@@ -24280,23 +24280,29 @@ static wc_test_ret_t hpke_test_single(Hpke* hpke)
2428024280 rngRet = ret = wc_InitRng(rng);
2428124281
2428224282 if (ret != 0)
24283- return ret;
24283+ return WC_TEST_RET_ENC_EC( ret) ;
2428424284
2428524285#ifdef WOLFSSL_SMALL_STACK
2428624286 if (ret == 0) {
2428724287 pubKey = (byte *)XMALLOC(pubKeySz, HEAP_HINT,
2428824288 DYNAMIC_TYPE_TMP_BUFFER);
2428924289 if (pubKey == NULL)
24290- ret = MEMORY_E;
24290+ ret = WC_TEST_RET_ENC_EC( MEMORY_E) ;
2429124291 }
2429224292#endif
2429324293
2429424294 /* generate the keys */
24295- if (ret == 0)
24295+ if (ret == 0) {
2429624296 ret = wc_HpkeGenerateKeyPair(hpke, &ephemeralKey, rng);
24297+ if (ret != 0)
24298+ ret = WC_TEST_RET_ENC_EC(ret);
24299+ }
2429724300
24298- if (ret == 0)
24301+ if (ret == 0) {
2429924302 ret = wc_HpkeGenerateKeyPair(hpke, &receiverKey, rng);
24303+ if (ret != 0)
24304+ ret = WC_TEST_RET_ENC_EC(ret);
24305+ }
2430024306
2430124307 /* seal */
2430224308 if (ret == 0) {
@@ -24305,11 +24311,16 @@ static wc_test_ret_t hpke_test_single(Hpke* hpke)
2430524311 (byte*)aad_text, (word32)XSTRLEN(aad_text),
2430624312 (byte*)start_text, (word32)XSTRLEN(start_text),
2430724313 ciphertext);
24314+ if (ret != 0)
24315+ ret = WC_TEST_RET_ENC_EC(ret);
2430824316 }
2430924317
2431024318 /* export ephemeral key */
24311- if (ret == 0)
24319+ if (ret == 0) {
2431224320 ret = wc_HpkeSerializePublicKey(hpke, ephemeralKey, pubKey, &pubKeySz);
24321+ if (ret != 0)
24322+ ret = WC_TEST_RET_ENC_EC(ret);
24323+ }
2431324324
2431424325 /* open with exported ephemeral key */
2431524326 if (ret == 0) {
@@ -24318,10 +24329,15 @@ static wc_test_ret_t hpke_test_single(Hpke* hpke)
2431824329 (byte*)aad_text, (word32)XSTRLEN(aad_text),
2431924330 ciphertext, (word32)XSTRLEN(start_text),
2432024331 plaintext);
24332+ if (ret != 0)
24333+ ret = WC_TEST_RET_ENC_EC(ret);
2432124334 }
2432224335
24323- if (ret == 0)
24336+ if (ret == 0) {
2432424337 ret = XMEMCMP(plaintext, start_text, XSTRLEN(start_text));
24338+ if (ret != 0)
24339+ ret = WC_TEST_RET_ENC_NC;
24340+ }
2432524341
2432624342 if (ephemeralKey != NULL)
2432724343 wc_HpkeFreeKey(hpke, hpke->kem, ephemeralKey, hpke->heap);
@@ -24352,7 +24368,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t hpke_test(void)
2435224368 HPKE_AES_128_GCM, NULL);
2435324369
2435424370 if (ret != 0)
24355- return ret;
24371+ return WC_TEST_RET_ENC_EC( ret) ;
2435624372
2435724373 ret = hpke_test_single(hpke);
2435824374
@@ -24367,7 +24383,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t hpke_test(void)
2436724383 HPKE_AES_128_GCM, NULL);
2436824384
2436924385 if (ret != 0)
24370- return ret;
24386+ return WC_TEST_RET_ENC_EC( ret) ;
2437124387
2437224388 ret = hpke_test_single(hpke);
2437324389
@@ -24382,7 +24398,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t hpke_test(void)
2438224398 HPKE_AES_128_GCM, NULL);
2438324399
2438424400 if (ret != 0)
24385- return ret;
24401+ return WC_TEST_RET_ENC_EC( ret) ;
2438624402
2438724403 ret = hpke_test_single(hpke);
2438824404
@@ -24397,7 +24413,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t hpke_test(void)
2439724413 HPKE_AES_256_GCM, NULL);
2439824414
2439924415 if (ret != 0)
24400- return ret;
24416+ return WC_TEST_RET_ENC_EC( ret) ;
2440124417
2440224418 ret = hpke_test_single(hpke);
2440324419
@@ -25106,7 +25122,7 @@ static wc_test_ret_t ecc521_test_deterministic_k(WC_RNG* rng)
