netbase_tests.cpp
1 // Copyright (c) 2012-2022 The Bitcoin Core developers 2 // Distributed under the MIT software license, see the accompanying 3 // file COPYING or http://www.opensource.org/licenses/mit-license.php. 4 5 #include <net_permissions.h> 6 #include <netaddress.h> 7 #include <netbase.h> 8 #include <netgroup.h> 9 #include <protocol.h> 10 #include <serialize.h> 11 #include <streams.h> 12 #include <test/util/setup_common.h> 13 #include <util/strencodings.h> 14 #include <util/translation.h> 15 16 #include <string> 17 #include <numeric> 18 19 #include <boost/test/unit_test.hpp> 20 21 using namespace std::literals; 22 using namespace util::hex_literals; 23 24 BOOST_FIXTURE_TEST_SUITE(netbase_tests, BasicTestingSetup) 25 26 static CNetAddr ResolveIP(const std::string& ip) 27 { 28 return LookupHost(ip, false).value_or(CNetAddr{}); 29 } 30 31 static CNetAddr CreateInternal(const std::string& host) 32 { 33 CNetAddr addr; 34 addr.SetInternal(host); 35 return addr; 36 } 37 38 BOOST_AUTO_TEST_CASE(netbase_networks) 39 { 40 BOOST_CHECK(ResolveIP("127.0.0.1").GetNetwork() == NET_UNROUTABLE); 41 BOOST_CHECK(ResolveIP("::1").GetNetwork() == NET_UNROUTABLE); 42 BOOST_CHECK(ResolveIP("8.8.8.8").GetNetwork() == NET_IPV4); 43 BOOST_CHECK(ResolveIP("2001::8888").GetNetwork() == NET_IPV6); 44 BOOST_CHECK(ResolveIP("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion").GetNetwork() == NET_ONION); 45 BOOST_CHECK(CreateInternal("foo.com").GetNetwork() == NET_INTERNAL); 46 } 47 48 BOOST_AUTO_TEST_CASE(netbase_properties) 49 { 50 51 BOOST_CHECK(ResolveIP("127.0.0.1").IsIPv4()); 52 BOOST_CHECK(ResolveIP("::FFFF:192.168.1.1").IsIPv4()); 53 BOOST_CHECK(ResolveIP("::1").IsIPv6()); 54 BOOST_CHECK(ResolveIP("10.0.0.1").IsRFC1918()); 55 BOOST_CHECK(ResolveIP("192.168.1.1").IsRFC1918()); 56 BOOST_CHECK(ResolveIP("172.31.255.255").IsRFC1918()); 57 BOOST_CHECK(ResolveIP("198.18.0.0").IsRFC2544()); 58 BOOST_CHECK(ResolveIP("198.19.255.255").IsRFC2544()); 59 BOOST_CHECK(ResolveIP("2001:0DB8::").IsRFC3849()); 60 BOOST_CHECK(ResolveIP("169.254.1.1").IsRFC3927()); 61 BOOST_CHECK(ResolveIP("2002::1").IsRFC3964()); 62 BOOST_CHECK(ResolveIP("FC00::").IsRFC4193()); 63 BOOST_CHECK(ResolveIP("2001::2").IsRFC4380()); 64 BOOST_CHECK(ResolveIP("2001:10::").IsRFC4843()); 65 BOOST_CHECK(ResolveIP("2001:20::").IsRFC7343()); 66 BOOST_CHECK(ResolveIP("FE80::").IsRFC4862()); 67 BOOST_CHECK(ResolveIP("64:FF9B::").IsRFC6052()); 68 BOOST_CHECK(ResolveIP("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion").IsTor()); 69 BOOST_CHECK(ResolveIP("127.0.0.1").IsLocal()); 70 BOOST_CHECK(ResolveIP("::1").IsLocal()); 71 BOOST_CHECK(ResolveIP("8.8.8.8").IsRoutable()); 72 BOOST_CHECK(ResolveIP("2001::1").IsRoutable()); 73 BOOST_CHECK(ResolveIP("127.0.0.1").IsValid()); 74 BOOST_CHECK(CreateInternal("FD6B:88C0:8724:edb1:8e4:3588:e546:35ca").IsInternal()); 75 BOOST_CHECK(CreateInternal("bar.com").IsInternal()); 76 77 } 78 79 bool static TestSplitHost(const