diff --git a/common/utils/ds/byte_array.c b/common/utils/ds/byte_array.c
index 04a2af0c5d55f784ab3876c3893a65c1a13feb7a..dfc8872662c780e13399586766926b479970d9db 100644
--- a/common/utils/ds/byte_array.c
+++ b/common/utils/ds/byte_array.c
@@ -28,7 +28,7 @@ byte_array_t copy_byte_array(byte_array_t src)
 {
   byte_array_t dst = {0};
   dst.buf = malloc(src.len);
-  DevAssert(dst.buf != NULL && "Memory exhausted");
+  AssertFatal(dst.buf != NULL, "Memory exhausted");
   memcpy(dst.buf, src.buf, src.len);
   dst.len = src.len;
   return dst;
diff --git a/openair2/LAYER2/nr_pdcp/nr_pdcp_integrity_nia2.c b/openair2/LAYER2/nr_pdcp/nr_pdcp_integrity_nia2.c
index eb8c7ee98ef73410ac7e97080dd085a91bb14e67..45133dc2f47eaaf9f1916daf15d7fc01f0a853f6 100644
--- a/openair2/LAYER2/nr_pdcp/nr_pdcp_integrity_nia2.c
+++ b/openair2/LAYER2/nr_pdcp/nr_pdcp_integrity_nia2.c
@@ -35,8 +35,8 @@ void *nr_pdcp_integrity_nia2_init(uint8_t integrity_key[16])
   // This is a hack. Reduce the 3 functions to just cipher?
   // No. The overhead is x8 times more. Don't change before measuring
   // return integrity_key;
-  cbc_cmac_ctx_t* ctx = calloc(1, sizeof(cbc_cmac_ctx_t));  
-  DevAssert(ctx != NULL && "Memory exhausted");
+  cbc_cmac_ctx_t* ctx = calloc(1, sizeof(cbc_cmac_ctx_t));
+  AssertFatal(ctx != NULL, "Memory exhausted");
 
   *ctx = init_aes_128_cbc_cmac(integrity_key);
   return ctx;
diff --git a/openair3/SECU/aes_128_cbc_cmac.c b/openair3/SECU/aes_128_cbc_cmac.c
index 6b02f1673a4bb2f0588bb9a85668f0de70cc42e0..da925f6d1ec1e3e15e9e8bbcd71fd1a3bc347daf 100644
--- a/openair3/SECU/aes_128_cbc_cmac.c
+++ b/openair3/SECU/aes_128_cbc_cmac.c
@@ -184,7 +184,7 @@ void aes_128_cbc_cmac(const aes_128_t* k_iv, byte_array_t msg, size_t len_out, u
     sz_iv = 16;
     iv = (uint8_t*)k_iv->iv16.iv;
   } else {
-    DevAssert(0!=0 && "Unknwon Initialization vector");
+    AssertFatal(0 != 0, "Unknwon Initialization vector");
   }
 
   CMAC_Update(ctx, iv, sz_iv);
@@ -233,7 +233,7 @@ void cipher_aes_128_cbc_cmac(cbc_cmac_ctx_t const* ctx, const aes_128_t* k_iv, b
     sz_iv = 16;
     iv = (uint8_t*)k_iv->iv16.iv;
   } else {
-    DevAssert(0!=0 && "Unknwon Initialization vector");
+    AssertFatal(0 != 0, "Unknwon Initialization vector");
   }
 
   CMAC_Update(ctx->mac, iv, sz_iv);
diff --git a/openair3/SECU/aes_128_ctr.c b/openair3/SECU/aes_128_ctr.c
index 4caf6ee3cf295695d707478b667f04aa95e79888..d9740e3b967b0ae63576eb8ad02753a86f784e5c 100644
--- a/openair3/SECU/aes_128_ctr.c
+++ b/openair3/SECU/aes_128_ctr.c
@@ -49,7 +49,7 @@ void aes_128_ctr(const aes_128_t* k_iv, byte_array_t msg, size_t len_out, uint8_
 
   int len_ev = 0;
   rc = EVP_EncryptUpdate(ctx, out, &len_ev, msg.buf, msg.len);
-  DevAssert(!(len_ev > len_out) && "Buffer overflow");
+  AssertFatal(!(len_ev > len_out), "Buffer overflow");
 
