crypto/weakcrypto/test/tpkcs5kdf/scripts/tpkcs12kdftests.txt
changeset 72 de46a57f75fb
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/crypto/weakcrypto/test/tpkcs5kdf/scripts/tpkcs12kdftests.txt	Thu Jun 24 15:39:07 2010 +0530
@@ -0,0 +1,10094 @@
+// Copyright (c) Symbian Software Ltd 2006 - 2007. All rights reserved.
+
+<action>
+	<actionname>PKCS5 Key Derivation Test 1 -- vector from peter gutmann</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>password</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>5</iterations>
+			<key>D1DAA78615F287E6</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 2 -- 100 iterations vector from generated openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>password</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>100</iterations>
+			<key>68551A5F09AC24F41152059F3A0A2EE8EE6048C9D600BE023C2D85B4BE27BAE6</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 3 -- 1000 iterations 16 byte key, vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>password</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>142F8FAFCE633CCD9265D90FC8FE4252</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 4 -- 10000 iteration 64 byte key -- vector from generated openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>password</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>10000</iterations>
+			<key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 5 -- 16 byte key, really long password vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>This is an example of a really long really long password, I'm attempting to see how long we can make it and still see if our code will work. This really shouldn't be a problem</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>A39EDFA35086746DE5B4792035D9A070</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 6 -- 16 byte key, medium size password vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>5F9219EED8BD0BCF5B3440B062305E05</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 7 -- 32 byte key, long salt, short password vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>password</passwd>
+			<salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt>
+			<iterations>1000</iterations>
+			<key>5648F3832B18C6A85165B093627F2268CCE1E79DC2F85D3909C36356789B349D</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 8 -- 32 byte key, long salt, long password vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
+			<salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt>
+			<iterations>1000</iterations>
+			<key>9F14D62760272D4388FA70E31C2B7940A083F0190C244F25F293D98D58766016</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 9 -- 16 byte key, really long password vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>Thisisanexampleofareallylongreallylongpassword,I'mattemptingtoseehowlongwecanmakeitandstillseeifourcodewillwork.Thisreallyshouldn'tbeaproblem</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>529C96D62F54418DD6AD33724F3014D6</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 10 -- 16 byte key, really long password vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>ThisisanexampleofareallylongreallylongpasswordImattemptingtoseehowlongwecanmakeitandstillseeifourcodewillworkThisreallyshouldntbeaproblem</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>E493D7C57BD77047C9D709DF99CBD3C7</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 11 -- 16 byte key, really long password vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>EBD56BEE980D41A38AFA53642AAE4B25</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 12 -- 32 byte key, really long password vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>EBD56BEE980D41A38AFA53642AAE4B251FF9C2A1503B2EF65F28E59DEF906A60</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 13 -- 32 byte key, long password vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>1FFB655FEEC4202B0466BF24AA9800D0A96BFA7F904D655253CE2E32B0B7B795</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 14 -- 32 byte key, long password vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>A544F0E2F88507E44F92CA2DCAC8B67C0E0D780182CF7DDC18AB1CA9BB3C2904</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 15 -- 32 byte key, medium length password vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>passwordpasswordpasswordpasswordpasswordpassword</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>F1DC1A4224F0C9A4655FFDB7D5BE75060BFFD0B682293A5D2E61BD5A773B81BC</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 16 -- 32 byte key, long password vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>798B6F4DA56ECDA25C82A63F3577C3FF97A3A2A92BE3DD810C47704916890615</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 17 -- 32 byte key, long password vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>5F9219EED8BD0BCF5B3440B062305E052CE70AEBC9A43CE9F4F39E3D0E56603D</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 18 -- 32 byte key, long password vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>421B82FF5825F9BE0E580C4D07BFF0CF54FFFD1BAD7763BF483A8291359F60E6</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 19 -- 32 byte key, 65 byte password to test the fix in the CHMAC::Init code vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordp</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>5D0AAB5A6A7BCD6F5376DF142E7FEAC98728F4F1322091138300A95DB5EBDE72</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 20 -- 32 byte key, password with spaces vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>password password password password password password password passwordp</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>EE99202289798A02DC6EAEB81A501C43AE3F8513B8F9ECC62FFBF3D0F70EF444</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 21 -- 1 byte key vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>password</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>10000</iterations>
+			<key>66</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 22 -- 128 byte key vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>password</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>10000</iterations>
+			<key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584E6FCB5C7636C3A04DA7F38778BE00C842A5A202578408C27FA08A3A7AACDF7A7B3F9763A33DDDCD09B3E07FA95106B07892F6981AA450447E106BCA8252B1532</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 23 -- 160 (multiple of hash size) byte key vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>alkiasdk29s.382{</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>30000</iterations>
+			<key>62E18995350965CF1E02F111ADBEE270FBBAE6A2D8C6B94D24F1E4E41B04FE40C1C7CE7E768092362A75F220601AAF3FBBE339F33D97CA0443D8DD795B88BF97F9A41561A80D20659486459995CA559D5C37792C608CF279E880142319D333D17C62C35C65E9D2A50E0F4010E2D475ECB179A41366D62617BB48B13FA3A98E3FA0F76236442E324B39EDD1B9AB253A1D6A6A6462E3330B548BC4DAE4CD060FC6</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 24 -- 8 byte key vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>`1234567890-=¬!"£$%^&*()_+qwertyuiop[]asdfghjkl;'#\zxcvbnm,./QWERTYUIOP{}ASDFGHJKL:@~|ZXCVBNM<>?</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>F104F4B53A4A160F</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 25 -- 256 byte key vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>`1234567890-=¬!"£$%^&*()_+qwertyuiop[]asdfghjkl;'#\zxcvbnm,./QWERTYUIOP{}ASDFGHJKL:@~|ZXCVBNM<>?</passwd>