std::string& test, const std::string& host, uint16_t port, bool validPort=true) 80 { 81 std::string hostOut; 82 uint16_t portOut{0}; 83 bool validPortOut = SplitHostPort(test, portOut, hostOut); 84 return hostOut == host && portOut == port && validPortOut == validPort; 85 } 86 87 BOOST_AUTO_TEST_CASE(netbase_splithost) 88 { 89 BOOST_CHECK(TestSplitHost("www.bitcoincore.org", "www.bitcoincore.org", 0)); 90 BOOST_CHECK(TestSplitHost("[www.bitcoincore.org]", "www.bitcoincore.org", 0)); 91 BOOST_CHECK(TestSplitHost("www.bitcoincore.org:80", "www.bitcoincore.org", 80)); 92 BOOST_CHECK(TestSplitHost("[www.bitcoincore.org]:80", "www.bitcoincore.org", 80)); 93 BOOST_CHECK(TestSplitHost("127.0.0.1", "127.0.0.1", 0)); 94 BOOST_CHECK(TestSplitHost("127.0.0.1:8333", "127.0.0.1", 8333)); 95 BOOST_CHECK(TestSplitHost("[127.0.0.1]", "127.0.0.1", 0)); 96 BOOST_CHECK(TestSplitHost("[127.0.0.1]:8333", "127.0.0.1", 8333)); 97 BOOST_CHECK(TestSplitHost("::ffff:127.0.0.1", "::ffff:127.0.0.1", 0)); 98 BOOST_CHECK(TestSplitHost("[::ffff:127.0.0.1]:8333", "::ffff:127.0.0.1", 8333)); 99 BOOST_CHECK(TestSplitHost("[::]:8333", "::", 8333)); 100 BOOST_CHECK(TestSplitHost("::8333", "::8333", 0)); 101 BOOST_CHECK(TestSplitHost(":8333", "", 8333)); 102 BOOST_CHECK(TestSplitHost("[]:8333", "", 8333)); 103 BOOST_CHECK(TestSplitHost("", "", 0)); 104 BOOST_CHECK(TestSplitHost(":65535", "", 65535)); 105 BOOST_CHECK(TestSplitHost(":65536", ":65536", 0, false)); 106 BOOST_CHECK(TestSplitHost(":-1", ":-1", 0, false)); 107 BOOST_CHECK(TestSplitHost("[]:70001", "[]:70001", 0, false)); 108 BOOST_CHECK(TestSplitHost("[]:-1", "[]:-1", 0, false)); 109 BOOST_CHECK(TestSplitHost("[]:-0", "[]:-0", 0, false)); 110 BOOST_CHECK(TestSplitHost("[]:0", "", 0, false)); 111 BOOST_CHECK(TestSplitHost("[]:1/2", "[]:1/2", 0, false)); 112 BOOST_CHECK(TestSplitHost("[]:1E2", "[]:1E2", 0, false)); 113 BOOST_CHECK(TestSplitHost("127.0.0.1:65536", "127.0.0.1:65536", 0, false)); 114 BOOST_CHECK(TestSplitHost("127.0.0.1:0", "127.0.0.1", 0, false)); 115 BOOST_CHECK(TestSplitHost("127.0.0.1:", "127.0.0.1:", 0, false)); 116 BOOST_CHECK(TestSplitHost("127.0.0.1:1/2", "127.0.0.1:1/2", 0, false)); 117 BOOST_CHECK(TestSplitHost("127.0.0.1:1E2", "127.0.0.1:1E2", 0, false)); 118 BOOST_CHECK(TestSplitHost("www.bitcoincore.org:65536", "www.bitcoincore.org:65536", 0, false)); 119 BOOST_CHECK(TestSplitHost("www.bitcoincore.org:0", "www.bitcoincore.org", 0, false)); 120 BOOST_CHECK(TestSplitHost("www.bitcoincore.org:", "www.bitcoincore.org:", 0, false)); 121 } 122 123 bool static TestParse(std::string src, std::string canon) 124 { 125 CService addr(LookupNumeric(src, 65535)); 126 return canon == addr.ToStringAddrPort(); 127 } 128 129 BOOST_AUTO_TEST_CASE(netbase_lookupnumeric) 130 { 131 BOOST_CHECK(TestParse("127.0.0.1", "127.0.0.1:65535")); 132 BOOST_CHECK(TestParse("127.0.0.1:8333", "127.0.0.1:8333")); 133 BOOST_CHECK(TestParse("::ffff:127.0.0.1", "127.0.0.1:65535")); 134 