/ src / test / netbase_tests.cpp
netbase_tests.cpp
  1  // Copyright (c) 2012-2022 The Bitcoin Core developers
  2  // Distributed under the MIT software license, see the accompanying
  3  // file COPYING or http://www.opensource.org/licenses/mit-license.php.
  4  
  5  #include <net_permissions.h>
  6  #include <netaddress.h>
  7  #include <netbase.h>
  8  #include <netgroup.h>
  9  #include <protocol.h>
 10  #include <serialize.h>
 11  #include <streams.h>
 12  #include <test/util/setup_common.h>
 13  #include <util/strencodings.h>
 14  #include <util/translation.h>
 15  
 16  #include <string>
 17  #include <numeric>
 18  
 19  #include <boost/test/unit_test.hpp>
 20  
 21  using namespace std::literals;
 22  using namespace util::hex_literals;
 23  
 24  BOOST_FIXTURE_TEST_SUITE(netbase_tests, BasicTestingSetup)
 25  
 26  static CNetAddr ResolveIP(const std::string& ip)
 27  {
 28      return LookupHost(ip, false).value_or(CNetAddr{});
 29  }
 30  
 31  static CNetAddr CreateInternal(const std::string& host)
 32  {
 33      CNetAddr addr;
 34      addr.SetInternal(host);
 35      return addr;
 36  }
 37  
 38  BOOST_AUTO_TEST_CASE(netbase_networks)
 39  {
 40      BOOST_CHECK(ResolveIP("127.0.0.1").GetNetwork() == NET_UNROUTABLE);
 41      BOOST_CHECK(ResolveIP("::1").GetNetwork() == NET_UNROUTABLE);
 42      BOOST_CHECK(ResolveIP("8.8.8.8").GetNetwork() == NET_IPV4);
 43      BOOST_CHECK(ResolveIP("2001::8888").GetNetwork() == NET_IPV6);
 44      BOOST_CHECK(ResolveIP("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion").GetNetwork() == NET_ONION);
 45      BOOST_CHECK(CreateInternal("foo.com").GetNetwork() == NET_INTERNAL);
 46  }
 47  
 48  BOOST_AUTO_TEST_CASE(netbase_properties)
 49  {
 50  
 51      BOOST_CHECK(ResolveIP("127.0.0.1").IsIPv4());
 52      BOOST_CHECK(ResolveIP("::FFFF:192.168.1.1").IsIPv4());
 53      BOOST_CHECK(ResolveIP("::1").IsIPv6());
 54      BOOST_CHECK(ResolveIP("10.0.0.1").IsRFC1918());
 55      BOOST_CHECK(ResolveIP("192.168.1.1").IsRFC1918());
 56      BOOST_CHECK(ResolveIP("172.31.255.255").IsRFC1918());
 57      BOOST_CHECK(ResolveIP("198.18.0.0").IsRFC2544());
 58      BOOST_CHECK(ResolveIP("198.19.255.255").IsRFC2544());
 59      BOOST_CHECK(ResolveIP("2001:0DB8::").IsRFC3849());
 60      BOOST_CHECK(ResolveIP("169.254.1.1").IsRFC3927());
 61      BOOST_CHECK(ResolveIP("2002::1").IsRFC3964());
 62      BOOST_CHECK(ResolveIP("FC00::").IsRFC4193());
 63      BOOST_CHECK(ResolveIP("2001::2").IsRFC4380());
 64      BOOST_CHECK(ResolveIP("2001:10::").IsRFC4843());
 65      BOOST_CHECK(ResolveIP("2001:20::").IsRFC7343());
 66      BOOST_CHECK(ResolveIP("FE80::").IsRFC4862());
 67      BOOST_CHECK(ResolveIP("64:FF9B::").IsRFC6052());
 68      BOOST_CHECK(ResolveIP("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion").IsTor());
 69      BOOST_CHECK(ResolveIP("127.0.0.1").IsLocal());
 70      BOOST_CHECK(ResolveIP("::1").IsLocal());
 71      BOOST_CHECK(ResolveIP("8.8.8.8").IsRoutable());
 72      BOOST_CHECK(ResolveIP("2001::1").IsRoutable());
 73      BOOST_CHECK(ResolveIP("127.0.0.1").IsValid());
 74      BOOST_CHECK(CreateInternal("FD6B:88C0:8724:edb1:8e4:3588:e546:35ca").IsInternal());
 75      BOOST_CHECK(CreateInternal("bar.com").IsInternal());
 76  
 77  }
 78  
 79  bool static TestSplitHost(const std::string& test, const std::string& host, uint16_t port, bool validPort=true)
 80  {
 81      std::string hostOut;
 82      uint16_t portOut{0};
 83      bool validPortOut = SplitHostPort(test, portOut, hostOut);
 84      return hostOut == host && portOut == port && validPortOut == validPort;
 85  }
 86  
 87  BOOST_AUTO_TEST_CASE(netbase_splithost)
 88  {
 89      BOOST_CHECK(TestSplitHost("www.bitcoincore.org", "www.bitcoincore.org", 0));
 90      BOOST_CHECK(TestSplitHost("[www.bitcoincore.org]", "www.bitcoincore.org", 0));
 91      BOOST_CHECK(TestSplitHost("www.bitcoincore.org:80", "www.bitcoincore.org", 80));
 92      BOOST_CHECK(TestSplitHost("[www.bitcoincore.org]:80", "www.bitcoincore.org", 80));
 93      BOOST_CHECK(TestSplitHost("127.0.0.1", "127.0.0.1", 0));
 94      BOOST_CHECK(TestSplitHost("127.0.0.1:8333", "127.0.0.1", 8333));