   // Finalise the encryption. Normally ciphertext bytes may be written at
   // this stage, but this does not occur in GCM mode
diff --git a/openair3/SECU/aes_128_ecb.c b/openair3/SECU/aes_128_ecb.c
index 2969166dc17a61ae3ccfeed24d2e028e9ab6bd7c..98b36031a1082cc75e5cb6b1f789fee042ebcc5f 100644
--- a/openair3/SECU/aes_128_ecb.c
+++ b/openair3/SECU/aes_128_ecb.c
@@ -40,7 +40,7 @@ void aes_128_ecb(const aes_128_t* k_iv, byte_array_t msg, size_t len_out, uint8_
 
   int len_ev = 0;
   rc = EVP_EncryptUpdate(ctx, out, &len_ev, msg.buf, msg.len);
-  DevAssert(!(len_ev > len_out) && "Buffer overflow");
+  AssertFatal(!(len_ev > len_out), "Buffer overflow");
 
   // Finalise the encryption. Normally ciphertext bytes may be written at
   // this stage, but this does not occur in GCM mode
diff --git a/openair3/SECU/secu_defs.c b/openair3/SECU/secu_defs.c
index 4a6782de971c53116022263606180ab8587dbccd..58a8754bad8f2d3b2467226599d2776405388067 100644
--- a/openair3/SECU/secu_defs.c
+++ b/openair3/SECU/secu_defs.c
@@ -43,7 +43,7 @@ void stream_compute_integrity(eia_alg_id_e alg, nas_stream_cipher_t const* strea
     nas_stream_encrypt_eia2(stream_cipher, out);
   } else {
     LOG_E(OSA, "Provided integrity algorithm is currently not supported = %u\n", alg);
-    DevAssert(0 != 0 && "Unknown Algorithm type");
+    AssertFatal(0 != 0, "Unknown Algorithm type");
   }
 }
 
@@ -60,7 +60,7 @@ void stream_compute_encrypt(eea_alg_id_e alg, nas_stream_cipher_t const* stream_
     nas_stream_encrypt_eea2(stream_cipher, out);
   } else {
     LOG_E(OSA, "Provided encrypt algorithm is currently not supported = %u\n", alg);
-    DevAssert(0 != 0 && "Unknown Algorithm type");
+    AssertFatal(0 != 0, "Unknown Algorithm type");
   }
 }
 
diff --git a/openair3/TEST/test_aes128_ctr.c b/openair3/TEST/test_aes128_ctr.c
index b29b0d2e165bfe336db23cb691a45338f73a5a90..697d0bf3f88ed74bb6cbb5ea12d91088287eb0e1 100644
--- a/openair3/TEST/test_aes128_ctr.c
+++ b/openair3/TEST/test_aes128_ctr.c
@@ -49,7 +49,7 @@ void test_1(void)
                         0xb2, 0x0e, 0xd7, 0xda, 0xd2, 0xf2, 0x33, 0xdc, 0x3c, 0x22, 0xd7, 0xbd, 0xee, 0xed, 0x8e, 0x78};
 
   int rc = memcmp(out, result, 32);
-  DevAssert(rc == 0 && "Ciphering did not produce the expected results");
+  AssertFatal(rc == 0, "Ciphering did not produce the expected results");
 
   uint8_t text_decipher[32] = {0};
 
@@ -57,7 +57,7 @@ void test_1(void)
   aes_128_ctr(&p, 32, out, 32, text_decipher);
 
   rc = memcmp(text, text_decipher, 32);
-  DevAssert(rc == 0 && "Text and deciphered text do not match");
+  AssertFatal(rc == 0, "Error: Text and deciphered text do not match\n");
 }
 
 void test_2(void)
@@ -83,13 +83,13 @@ void test_2(void)
                          0x92, 0x23, 0x95, 0x87, 0xb8, 0x95, 0x60, 0x86, 0xbc, 0xab, 0x18, 0x83, 0x60, 0x42, 0xe2, 0xe6, 0xce, 0x42, 0x43, 0x2a, 0x17, 0x10, 0x5c, 0x53, 0xd0};
 
   int rc = memcmp(out, result, 99);
-  DevAssert(rc == 0 && "Ciphering did not produce the expected results");
+  AssertFatal(rc == 0, "Ciphering did not produce the expected results");
 