+			<salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt>
+			<iterations>10000</iterations>
+			<key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key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+// Out of Memory tests follow
+<action>
+    <actionname>OOM Start</actionname>
+    <actiontype>startmemfailure</actiontype>
+    <actionbody></actionbody>
+    <actionresult>
+        <return>KErrNone</return>
+    </actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 1 -- vector from peter gutmann</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>password</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>5</iterations>
+			<key>D1DAA78615F287E6</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 2 -- 100 iterations vector from generated openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>password</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>100</iterations>
+			<key>68551A5F09AC24F41152059F3A0A2EE8EE6048C9D600BE023C2D85B4BE27BAE6</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 3 -- 1000 iterations 16 byte key, vector generated from openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>password</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>1000</iterations>
+			<key>142F8FAFCE633CCD9265D90FC8FE4252</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 4 -- 10000 iteration 64 byte key -- vector from generated openssl</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>password</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>10000</iterations>
+			<key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584</key>
+		</derivekey>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+	<actionname>PKCS5 Key Derivation Test 5 -- leave from performAction other than KErrNoMemory</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<passwd>password</passwd>
+			<salt>1234567878563412</salt>
+			<iterations>10000</iterations>
+			<key>66</key>
+			<leaveinperformaction>1</leaveinperformaction>
+		</derivekey>
+		<knowndefect>ETrue</knowndefect>
+	</actionbody>
+	<actionresult>
+		<return>KErrNone</return>
+	</actionresult>
+</action>
+<action>
+    <actionname>OOM End</actionname>
+    <actiontype>stopmemfailure</actiontype>
+    <actionbody></actionbody>
+    <actionresult>
+        <return>KErrNone</return>
+    </actionresult>
+</action>
+//End of out of memory tests
+
+// =====================================================================
+// PKCS#12 tests
+
+<action>
+    <actionname>OOM Start</actionname>
+    <actiontype>startmemfailure</actiontype>
+    <actionbody></actionbody>
+    <actionresult>
+        <return>KErrNone</return>
+    </actionresult>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>3037AFC8EA</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>37F44080CB</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>8A18939ACF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>AFF6C5EDE0</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>2ED53BB2CE</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>49CABE7B67</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>F994B990D3</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>1AFAAD7E51</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>878C91098D</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>0DE3F08CAF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>90253A49C0</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>40BE97AB93</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>A64B43E14E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>E323D5F588</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>27476572AF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>A1D9010A67</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>17E4E1F15B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>D1B71808FC</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>EE7E4073F2</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>5BF185C726</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>72ADF5E041</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>63E6DF459C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>C2099204AB</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>3204D28A32</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>FB845F70A4</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>B9230EEC1D</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>462B0F2D1B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>05B66EF1BB</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>C1B7E77C96</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>3DE08CDACF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>D0158BFC57</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>AEB6CD53F0</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>80010C12B6</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>497DE34C4C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>146C6A5B58</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>E89772E7A5</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>2393071377</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>DF2D961FE3</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>363619530B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>B43FA2D22B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>EF50923D65</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>9A618595C7</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>B3B33AA8A6</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>C007DC1ADA</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>91DF366136</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>9A08D3C4F5</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>33002FA0B6</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>22001FA269</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>B0935F1122</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>6602B1B4BB</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>3A478368DD</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>6473EB1244</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>AA762B8736</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>F00C5240B0</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>935593CA37</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>FCE1F429AE</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>82B4A13659</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>45FE091D4D</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>5670457314</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>1C4CAE2514</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>8B4B3CBFB0</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>C89C3A2C9C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>8109F97073</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>55E985CC15</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>2802AA97D4</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>881509A34D</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>B2918BC593</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>0FE0529B45</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>1FF923C4B1</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>05D1E56D04</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>99FE149183</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