 95      BOOST_CHECK(TestSplitHost("[127.0.0.1]", "127.0.0.1", 0));
 96      BOOST_CHECK(TestSplitHost("[127.0.0.1]:8333", "127.0.0.1", 8333));
 97      BOOST_CHECK(TestSplitHost("::ffff:127.0.0.1", "::ffff:127.0.0.1", 0));
 98      BOOST_CHECK(TestSplitHost("[::ffff:127.0.0.1]:8333", "::ffff:127.0.0.1", 8333));
 99      BOOST_CHECK(TestSplitHost("[::]:8333", "::", 8333));
100      BOOST_CHECK(TestSplitHost("::8333", "::8333", 0));
101      BOOST_CHECK(TestSplitHost(":8333", "", 8333));
102      BOOST_CHECK(TestSplitHost("[]:8333", "", 8333));
103      BOOST_CHECK(TestSplitHost("", "", 0));
104      BOOST_CHECK(TestSplitHost(":65535", "", 65535));
105      BOOST_CHECK(TestSplitHost(":65536", ":65536", 0, false));
106      BOOST_CHECK(TestSplitHost(":-1", ":-1", 0, false));
107      BOOST_CHECK(TestSplitHost("[]:70001", "[]:70001", 0, false));
108      BOOST_CHECK(TestSplitHost("[]:-1", "[]:-1", 0, false));
109      BOOST_CHECK(TestSplitHost("[]:-0", "[]:-0", 0, false));
110      BOOST_CHECK(TestSplitHost("[]:0", "", 0, false));
111      BOOST_CHECK(TestSplitHost("[]:1/2", "[]:1/2", 0, false));
112      BOOST_CHECK(TestSplitHost("[]:1E2", "[]:1E2", 0, false));
113      BOOST_CHECK(TestSplitHost("127.0.0.1:65536", "127.0.0.1:65536", 0, false));
114      BOOST_CHECK(TestSplitHost("127.0.0.1:0", "127.0.0.1", 0, false));
115      BOOST_CHECK(TestSplitHost("127.0.0.1:", "127.0.0.1:", 0, false));
116      BOOST_CHECK(TestSplitHost("127.0.0.1:1/2", "127.0.0.1:1/2", 0, false));
117      BOOST_CHECK(TestSplitHost("127.0.0.1:1E2", "127.0.0.1:1E2", 0, false));
118      BOOST_CHECK(TestSplitHost("www.bitcoincore.org:65536", "www.bitcoincore.org:65536", 0, false));
119      BOOST_CHECK(TestSplitHost("www.bitcoincore.org:0", "www.bitcoincore.org", 0, false));
120      BOOST_CHECK(TestSplitHost("www.bitcoincore.org:", "www.bitcoincore.org:", 0, false));
121  }
122  
123  bool static TestParse(std::string src, std::string canon)
124  {
125      CService addr(LookupNumeric(src, 65535));
126      return canon == addr.ToStringAddrPort();
127  }
128  
129  BOOST_AUTO_TEST_CASE(netbase_lookupnumeric)
130  {
131      BOOST_CHECK(TestParse("127.0.0.1", "127.0.0.1:65535"));
132      BOOST_CHECK(TestParse("127.0.0.1:8333", "127.0.0.1:8333"));
133      BOOST_CHECK(TestParse("::ffff:127.0.0.1", "127.0.0.1:65535"));
134      BOOST_CHECK(TestParse("::", "[::]:65535"));
135      BOOST_CHECK(TestParse("[::]:8333", "[::]:8333"));
136      BOOST_CHECK(TestParse("[127.0.0.1]", "127.0.0.1:65535"));
137      BOOST_CHECK(TestParse(":::", "[::]:0"));
138  
139      // verify that an internal address fails to resolve
140      BOOST_CHECK(TestParse("[fd6b:88c0:8724:1:2:3:4:5]", "[::]:0"));
141      // and that a one-off resolves correctly
142      BOOST_CHECK(TestParse("[fd6c:88c0:8724:1:2:3:4:5]", "[fd6c:88c0:8724:1:2:3:4:5]:65535"));
143  }
144  
145  BOOST_AUTO_TEST_CASE(embedded_test)
146  {
147      CNetAddr addr1(ResolveIP("1.2.3.4"));
148      CNetAddr addr2(ResolveIP("::FFFF:0102:0304"));
149      BOOST_CHECK(addr2.IsIPv4());
150      BOOST_CHECK_EQUAL(addr1.ToStringAddr(), addr2.ToStringAddr());
151  }
152  
153  BOOST_AUTO_TEST_CASE(subnet_test)
154  {
155      BOOST_CHECK(LookupSubNet("1.2.3.0/24") == LookupSubNet("1.2.3.0/255.255.255.0"));
156      BOOST_CHECK(LookupSubNet("1.2.3.0/24") != LookupSubNet("1.2.4.0/255.255.255.0"));
157      BOOST_CHECK(LookupSubNet("1.2.3.0/24").Match(ResolveIP("1.2.3.4")));
158      BOOST_CHECK(!LookupSubNet("1.2.2.0/24").Match(ResolveIP("1.2.3.4")));
159      BOOST_CHECK(LookupSubNet("1.2.3.4").Match(ResolveIP("1.2.3.4")));
160      BOOST_CHECK(LookupSubNet("1.2.3.4/32").Match(ResolveIP("1.2.3.4")));
161      BOOST_CHECK(!LookupSubNet("1.2.3.4").Match(ResolveIP("5.6.7.8")));
162      BOOST_CHECK(!LookupSubNet("1.2.3.4/32").Match(ResolveIP("5.6.7.8")));
163      BOOST_CHECK(LookupSubNet("::ffff:127.0.0.1").Match(ResolveIP("127.0.0.1")));
164      BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8").Match(ResolveIP("1:2:3:4:5:6:7:8")));
165      BOOST_CHECK(!LookupSubNet("1:2:3:4:5:6:7:8").Match(ResolveIP("1:2:3:4:5:6:7:9")));
166      BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:0/112").Match(ResolveIP("1:2:3:4:5:6:7:1234")));
