--- /dev/null
+/*
+ * Copyright 2020 The OpenSSL Project Authors. All Rights Reserved.
+ *
+ * Licensed under the Apache License 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ * https://www.openssl.org/source/license.html
+ * or in the file LICENSE in the source distribution.
+ */
+
+/*
+ * This program tests the use of OSSL_PARAM, currently in raw form.
+ */
+
+#include "internal/nelem.h"
+#include "internal/cryptlib.h"
+#include "testutil.h"
+
+struct testdata
+{
+ const char *in;
+ const unsigned char *expected;
+ size_t expected_len;
+ const char sep;
+};
+
+static const unsigned char test_1[] = { 0xAB, 0xCD, 0xEF, 0xF1 };
+static const unsigned char test_2[] = { 0xAB, 0xCD, 0xEF, 0x76, 0x00 };
+
+static struct testdata tbl_testdata[] = {
+ {
+ "AB:CD:EF:F1",
+ test_1, sizeof(test_1),
+ ':',
+ },
+ {
+ "AB:CD:EF:76:00",
+ test_2, sizeof(test_2),
+ ':',
+ },
+ {
+ "AB_CD_EF_F1",
+ test_1, sizeof(test_1),
+ '_',
+ },
+ {
+ "AB_CD_EF_76_00",
+ test_2, sizeof(test_2),
+ '_',
+ },
+ {
+ "ABCDEFF1",
+ test_1, sizeof(test_1),
+ '\0',
+ },
+ {
+ "ABCDEF7600",
+ test_2, sizeof(test_2),
+ '\0',
+ },
+};
+
+static int test_hexstr_sep_to_from(int test_index)
+{
+ int ret = 0;
+ long len = 0;
+ unsigned char *buf = NULL;
+ char *out = NULL;
+ struct testdata *test = &tbl_testdata[test_index];
+
+ if (!TEST_ptr(buf = openssl_hexstr2buf_sep(test->in, &len, test->sep))
+ || !TEST_mem_eq(buf, len, test->expected, test->expected_len)
+ || !TEST_ptr(out = openssl_buf2hexstr_sep(buf, len, test->sep))
+ || !TEST_str_eq(out, test->in))
+ goto err;
+
+ ret = 1;
+err:
+ OPENSSL_free(buf);
+ OPENSSL_free(out);
+ return ret;
+}
+
+static int test_hexstr_to_from(int test_index)
+{
+ int ret = 0;
+ long len = 0;
+ unsigned char *buf = NULL;
+ char *out = NULL;
+ struct testdata *test = &tbl_testdata[test_index];
+
+ if (test->sep != '_') {
+ if (!TEST_ptr(buf = OPENSSL_hexstr2buf(test->in, &len))
+ || !TEST_mem_eq(buf, len, test->expected, test->expected_len)
+ || !TEST_ptr(out = OPENSSL_buf2hexstr(buf, len)))
+ goto err;
+ if (test->sep == ':') {
+ if (!TEST_str_eq(out, test->in))
+ goto err;
+ } else if (!TEST_str_ne(out, test->in)) {
+ goto err;
+ }
+ } else {
+ if (!TEST_ptr_null(buf = OPENSSL_hexstr2buf(test->in, &len)))
+ goto err;
+ }
+ ret = 1;
+err:
+ OPENSSL_free(buf);
+ OPENSSL_free(out);
+ return ret;
+}
+
+static int test_hexstr_ex_to_from(int test_index)
+{
+ size_t len = 0;
+ char out[64];
+ unsigned char buf[64];
+ struct testdata *test = &tbl_testdata[test_index];
+
+ return TEST_true(OPENSSL_hexstr2buf_ex(buf, sizeof(buf), &len, test->in))
+ && TEST_mem_eq(buf, len, test->expected, test->expected_len)
+ && TEST_true(OPENSSL_buf2hexstr_ex(out, sizeof(out), NULL, buf, len))
+ && TEST_str_eq(out, test->in);
+}
+
+int setup_tests(void)
+{
+ ADD_ALL_TESTS(test_hexstr_sep_to_from, OSSL_NELEM(tbl_testdata));
+ ADD_ALL_TESTS(test_hexstr_to_from, OSSL_NELEM(tbl_testdata));
+ ADD_ALL_TESTS(test_hexstr_ex_to_from, 2);
+ return 1;
+}