crypto/weakcrypto/test/tpbe/scripts/tpbetests_v2.txt
author hgs
Thu, 24 Jun 2010 15:39:07 +0530
changeset 72 de46a57f75fb
permissions -rw-r--r--
201023_02
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
72
de46a57f75fb 201023_02
hgs
parents:
diff changeset
     1
de46a57f75fb 201023_02
hgs
parents:
diff changeset
     2
// Copyright (C) 2005 - 2006 Symbian Ltd. All Rights Reserved
de46a57f75fb 201023_02
hgs
parents:
diff changeset
     3
de46a57f75fb 201023_02
hgs
parents:
diff changeset
     4
de46a57f75fb 201023_02
hgs
parents:
diff changeset
     5
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
     6
	<actionname>Element test case 1 with explicit kdf, salt len and iterations, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
     7
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
     8
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
     9
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    10
		<kdf>PKCS#5</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    11
		<salt_len_bytes>16</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    12
		<iter_count>1000</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    13
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    14
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    15
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    16
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    17
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    18
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    19
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    20
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    21
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    22
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    23
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    24
	<actionname>Element test case 1, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    25
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    26
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    27
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    28
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    29
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    30
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    31
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    32
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    33
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    34
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    35
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    36
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    37
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    38
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    39
	<actionname>Element test case 2, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    40
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    41
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    42
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    43
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    44
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    45
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    46
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    47
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    48
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    49
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    50
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    51
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    52
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    53
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    54
	<actionname>Element test case 3, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    55
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    56
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    57
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    58
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    59
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    60
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    61
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    62
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    63
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    64
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    65
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    66
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    67
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    68
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    69
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    70
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    71
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    72
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    73
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    74
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    75
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    76
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    77
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    78
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    79
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    80
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    81
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    82
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    83
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    84
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, explicit kdf, salt len, iter count, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    85
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    86
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    87
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    88
		<kdf>PKCS#5</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    89
		<salt_len_bytes>16</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    90
		<iter_count>1000</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    91
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    92
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    93
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    94
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    95
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    96
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    97
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    98
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
    99
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   100
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   101
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   102
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   103
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   104
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   105
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   106
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   107
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   108
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   109
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   110
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   111
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   112
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   113
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   114
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   115
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   116
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   117
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   118
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   119
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   120
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   121
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   122
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   123
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   124
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   125
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   126
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   127
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   128
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   129
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   130
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   131
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   132
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   133
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   134
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   135
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   136
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   137
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   138
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   139
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   140
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   141
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   142
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   143
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   144
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   145
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   146
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   147
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   148
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   149
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   150
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   151
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   152
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   153
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   154
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   155
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   156
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   157
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   158
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   159
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   160
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   161
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   162
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   163
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   164
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   165
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   166
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   167
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   168
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   169
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   170
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   171
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   172
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   173
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   174
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   175
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   176
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   177
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   178
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   179
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   180
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   181
	<actionname>Element test case 1, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   182
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   183
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   184
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   185
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   186
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   187
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   188
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   189
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   190
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   191
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   192
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   193
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   194
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   195
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   196
	<actionname>Element test case 2, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   197
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   198
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   199
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   200
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   201
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   202
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   203
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   204
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   205
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   206
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   207
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   208
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   209
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   210
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   211
	<actionname>Element test case 3, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   212
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   213
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   214
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   215
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   216
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   217
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   218
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   219
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   220
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   221
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   222
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   223
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   224
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   225
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   226
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   227
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   228
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   229
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   230
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   231
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   232
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   233
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   234
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   235
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   236
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   237
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   238
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   239
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   240
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   241
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   242
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   243
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   244
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   245
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   246
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   247
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   248
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   249
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   250
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   251
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   252
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   253
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   254
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   255
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   256
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   257
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   258
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   259
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   260
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   261
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   262
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   263
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   264
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   265
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   266
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   267
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   268
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   269
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   270
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   271
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   272
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   273
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   274
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   275
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   276
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   277
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   278
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   279
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   280
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   281
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   282
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   283
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   284
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   285
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   286
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   287
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   288
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   289
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   290
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   291
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   292
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   293
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   294
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   295
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   296
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   297
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   298
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   299
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   300
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   301
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   302
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   303
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   304
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   305
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   306
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   307
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   308
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   309
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   310
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   311
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   312
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   313
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   314
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   315
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   316
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   317
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   318
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   319
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   320
	<actionname>Element test case 1, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   321
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   322
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   323
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   324
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   325
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   326
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   327
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   328
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   329
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   330
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   331
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   332
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   333
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   334
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   335
	<actionname>Element test case 2, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   336
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   337
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   338
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   339
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   340
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   341
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   342
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   343
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   344
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   345
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   346
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   347
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   348
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   349
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   350
	<actionname>Element test case 3, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   351
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   352
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   353
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   354
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   355
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   356
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   357
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   358
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   359
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   360
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   361
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   362
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   363
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   364
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   365
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   366
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   367
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   368
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   369
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   370
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   371
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   372
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   373
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   374
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   375
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   376
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   377
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   378
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   379
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   380
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   381
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   382
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   383
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   384
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   385
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   386
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   387
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   388
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   389
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   390
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   391
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   392
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   393
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   394
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   395
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   396
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   397
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   398
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   399
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   400
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   401
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   402
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   403
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   404
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   405
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   406
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   407
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   408
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   409
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   410
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   411
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   412
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   413
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   414
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   415
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   416
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   417
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   418
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   419
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   420
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   421
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   422
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   423
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   424
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   425
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   426
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   427
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   428