167      BOOST_CHECK(LookupSubNet("192.168.0.1/24").Match(ResolveIP("192.168.0.2")));
168      BOOST_CHECK(LookupSubNet("192.168.0.20/29").Match(ResolveIP("192.168.0.18")));
169      BOOST_CHECK(LookupSubNet("1.2.2.1/24").Match(ResolveIP("1.2.2.4")));
170      BOOST_CHECK(LookupSubNet("1.2.2.110/31").Match(ResolveIP("1.2.2.111")));
171      BOOST_CHECK(LookupSubNet("1.2.2.20/26").Match(ResolveIP("1.2.2.63")));
172      // All-Matching IPv6 Matches arbitrary IPv6
173      BOOST_CHECK(LookupSubNet("::/0").Match(ResolveIP("1:2:3:4:5:6:7:1234")));
174      // But not `::` or `0.0.0.0` because they are considered invalid addresses
175      BOOST_CHECK(!LookupSubNet("::/0").Match(ResolveIP("::")));
176      BOOST_CHECK(!LookupSubNet("::/0").Match(ResolveIP("0.0.0.0")));
177      // Addresses from one network (IPv4) don't belong to subnets of another network (IPv6)
178      BOOST_CHECK(!LookupSubNet("::/0").Match(ResolveIP("1.2.3.4")));
179      // All-Matching IPv4 does not Match IPv6
180      BOOST_CHECK(!LookupSubNet("0.0.0.0/0").Match(ResolveIP("1:2:3:4:5:6:7:1234")));
181      // Invalid subnets Match nothing (not even invalid addresses)
182      BOOST_CHECK(!CSubNet().Match(ResolveIP("1.2.3.4")));
183      BOOST_CHECK(!LookupSubNet("").Match(ResolveIP("4.5.6.7")));
184      BOOST_CHECK(!LookupSubNet("bloop").Match(ResolveIP("0.0.0.0")));
185      BOOST_CHECK(!LookupSubNet("bloop").Match(ResolveIP("hab")));
186      // Check valid/invalid
187      BOOST_CHECK(LookupSubNet("1.2.3.0/0").IsValid());
188      BOOST_CHECK(!LookupSubNet("1.2.3.0/-1").IsValid());
189      BOOST_CHECK(!LookupSubNet("1.2.3.0/+24").IsValid());
190      BOOST_CHECK(LookupSubNet("1.2.3.0/32").IsValid());
191      BOOST_CHECK(!LookupSubNet("1.2.3.0/33").IsValid());
192      BOOST_CHECK(!LookupSubNet("1.2.3.0/300").IsValid());
193      BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8/0").IsValid());
194      BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8/33").IsValid());
195      BOOST_CHECK(!LookupSubNet("1:2:3:4:5:6:7:8/-1").IsValid());
196      BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8/128").IsValid());
197      BOOST_CHECK(!LookupSubNet("1:2:3:4:5:6:7:8/129").IsValid());
198      BOOST_CHECK(!LookupSubNet("fuzzy").IsValid());
199  
200      //CNetAddr constructor test
201      BOOST_CHECK(CSubNet(ResolveIP("127.0.0.1")).IsValid());
202      BOOST_CHECK(CSubNet(ResolveIP("127.0.0.1")).Match(ResolveIP("127.0.0.1")));
203      BOOST_CHECK(!CSubNet(ResolveIP("127.0.0.1")).Match(ResolveIP("127.0.0.2")));
204      BOOST_CHECK(CSubNet(ResolveIP("127.0.0.1")).ToString() == "127.0.0.1/32");
205  
206      CSubNet subnet = CSubNet(ResolveIP("1.2.3.4"), 32);
207      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/32");
208      subnet = CSubNet(ResolveIP("1.2.3.4"), 8);
209      BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/8");
210      subnet = CSubNet(ResolveIP("1.2.3.4"), 0);
211      BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/0");
212  
213      subnet = CSubNet(ResolveIP("1.2.3.4"), ResolveIP("255.255.255.255"));
214      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/32");
215      subnet = CSubNet(ResolveIP("1.2.3.4"), ResolveIP("255.0.0.0"));
216      BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/8");
217      subnet = CSubNet(ResolveIP("1.2.3.4"), ResolveIP("0.0.0.0"));
218      BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/0");
219  
220      BOOST_CHECK(CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).IsValid());
221      BOOST_CHECK(CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).Match(ResolveIP("1:2:3:4:5:6:7:8")));
222      BOOST_CHECK(!CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).Match(ResolveIP("1:2:3:4:5:6:7:9")));
223      BOOST_CHECK(CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).ToString() == "1:2:3:4:5:6:7:8/128");
224      // IPv4 address with IPv6 netmask or the other way around.
225      BOOST_CHECK(!CSubNet(ResolveIP("1.1.1.1"), ResolveIP("ffff::")).IsValid());
226      BOOST_CHECK(!CSubNet(ResolveIP("::1"), ResolveIP("255.0.0.0")).IsValid());
227  
228      // Create Non-IP subnets.