>79E29F3FCB</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>22A70A8657</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>9CBA922190</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>A037A8B1C2</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>82824BE51C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>E166049AC4</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>90E975CC54</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>1FFD40D7BB</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>406C92305A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>E82BD75AA9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>0182E41FCA</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>101FB77598</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>D7499C6A12</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>2C6222B8E2</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>6789F0680A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>43E6637258</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>8B3308BDD5</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>CA202602C9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>F6A33ADA6A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>79A4E1398F</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>6F2402CCE4</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>B9ED7B3135</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>65B27A78C7</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>8F8FC96A3D</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>642DDC3F4E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>0FE4BDC100</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>32D7F10C5E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>C05FE26245</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>818C967A8F</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>5301B5B2A1</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>9CB5BD2394</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>EB90D956B3</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>ACAFB5EB24</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>A7B0859D9D</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>B0F0F2EB44</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>C11C0499CC</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>3F63500AC4</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>B47F802F12</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>3099237692</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>CD04522946</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>D85432F8AC</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>C77FDE2E52</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>62E06B8A26</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>A5B348EB49</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>2A824C1B6B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>4B8D18B96E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>9DABF586AD</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>F734BE1BF9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>47C18634A0</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>3037AFC8EACD4E2AEAB3C1E343B81DE8</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>37F44080CB10A6F7E2719CC979FE0F2E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>8A18939ACF4A00A900FE2351DCBAFD0C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>AFF6C5EDE0A50855FE56FDEDB6031BD0</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>2ED53BB2CE3C39A2F4039B734F9D94C5</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>49CABE7B67736931126499722509C03D</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>F994B990D3554AFB778C729E9BAA0CC6</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>1AFAAD7E51964CCD2760CCE134E1F2B8</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>878C91098D1F4FD0DD8CBC3A8149DF5F</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>0DE3F08CAF4FF556C956527AD47C3497</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>90253A49C069E7FF35281461A4DDBE0B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>40BE97AB930A7E8B6DB634C93B94E699</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>A64B43E14E9F71F9EC9A3E6B73FA35E6</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>E323D5F588414AE68EF8FCA46879C1C7</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>27476572AF26E99AB85CD350DC802ABA</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>A1D9010A6761CB2675F1C33BB3C52158</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>17E4E1F15BC31052E563BFF7B5D11D15</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>D1B71808FCCA5C97E8E52CF5E23C633C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>EE7E4073F2E6008722BB9842540998C2</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>5BF185C726EE2182888A834066C30BA9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>72ADF5E0413FDBF6659A1E7D495BBE32</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>63E6DF459C899D72577C20FFE4F27670</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>C2099204ABFBB841875BD7595A89D31A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>3204D28A32DF299B612958906C79154A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>FB845F70A40E96C536641C3F797AAE39</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>B9230EEC1D615A6DFEF5A8793CB06783</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>462B0F2D1B18297A3F2C5E4058A0083E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>05B66EF1BB844470CBBB46D5F4C7DB29</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>C1B7E77C96BB5EE1386E8461A58F0D0C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>3DE08CDACF489F30BBD75C0FF401EC02</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>D0158BFC57E643965DC161741725CE94</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>AEB6CD53F0D6830161100C4BFD439B34</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>80010C12B66CC739F4ACF8BB15419770</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>497DE34C4C64E56AD53E5F8F6E16D1A3</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>146C6A5B58AF8561220DE4C13A133248</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>E89772E7A52D6D8C65AAE01D0380ED59</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>23930713772E26DBBABB53F3C5C77501</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>DF2D961FE3929BBA41493EB5421FEF7C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>363619530B170B7BAE1C046B29351C23</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>B43FA2D22B6912F6FEDF1CF3FAD123AF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>EF50923D65A0610BDC51AD5DB1B4F4F9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>9A618595C714486B7D7E3120005C8BC1</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>B3B33AA8A6777605E3029C0F8DC45290</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>C007DC1ADA9475C5DB2F9B5D18A2DEFD</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>91DF3661364A0DAD28180A41ADCB5567</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>9A08D3C4F584ECD1E538B7A46DCFDEA1</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>33002FA0B6A5A27991A062FF6173E357</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>22001FA26964DCD0BE3C58AB6E43557C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>B0935F11227F5A473073DCD188886687</