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   429
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   430
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   431
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   432
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   433
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   434
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   435
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   436
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   437
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   438
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   439
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   440
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   441
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   442
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   443
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   444
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   445
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   446
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   447
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   448
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   449
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   450
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   451
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   452
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   453
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   454
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   455
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   456
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   457
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   458
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   459
	<actionname>Element test case 1, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   460
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   461
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   462
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   463
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   464
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   465
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   466
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   467
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   468
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   469
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   470
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   471
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   472
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   473
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   474
	<actionname>Element test case 2, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   475
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   476
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   477
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   478
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   479
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   480
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   481
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   482
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   483
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   484
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   485
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   486
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   487
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   488
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   489
	<actionname>Element test case 3, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   490
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   491
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   492
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   493
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   494
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   495
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   496
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   497
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   498
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   499
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   500
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   501
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   502
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   503
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   504
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   505
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   506
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   507
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   508
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   509
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   510
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   511
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   512
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   513
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   514
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   515
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   516
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   517
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   518
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   519
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   520
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   521
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   522
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   523
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   524
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   525
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   526
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   527
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   528
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   529
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   530
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   531
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   532
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   533
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   534
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   535
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   536
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   537
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   538
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   539
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   540
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   541
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   542
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   543
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   544
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   545
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   546
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   547
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   548
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   549
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   550
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   551
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   552
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   553
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   554
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   555
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   556
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   557
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   558
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   559
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   560
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   561
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   562
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   563
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   564
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   565
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   566
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   567
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   568
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   569
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   570
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   571
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   572
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   573
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   574
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   575
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   576
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   577
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   578
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   579
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   580
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   581
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   582
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   583
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   584
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   585
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   586
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   587
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   588
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   589
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   590
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   591
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   592
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   593
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   594
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   595
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   596
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   597
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   598
	<actionname>Element test case 1, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   599
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   600
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   601
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   602
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   603
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   604
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   605
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   606
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   607
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   608
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   609
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   610
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   611
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   612
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   613
	<actionname>Element test case 2, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   614
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   615
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   616
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   617
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   618
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   619
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   620
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   621
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   622
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   623
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   624
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   625
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   626
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   627
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   628
	<actionname>Element test case 3, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   629
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   630
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   631
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   632
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   633
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   634
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   635
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   636
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   637
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   638
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   639
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   640
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   641
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   642
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   643
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   644
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   645
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   646
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   647
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   648
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   649
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   650
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   651
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   652
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   653
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   654
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   655
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   656
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   657
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   658
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   659
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   660
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   661
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   662
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   663
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   664
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   665
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   666
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   667
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   668
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   669
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   670
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   671
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   672
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   673
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   674
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   675
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   676
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   677
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   678
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   679
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   680
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   681
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   682
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   683
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   684
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   685
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   686
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   687
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   688
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   689
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   690
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   691
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   692
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   693
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   694
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   695
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   696
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   697
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   698
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   699
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   700
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   701
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   702
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   703
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   704
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   705
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   706
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   707
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   708
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   709
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   710
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   711
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   712
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   713
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   714
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   715
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   716
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   717
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   718
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   719
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   720
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   721
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   722
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   723
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   724
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   725
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   726
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   727
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   728
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   729
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   730
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   731
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   732
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   733
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   734
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   735
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   736
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   737
	<actionname>Element test case 1, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   738
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   739
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   740
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   741
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   742
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   743
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   744
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   745
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   746
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   747
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   748
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   749
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   750
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   751
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   752
	<actionname>Element test case 2, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   753
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   754
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   755
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   756
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   757
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   758
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   759
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   760
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   761
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   762
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   763
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   764
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   765
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   766
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   767
	<actionname>Element test case 3, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   768
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   769
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   770
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   771
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   772
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   773
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   774
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   775
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   776
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   777
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   778
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   779
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   780
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   781
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   782
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   783
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   784
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   785
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   786
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   787
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   788
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   789
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   790
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   791
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   792
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   793
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   794
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   795
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   796
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   797
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   798
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   799
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   800
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   801
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   802
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   803
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   804
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   805
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   806
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   807
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   808
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   809
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   810
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   811
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   812
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   813
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   814
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   815
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   816
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   817
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   818
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   819
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   820
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   821
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   822
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   823
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   824
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   825
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   826
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   827
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   828
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   829
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   830
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   831
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   832
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   833
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   834
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   835
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   836
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   837
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   838
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   839
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   840
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   841
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   842
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   843
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   844
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   845
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   846
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   847
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   848
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   849
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   850
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   851
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   852
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   853
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   854
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   855
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   856
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   857
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   858
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   859
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   860
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   861
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   862
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   863
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   864
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   865