229  
230      const CNetAddr tor_addr{
231          ResolveIP("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion")};
232  
233      subnet = CSubNet(tor_addr);
234      BOOST_CHECK(subnet.IsValid());
235      BOOST_CHECK_EQUAL(subnet.ToString(), tor_addr.ToStringAddr());
236      BOOST_CHECK(subnet.Match(tor_addr));
237      BOOST_CHECK(
238          !subnet.Match(ResolveIP("kpgvmscirrdqpekbqjsvw5teanhatztpp2gl6eee4zkowvwfxwenqaid.onion")));
239      BOOST_CHECK(!subnet.Match(ResolveIP("1.2.3.4")));
240  
241      BOOST_CHECK(!CSubNet(tor_addr, 200).IsValid());
242      BOOST_CHECK(!CSubNet(tor_addr, ResolveIP("255.0.0.0")).IsValid());
243  
244      subnet = LookupSubNet("1.2.3.4/255.255.255.255");
245      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/32");
246      subnet = LookupSubNet("1.2.3.4/255.255.255.254");
247      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/31");
248      subnet = LookupSubNet("1.2.3.4/255.255.255.252");
249      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/30");
250      subnet = LookupSubNet("1.2.3.4/255.255.255.248");
251      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/29");
252      subnet = LookupSubNet("1.2.3.4/255.255.255.240");
253      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/28");
254      subnet = LookupSubNet("1.2.3.4/255.255.255.224");
255      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/27");
256      subnet = LookupSubNet("1.2.3.4/255.255.255.192");
257      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/26");
258      subnet = LookupSubNet("1.2.3.4/255.255.255.128");
259      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/25");
260      subnet = LookupSubNet("1.2.3.4/255.255.255.0");
261      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/24");
262      subnet = LookupSubNet("1.2.3.4/255.255.254.0");
263      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.2.0/23");
264      subnet = LookupSubNet("1.2.3.4/255.255.252.0");
265      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/22");
266      subnet = LookupSubNet("1.2.3.4/255.255.248.0");
267      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/21");
268      subnet = LookupSubNet("1.2.3.4/255.255.240.0");
269      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/20");
270      subnet = LookupSubNet("1.2.3.4/255.255.224.0");
271      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/19");
272      subnet = LookupSubNet("1.2.3.4/255.255.192.0");
273      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/18");
274      subnet = LookupSubNet("1.2.3.4/255.255.128.0");
275      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/17");
276      subnet = LookupSubNet("1.2.3.4/255.255.0.0");
277      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/16");
278      subnet = LookupSubNet("1.2.3.4/255.254.0.0");
279      BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/15");
280      subnet = LookupSubNet("1.2.3.4/255.252.0.0");
281      BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/14");
282      subnet = LookupSubNet("1.2.3.4/255.248.0.0");
283      BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/13");
284      subnet = LookupSubNet("1.2.3.4/255.240.0.0");
285      BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/12");
286      subnet = LookupSubNet("1.2.3.4/255.224.0.0");
287      BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/11");
288      subnet = LookupSubNet("1.2.3.4/255.192.0.0");
289      BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/10");
290      subnet = LookupSubNet("1.2.3.4/255.128.0.0");
291      BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/9");
292      subnet = LookupSubNet("1.2.3.4/255.0.0.0");
293      BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/8");
294      subnet = LookupSubNet("1.2.3.4/254.0.0.0");
295      BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/7");
296      subnet = LookupSubNet("1.2.3.4/252.0.0.0");
297      BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/6");
298      subnet = LookupSubNet("1.2.3.4/248.0.0.0");
299      BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/5");
300      subnet = LookupSubNet("1.2.3.4/240.0.0.0");
301      BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/4");
302      subnet = LookupSubNet("1.2.3.4/224.0.0.0");
303      BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/3");
304      subnet = LookupSubNet("1.2.3.4/192.0.0.0");
305      BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/2");
306      subnet = LookupSubNet("1.2.3.4/128.0.0.0");
307      BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/1");
308      subnet = LookupSubNet("1.2.3.4/0.0.0.0");
309      BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/0");
310  
311      subnet = LookupSubNet("1:2:3:4:5:6:7:8/ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff");
312      BOOST_CHECK_EQUAL(subnet.ToString(), "1:2:3:4:5:6:7:8/128");
313      subnet = LookupSubNet("1:2:3:4:5:6:7:8/ffff:0000:0000:0000:0000:0000:0000:0000");
314      BOOST_CHECK_EQUAL(subnet.ToString(), "1::/16");
315      subnet = LookupSubNet("1:2:3:4:5:6:7:8/0000:0000:0000:0000:0000:0000:0000:0000");
316      BOOST_CHECK_EQUAL(subnet.ToString(), "::/0");
317      // Invalid netmasks (with 1-bits after 0-bits)
318      subnet = LookupSubNet("1.2.3.4/255.255.232.0");
319      BOOST_CHECK(!subnet.IsValid());
320      subnet = LookupSubNet("1.2.3.4/255.0.255.255");
321      BOOST_CHECK(!subnet.IsValid());
322      subnet = LookupSubNet("1:2:3:4:5:6:7:8/ffff:ffff:ffff:fffe:ffff:ffff:ffff:ff0f");
323      BOOST_CHECK(!subnet.IsValid());
324  }
325  
326  BOOST_AUTO_TEST_CASE(netbase_getgroup)
327  {
328      NetGroupManager netgroupman{std::vector<bool>()}; // use /16
329      BOOST_CHECK(netgroupman.GetGroup(ResolveIP("127.0.0.1")) == std::vector<unsigned char>({0})); // Local -> !Routable()
330      BOOST_CHECK(netgroupman.GetGroup(ResolveIP("257.0.0.1")) == std::vector<unsigned char>({0})); // !Valid -> !Routable()
331      BOOST_CHECK(netgroupman.GetGroup(ResolveIP("10.0.0.1")) == std::vector<unsigned char>({0})); // RFC1918 -> !Routable()