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>6602B1B4BBB670208041ECD8E1634845</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>3A478368DD5DC61BAA09325959A3F46C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>6473EB1244E055149E0858C49FAE7B8D</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>AA762B8736D4C37BAD263103CA283E09</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>F00C5240B03C9A2324BD5FE0AEEE1B62</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>935593CA370BB6988F2F41D2F4ABF56E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>FCE1F429AEB3B9818D96B88DD25CDED9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>82B4A13659033EA4025DB51A6CB573F9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>45FE091D4DD2D50FA7D3340B1DB838F2</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>5670457314E405B0ED1583FC4B82FEAD</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>1C4CAE25146D74F3762B5C3FD3A91752</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>8B4B3CBFB00466F63B30FEAD111E163D</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>C89C3A2C9C06626EB831F4BB5262809B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>8109F97073FF3D286B21095E7AFBBAFA</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>55E985CC1581F3D0052F53DB469F6DC9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>2802AA97D4C79B1813AB23F2DD710722</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>881509A34D80B5AB5CEC65B859DF2D99</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>B2918BC593DEC4559C279CFA050CB0F9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>0FE0529B45AFC9BB66323C2182DE414A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>1FF923C4B1E1007EF168E4185280F818</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>05D1E56D04BC435A60BDE06C5AFAC9E3</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>99FE149183022F9EB2EB815BCC9504E5</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>79E29F3FCB3777460EC0F43D3D7048A7</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>22A70A865774E55CF08A704356112522</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>9CBA922190F1659F6AA3B2B98347EEC2</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>A037A8B1C20DC883FAABF82D8A591B9E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>82824BE51C81A5FF4C4268E256F6621B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>E166049AC4E765E513AFA8A35DDBE756</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>90E975CC54F8BDA5A6CED39088716B27</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>1FFD40D7BBA891A7E6C4DED39FB0740B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>406C92305ACD663AB0B9EB66DED79295</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>E82BD75AA9467E0B8D92362A56CB5D73</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>0182E41FCA166CEAED10972BDF5F57A8</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>101FB775982CA15E37A065F7CDC5593D</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>D7499C6A1218C419A1F81AA5E3F41E88</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>2C6222B8E2E97F63FFE9E2FC32D673FA</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>6789F0680A5C5840B8ED34B061494171</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>43E663725870C4801A917C41C9B58C41</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>8B3308BDD5A8AE507200EAA16FE19D42</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>CA202602C9A265559B6B96729B574DAA</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>F6A33ADA6A0F5990E9DA747550DE0941</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>79A4E1398F511B262E60DCFE9E838C93</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>6F2402CCE4A91C1B848CCABD915657A2</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>B9ED7B3135488439E78DF480AD845E7E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>65B27A78C72DFEEA6C92846330CE98C6</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>8F8FC96A3D958731780B50E843D6BB65</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>642DDC3F4E11C3051D6CDED8DD898C4C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>0FE4BDC1000D1AC2F5E83A938A2BE2F1</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>32D7F10C5EAA9961B590E8FE4561B9D5</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>C05FE26245C742CC01B23C655E5D934D</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>818C967A8F742565CCA37CEA8C683FCC</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>5301B5B2A1A6EB6832DC47F3A0850B56</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>9CB5BD2394B268E13DCA91EE2BB0A39C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>EB90D956B358B7C5E9FC4A4EFA02589B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>ACAFB5EB24FFB3B418587B832F52C226</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>A7B0859D9D1BF5E59047192BF2B8C7AC</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>B0F0F2EB445AB4DBE901D3C248482259</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>C11C0499CC9EC9FBB6ACA7BF4C0B5389</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>3F63500AC41074B4D2C1A991CBBBB013</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>B47F802F1238A73054DEFD7D3AABFC81</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>3099237692953AB2017A1BF0B12DAFC8</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>CD045229461658BC6C47C259F2D20433</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>D85432F8ACAE9653D34A68D9329F347A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>C77FDE2E52892DF5613E6A3B8F1C80B9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>62E06B8A2650199AE6E73AB3F503BF02</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>A5B348EB4926290B223724CC8E4ED67F</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>2A824C1B6B36AD48D0A5AE94E27988D4</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>4B8D18B96EB898D1BAA8BDD82BC443F0</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>9DABF586AD2BCD603DC38C3987C98D73</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>F734BE1BF990A3A59CEA6C821492F0B6</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>47C18634A09AB37AB6EECBCD5C7E7F23</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>3037AFC8EACD4E2AEAB3C1E343B81DE84ACF7E50A7</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>37F44080CB10A6F7E2719CC979FE0F2E37D0A2CD9B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>8A18939ACF4A00A900FE2351DCBAFD0C19FCB09599</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>AFF6C5EDE0A50855FE56FDEDB6031BD0BDEFCB74C5</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>2ED53BB2CE3C39A2F4039B734F9D94C5075116B05A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>49CABE7B67736931126499722509C03D4BBEF714A8</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>F994B990D3554AFB778C729E9BAA0CC6EB5BA76534</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>1AFAAD7E51964CCD2760CCE134E1F2B87B314CC024</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>878C91098D1F4FD0DD8CBC3A8149DF5FDE18B82888</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>0DE3F08CAF4FF556C956527AD47C3497C24281A32B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>90253A49C069E7FF35281461A4DDBE0BB38F4041A0</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>40BE97AB930A7E8B6DB634C93B94E699D1AD5125B8</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>A64B43E14E9F71F9EC9A3E6B73FA35E6F7058A9FC8</