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   866
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   867
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   868
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   869
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   870
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   871
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   872
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   873
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   874
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   875
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   876
	<actionname>Element test case 1, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   877
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   878
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   879
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   880
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   881
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   882
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   883
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   884
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   885
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   886
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   887
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   888
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   889
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   890
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   891
	<actionname>Element test case 2, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   892
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   893
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   894
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   895
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   896
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   897
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   898
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   899
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   900
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   901
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   902
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   903
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   904
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   905
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   906
	<actionname>Element test case 3, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   907
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   908
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   909
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   910
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   911
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   912
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   913
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   914
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   915
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   916
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   917
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   918
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   919
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   920
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   921
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   922
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   923
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   924
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   925
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   926
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   927
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   928
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   929
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   930
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   931
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   932
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   933
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   934
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   935
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   936
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   937
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   938
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   939
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   940
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   941
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   942
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   943
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   944
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   945
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   946
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   947
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   948
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   949
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   950
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   951
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   952
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   953
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   954
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   955
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   956
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   957
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   958
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   959
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   960
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   961
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   962
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   963
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   964
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   965
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   966
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   967
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   968
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   969
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   970
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   971
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   972
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   973
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   974
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   975
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   976
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   977
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   978
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   979
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   980
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   981
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   982
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   983
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   984
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   985
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   986
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   987
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   988
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   989
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   990
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   991
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   992
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   993
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   994
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   995
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   996
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   997
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   998
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
   999
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1000
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1001
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1002
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1003
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1004
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1005
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1006
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1007
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1008
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1009
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1010
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1011
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1012
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1013
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1014
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1015
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1016
	<actionname>Element test case 1, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1017
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1018
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1019
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1020
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1021
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1022
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1023
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1024
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1025
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1026
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1027
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1028
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1029
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1030
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1031
	<actionname>Element test case 2, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1032
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1033
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1034
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1035
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1036
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1037
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1038
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1039
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1040
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1041
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1042
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1043
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1044
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1045
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1046
	<actionname>Element test case 3, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1047
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1048
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1049
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1050
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1051
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1052
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1053
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1054
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1055
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1056
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1057
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1058
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1059
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1060
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1061
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1062
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1063
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1064
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1065
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1066
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1067
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1068
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1069
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1070
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1071
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1072
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1073
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1074
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1075
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1076
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1077
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1078
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1079
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1080
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1081
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1082
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1083
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1084
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1085
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1086
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1087
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1088
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1089
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1090
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1091
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1092
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1093
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1094
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1095
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1096
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1097
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1098
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1099
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1100
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1101
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1102
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1103
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1104
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1105
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1106
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1107
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1108
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1109
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1110
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1111
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1112
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1113
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1114
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1115
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1116
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1117
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1118
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1119
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1120
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1121
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1122
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1123
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1124
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1125
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1126
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1127
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1128
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1129
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1130
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1131
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1132
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1133
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1134
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1135
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1136
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1137
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1138
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1139
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1140
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1141
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1142
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1143
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1144
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1145
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1146
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1147
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1148
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1149
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1150
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1151
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1152
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1153
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1154
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1155
// Start of Permanent File Store PBE testing between weak and strong crypto
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1156
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1157
	<actionname>Write encrypted data to a PFS named according to crypto strength</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1158
	<actiontype>WritePFS</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1159
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1160
		<writepfs>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1161
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1162
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1163
		</writepfs>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1164
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1165
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1166
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1167
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1168
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1169
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1170
	<actionname>Decrypting weak crypto file</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1171
	<actiontype>ReadPFS</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1172
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1173
		<readpfs>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1174
			<strength>weak</strength>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1175
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1176
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1177
		</readpfs>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1178
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1179
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1180
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1181
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1182
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1183
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1184
	<actionname>Decrypting strong crypto file</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1185
	<actiontype>ReadPFS</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1186
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1187
		<readpfs>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1188
			<strength>strong</strength>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1189
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1190
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1191
		</readpfs>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1192
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1193
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1194
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1195
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1196
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1197
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1198
//Start of OOM testing
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1199
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1200
    <actionname>OOM start</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1201
    <actiontype>startmemfailure</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1202
    <actionbody></actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1203
    <actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1204
        <return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1205
    </actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1206
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1207
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1208
	<actionname>Element test case 2</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1209
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1210
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1211
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1212
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1213
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1214
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1215
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1216
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1217
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1218
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1219
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1220
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1221
	<actionname>Test of Set encryption, password changing, exporting importing Test 1</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1222
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1223
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1224
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1225
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1226
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1227
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1228
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1229
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1230
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1231
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1232
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1233
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1234
    <actionname>OOM end</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1235
    <actiontype>stopmemfailure</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1236
    <actionbody></actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1237
    <actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1238
        <return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1239
    </actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1240
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1241
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1242
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1243
// =======================================================================
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1244
// PKCS#12 tests
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1245
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1246
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1247
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1248
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1249
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1250
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1251
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1252
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1253
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1254
	<actionname>Element test case 1, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1255
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1256
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1257
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1258
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1259
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1260
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1261
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1262
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1263
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1264
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1265
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1266
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1267
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1268
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1269
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1270
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1271
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1272
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1273
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1274
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1275
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1276
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1277
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1278
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1279
	<actionname>Element test case 2, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1280
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1281
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1282
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1283
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1284
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1285
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1286
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1287
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1288
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1289
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1290
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1291
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1292
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1293
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1294
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1295
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1296
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1297
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1298