BOOST_CHECK(TestParse("::", "[::]:65535")); 135 BOOST_CHECK(TestParse("[::]:8333", "[::]:8333")); 136 BOOST_CHECK(TestParse("[127.0.0.1]", "127.0.0.1:65535")); 137 BOOST_CHECK(TestParse(":::", "[::]:0")); 138 139 // verify that an internal address fails to resolve 140 BOOST_CHECK(TestParse("[fd6b:88c0:8724:1:2:3:4:5]", "[::]:0")); 141 // and that a one-off resolves correctly 142 BOOST_CHECK(TestParse("[fd6c:88c0:8724:1:2:3:4:5]", "[fd6c:88c0:8724:1:2:3:4:5]:65535")); 143 } 144 145 BOOST_AUTO_TEST_CASE(embedded_test) 146 { 147 CNetAddr addr1(ResolveIP("1.2.3.4")); 148 CNetAddr addr2(ResolveIP("::FFFF:0102:0304")); 149 BOOST_CHECK(addr2.IsIPv4()); 150 BOOST_CHECK_EQUAL(addr1.ToStringAddr(), addr2.ToStringAddr()); 151 } 152 153 BOOST_AUTO_TEST_CASE(subnet_test) 154 { 155 BOOST_CHECK(LookupSubNet("1.2.3.0/24") == LookupSubNet("1.2.3.0/255.255.255.0")); 156 BOOST_CHECK(LookupSubNet("1.2.3.0/24") != LookupSubNet("1.2.4.0/255.255.255.0")); 157 BOOST_CHECK(LookupSubNet("1.2.3.0/24").Match(ResolveIP("1.2.3.4"))); 158 BOOST_CHECK(!LookupSubNet("1.2.2.0/24").Match(ResolveIP("1.2.3.4"))); 159 BOOST_CHECK(LookupSubNet("1.2.3.4").Match(ResolveIP("1.2.3.4"))); 160 BOOST_CHECK(LookupSubNet("1.2.3.4/32").Match(ResolveIP("1.2.3.4"))); 161 BOOST_CHECK(!LookupSubNet("1.2.3.4").Match(ResolveIP("5.6.7.8"))); 162 BOOST_CHECK(!LookupSubNet("1.2.3.4/32").Match(ResolveIP("5.6.7.8"))); 163 BOOST_CHECK(LookupSubNet("::ffff:127.0.0.1").Match(ResolveIP("127.0.0.1"))); 164 BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8").Match(ResolveIP("1:2:3:4:5:6:7:8"))); 165 BOOST_CHECK(!LookupSubNet("1:2:3:4:5:6:7:8").Match(ResolveIP("1:2:3:4:5:6:7:9"))); 166 BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:0/112").Match(ResolveIP("1:2:3:4:5:6:7:1234"))); 167 BOOST_CHECK(LookupSubNet("192.168.0.1/24").Match(ResolveIP("192.168.0.2"))); 168 BOOST_CHECK(LookupSubNet("192.168.0.20/29").Match(ResolveIP("192.168.0.18"))); 169 BOOST_CHECK(LookupSubNet("1.2.2.1/24").Match(ResolveIP("1.2.2.4"))); 170 BOOST_CHECK(LookupSubNet("1.2.2.110/31").Match(ResolveIP("1.2.2.111"))); 171 BOOST_CHECK(LookupSubNet("1.2.2.20/26").Match(ResolveIP("1.2.2.63"))); 172 // All-Matching IPv6 Matches arbitrary IPv6 173 BOOST_CHECK(LookupSubNet("::/0").Match(ResolveIP("1:2:3:4:5:6:7:1234"))); 174 // But not `::` or `0.0.0.0` because they are considered invalid addresses 175 BOOST_CHECK(!LookupSubNet("::/0").Match(ResolveIP("::"))); 176 BOOST_CHECK(!LookupSubNet("::/0").Match(ResolveIP("0.0.0.0"))); 177 // Addresses from one network (IPv4) don't belong to subnets of another network (IPv6) 178 BOOST_CHECK(!LookupSubNet("::/0").Match(ResolveIP("1.2.3.4"))); 179 // All-Matching IPv4 does not Match IPv6 180 BOOST_CHECK(!LookupSubNet("0.0.0.0/0").Match(ResolveIP("1:2:3:4:5:6:7:1234"))); 181 // Invalid subnets Match nothing (not even invalid addresses) 182 BOOST_CHECK(!CSubNet().Match(ResolveIP("1.2.3.4"))); 183 BOOST_CHECK(!LookupSubNet("").Match(ResolveIP("4.5.6.7"))); 184 