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>E323D5F588414AE68EF8FCA46879C1C7317B8FA9C1</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>27476572AF26E99AB85CD350DC802ABA3A831332A7</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>A1D9010A6761CB2675F1C33BB3C5215851703D0D26</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>17E4E1F15BC31052E563BFF7B5D11D1545835E9B47</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>D1B71808FCCA5C97E8E52CF5E23C633C5B9D4A5BE3</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>EE7E4073F2E6008722BB9842540998C2C4F7A87C3A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>5BF185C726EE2182888A834066C30BA92C0A6A140F</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>72ADF5E0413FDBF6659A1E7D495BBE32915F295734</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>63E6DF459C899D72577C20FFE4F27670F3A85EA780</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>C2099204ABFBB841875BD7595A89D31A9D03A34B94</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>3204D28A32DF299B612958906C79154AED69D3F1C0</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>FB845F70A40E96C536641C3F797AAE39BE8A81CD04</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>B9230EEC1D615A6DFEF5A8793CB067834B66B77A11</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>462B0F2D1B18297A3F2C5E4058A0083E1FF74BE8CC</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>05B66EF1BB844470CBBB46D5F4C7DB291B21A4623F</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>C1B7E77C96BB5EE1386E8461A58F0D0CB544944CDF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>3DE08CDACF489F30BBD75C0FF401EC02E87ECD4647</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>D0158BFC57E643965DC161741725CE9478CDF2A0B5</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>AEB6CD53F0D6830161100C4BFD439B341066339A00</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>80010C12B66CC739F4ACF8BB154197709F78AAD39A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>497DE34C4C64E56AD53E5F8F6E16D1A3220BC95812</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>146C6A5B58AF8561220DE4C13A133248300D59D39E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>E89772E7A52D6D8C65AAE01D0380ED59927CD0C2BE</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>23930713772E26DBBABB53F3C5C775019B8048482B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>DF2D961FE3929BBA41493EB5421FEF7C2F6C31FE0A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>363619530B170B7BAE1C046B29351C235B8EFED588</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>B43FA2D22B6912F6FEDF1CF3FAD123AF6FC587CA4E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>EF50923D65A0610BDC51AD5DB1B4F4F98FD4D15B0E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>9A618595C714486B7D7E3120005C8BC18D5D95D79B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>B3B33AA8A6777605E3029C0F8DC45290E3C4167208</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>C007DC1ADA9475C5DB2F9B5D18A2DEFD93A30AE3B2</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>91DF3661364A0DAD28180A41ADCB55676E992986EF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>9A08D3C4F584ECD1E538B7A46DCFDEA18A8F8BE461</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>33002FA0B6A5A27991A062FF6173E357D9496E6ED1</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>22001FA26964DCD0BE3C58AB6E43557CE7B006E466</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>B0935F11227F5A473073DCD188886687D2A1811953</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>6602B1B4BBB670208041ECD8E1634845FC0DC28532</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>3A478368DD5DC61BAA09325959A3F46C7F46AD9E44</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>6473EB1244E055149E0858C49FAE7B8DC951E7E32A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>AA762B8736D4C37BAD263103CA283E09010B7EFC53</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>F00C5240B03C9A2324BD5FE0AEEE1B6237EB9421D8</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>935593CA370BB6988F2F41D2F4ABF56E433064D83E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>FCE1F429AEB3B9818D96B88DD25CDED9F01233C0BF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>82B4A13659033EA4025DB51A6CB573F93B03A69634</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>45FE091D4DD2D50FA7D3340B1DB838F22161FBEE94</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>5670457314E405B0ED1583FC4B82FEAD94B434EBED</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>1C4CAE25146D74F3762B5C3FD3A917522564855675</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>8B4B3CBFB00466F63B30FEAD111E163D56118A7D93</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>C89C3A2C9C06626EB831F4BB5262809B9C138181C4</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>8109F97073FF3D286B21095E7AFBBAFAA62B1313EE</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>55E985CC1581F3D0052F53DB469F6DC9B72C8F0F5C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>2802AA97D4C79B1813AB23F2DD71072209BCFF9D4F</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>881509A34D80B5AB5CEC65B859DF2D998F1A98B2DD</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>B2918BC593DEC4559C279CFA050CB0F917D8ED7FF3</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>0FE0529B45AFC9BB66323C2182DE414A3D24275EEF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>1FF923C4B1E1007EF168E4185280F8184B14D41DC3</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>05D1E56D04BC435A60BDE06C5AFAC9E3CB282C7B16</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>99FE149183022F9EB2EB815BCC9504E59C524A1497</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>79E29F3FCB3777460EC0F43D3D7048A7F4919120FE</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>22A70A865774E55CF08A70435611252278DCE76AED</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>9CBA922190F1659F6AA3B2B98347EEC28DCD740C67</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>A037A8B1C20DC883FAABF82D8A591B9E2BE41C79CE</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>82824BE51C81A5FF4C4268E256F6621B9656325BEF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>E166049AC4E765E513AFA8A35DDBE7562E01B79FC2</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>90E975CC54F8BDA5A6CED39088716B272C4B5887CE</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>1FFD40D7BBA891A7E6C4DED39FB0740B6A5AD39E84</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>406C92305ACD663AB0B9EB66DED7929547C692FE11</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>E82BD75AA9467E0B8D92362A56CB5D7353508CC355</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>0182E41FCA166CEAED10972BDF5F57A8F851200E37</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>101FB775982CA15E37A065F7CDC5593DE385BDF504</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>D7499C6A1218C419A1F81AA5E3F41E88AF0704B614</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>2C6222B8E2E97F63FFE9E2FC32D673FAAEC7201B95</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>6789F0680A5C5840B8ED34B061494171E6407643F9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>43E663725870C4801A917C41C9B58C419933A93475</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>8B3308BDD5A8AE507200EAA16FE19D42F3736716A5</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>CA202602C9A265559B6B96729B574DAA9B6D67036F</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>F6A33ADA6A0F5