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1299
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1300
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1301
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1302
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1303
	<actionname>Element test case 3, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1304
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1305
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1306
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1307
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1308
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1309
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1310
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1311
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1312
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1313
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1314
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1315
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1316
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1317
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1318
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1319
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1320
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1321
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1322
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1323
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1324
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1325
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1326
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1327
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1328
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1329
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1330
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1331
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1332
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1333
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1334
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1335
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1336
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1337
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1338
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1339
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1340
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1341
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1342
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1343
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1344
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1345
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1346
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1347
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#5 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1348
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1349
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1350
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1351
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1352
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1353
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, explicit kdf, salt len, iter count, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1354
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1355
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1356
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1357
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1358
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1359
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1360
		<kdf>PKCS#5</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1361
		<salt_len_bytes>16</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1362
		<iter_count>1000</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1363
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1364
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1365
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1366
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1367
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1368
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1369
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1370
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1371
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1372
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1373
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1374
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1375
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1376
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1377
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1378
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1379
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1380
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1381
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1382
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1383
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1384
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1385
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1386
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1387
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1388
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1389
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1390
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1391
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1392
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1393
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1394
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1395
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1396
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1397
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1398
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1399
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1400
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1401
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1402
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1403
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1404
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1405
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1406
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1407
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1408
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1409
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1410
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1411
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1412
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1413
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1414
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1415
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1416
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1417
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1418
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1419
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1420
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1421
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1422
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1423
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1424
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1425
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1426
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1427
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1428
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1429
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1430
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1431
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1432
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1433
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1434
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1435
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1436
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1437
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1438
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1439
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1440
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1441
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1442
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1443
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1444
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1445
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1446
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1447
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1448
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1449
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1450
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1451
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1452
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1453
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1454
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1455
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1456
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1457
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1458
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1459
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1460
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1461
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1462
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1463
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1464
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1465
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1466
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1467
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1468
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1469
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1470
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1471
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1472
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1473
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1474
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1475
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1476
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1477
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1478
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1479
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1480
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1481
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1482
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1483
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1484
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1485
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1486
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1487
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1488
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1489
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1490
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1491
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1492
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1493
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1494
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1495
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1496
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1497
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1498
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1499
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1500
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1501
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1502
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1503
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1504
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1505
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1506
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1507
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1508
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1509
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1510
	<actionname>Element test case 1, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1511
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1512
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1513
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1514
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1515
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1516
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1517
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1518
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1519
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1520
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1521
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1522
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1523
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1524
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1525
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1526
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1527
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1528
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1529
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1530
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1531
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1532
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1533
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1534
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1535
	<actionname>Element test case 2, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1536
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1537
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1538
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1539
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1540
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1541
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1542
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1543
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1544
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1545
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1546
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1547
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1548
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1549
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1550
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1551
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1552
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1553
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1554
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1555
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1556
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1557
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1558
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1559
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1560
	<actionname>Element test case 3, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1561
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1562
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1563
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1564
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1565
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1566
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1567
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1568
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1569
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1570
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1571
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1572
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1573
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1574
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1575
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1576
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1577
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1578
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1579
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1580
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1581
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1582
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1583
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1584
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1585
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1586
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1587
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1588
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1589
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1590
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1591
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1592
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1593
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1594
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1595
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1596
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1597
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1598
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1599
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1600
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1601
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1602
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1603
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1604
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1605
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1606
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1607
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1608
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1609
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1610
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1611
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1612
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1613
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1614
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1615
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1616
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1617
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1618
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1619
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1620
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1621
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1622
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1623
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1624
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1625
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1626
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1627
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1628
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1629
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1630
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1631
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1632
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1633
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1634
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1635
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1636
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1637
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1638
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1639
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1640
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1641
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1642
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1643
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1644
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1645
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1646
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1647
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1648
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1649
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1650
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1651
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1652
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1653
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1654
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1655
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1656
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1657
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1658
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1659
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1660
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1661
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1662
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1663
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1664
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1665
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1666
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1667
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1668
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1669
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1670
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1671
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1672
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1673
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1674
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1675
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1676
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1677
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1678
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1679
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1680
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1681
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1682
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1683
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1684
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1685
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1686
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1687
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1688
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1689
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1690
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1691
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1692
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1693
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1694
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1695
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1696
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1697
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1698
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1699
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1700
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1701
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1702
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1703
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1704
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1705
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1706
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1707
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1708
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1709
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1710
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1711
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1712
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1713
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1714
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1715
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1716
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1717
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1718
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1719
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1720
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1721
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1722
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1723
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1724
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1725
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1726
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1727
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1728
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1729
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1730
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1731
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1732
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1733
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1734
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1735
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1736
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1737
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1738
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1739
	<actionname>Element test case 1, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1740
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1741
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1742
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1743
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1744
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1745
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1746
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1747
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1748
