Fix: Use EXPECT_FAIL macro correctly in test_evp_null_cipher

Co-Authored-By: lealem@wolfssl.com <lealem@wolfssl.com>
This commit is contained in:
Devin AI
2025-02-28 16:38:46 +00:00
parent 3e90722d27
commit 35e14a01b8

View File

@ -64080,6 +64080,7 @@ static int test_wolfSSL_EVP_BytesToKey(void)
}
return EXPECT_RESULT();
static int test_evp_null_cipher(void)
{
EXPECT_DECLS;
@ -64088,26 +64089,31 @@ static int test_evp_null_cipher(void)
ret = TestNullCipherUpdate();
if (ret != 0) {
EXPECT_FAIL("TestNullCipherUpdate failed");
printf("TestNullCipherUpdate failed\n");
EXPECT_FAIL();
}
ret = TestNullCipherUpdateEmptyData();
if (ret != 0) {
EXPECT_FAIL("TestNullCipherUpdateEmptyData failed");
printf("TestNullCipherUpdateEmptyData failed\n");
EXPECT_FAIL();
}
ret = TestNullCipherUpdateLargeData();
if (ret != 0) {
EXPECT_FAIL("TestNullCipherUpdateLargeData failed");
printf("TestNullCipherUpdateLargeData failed\n");
EXPECT_FAIL();
}
ret = TestNullCipherUpdateMultiple();
if (ret != 0) {
EXPECT_FAIL("TestNullCipherUpdateMultiple failed");
printf("TestNullCipherUpdateMultiple failed\n");
EXPECT_FAIL();
}
#endif /* OPENSSL_EXTRA */
#endif
return EXPECT_RESULT();
}
}
static int test_evp_cipher_aes_gcm(void)
{
EXPECT_DECLS;