990E9DA747550DE0941AE4263D468</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>79A4E1398F511B262E60DCFE9E838C938B806716A9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>6F2402CCE4A91C1B848CCABD915657A242EA1FC6D2</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>B9ED7B3135488439E78DF480AD845E7EFEE3EF39E6</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>65B27A78C72DFEEA6C92846330CE98C6721909E89B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>8F8FC96A3D958731780B50E843D6BB65137A0728C3</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>642DDC3F4E11C3051D6CDED8DD898C4CAEB2463E25</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>0FE4BDC1000D1AC2F5E83A938A2BE2F14C62609AB4</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>32D7F10C5EAA9961B590E8FE4561B9D571AD446F0C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>C05FE26245C742CC01B23C655E5D934D734610DE01</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>818C967A8F742565CCA37CEA8C683FCC5BEE9DA7B0</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>5301B5B2A1A6EB6832DC47F3A0850B5680178499B3</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>9CB5BD2394B268E13DCA91EE2BB0A39C101A5534AA</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>EB90D956B358B7C5E9FC4A4EFA02589B2357EA87EA</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>ACAFB5EB24FFB3B418587B832F52C2260339CD1DD4</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>A7B0859D9D1BF5E59047192BF2B8C7ACC676E0C4B2</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>B0F0F2EB445AB4DBE901D3C2484822595F58B91CCD</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>C11C0499CC9EC9FBB6ACA7BF4C0B538991A350E7A2</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>3F63500AC41074B4D2C1A991CBBBB013D8416F66C2</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>B47F802F1238A73054DEFD7D3AABFC819FC75A29D9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>3099237692953AB2017A1BF0B12DAFC8F3A797AA45</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>CD045229461658BC6C47C259F2D20433173DE4D31E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>D85432F8ACAE9653D34A68D9329F347AA10E53DB6D</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>C77FDE2E52892DF5613E6A3B8F1C80B92E9E2AB0BC</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>62E06B8A2650199AE6E73AB3F503BF027DCEC0A49B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>A5B348EB4926290B223724CC8E4ED67FF458F23622</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>2A824C1B6B36AD48D0A5AE94E27988D4F6BDCB2A25</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>4B8D18B96EB898D1BAA8BDD82BC443F0FF00CE1360</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>9DABF586AD2BCD603DC38C3987C98D73A5A9F4B3B2</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>F734BE1BF990A3A59CEA6C821492F0B660C6488EF0</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>47C18634A09AB37AB6EECBCD5C7E7F234F02E574A1</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>3037AFC8EACD4E2AEAB3C1E343B81DE84ACF7E50A7FB67481AA26FAE2392310DEEF5BA9CB27DCE2D3FB11C95109E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>37F44080CB10A6F7E2719CC979FE0F2E37D0A2CD9B5FC87F188064903840A07BEA1540D4397A8C3BF85454D5EAEF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>8A18939ACF4A00A900FE2351DCBAFD0C19FCB0959936E4C6D9ED338B321B97C02E22A12E67A249DF5FFBB5F09E01</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>AFF6C5EDE0A50855FE56FDEDB6031BD0BDEFCB74C596AEC2CBF2648BC315B5422D9071708C31F2FCC6D7AC48ED63</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>1</iterations>
+			<key>2ED53BB2CE3C39A2F4039B734F9D94C5075116B05A655F8AB429B72644AA7EE4C3FA31141DACFEB8D89E1825091F</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>49CABE7B67736931126499722509C03D4BBEF714A80CCCCF475F4CA3FCBC217CAFA6AFF894CEA28E0DCD7B5A0D0D</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>F994B990D3554AFB778C729E9BAA0CC6EB5BA765340999DE8474B918B754A380F8141A055CD68B85B4CDCC592ED9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>1AFAAD7E51964CCD2760CCE134E1F2B87B314CC0246300C1BDD916C1EF496E57D589FB2C357D7EF9142AB64B2E02</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>878C91098D1F4FD0DD8CBC3A8149DF5FDE18B82888F04507B6810813D6DDAF8E0257911B49AB5250127C50809B33</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1</iterations>
+			<key>0DE3F08CAF4FF556C956527AD47C3497C24281A32B7984CFB3D568FE48E9F78B99EB8561E2F627E46D0EEECF491C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>90253A49C069E7FF35281461A4DDBE0BB38F4041A04FF42A617251CC66ED7314BFAF4CB2F47A98E42B8AA3BE142A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>40BE97AB930A7E8B6DB634C93B94E699D1AD5125B8FA3F056762C96D7E119F68827FBFCC07B2A9E98238B52AA02B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>A64B43E14E9F71F9EC9A3E6B73FA35E6F7058A9FC812A4EEE1F3DE7E52EA6A981DB02085FC4AB4860E438EA50BC5</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>E323D5F588414AE68EF8FCA46879C1C7317B8FA9C19C126E28BC5C05064D38F67EF7A72A28795F0CFBA8574DA174</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1</iterations>
+			<key>27476572AF26E99AB85CD350DC802ABA3A831332A7E037629B764434E2E02B5AB8E8A3DC181BBA3AD9AF9D7E8F08</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>A1D9010A6761CB2675F1C33BB3C5215851703D0D2657B057B9372B986ABA327B6C8B8D4372656C74E9756C7C0C2C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>17E4E1F15BC31052E563BFF7B5D11D1545835E9B47AC57D1E3FE07F2C194037B1CE0E18DE0CB8C335975EA51B037</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>D1B71808FCCA5C97E8E52CF5E23C633C5B9D4A5BE332D3AB8A36EE0DC8F1B7E691D2FA8BCCC2C7C371639EBA5CC6</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>EE7E4073F2E6008722BB9842540998C2C4F7A87C3A0EC11A60E916ADAD62C57711E88134D3451CEE8640938390E9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>2</iterations>
+			<key>5BF185C726EE2182888A834066C30BA92C0A6A140FD09995773E708440FF38F65CBF71E7449EF43ADDDDCCEE7B63</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>72ADF5E0413FDBF6659A1E7D495BBE32915F295734423A7247E5DFD46D2CE07E64F4F881362C98992B188EDE499D</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>63E6DF459C899D72577C20FFE4F27670F3A85EA780B450C711D83FB12C0B0A0539209B1B06AF82EE392AB3FD6A6B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>C2099204ABFBB841875BD7595A89D31A9D03A34B94D3ED582C55B0787E2FB841ADE1E6171D6FE2BDDB19A658F552</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>3204D28A32DF299B612958906C79154AED69D3F1C0351B1A4B4E2DCA7E93F3CAD92714CC9E13CCD0E95A305EBB13</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2</iterations>
+			<key>FB845F70A40E96C536641C3F797AAE39BE8A81CD04873EC243829CE9F83DE277AEC92B18D43211D6DAC966AFFFE8</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>B9230EEC1D615A6DFEF5A8793CB067834B66B77A11162299D91EC09517DEACB6C8992D8D1952B9410AED287F9387</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>462B0F2D1B18297A3F2C5E4058A0083E1FF74BE8CC49A6C7BD0A735DBA22FCBC56A6AACAA2ECE7F146A54C7442A7</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>05B66EF1BB844470CBBB46D5F4C7DB291B21A4623F41D1179DBADD72CF7CC8A3F03118C5EF87C588C6665E942158</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>C1B7E77C96BB5EE1386E8461A58F0D0CB544944CDFE51188263603019F80688985DB1EF389A8F2CADA47463756C7</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2</iterations>