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1749
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1750
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1751
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1752
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1753
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1754
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1755
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1756
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1757
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1758
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1759
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1760
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1761
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1762
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1763
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1764
	<actionname>Element test case 2, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1765
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1766
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1767
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1768
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1769
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1770
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1771
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1772
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1773
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1774
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1775
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1776
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1777
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1778
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1779
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1780
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1781
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1782
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1783
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1784
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1785
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1786
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1787
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1788
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1789
	<actionname>Element test case 3, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1790
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1791
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1792
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1793
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1794
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1795
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1796
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1797
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1798
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1799
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1800
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1801
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1802
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1803
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1804
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1805
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1806
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1807
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1808
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1809
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1810
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1811
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1812
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1813
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1814
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1815
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1816
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1817
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1818
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1819
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1820
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1821
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1822
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1823
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1824
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1825
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1826
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1827
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1828
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1829
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1830
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1831
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1832
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1833
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1834
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1835
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1836
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1837
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1838
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1839
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1840
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1841
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1842
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1843
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1844
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1845
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1846
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1847
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1848
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1849
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1850
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1851
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1852
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1853
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1854
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1855
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1856
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1857
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1858
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1859
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1860
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1861
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1862
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1863
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1864
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1865
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1866
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1867
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1868
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1869
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1870
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1871
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1872
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1873
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1874
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1875
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1876
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1877
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1878
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1879
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1880
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1881
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1882
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1883
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1884
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1885
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1886
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1887
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1888
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1889
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1890
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1891
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1892
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1893
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1894
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1895
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1896
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1897
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1898
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1899
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1900
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1901
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1902
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1903
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1904
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1905
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1906
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1907
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1908
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1909
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1910
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1911
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1912
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1913
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1914
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1915
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1916
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1917
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1918
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1919
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1920
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1921
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1922
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1923
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1924
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1925
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1926
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1927
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1928
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1929
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1930
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1931
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1932
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1933
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1934
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1935
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1936
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1937
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1938
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1939
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1940
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1941
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1942
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1943
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1944
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1945
		<cipher>ECipherRC2_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1946
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1947
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1948
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1949
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1950
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1951
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1952
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1953
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1954
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1955
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1956
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1957
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1958
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1959
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1960
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1961
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1962
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1963
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1964
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1965
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1966
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1967
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1968
	<actionname>Element test case 1, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1969
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1970
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1971
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1972
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1973
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1974
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1975
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1976
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1977
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1978
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1979
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1980
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1981
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1982
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1983
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1984
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1985
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1986
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1987
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1988
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1989
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1990
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1991
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1992
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1993
	<actionname>Element test case 2, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1994
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1995
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1996
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1997
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1998
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  1999
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2000
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2001
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2002
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2003
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2004
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2005
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2006
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2007
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2008
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2009
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2010
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2011
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2012
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2013
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2014
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2015
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2016
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2017
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2018
	<actionname>Element test case 3, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2019
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2020
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2021
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2022
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2023
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2024
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2025
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2026
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2027
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2028
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2029
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2030
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2031
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2032
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2033
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2034
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2035
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2036
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2037
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2038
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2039
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2040
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2041
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2042
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2043
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2044
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2045
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2046
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2047
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2048
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2049
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2050
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2051
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2052
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2053
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2054
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2055
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2056
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2057
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2058
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2059
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2060
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2061
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2062
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2063
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2064
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2065
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2066
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2067
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2068
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2069
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2070
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2071
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2072
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2073
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2074
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2075
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2076
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2077
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2078
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2079
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2080
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2081
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2082
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2083
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2084
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2085
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2086
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2087
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2088
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2089
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2090
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2091
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2092
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2093
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2094
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2095
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2096
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2097
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2098
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2099
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2100
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2101
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2102
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2103
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2104
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2105
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2106
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2107
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2108
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2109
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2110
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2111
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2112
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2113
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2114
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2115
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2116
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2117
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2118
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2119
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2120
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2121
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2122
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2123
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2124
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2125
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2126
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2127
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2128
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2129
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2130
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2131
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2132
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2133
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2134
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2135
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2136
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2137
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2138
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2139
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2140
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2141
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2142
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2143
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2144
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2145
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2146
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2147
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2148
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2149
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2150
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2151
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2152
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2153
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2154
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2155
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2156
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2157
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2158
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2159
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2160
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2161
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2162
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2163
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2164
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2165
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2166
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2167
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2168
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2169
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2170
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2171
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2172
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2173
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2174
		<cipher>ECipherRC2_CBC_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2175
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2176
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2177
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2178
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2179
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2180
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2181
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2182
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2183
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2184
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2185
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2186
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2187
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2188
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2189
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2190
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2191
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2192
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2193
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2194
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2195
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2196
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2197
	<actionname>Element test case 1, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2198
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2199
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2200
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2201
