diff --git a/wolfcrypt/test/test.c b/wolfcrypt/test/test.c index b31461a67..8d6700057 100644 --- a/wolfcrypt/test/test.c +++ b/wolfcrypt/test/test.c @@ -12671,7 +12671,7 @@ int openssl_pkey0_test(void) printf("error with encrypt init\n"); return ERR_BASE_PKEY-17; } - XMEMSET(out, 0, sizeof(out)); + XMEMSET(out, 0, sizeof(out)); ret = EVP_PKEY_encrypt(enc, out, &outlen, in, sizeof(in)); if (ret != 1) { printf("error encrypting msg\n"); @@ -12680,7 +12680,7 @@ int openssl_pkey0_test(void) show("encrypted msg", out, outlen); - XMEMSET(plain, 0, sizeof(plain)); + XMEMSET(plain, 0, sizeof(plain)); ret = EVP_PKEY_decrypt(dec, plain, &outlen, out, keySz); if (ret != 1) { printf("error decrypting msg\n"); @@ -12717,7 +12717,7 @@ int openssl_pkey0_test(void) } #endif - XMEMSET(out, 0, sizeof(out)); + XMEMSET(out, 0, sizeof(out)); ret = EVP_PKEY_encrypt(enc, out, &outlen, in, sizeof(in)); if (ret != 1) { printf("error encrypting msg\n"); @@ -12726,7 +12726,7 @@ int openssl_pkey0_test(void) show("encrypted msg", out, outlen); - XMEMSET(plain, 0, sizeof(plain)); + XMEMSET(plain, 0, sizeof(plain)); ret = EVP_PKEY_decrypt(dec, plain, &outlen, out, keySz); if (ret != 1) { printf("error decrypting msg\n"); diff --git a/wolfssl/test.h b/wolfssl/test.h index 77dee8474..1b584c0a0 100644 --- a/wolfssl/test.h +++ b/wolfssl/test.h @@ -639,7 +639,7 @@ static INLINE void build_addr(SOCKADDR_IN_T* addr, const char* peer, if (addr == NULL) err_sys("invalid argument to build_addr, addr is NULL"); - XMEMSET(addr, 0, sizeof(SOCKADDR_IN_T)); + XMEMSET(addr, 0, sizeof(SOCKADDR_IN_T)); #ifndef TEST_IPV6 /* peer could be in human readable form */ @@ -692,7 +692,7 @@ static INLINE void build_addr(SOCKADDR_IN_T* addr, const char* peer, int ret; char strPort[80]; - XMEMSET(&hints, 0, sizeof(hints)); + XMEMSET(&hints, 0, sizeof(hints)); hints.ai_family = AF_INET_V; if (udp) { @@ -1852,14 +1852,14 @@ static INLINE void SetupAtomicUser(WOLFSSL_CTX* ctx, WOLFSSL* ssl) encCtx = (AtomicEncCtx*)malloc(sizeof(AtomicEncCtx)); if (encCtx == NULL) err_sys("AtomicEncCtx malloc failed"); - XMEMSET(encCtx, 0, sizeof(AtomicEncCtx)); + XMEMSET(encCtx, 0, sizeof(AtomicEncCtx)); decCtx = (AtomicDecCtx*)malloc(sizeof(AtomicDecCtx)); if (decCtx == NULL) { free(encCtx); err_sys("AtomicDecCtx malloc failed"); } - XMEMSET(decCtx, 0, sizeof(AtomicDecCtx)); + XMEMSET(decCtx, 0, sizeof(AtomicDecCtx)); wolfSSL_CTX_SetMacEncryptCb(ctx, myMacEncryptCb); wolfSSL_SetMacEncryptCtx(ssl, encCtx);