332      BOOST_CHECK(netgroupman.GetGroup(ResolveIP("169.254.1.1")) == std::vector<unsigned char>({0})); // RFC3927 -> !Routable()
333      BOOST_CHECK(netgroupman.GetGroup(ResolveIP("1.2.3.4")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // IPv4
334      BOOST_CHECK(netgroupman.GetGroup(ResolveIP("::FFFF:0:102:304")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC6145
335      BOOST_CHECK(netgroupman.GetGroup(ResolveIP("64:FF9B::102:304")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC6052
336      BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2002:102:304:9999:9999:9999:9999:9999")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC3964
337      BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2001:0:9999:9999:9999:9999:FEFD:FCFB")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC4380
338      BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2001:470:abcd:9999:9999:9999:9999:9999")) == std::vector<unsigned char>({(unsigned char)NET_IPV6, 32, 1, 4, 112, 175})); //he.net
339      BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2001:2001:9999:9999:9999:9999:9999:9999")) == std::vector<unsigned char>({(unsigned char)NET_IPV6, 32, 1, 32, 1})); //IPv6
340  
341      // baz.net sha256 hash: 12929400eb4607c4ac075f087167e75286b179c693eb059a01774b864e8fe505
342      std::vector<unsigned char> internal_group = {NET_INTERNAL, 0x12, 0x92, 0x94, 0x00, 0xeb, 0x46, 0x07, 0xc4, 0xac, 0x07};
343      BOOST_CHECK(netgroupman.GetGroup(CreateInternal("baz.net")) == internal_group);
344  }
345  
346  BOOST_AUTO_TEST_CASE(netbase_parsenetwork)
347  {
348      BOOST_CHECK_EQUAL(ParseNetwork("ipv4"), NET_IPV4);
349      BOOST_CHECK_EQUAL(ParseNetwork("ipv6"), NET_IPV6);
350      BOOST_CHECK_EQUAL(ParseNetwork("onion"), NET_ONION);
351      BOOST_CHECK_EQUAL(ParseNetwork("tor"), NET_ONION);
352      BOOST_CHECK_EQUAL(ParseNetwork("cjdns"), NET_CJDNS);
353  
354      BOOST_CHECK_EQUAL(ParseNetwork("IPv4"), NET_IPV4);
355      BOOST_CHECK_EQUAL(ParseNetwork("IPv6"), NET_IPV6);
356      BOOST_CHECK_EQUAL(ParseNetwork("ONION"), NET_ONION);
357      BOOST_CHECK_EQUAL(ParseNetwork("TOR"), NET_ONION);
358      BOOST_CHECK_EQUAL(ParseNetwork("CJDNS"), NET_CJDNS);
359  
360      BOOST_CHECK_EQUAL(ParseNetwork(":)"), NET_UNROUTABLE);
361      BOOST_CHECK_EQUAL(ParseNetwork("tÖr"), NET_UNROUTABLE);
362      BOOST_CHECK_EQUAL(ParseNetwork("\xfe\xff"), NET_UNROUTABLE);
363      BOOST_CHECK_EQUAL(ParseNetwork(""), NET_UNROUTABLE);
364  }
365  
366  BOOST_AUTO_TEST_CASE(netpermissions_test)
367  {
368      bilingual_str error;
369      NetWhitebindPermissions whitebindPermissions;
370      NetWhitelistPermissions whitelistPermissions;
371      ConnectionDirection connection_direction;
372  
373      // Detect invalid white bind
374      BOOST_CHECK(!NetWhitebindPermissions::TryParse("", whitebindPermissions, error));
375      BOOST_CHECK(error.original.find("Cannot resolve -whitebind address") != std::string::npos);
376      BOOST_CHECK(!NetWhitebindPermissions::TryParse("127.0.0.1", whitebindPermissions, error));
377      BOOST_CHECK(error.original.find("Need to specify a port with -whitebind") != std::string::npos);
378      BOOST_CHECK(!NetWhitebindPermissions::TryParse("", whitebindPermissions, error));
379  
380      // If no permission flags, assume backward compatibility
381      BOOST_CHECK(NetWhitebindPermissions::TryParse("1.2.3.4:32", whitebindPermissions, error));
382      BOOST_CHECK(error.empty());
383      BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::Implicit);
384      BOOST_CHECK(NetPermissions::HasFlag(whitebindPermissions.m_flags, NetPermissionFlags::Implicit));
385      NetPermissions::ClearFlag(whitebindPermissions.m_flags, NetPermissionFlags::Implicit);
386      BOOST_CHECK(!NetPermissions::HasFlag(whitebindPermissions.m_flags, NetPermissionFlags::Implicit));
387      BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::None);
388      NetPermissions::AddFlag(whitebindPermissions.m_flags, NetPermissionFlags::Implicit);
389      BOOST_CHECK(NetPermissions::HasFlag(whitebindPermissions.m_flags, NetPermissionFlags::Implicit));
390  
391      // Can set one permission
392      BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom@1.2.3.4:32", whitebindPermissions, error));
393      BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::BloomFilter);
394      BOOST_CHECK(NetWhitebindPermissions::TryParse("@1.2.3.4:32", whitebindPermissions, error));
395      BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::None);
396  
397      NetWhitebindPermissions noban, noban_download, download_noban, download;
398  
399      // "noban" implies "download"
400      BOOST_REQUIRE(NetWhitebindPermissions::TryParse("noban@1.2.3.4:32", noban, error));
401      BOOST_CHECK_EQUAL(noban.m_flags, NetPermissionFlags::NoBan);
402      BOOST_CHECK(NetPermissions::HasFlag(noban.m_flags, NetPermissionFlags::Download));
403      BOOST_CHECK(NetPermissions::HasFlag(noban.m_flags, NetPermissionFlags::NoBan));
404  
405      // "noban,download" is equivalent to "noban"
406      BOOST_REQUIRE(NetWhitebindPermissions::TryParse("noban,download@1.2.3.4:32", noban_download, error));
407      BOOST_CHECK_EQUAL(noban_download.m_flags, noban.m_flags);
408  
409      // "download,noban" is equivalent to "noban"
410      BOOST_REQUIRE(NetWhitebindPermissions::TryParse("download,noban@1.2.3.4:32", download_noban, error));
411      BOOST_CHECK_EQUAL(download_noban.m_flags, noban.m_flags);
412  
413      // "download" excludes (does not imply) "noban"
414      BOOST_REQUIRE(NetWhitebindPermissions::TryParse("download@1.2.3.4:32", download, error));
415      BOOST_CHECK_EQUAL(download.m_flags, NetPermissionFlags::Download);
416      BOOST_CHECK(NetPermissions::HasFlag(download.m_flags, NetPermissionFlags::Download));
417      BOOST_CHECK(!NetPermissions::HasFlag(download.m_flags, NetPermissionFlags::NoBan));
418  
419      // Happy path, can parse flags
420      BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,forcerelay@1.2.3.4:32", whitebindPermissions, error));
421      // forcerelay should also activate the relay permission