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2202
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2203
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2204
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2205
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2206
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2207
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2208
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2209
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2210
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2211
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2212
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2213
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2214
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2215
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2216
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2217
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2218
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2219
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2220
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2221
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2222
	<actionname>Element test case 2, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2223
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2224
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2225
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2226
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2227
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2228
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2229
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2230
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2231
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2232
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2233
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2234
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2235
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2236
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2237
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2238
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2239
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2240
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2241
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2242
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2243
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2244
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2245
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2246
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2247
	<actionname>Element test case 3, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2248
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2249
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2250
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2251
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2252
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2253
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2254
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2255
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2256
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2257
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2258
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2259
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2260
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2261
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2262
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2263
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2264
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2265
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2266
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2267
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2268
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2269
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2270
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2271
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2272
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2273
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2274
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2275
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2276
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2277
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2278
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2279
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2280
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2281
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2282
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2283
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2284
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2285
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2286
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2287
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2288
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2289
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2290
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2291
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2292
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2293
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2294
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2295
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2296
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2297
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2298
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2299
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2300
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2301
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2302
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2303
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2304
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2305
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2306
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2307
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2308
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2309
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2310
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2311
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2312
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2313
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2314
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2315
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2316
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2317
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2318
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2319
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2320
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2321
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2322
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2323
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2324
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2325
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2326
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2327
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2328
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2329
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2330
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2331
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2332
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2333
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2334
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2335
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2336
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2337
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2338
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2339
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2340
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2341
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2342
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2343
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2344
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2345
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2346
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2347
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2348
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2349
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2350
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2351
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2352
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2353
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2354
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2355
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2356
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2357
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2358
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2359
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2360
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2361
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2362
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2363
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2364
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2365
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2366
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2367
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2368
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2369
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2370
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2371
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2372
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2373
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2374
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2375
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2376
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2377
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2378
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2379
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2380
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2381
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2382
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2383
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2384
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2385
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2386
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2387
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2388
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2389
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2390
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2391
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2392
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2393
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2394
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2395
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2396
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2397
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipher3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2398
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2399
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2400
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2401
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2402
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2403
		<cipher>ECipher3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2404
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2405
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2406
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2407
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2408
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2409
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2410
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2411
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2412
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2413
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2414
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2415
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2416
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2417
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2418
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2419
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2420
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2421
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2422
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2423
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2424
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2425
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2426
	<actionname>Element test case 1, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2427
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2428
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2429
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2430
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2431
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2432
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2433
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2434
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2435
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2436
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2437
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2438
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2439
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2440
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2441
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2442
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2443
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2444
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2445
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2446
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2447
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2448
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2449
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2450
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2451
	<actionname>Element test case 2, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2452
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2453
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2454
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2455
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2456
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2457
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2458
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2459
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2460
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2461
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2462
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2463
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2464
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2465
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2466
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2467
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2468
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2469
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2470
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2471
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2472
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2473
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2474
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2475
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2476
	<actionname>Element test case 3, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2477
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2478
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2479
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2480
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2481
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2482
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2483
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2484
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2485
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2486
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2487
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2488
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2489
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2490
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2491
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2492
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2493
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2494
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2495
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2496
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2497
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2498
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2499
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2500
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2501
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2502
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2503
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2504
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2505
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2506
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2507
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2508
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2509
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2510
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2511
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2512
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2513
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2514
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2515
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2516
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2517
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2518
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2519
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2520
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2521
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2522
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2523
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2524
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2525
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2526
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2527
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2528
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2529
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2530
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2531
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2532
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2533
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2534
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2535
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2536
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2537
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2538
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2539
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2540
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2541
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2542
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2543
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2544
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2545
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2546
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2547
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2548
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2549
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2550
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2551
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2552
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2553
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2554
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2555
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2556
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2557
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2558
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2559
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2560
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2561
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2562
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2563
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2564
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2565
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2566
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2567
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2568
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2569
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2570
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2571
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2572
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2573
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2574
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2575
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2576
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2577
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2578
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2579
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2580
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2581
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2582
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2583
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2584
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2585
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2586
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2587
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2588
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2589
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2590
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2591
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2592
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2593
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2594
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2595
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2596
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2597
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2598
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2599
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2600
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2601
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2602
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2603
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2604
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2605
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2606
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2607
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2608
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2609
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2610
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2611
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2612
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2613
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2614
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2615
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2616
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2617
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2618
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2619
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2620
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2621
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2622
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2623
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2624
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2625
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2626
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_256</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2627
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2628
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2629
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2630
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2631
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2632
		<cipher>ECipherAES_CBC_256</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2633
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2634
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2635
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2636
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2637
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2638
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2639
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2640
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2641
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2642
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2643
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2644
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2645
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2646
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2647
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2648
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2649
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2650
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2651
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2652
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2653