+			<key>3DE08CDACF489F30BBD75C0FF401EC02E87ECD4647451A53DE6218B8B2F860931DE8975712EAC7CAF34347828525</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>D0158BFC57E643965DC161741725CE9478CDF2A0B52A78253F32B2DFCC2228C929F19663EC3AF4B6B3B4A514D2AE</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>AEB6CD53F0D6830161100C4BFD439B341066339A0025D3CF7DC68CEE4D9AC92B10B29EB19973637D27DC2C9BF911</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>80010C12B66CC739F4ACF8BB154197709F78AAD39ABC8EEC11F7C88CD138DE85A21B5D5DCB9C8E50E0AFABE82149</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>497DE34C4C64E56AD53E5F8F6E16D1A3220BC95812046A01A53F6FB1C9051ED917D0B3C08A82CADA712730DD2410</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>4</iterations>
+			<key>146C6A5B58AF8561220DE4C13A133248300D59D39E22569CC568CB98585324F9287A672ABFCDF360A26B8B83D1AE</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>E89772E7A52D6D8C65AAE01D0380ED59927CD0C2BE22F0030D6D6FBF85D6A56D7D55A3002233181BCC2A0C4108C8</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>23930713772E26DBBABB53F3C5C775019B8048482B6FECC40729F2D5023D6F3C27092166E11A435738C3E0DBF7B0</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>DF2D961FE3929BBA41493EB5421FEF7C2F6C31FE0A93D6A3DD0A61826365407B4C1CBB589C0BC10EC8B510A83771</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>363619530B170B7BAE1C046B29351C235B8EFED58879EAB2DAF93502D254C5569C2667F16B2AA036619AAF4D8E33</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>4</iterations>
+			<key>B43FA2D22B6912F6FEDF1CF3FAD123AF6FC587CA4EFF6FE83AD6ED83E4F217EF7E0C6727BEF0614398026907E7E6</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>EF50923D65A0610BDC51AD5DB1B4F4F98FD4D15B0EA1D3AB1983B1E0496EB6FD7259774354267B1976BE459A1D23</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>9A618595C714486B7D7E3120005C8BC18D5D95D79B54DE1063C64DBE97C41BFC6A4A5239B77F2F603C7AFE06247C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>B3B33AA8A6777605E3029C0F8DC45290E3C4167208FA46F3C504ABA355D99FE3A4291DBAB83CB6980CD28C153D24</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>C007DC1ADA9475C5DB2F9B5D18A2DEFD93A30AE3B2F2B76DBC180C689C88147F5366D48C10086AD45B445F818F22</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>4</iterations>
+			<key>91DF3661364A0DAD28180A41ADCB55676E992986EFCD5481A7EBCCA45806E087BB95BAEFD24685A7D9B08426EFCF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>9A08D3C4F584ECD1E538B7A46DCFDEA18A8F8BE4612564ECF299468389BF3597B38FF0ADB79AE9A718D7FC5E0D7E</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>33002FA0B6A5A27991A062FF6173E357D9496E6ED1CD2460647D83960A81A688C1E7C3CB1745C640F96CA26BAB55</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>22001FA26964DCD0BE3C58AB6E43557CE7B006E466B5176BC31A916229C8DC27918BEAC1912CCD1BEDD4D9AC6F7F</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>B0935F11227F5A473073DCD188886687D2A18119532A1D5D0A8631441599FF319BD921404D04DA973217A199F621</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>8</iterations>
+			<key>6602B1B4BBB670208041ECD8E1634845FC0DC28532AF24AA6CB93368E87126BC821DB7B3F4301455B454E9715981</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>3A478368DD5DC61BAA09325959A3F46C7F46AD9E449B3AFB8236BFFDF548BA07B6269CB5C0D0E0E00AABB5E872F7</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>6473EB1244E055149E0858C49FAE7B8DC951E7E32AC2AA2146482717104D3E93074D41BCA226B3212A41E4EC0F00</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>AA762B8736D4C37BAD263103CA283E09010B7EFC538B44C6C3CB724C8CEC28C91F57A2778A8C74CBBF00A63D6875</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>F00C5240B03C9A2324BD5FE0AEEE1B6237EB9421D88232044436DA8D74F09E19B578C65F8629D022FD8D529F11E2</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>8</iterations>
+			<key>935593CA370BB6988F2F41D2F4ABF56E433064D83E5C5C9892BDB854C8219FFBC1404D590450B1613EB0D2CC0447</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>FCE1F429AEB3B9818D96B88DD25CDED9F01233C0BFCE80BAAFDC06F9C1D1A2862C10203D891E0B2C23F5394ED271</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>82B4A13659033EA4025DB51A6CB573F93B03A69634D71DFB7E270A406AF705382CCA3BB17F29C88ED81EA583AFF5</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>45FE091D4DD2D50FA7D3340B1DB838F22161FBEE94047C10AE3CA2853B57E8E59A819DE9BB2D4F3BFBD302F978C7</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>5670457314E405B0ED1583FC4B82FEAD94B434EBEDD86DFBC39161A8A7E48CAD3591C2C9A14FAA242D860ED55163</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>8</iterations>
+			<key>1C4CAE25146D74F3762B5C3FD3A917522564855675801D9D7D946C11B6F57C42C2E7447F8CACF4178D8F7A001A18</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>8B4B3CBFB00466F63B30FEAD111E163D56118A7D93AF1D5E01AB3B9973959193DE7A2433CB46A8A15F2D84D97DBC</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>C89C3A2C9C06626EB831F4BB5262809B9C138181C44B6D521245B6BBDBE2271369C6B77EC12626368DFCEB358BB8</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>8109F97073FF3D286B21095E7AFBBAFAA62B1313EEE6D0B4E9C0A5EBBFF08FC23CB11E1DB17EBAE6A93C2DA749A6</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>55E985CC1581F3D0052F53DB469F6DC9B72C8F0F5C2011A3B26BD1C95A8797741938D8E3F2057F76B04310B3D922</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>128</iterations>
+			<key>2802AA97D4C79B1813AB23F2DD71072209BCFF9D4F97A6D3BDA02B3173244164AAE9123987A00699B74F042C35DC</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>881509A34D80B5AB5CEC65B859DF2D998F1A98B2DD8D380FA3C08389E335A71B575F3D48228119EA2E34351C7E51</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>B2918BC593DEC4559C279CFA050CB0F917D8ED7FF3FD6375B5D9AB89DDA3B28526392E1BED3594C3A22594137133</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>0FE0529B45AFC9BB66323C2182DE414A3D24275EEF6F15DAE903AEAA4C8A9A23B8DA9E91293F5ED1904E6D8F8ED5</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>1FF923C4B1E1007EF168E4185280F8184B14D41DC3483C97430FABCCAB60A1F471741095AEB2B22B00951CEFB816</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>128</iterations>
+			<key>05D1E56D04BC435A60BDE06C5AFAC9E3CB282C7B16C2FF4007B705AC86ACDBE7C08A599E170F42573671CAAC9978</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>99FE149183022F9EB2EB815BCC9504E59C524A1497922B0A2AAB43D17ACD0C3C782048DA1AD2BA09B56143681975</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>79E29F3FCB3777460EC0F43D3D7048A7F4919120FEB822868DC3090EEB79DED23D3E5F8FADAF47EB100E36B393BF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>22A70A865774E55CF08A70435611252278DCE76AED5C8A686073CBBEFEA2A3498BF5505B3E9CC6A1BE108737874F</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>9CBA922190F1659F6AA3B2B98347EEC28DCD740C672CFA941C4ECCF5F173B42AABBBE23AEF7593C67EF5B183C3C8</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>128</iterations>
+			<key>A037A8B1C20DC883FAABF82D8A591B9E2BE41C79CED20B6799ADA986C06DDF299F615C6B222A9C12CB65CD078D9A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>82824BE51C81A5FF4C4268E256F6621B9656325BEFB8E936331AB1AB8BDE634EA6298D7B8EB79832AAF01CF1F49A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>E166049AC4E765E513AFA8A35DDBE7562E01B79FC2680CD8CEAEF02609895F3CAC00A837D49674737EEC85151786</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>90E975CC54F8BDA5A6CED39088716B272C4B5887CE53571C9CE41B5FB82532D38F0DB4489BC642605ACF4FDCAEF5</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>1FFD40D7BBA891A7E6C4DED39FB0740B6A5AD39E848576D39CDFA77EFE9969986D072D8C44B9147961EC0A3BC5AC</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>1024</iterations>