   uint8_t text_decipher[100] = {0};
   aes_128_ctr(&p, 99, out, 99, text_decipher);
 
   rc = memcmp(text, text_decipher, 99);
-  DevAssert(rc == 0 && "Text and deciphered text do not match");
+  AssertFatal(rc == 0, "Text and deciphered text do not match");
 }
 
 void test_3(void)
@@ -110,14 +110,14 @@ void test_3(void)
                         0xa4, 0x81, 0x38, 0xa3, 0xb0, 0xc4, 0x71, 0xe2, 0xa7, 0x04, 0x1a, 0x57, 0x64, 0x23, 0xd2, 0x92, 0x72, 0x87, 0xf0, 0x00};
 
   int rc = memcmp(out, result, 39);
-  DevAssert(rc == 0 && "Ciphering did not produce the expected results");
+  AssertFatal(rc == 0, "Ciphering did not produce the expected results");
 
   // Decipher
   uint8_t text_decipher[40] = {0};
   aes_128_ctr(&p, 40, out, 40, text_decipher);
 
   rc = memcmp(text, text_decipher, 39);
-  DevAssert(rc == 0 && "Text and deciphered text do not match");
+  AssertFatal(rc == 0, "Text and deciphered text do not match");
 }
 
 void test_4(void)
@@ -144,14 +144,14 @@ void test_4(void)
                          0x10, 0xfe, 0xb3, 0x24, 0xba, 0x74, 0xc4, 0xc1, 0x56, 0xe0, 0x4d, 0x39, 0x09, 0x72, 0x09, 0x65, 0x3a, 0xc3, 0x3e, 0x5a, 0x5f, 0x2d, 0x88, 0x64};
 
   int rc = memcmp(out, result, 127);
-  DevAssert(rc == 0 && "Ciphering did not produce the expected results");
+  AssertFatal(rc == 0, "Ciphering did not produce the expected results");
 
   // Decipher
   uint8_t text_decipher[128] = {0};
   aes_128_ctr(&p, 128, out, 128, text_decipher);
 
   rc = memcmp(text, text_decipher, 127);
-  DevAssert(rc == 0 && "Text and deciphered text do not match");
+  AssertFatal(rc == 0, "Text and deciphered text do not match");
 }
 
 void test_5(void)
@@ -180,14 +180,14 @@ void test_5(void)
                          0x3f, 0x95, 0x62, 0x33, 0x71, 0xd4, 0x9b, 0x14, 0x7c, 0x0a, 0xf4, 0x86, 0x17, 0x1f, 0x22, 0xcd, 0x04, 0xb1, 0xcb, 0xeb, 0x26, 0x58, 0x22, 0x3e, 0x69, 0x38};
 
   int rc = memcmp(out, result, 155);
-  DevAssert(rc == 0 && "Ciphering did not produce the expected results");
+  AssertFatal(rc == 0, "Ciphering did not produce the expected results");
 
   // Decipher
   uint8_t text_decipher[156] = {0};
   aes_128_ctr(&p, 156, out, 156, text_decipher);
 
   rc = memcmp(text, text_decipher, 155);
-  DevAssert(rc == 0 && "Text and deciphered text do not match");
+  AssertFatal(rc == 0, "Text and deciphered text do not match");
 }
 
 void test_6(void)
@@ -238,14 +238,14 @@ void test_6(void)
                          0x7a, 0xb3, 0xb6, 0x72, 0x5d, 0x1a, 0x6f, 0x3f, 0x98, 0xb9, 0xc9, 0xda, 0xa8, 0x98, 0x2a, 0xff, 0x06, 0x78, 0x28, 0x00};
 
   int rc = memcmp(out, result, 483);
-  DevAssert(rc == 0 && "Ciphering did not produce the expected results");
+  AssertFatal(rc == 0, "Ciphering did not produce the expected results");
 
   // Decipher
   uint8_t text_decipher[512] = {0};
   aes_128_ctr(&p, 512, out, 512, text_decipher);
 
   rc = memcmp(text, text_decipher, 483);
-  DevAssert(rc == 0 && "Text and deciphered text do not match");
+  AssertFatal(rc == 0, "Text and deciphered text do not match");
 }
 
 void doit(void)