422      BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::BloomFilter | NetPermissionFlags::ForceRelay | NetPermissionFlags::Relay);
423      BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,relay,noban@1.2.3.4:32", whitebindPermissions, error));
424      BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::BloomFilter | NetPermissionFlags::Relay | NetPermissionFlags::NoBan);
425      BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,forcerelay,noban@1.2.3.4:32", whitebindPermissions, error));
426      BOOST_CHECK(NetWhitebindPermissions::TryParse("all@1.2.3.4:32", whitebindPermissions, error));
427      BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::All);
428  
429      // Allow dups
430      BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,relay,noban,noban@1.2.3.4:32", whitebindPermissions, error));
431      BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::BloomFilter | NetPermissionFlags::Relay | NetPermissionFlags::NoBan | NetPermissionFlags::Download); // "noban" implies "download"
432  
433      // Allow empty
434      BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,relay,,noban@1.2.3.4:32", whitebindPermissions, error));
435      BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::BloomFilter | NetPermissionFlags::Relay | NetPermissionFlags::NoBan);
436      BOOST_CHECK(NetWhitebindPermissions::TryParse(",@1.2.3.4:32", whitebindPermissions, error));
437      BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::None);
438      BOOST_CHECK(NetWhitebindPermissions::TryParse(",,@1.2.3.4:32", whitebindPermissions, error));
439      BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::None);
440  
441      BOOST_CHECK(!NetWhitebindPermissions::TryParse("out,forcerelay@1.2.3.4:32", whitebindPermissions, error));
442      BOOST_CHECK(error.original.find("whitebind may only be used for incoming connections (\"out\" was passed)") != std::string::npos);
443  
444      // Detect invalid flag
445      BOOST_CHECK(!NetWhitebindPermissions::TryParse("bloom,forcerelay,oopsie@1.2.3.4:32", whitebindPermissions, error));
446      BOOST_CHECK(error.original.find("Invalid P2P permission") != std::string::npos);
447  
448      // Check netmask error
449      BOOST_CHECK(!NetWhitelistPermissions::TryParse("bloom,forcerelay,noban@1.2.3.4:32", whitelistPermissions, connection_direction, error));
450      BOOST_CHECK(error.original.find("Invalid netmask specified in -whitelist") != std::string::npos);
451  
452      // Happy path for whitelist parsing
453      BOOST_CHECK(NetWhitelistPermissions::TryParse("noban@1.2.3.4", whitelistPermissions, connection_direction, error));
454      BOOST_CHECK_EQUAL(whitelistPermissions.m_flags, NetPermissionFlags::NoBan);
455      BOOST_CHECK(NetPermissions::HasFlag(whitelistPermissions.m_flags, NetPermissionFlags::NoBan));
456  
457      BOOST_CHECK(NetWhitelistPermissions::TryParse("bloom,forcerelay,noban,relay@1.2.3.4/32", whitelistPermissions, connection_direction, error));
458      BOOST_CHECK_EQUAL(whitelistPermissions.m_flags, NetPermissionFlags::BloomFilter | NetPermissionFlags::ForceRelay | NetPermissionFlags::NoBan | NetPermissionFlags::Relay);
459      BOOST_CHECK(error.empty());
460      BOOST_CHECK_EQUAL(whitelistPermissions.m_subnet.ToString(), "1.2.3.4/32");
461      BOOST_CHECK(NetWhitelistPermissions::TryParse("bloom,forcerelay,noban,relay,mempool@1.2.3.4/32", whitelistPermissions, connection_direction, error));
462      BOOST_CHECK(NetWhitelistPermissions::TryParse("in,relay@1.2.3.4", whitelistPermissions, connection_direction, error));
463      BOOST_CHECK_EQUAL(connection_direction, ConnectionDirection::In);
464      BOOST_CHECK(NetWhitelistPermissions::TryParse("out,bloom@1.2.3.4", whitelistPermissions, connection_direction, error));
465      BOOST_CHECK_EQUAL(connection_direction, ConnectionDirection::Out);
466      BOOST_CHECK(NetWhitelistPermissions::TryParse("in,out,bloom@1.2.3.4", whitelistPermissions, connection_direction, error));
467      BOOST_CHECK_EQUAL(connection_direction, ConnectionDirection::Both);
468  
469      const auto strings = NetPermissions::ToStrings(NetPermissionFlags::All);
470      BOOST_CHECK_EQUAL(strings.size(), 7U);
471      BOOST_CHECK(std::find(strings.begin(), strings.end(), "bloomfilter") != strings.end());
472      BOOST_CHECK(std::find(strings.begin(), strings.end(), "forcerelay") != strings.end());
473      BOOST_CHECK(std::find(strings.begin(), strings.end(), "relay") != strings.end());
474      BOOST_CHECK(std::find(strings.begin(), strings.end(), "noban") != strings.end());
475      BOOST_CHECK(std::find(strings.begin(), strings.end(), "mempool") != strings.end());
476      BOOST_CHECK(std::find(strings.begin(), strings.end(), "download") != strings.end());
477      BOOST_CHECK(std::find(strings.begin(), strings.end(), "addr") != strings.end());
478  }
479  
480  BOOST_AUTO_TEST_CASE(netbase_dont_resolve_strings_with_embedded_nul_characters)
481  {
482      BOOST_CHECK(LookupHost("127.0.0.1"s, false).has_value());
483      BOOST_CHECK(!LookupHost("127.0.0.1\0"s, false).has_value());
484      BOOST_CHECK(!LookupHost("127.0.0.1\0example.com"s, false).has_value());
485      BOOST_CHECK(!LookupHost("127.0.0.1\0example.com\0"s, false).has_value());
486  
487      BOOST_CHECK(LookupSubNet("1.2.3.0/24"s).IsValid());
488      BOOST_CHECK(!LookupSubNet("1.2.3.0/24\0"s).IsValid());
489      BOOST_CHECK(!LookupSubNet("1.2.3.0/24\0example.com"s).IsValid());
490      BOOST_CHECK(!LookupSubNet("1.2.3.0/24\0example.com\0"s).IsValid());
491      BOOST_CHECK(LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion"s).IsValid());
492      BOOST_CHECK(!LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion\0"s).IsValid());
493      BOOST_CHECK(!LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion\0example.com"s).IsValid());
494      BOOST_CHECK(!LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion\0example.com\0"s).IsValid());
495  }
496  
497  // Since CNetAddr (un)ser is tested separately in net_tests.cpp here we only
498  // try a few edge cases for port, service flags and time.