+			<key>406C92305ACD663AB0B9EB66DED7929547C692FE118E8D16D80EDCE4FAFBB47960F4B4AB7272496528D235E45B5A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>E82BD75AA9467E0B8D92362A56CB5D7353508CC355C1E6AFFDE182AC0F49BF46F175F79F51352196D93EA67E17DF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>0182E41FCA166CEAED10972BDF5F57A8F851200E371EC06DC900E66ACAEA25B12EFE28E7571395A1B57ABB8E9DAC</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>101FB775982CA15E37A065F7CDC5593DE385BDF504433650CC572F880CE0F525E77551ACFFCF92F66C9D407BFABF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>D7499C6A1218C419A1F81AA5E3F41E88AF0704B61492CF0D98500BD3842C77C2D639589A83E60B22BE53751156F1</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1024</iterations>
+			<key>2C6222B8E2E97F63FFE9E2FC32D673FAAEC7201B95969233AAFAC6ABB4C369DDD9394FBCE2C4D86670BAA2AD6355</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>6789F0680A5C5840B8ED34B061494171E6407643F9400545C62690ED570B3AAD96654D5DE15C7CA6AE242E6123E9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>43E663725870C4801A917C41C9B58C419933A93475CEA2FBB864F29E6D949DF2AAA8ADAB91C8A32B68062F12EE61</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>8B3308BDD5A8AE507200EAA16FE19D42F3736716A5C24BF367B0C63BE89EA9EB57615C0ABFAFC3FB8DFDEA3907AA</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>CA202602C9A265559B6B96729B574DAA9B6D67036F69D903784374671E9B7E087ADE4AB9C5AE6BB62530C90F4E9C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1024</iterations>
+			<key>F6A33ADA6A0F5990E9DA747550DE0941AE4263D4689DBDFBE81CF5F337376B8EEC58ADFD518A26768ABEB20131B9</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>79A4E1398F511B262E60DCFE9E838C938B806716A9831A1BF6FFE616ADE12860428079E9CD2165E9194346EB6677</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>6F2402CCE4A91C1B848CCABD915657A242EA1FC6D25BFDD890E8B903E66B306ED5C9F5C7B53BEA11BD495C328951</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>B9ED7B3135488439E78DF480AD845E7EFEE3EF39E64B6690AE6ED16C5A82A0F7E7D9578BA7F62A7427260733165A</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>65B27A78C72DFEEA6C92846330CE98C6721909E89B014925B22427256BC6A4EFEB7A83A2244E59A25E7DE2F01FA6</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>1536</iterations>
+			<key>8F8FC96A3D958731780B50E843D6BB65137A0728C3A4C55D23D4A0E99EBA71F56EC19356B50B987F486F3FF74A9C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>642DDC3F4E11C3051D6CDED8DD898C4CAEB2463E25C6120B9099920440D11725F1D4F7CABFB8A170BF9744B74461</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>0FE4BDC1000D1AC2F5E83A938A2BE2F14C62609AB413E8EAC164C3BA1FAD7ABC1CADB1BF7458010BF7814262F563</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>32D7F10C5EAA9961B590E8FE4561B9D571AD446F0CC173973E296F655BAB0BFEA7E51BACD8FC73AB278469439B58</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>C05FE26245C742CC01B23C655E5D934D734610DE015AEFA126CC8A53FBD91EC774AE631F57444E206494BE6EB304</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>1536</iterations>
+			<key>818C967A8F742565CCA37CEA8C683FCC5BEE9DA7B0E036709FBD02F0FA15B7497042FF3E0B56ED26ACC058F1D00B</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>5301B5B2A1A6EB6832DC47F3A0850B5680178499B3E8CDC6C4D8D7D7226769FADE4650767B4472BBD418B2D969EB</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>9CB5BD2394B268E13DCA91EE2BB0A39C101A5534AA3932F031B4FB2D6F799C857B7B821D5CB05419EE6DF2D10BBD</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>EB90D956B358B7C5E9FC4A4EFA02589B2357EA87EA949B44DA6EAFD9D83FCD9365C617C137F7EC9C3EF036BD592C</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>ACAFB5EB24FFB3B418587B832F52C2260339CD1DD458CDBB895741595BD6F879B9134D56F8695A654407E4809C56</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>1536</iterations>
+			<key>A7B0859D9D1BF5E59047192BF2B8C7ACC676E0C4B272CB0DD4D76CAE04D831A4C12BC353F7C60F50ED67DF548599</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>B0F0F2EB445AB4DBE901D3C2484822595F58B91CCDD858068993D4F95777E800B47B0A091487E50D888139BBAA95</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>C11C0499CC9EC9FBB6ACA7BF4C0B538991A350E7A2275085600120C9642E197813F99DBE317142466C44961771AF</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>3F63500AC41074B4D2C1A991CBBBB013D8416F66C2D6DD3D0577A59043B25D770FAC6CFF48666D15795B61297255</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>B47F802F1238A73054DEFD7D3AABFC819FC75A29D97444114C46756D3F2FD1DF12182CF6C83CF32E72D1A70DF206</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>53414C54</salt>
+			<iterations>2048</iterations>
+			<key>3099237692953AB2017A1BF0B12DAFC8F3A797AA45F218B705E54071E5BE4AB622F2E9B45FCA663D8B30ADCC0073</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>CD045229461658BC6C47C259F2D20433173DE4D31E54B1D693738FBA6D643ECB095761373FB0E49F9C478BA11755</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>D85432F8ACAE9653D34A68D9329F347AA10E53DB6DC8B942CA4D9447EDFC29A5BDC1D450A73B298C6A9A8ED7D2F4</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>C77FDE2E52892DF5613E6A3B8F1C80B92E9E2AB0BC37C801DE5E02A6DD1A193970B4505A403005B378BE47D61FEB</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>62E06B8A2650199AE6E73AB3F503BF027DCEC0A49B2F0294723113F25347AEAF0109E270C77A2524CAC118D164B8</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
+			<iterations>2048</iterations>
+			<key>A5B348EB4926290B223724CC8E4ED67FF458F2362279F0DF9F3A92AFF0473030D0EBA6E4173AF91E7AE535D3E988</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0000</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>2A824C1B6B36AD48D0A5AE94E27988D4F6BDCB2A259262CE1B3E626454FF2A5B69A372FE3894C48E574F70F191F4</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>0001</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>4B8D18B96EB898D1BAA8BDD82BC443F0FF00CE13602A15DF682A601681221A748627D1C585C079F8DCBD5ABE9763</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>PSWD</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>9DABF586AD2BCD603DC38C3987C98D73A5A9F4B3B2A148121AE3E9E23B3891882F575F204CB0639FC9FDB9D5B0BD</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>password</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>F734BE1BF990A3A59CEA6C821492F0B660C6488EF08E3059843173C72CD79EFEADE34A6DA91F6AB8E92383F1BDFA</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+//! @SYMTestCaseID CIT_PREQ1054_01
+//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
+//! @SYMREQ CIT_PREQ1054
+//! @SYMTestPriority medium
+//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
+//! @SYMTestExpectedResults The generated key matches the expected byte stream.
+<action>
+	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
+	<actiontype>DeriveKey</actiontype>
+	<actionbody>
+		<derivekey>
+			<kdf>pkcs#12</kdf>
+			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
+			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
+			<iterations>2048</iterations>
+			<key>47C18634A09AB37AB6EECBCD5C7E7F234F02E574A1167ED13693E8373DFB92EC6F000DBADB9363CA12E9E16ED019</key>
+		</derivekey>
+	</actionbody>
+</action>
+
+<action>
+    <actionname>OOM End</actionname>
+    <actiontype>stopmemfailure</actiontype>
+    <actionbody></actionbody>
+    <actionresult>
+        <return>KErrNone</return>
+    </actionresult>
+</action>
+