BOOST_CHECK(!LookupSubNet("bloop").Match(ResolveIP("0.0.0.0"))); 185 BOOST_CHECK(!LookupSubNet("bloop").Match(ResolveIP("hab"))); 186 // Check valid/invalid 187 BOOST_CHECK(LookupSubNet("1.2.3.0/0").IsValid()); 188 BOOST_CHECK(!LookupSubNet("1.2.3.0/-1").IsValid()); 189 BOOST_CHECK(!LookupSubNet("1.2.3.0/+24").IsValid()); 190 BOOST_CHECK(LookupSubNet("1.2.3.0/32").IsValid()); 191 BOOST_CHECK(!LookupSubNet("1.2.3.0/33").IsValid()); 192 BOOST_CHECK(!LookupSubNet("1.2.3.0/300").IsValid()); 193 BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8/0").IsValid()); 194 BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8/33").IsValid()); 195 BOOST_CHECK(!LookupSubNet("1:2:3:4:5:6:7:8/-1").IsValid()); 196 BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8/128").IsValid()); 197 BOOST_CHECK(!LookupSubNet("1:2:3:4:5:6:7:8/129").IsValid()); 198 BOOST_CHECK(!LookupSubNet("fuzzy").IsValid()); 199 200 //CNetAddr constructor test 201 BOOST_CHECK(CSubNet(ResolveIP("127.0.0.1")).IsValid()); 202 BOOST_CHECK(CSubNet(ResolveIP("127.0.0.1")).Match(ResolveIP("127.0.0.1"))); 203 BOOST_CHECK(!CSubNet(ResolveIP("127.0.0.1")).Match(ResolveIP("127.0.0.2"))); 204 BOOST_CHECK(CSubNet(ResolveIP("127.0.0.1")).ToString() == "127.0.0.1/32"); 205 206 CSubNet subnet = CSubNet(ResolveIP("1.2.3.4"), 32); 207 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/32"); 208 subnet = CSubNet(ResolveIP("1.2.3.4"), 8); 209 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/8"); 210 subnet = CSubNet(ResolveIP("1.2.3.4"), 0); 211 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/0"); 212 213 subnet = CSubNet(ResolveIP("1.2.3.4"), ResolveIP("255.255.255.255")); 214 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/32"); 215 subnet = CSubNet(ResolveIP("1.2.3.4"), ResolveIP("255.0.0.0")); 216 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/8"); 217 subnet = CSubNet(ResolveIP("1.2.3.4"), ResolveIP("0.0.0.0")); 218 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/0"); 219 220 BOOST_CHECK(CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).IsValid()); 221 BOOST_CHECK(CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).Match(ResolveIP("1:2:3:4:5:6:7:8"))); 222 BOOST_CHECK(!CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).Match(ResolveIP("1:2:3:4:5:6:7:9"))); 223 BOOST_CHECK(CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).ToString() == "1:2:3:4:5:6:7:8/128"); 224 // IPv4 address with IPv6 netmask or the other way around. 225 BOOST_CHECK(!CSubNet(ResolveIP("1.1.1.1"), ResolveIP("ffff::")).IsValid()); 226 BOOST_CHECK(!CSubNet(ResolveIP("::1"), ResolveIP("255.0.0.0")).IsValid()); 227 228 // Create Non-IP subnets. 