499  
500  static const std::vector<CAddress> fixture_addresses({
501      CAddress{
502          CService(CNetAddr(in6_addr(IN6ADDR_LOOPBACK_INIT)), 0 /* port */),
503          NODE_NONE,
504          NodeSeconds{0x4966bc61s}, /* Fri Jan  9 02:54:25 UTC 2009 */
505      },
506      CAddress{
507          CService(CNetAddr(in6_addr(IN6ADDR_LOOPBACK_INIT)), 0x00f1 /* port */),
508          NODE_NETWORK,
509          NodeSeconds{0x83766279s}, /* Tue Nov 22 11:22:33 UTC 2039 */
510      },
511      CAddress{
512          CService(CNetAddr(in6_addr(IN6ADDR_LOOPBACK_INIT)), 0xf1f2 /* port */),
513          static_cast<ServiceFlags>(NODE_WITNESS | NODE_COMPACT_FILTERS | NODE_NETWORK_LIMITED),
514          NodeSeconds{0xffffffffs}, /* Sun Feb  7 06:28:15 UTC 2106 */
515      },
516  });
517  
518  // fixture_addresses should equal to this when serialized in V1 format.
519  // When this is unserialized from V1 format it should equal to fixture_addresses.
520  static constexpr const char* stream_addrv1_hex =
521      "03" // number of entries
522  
523      "61bc6649"                         // time, Fri Jan  9 02:54:25 UTC 2009
524      "0000000000000000"                 // service flags, NODE_NONE
525      "00000000000000000000000000000001" // address, fixed 16 bytes (IPv4 embedded in IPv6)
526      "0000"                             // port
527  
528      "79627683"                         // time, Tue Nov 22 11:22:33 UTC 2039
529      "0100000000000000"                 // service flags, NODE_NETWORK
530      "00000000000000000000000000000001" // address, fixed 16 bytes (IPv6)
531      "00f1"                             // port
532  
533      "ffffffff"                         // time, Sun Feb  7 06:28:15 UTC 2106
534      "4804000000000000"                 // service flags, NODE_WITNESS | NODE_COMPACT_FILTERS | NODE_NETWORK_LIMITED
535      "00000000000000000000000000000001" // address, fixed 16 bytes (IPv6)
536      "f1f2";                            // port
537  
538  // fixture_addresses should equal to this when serialized in V2 format.
539  // When this is unserialized from V2 format it should equal to fixture_addresses.
540  static constexpr const char* stream_addrv2_hex =
541      "03" // number of entries
542  
543      "61bc6649"                         // time, Fri Jan  9 02:54:25 UTC 2009
544      "00"                               // service flags, COMPACTSIZE(NODE_NONE)
545      "02"                               // network id, IPv6
546      "10"                               // address length, COMPACTSIZE(16)
547      "00000000000000000000000000000001" // address
548      "0000"                             // port
549  
550      "79627683"                         // time, Tue Nov 22 11:22:33 UTC 2039
551      "01"                               // service flags, COMPACTSIZE(NODE_NETWORK)
552      "02"                               // network id, IPv6
553      "10"                               // address length, COMPACTSIZE(16)
554      "00000000000000000000000000000001" // address
555      "00f1"                             // port
556  
557      "ffffffff"                         // time, Sun Feb  7 06:28:15 UTC 2106
558      "fd4804"                           // service flags, COMPACTSIZE(NODE_WITNESS | NODE_COMPACT_FILTERS | NODE_NETWORK_LIMITED)
559      "02"                               // network id, IPv6
560      "10"                               // address length, COMPACTSIZE(16)
561      "00000000000000000000000000000001" // address
562      "f1f2";                            // port
563  
564  BOOST_AUTO_TEST_CASE(caddress_serialize_v1)
565  {
566      DataStream s{};
567  
568      s << CAddress::V1_NETWORK(fixture_addresses);
569      BOOST_CHECK_EQUAL(HexStr(s), stream_addrv1_hex);
570  }
571  
572  BOOST_AUTO_TEST_CASE(caddress_unserialize_v1)
573  {
574      DataStream s{ParseHex(stream_addrv1_hex)};
575      std::vector<CAddress> addresses_unserialized;
576  
577      s >> CAddress::V1_NETWORK(addresses_unserialized);
578      BOOST_CHECK(fixture_addresses == addresses_unserialized);
579  }
580  
581  BOOST_AUTO_TEST_CASE(caddress_serialize_v2)
582  {
583      DataStream s{};
584  
585      s << CAddress::V2_NETWORK(fixture_addresses);
586      BOOST_CHECK_EQUAL(HexStr(s), stream_addrv2_hex);
587  }
588  
589  BOOST_AUTO_TEST_CASE(caddress_unserialize_v2)
590  {
591      DataStream s{ParseHex(stream_addrv2_hex)};
592      std::vector<CAddress> addresses_unserialized;
593  
594      s >> CAddress::V2_NETWORK(addresses_unserialized);
595      BOOST_CHECK(fixture_addresses == addresses_unserialized);
596  }
597  
598  BOOST_AUTO_TEST_CASE(isbadport)
599  {
600      BOOST_CHECK(IsBadPort(1));
601      BOOST_CHECK(IsBadPort(22));
602      BOOST_CHECK(IsBadPort(6000));
603  
604      BOOST_CHECK(!IsBadPort(80));
605      BOOST_CHECK(!IsBadPort(443));
606      BOOST_CHECK(!IsBadPort(8333));
607  
608      // Check all possible ports and ensure we only flag the expected amount as bad
609      std::list<int> ports(std::numeric_limits<uint16_t>::max());
610      std::iota(ports.begin(), ports.end(), 1);
611      BOOST_CHECK_EQUAL(std::ranges::count_if(ports, IsBadPort), 85);
612  }
613  
614  
615  BOOST_AUTO_TEST_CASE(asmap_test_vectors)
616  {
617      // Randomly generated encoded ASMap with 128 ranges, up to 20-bit AS numbers.