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2654
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2655
	<actionname>Element test case 1, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2656
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2657
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2658
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2659
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2660
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2661
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2662
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2663
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2664
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2665
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2666
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2667
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2668
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2669
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2670
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2671
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2672
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2673
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2674
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2675
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2676
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2677
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2678
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2679
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2680
	<actionname>Element test case 2, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2681
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2682
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2683
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2684
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2685
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2686
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2687
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2688
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2689
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2690
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2691
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2692
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2693
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2694
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2695
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2696
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2697
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2698
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2699
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2700
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2701
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2702
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2703
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2704
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2705
	<actionname>Element test case 3, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2706
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2707
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2708
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2709
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2710
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2711
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2712
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2713
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2714
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2715
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2716
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2717
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2718
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2719
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2720
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2721
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2722
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2723
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2724
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2725
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2726
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2727
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2728
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2729
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2730
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2731
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2732
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2733
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2734
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2735
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2736
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2737
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2738
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2739
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2740
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2741
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2742
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2743
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2744
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2745
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2746
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2747
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2748
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2749
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2750
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2751
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2752
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2753
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2754
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2755
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2756
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2757
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2758
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2759
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2760
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2761
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2762
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2763
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2764
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2765
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2766
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2767
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2768
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2769
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2770
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2771
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2772
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2773
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2774
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2775
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2776
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2777
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2778
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2779
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2780
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2781
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2782
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2783
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2784
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2785
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2786
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2787
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2788
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2789
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2790
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2791
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2792
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2793
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2794
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2795
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2796
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2797
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2798
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2799
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2800
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2801
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2802
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2803
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2804
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2805
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2806
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2807
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2808
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2809
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2810
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2811
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2812
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2813
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2814
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2815
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2816
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2817
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2818
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2819
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2820
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2821
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2822
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2823
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2824
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2825
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2826
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2827
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2828
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2829
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2830
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2831
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2832
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2833
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2834
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2835
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2836
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2837
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2838
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2839
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2840
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2841
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2842
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2843
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2844
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2845
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2846
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2847
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2848
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2849
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2850
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2851
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2852
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2853
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2854
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2855
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_192</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2856
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2857
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2858
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2859
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2860
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2861
		<cipher>ECipherAES_CBC_192</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2862
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2863
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2864
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2865
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2866
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2867
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2868
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2869
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2870
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2871
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2872
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2873
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2874
///////////////////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2875
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2876
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2877
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2878
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2879
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2880
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2881
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2882
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2883
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2884
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2885
	<actionname>Element test case 1, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2886
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2887
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2888
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2889
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2890
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2891
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2892
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2893
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2894
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2895
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2896
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2897
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2898
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2899
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2900
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2901
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2902
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2903
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2904
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2905
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2906
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2907
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2908
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2909
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2910
	<actionname>Element test case 2, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2911
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2912
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2913
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2914
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2915
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2916
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2917
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2918
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2919
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2920
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2921
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2922
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2923
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2924
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2925
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2926
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2927
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2928
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2929
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2930
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2931
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2932
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2933
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2934
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2935
	<actionname>Element test case 3, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2936
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2937
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2938
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2939
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2940
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2941
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2942
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2943
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2944
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2945
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2946
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2947
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2948
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2949
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2950
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2951
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2952
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2953
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2954
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2955
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2956
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2957
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2958
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2959
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2960
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2961
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2962
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2963
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2964
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2965
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2966
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2967
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2968
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2969
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2970
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2971
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2972
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2973
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2974
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2975
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2976
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2977
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2978
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2979
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2980
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2981
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2982
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2983
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2984
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2985
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2986
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2987
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2988
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2989
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2990
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2991
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2992
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2993
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2994
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2995
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2996
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2997
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2998
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  2999
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3000
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3001
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3002
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3003
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3004
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3005
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3006
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3007
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3008
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3009
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3010
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3011
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3012
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3013
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3014
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3015
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3016
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3017
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3018
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3019
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3020
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3021
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3022
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3023
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3024
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3025
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3026
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3027
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3028
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3029
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3030
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3031
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3032
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3033
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3034
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3035
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3036
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3037
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3038
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3039
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3040
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3041
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3042
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3043
			<passwd>m</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3044
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3045
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3046
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3047
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3048
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3049
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3050
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3051
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3052
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3053
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3054
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3055
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3056
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3057
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3058
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3059
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3060
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3061
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3062
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3063
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3064
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3065
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3066
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3067
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3068
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3069
			<input>ZYXWUTSR</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3070
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3071
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3072
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3073
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3074
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3075
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3076
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3077
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3078
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3079
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3080
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3081
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3082
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3083
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3084
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3085
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3086
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3087
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3088
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3089
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3090
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3091
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3092
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3093
			<passwd></passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3094
			<input></input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3095
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3096
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3097
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3098
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3099
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3100
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3101
////////////////////////////////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3102
// PKCS12 tests using PKCS#12 PBE algorithm with PKCS#12 KDF function. 