2510625122 }
2510725123 ret = wc_ecc_init_ex(key, HEAP_HINT, devId);
2510825124 if (ret != 0) {
25109- return ret;
25125+ return WC_TEST_RET_ENC_EC( ret) ;
2511025126 }
2511125127 key_inited = 1;
2511225128
@@ -25750,41 +25766,40 @@ static wc_test_ret_t ecc_test_key_gen(WC_RNG* rng, int keySize)
2575025766
2575125767#if defined(WOLFSSL_SMALL_STACK) && !defined(WOLFSSL_NO_MALLOC)
2575225768 if ((der == NULL) || (userA == NULL))
25753- ERROR_OUT(MEMORY_E, done);
25769+ ERROR_OUT(WC_TEST_RET_ENC_EC( MEMORY_E) , done);
2575425770#endif
2575525771
2575625772 ret = wc_ecc_init_ex(userA, HEAP_HINT, devId);
2575725773 if (ret != 0)
25758- goto done;
25774+ ERROR_OUT(WC_TEST_RET_ENC_EC(ret), done) ;
2575925775
2576025776 ret = wc_ecc_make_key(rng, keySize, userA);
2576125777#if defined(WOLFSSL_ASYNC_CRYPT)
2576225778 ret = wc_AsyncWait(ret, &userA->asyncDev, WC_ASYNC_FLAG_NONE);
2576325779#endif
2576425780 if (ret != 0)
25765- goto done;
25781+ ERROR_OUT(WC_TEST_RET_ENC_EC(ret), done) ;
2576625782 TEST_SLEEP();
2576725783
2576825784 ret = wc_ecc_check_key(userA);
2576925785 if (ret != 0)
25770- goto done;
25786+ ERROR_OUT(WC_TEST_RET_ENC_EC(ret), done) ;
2577125787 TEST_SLEEP();
2577225788
2577325789 derSz = wc_EccKeyToDer(userA, der, ECC_BUFSIZE);
2577425790 if (derSz < 0) {
25775- ERROR_OUT(derSz, done);
25791+ ERROR_OUT(WC_TEST_RET_ENC_I( derSz) , done);
2577625792 }
2577725793
2577825794 ret = SaveDerAndPem(der, derSz, eccCaKeyTempFile, eccCaKeyPemFile,
2577925795 ECC_PRIVATEKEY_TYPE);
25780- if (ret != 0) {
25781- goto done;
25782- }
25796+ if (ret != 0)
25797+ ERROR_OUT(WC_TEST_RET_ENC_EC(ret), done);
2578325798
2578425799 /* test export of public key */
2578525800 derSz = wc_EccPublicKeyToDer(userA, der, ECC_BUFSIZE, 1);
2578625801 if (derSz < 0) {
25787- ERROR_OUT(derSz, done);
25802+ ERROR_OUT(WC_TEST_RET_ENC_I( derSz) , done);
2578825803 }
2578925804 if (derSz == 0) {
2579025805 ERROR_OUT(WC_TEST_RET_ENC_NC, done);
@@ -25794,24 +25809,23 @@ static wc_test_ret_t ecc_test_key_gen(WC_RNG* rng, int keySize)
2579425809 /* test export of compressed public key */
2579525810 derSz = wc_EccPublicKeyToDer_ex(userA, der, ECC_BUFSIZE, 1, 1);
2579625811 if (derSz < 0) {
25797- ERROR_OUT(derSz, done);
25812+ ERROR_OUT(WC_TEST_RET_ENC_I( derSz) , done);
2579825813 }
2579925814 if (derSz == 0) {
2580025815 ERROR_OUT(WC_TEST_RET_ENC_NC, done);
2580125816 }
2580225817#endif
2580325818
2580425819 ret = SaveDerAndPem(der, derSz, eccPubKeyDerFile, NULL, 0);
25805- if (ret != 0) {
25806- goto done;
25807- }
25820+ if (ret != 0)
25821+ ERROR_OUT(WC_TEST_RET_ENC_EC(ret), done);
2580825822
2580925823#ifdef HAVE_PKCS8
2581025824 /* test export of PKCS#8 unencrypted private key */
2581125825 pkcs8Sz = FOURK_BUF;
2581225826 derSz = wc_EccPrivateKeyToPKCS8(userA, der, &pkcs8Sz);
2581325827 if (derSz < 0) {
25814- ERROR_OUT(derSz, done);
25828+ ERROR_OUT(WC_TEST_RET_ENC_I( derSz) , done);
2581525829 }
2581625830
2581725831 if (derSz == 0) {
@@ -28723,7 +28737,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t ecc_test(void)
2872328737#if (defined(HAVE_ECC521) || defined(HAVE_ALL_CURVES)) && ECC_MIN_KEY_SZ <= 521
2872428738 ret = ecc_test_curve(&rng, 66, ECC_CURVE_DEF);
2872528739 if (ret < 0) {
28726- printf("keySize=68 , Default\n");
28740+ printf("keySize=66 , Default\n");
2872728741 goto done;
2872828742 }
2872928743#endif /* HAVE_ECC521 */
0 commit comments