618      constexpr auto ASMAP_DATA{
619          "fd38d50f7d5d665357f64bba6bfc190d6078a7e68e5d3ac032edf47f8b5755f87881bfd3633d9aa7c1fa279b3"
620          "6fe26c63bbc9de44e0f04e5a382d8e1cddbe1c26653bc939d4327f287e8b4d1f8aff33176787cb0ff7cb28e3f"
621          "daef0f8f47357f801c9f7ff7a99f7f9c9f99de7f3156ae00f23eb27a303bc486aa3ccc31ec19394c2f8a53ddd"
622          "ea3cc56257f3b7e9b1f488be9c1137db823759aa4e071eef2e984aaf97b52d5f88d0f373dd190fe45e06efef1"
623          "df7278be680a73a74c76db4dd910f1d30752c57fe2bc9f079f1a1e1b036c2a69219f11c5e11980a3fa51f4f82"
624          "d36373de73b1863a8c27e36ae0e4f705be3d76ecff038a75bc0f92ba7e7f6f4080f1c47c34d095367ecf4406c"
625          "1e3bbc17ba4d6f79ea3f031b876799ac268b1e0ea9babf0f9a8e5f6c55e363c6363df46afc696d7afceaf49b6"
626          "e62df9e9dc27e70664cafe5c53df66dd0b8237678ada90e73f05ec60e6f6e96c3cbb1ea2f9dece115d5bdba10"
627          "33e53662a7d72a29477b5beb35710591d3e23e5f0379baea62ffdee535bcdf879cbf69b88d7ea37c8015381cf"
628          "63dc33d28f757a4a5e15d6a08"_hex};
629  
630      // Convert to std::vector<bool> format that the ASMap interpreter uses.
631      std::vector<bool> asmap_bits;
632      asmap_bits.reserve(ASMAP_DATA.size() * 8);
633      for (auto byte : ASMAP_DATA) {
634          for (int bit = 0; bit < 8; ++bit) {
635              asmap_bits.push_back((std::to_integer<uint8_t>(byte) >> bit) & 1);
636          }
637      }
638  
639      // Construct NetGroupManager with this data.
640      NetGroupManager netgroup{std::move(asmap_bits)};
641      BOOST_CHECK(netgroup.UsingASMap());
642  
643      // Check some randomly-generated IPv6 addresses in it (biased towards the very beginning and
644      // very end of the 128-bit range).
645      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("0:1559:183:3728:224c:65a5:62e6:e991", false)), 961340);
646      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("d0:d493:faa0:8609:e927:8b75:293c:f5a4", false)), 961340);
647      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("2a0:26f:8b2c:2ee7:c7d1:3b24:4705:3f7f", false)), 693761);
648      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("a77:7cd4:4be5:a449:89f2:3212:78c6:ee38", false)), 0);
649      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("1336:1ad6:2f26:4fe3:d809:7321:6e0d:4615", false)), 672176);
650      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("1d56:abd0:a52f:a8d5:d5a7:a610:581d:d792", false)), 499880);
651      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("378e:7290:54e5:bd36:4760:971c:e9b9:570d", false)), 0);
652      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("406c:820b:272a:c045:b74e:fc0a:9ef2:cecc", false)), 248495);
653      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("46c2:ae07:9d08:2d56:d473:2bc7:57e3:20ac", false)), 248495);
654      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("50d2:3db6:52fa:2e7:12ec:5bc4:1bd1:49f9", false)), 124471);
655      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("53e1:1812:ffa:dccf:f9f2:64be:75fa:795", false)), 539993);
656      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("544d:eeba:3990:35d1:ad66:f9a3:576d:8617", false)), 374443);
657      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("6a53:40dc:8f1d:3ffa:efeb:3aa3:df88:b94b", false)), 435070);
658      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("87aa:d1c9:9edb:91e7:aab1:9eb9:baa0:de18", false)), 244121);
659      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("9f00:48fa:88e3:4b67:a6f3:e6d2:5cc1:5be2", false)), 862116);
660      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("c49f:9cc6:86ad:ba08:4580:315e:dbd1:8a62", false)), 969411);
661      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("dff5:8021:61d:b17d:406d:7888:fdac:4a20", false)), 969411);
662      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("e888:6791:2960:d723:bcfd:47e1:2d8c:599f", false)), 824019);
663      BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("ffff:d499:8c4b:4941:bc81:d5b9:b51e:85a8", false)), 824019);
664  }
665  
666  BOOST_AUTO_TEST_SUITE_END()