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3103
//  ECipherRC2_CBC_128_16, ECipher3DES_CBC tests defined above.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3104
//  "Set" tests are not supported for stream cipher ECipherARC4_40,ECipherARC4_128
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3105
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3106
	<actionname>Element test case 1, ECipherRC2_CBC_40_5</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3107
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3108
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3109
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3110
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3111
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3112
		<cipher>ECipherRC2_CBC_40_5</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3113
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3114
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3115
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3116
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3117
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3118
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3119
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3120
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3121
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3122
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3123
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3124
	<actionname>Element test case 2, ECipherARC4_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3125
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3126
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3127
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3128
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3129
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3130
		<cipher>ECipherARC4_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3131
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3132
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3133
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3134
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3135
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3136
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3137
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3138
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3139
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3140
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3141
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3142
	<actionname>Element test case 3, ECipherARC4_40</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3143
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3144
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3145
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3146
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3147
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3148
		<cipher>ECipherARC4_40</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3149
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3150
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3151
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3152
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3153
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3154
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3155
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3156
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3157
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3158
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3159
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3160
	<actionname>Element test case 4, ECipher2Key3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3161
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3162
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3163
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3164
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3165
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3166
		<cipher>ECipher2Key3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3167
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3168
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3169
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3170
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3171
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3172
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3173
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3174
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3175
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3176
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3177
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3178
	<actionname>Test of Set encryption, password changing, exporting importing Test 5, ECipherRC2_CBC_40_5</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3179
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3180
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3181
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3182
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3183
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3184
		<cipher>ECipherRC2_CBC_40_5</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3185
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3186
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3187
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3188
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3189
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3190
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3191
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3192
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3193
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3194
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3195
	<actionname>Test of Set encryption, password changing, exporting importing Test 9, ECipher2Key3DES_CBC</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3196
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3197
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3198
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3199
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3200
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3201
		<cipher>ECipher2Key3DES_CBC</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3202
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3203
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3204
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3205
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3206
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3207
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3208
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3209
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3210
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3211
/////////////////////////////////////////
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3212
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3213
// Run selected PKCS#12 tests in OOM
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3214
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3215
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3216
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3217
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3218
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3219
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3220
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3221
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3222
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3223
    <actionname>OOM start</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3224
    <actiontype>startmemfailure</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3225
    <actionbody></actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3226
    <actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3227
        <return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3228
    </actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3229
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3230
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3231
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3232
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3233
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3234
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3235
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3236
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3237
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3238
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3239
	<actionname>Element test case 1, ECipherRC2_CBC_128_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3240
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3241
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3242
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3243
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3244
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3245
		<cipher>ECipherRC2_CBC_128_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3246
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3247
			<passwd>password</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3248
			<input>This is what I want to encrypt</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3249
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3250
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3251
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3252
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3253
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3254
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3255
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3256
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3257
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3258
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3259
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3260
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3261
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3262
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3263
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3264
	<actionname>Element test case 3, ECipherRC2_CBC_40_16</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3265
	<actiontype>Element</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3266
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3267
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3268
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3269
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3270
		<cipher>ECipherRC2_CBC_40_16</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3271
		<element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3272
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3273
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3274
		</element>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3275
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3276
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3277
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3278
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3279
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3280
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3281
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3282
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3283
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3284
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3285
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3286
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3287
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3288
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3289
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3290
	<actiontype>Set</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3291
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3292
		<kdf>PKCS#12</kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3293
		<salt_len_bytes>20</salt_len_bytes>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3294
		<iter_count>1024</iter_count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3295
		<cipher>ECipherAES_CBC_128</cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3296
		<set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3297
			<passwd>a90lkjasjk3lk32kdf89</passwd>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3298
			<input>B</input>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3299
		</set>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3300
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3301
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3302
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3303
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3304
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3305
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3306
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3307
//! @SYMTestCaseID CIT_PREQ1054_02
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3308
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3309
//! @SYMREQ CIT_PREQ1054
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3310
//! @SYMTestPriority medium
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3311
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3312
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3313
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3314
	<actionname>OOM end</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3315
	<actiontype>stopmemfailure</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3316
	<actionbody></actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3317
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3318
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3319
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3320
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3321
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3322
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3323
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3324
	<actionname>Compatibility old PKCS#5</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3325
	<actiontype>ExternPbeParams</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3326
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3327
		<orig-filename>c:\tpbe\pkcs5-orig.dat</orig-filename>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3328
		<expected-cipher>2</expected-cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3329
		<expected-salt>53414c5434353637</expected-salt>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3330
		<expected-iv>49563233343536373839616263646566</expected-iv>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3331
		<expected-iter-count>1234</expected-iter-count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3332
		<expected-kdf>0</expected-kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3333
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3334
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3335
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3336
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3337
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3338
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3339
<action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3340
	<actionname>Data compatibility orig PKCS#12</actionname>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3341
	<actiontype>ExternPbeParams</actiontype>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3342
	<actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3343
		<orig-filename>c:\tpbe\pkcs12-first.dat</orig-filename>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3344
		<expected-cipher>2</expected-cipher>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3345
		<expected-salt>53414c5434353637</expected-salt>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3346
		<expected-iv>49563233343536373839616263646566</expected-iv>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3347
		<expected-iter-count>1234</expected-iter-count>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3348
		<expected-kdf>1</expected-kdf>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3349
	</actionbody>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3350
	<actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3351
		<return>KErrNone</return>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3352
	</actionresult>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3353
</action>
de46a57f75fb 201023_02
hgs
parents:
diff changeset
  3354