229 230 const CNetAddr tor_addr{ 231 ResolveIP("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion")}; 232 233 subnet = CSubNet(tor_addr); 234 BOOST_CHECK(subnet.IsValid()); 235 BOOST_CHECK_EQUAL(subnet.ToString(), tor_addr.ToStringAddr()); 236 BOOST_CHECK(subnet.Match(tor_addr)); 237 BOOST_CHECK( 238 !subnet.Match(ResolveIP("kpgvmscirrdqpekbqjsvw5teanhatztpp2gl6eee4zkowvwfxwenqaid.onion"))); 239 BOOST_CHECK(!subnet.Match(ResolveIP("1.2.3.4"))); 240 241 BOOST_CHECK(!CSubNet(tor_addr, 200).IsValid()); 242 BOOST_CHECK(!CSubNet(tor_addr, ResolveIP("255.0.0.0")).IsValid()); 243 244 subnet = LookupSubNet("1.2.3.4/255.255.255.255"); 245 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/32"); 246 subnet = LookupSubNet("1.2.3.4/255.255.255.254"); 247 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/31"); 248 subnet = LookupSubNet("1.2.3.4/255.255.255.252"); 249 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/30"); 250 subnet = LookupSubNet("1.2.3.4/255.255.255.248"); 251 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/29"); 252 subnet = LookupSubNet("1.2.3.4/255.255.255.240"); 253 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/28"); 254 subnet = LookupSubNet("1.2.3.4/255.255.255.224"); 255 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/27"); 256 subnet = LookupSubNet("1.2.3.4/255.255.255.192"); 257 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/26"); 258 subnet = LookupSubNet("1.2.3.4/255.255.255.128"); 259 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/25"); 260 subnet = LookupSubNet("1.2.3.4/255.255.255.0"); 261 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/24"); 262 subnet = LookupSubNet("1.2.3.4/255.255.254.0"); 263 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.2.0/23"); 264 subnet = LookupSubNet("1.2.3.4/255.255.252.0"); 265 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/22"); 266 subnet = LookupSubNet("1.2.3.4/255.255.248.0"); 267 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/21"); 268 subnet = LookupSubNet("1.2.3.4/255.255.240.0"); 269 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/20"); 270 subnet = LookupSubNet("1.2.3.4/255.255.224.0"); 271 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/19"); 272 subnet = LookupSubNet("1.2.3.4/255.255.192.0"); 273 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/18"); 274 subnet = LookupSubNet("1.2.3.4/255.255.128.0"); 275 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/17"); 276 subnet = LookupSubNet("1.2.3.4/255.255.0.0"); 277 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/16"); 278 subnet = LookupSubNet("1.2.3.4/255.254.0.0"); 279 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/15"); 280 subnet = LookupSubNet("1.2.3.4/255.252.0.0"); 281 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/14"); 282 subnet = LookupSubNet("1.2.3.4/255.248.0.0"); 283 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/13"); 284 subnet = LookupSubNet("1.2.3.4/255.240.0.0"); 285 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/12"); 286 subnet = LookupSubNet("1.2.3.4/255.224.0.0"); 287 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/11"); 288 subnet = LookupSubNet("1.2.3.4/255.192.0.0"); 289 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/10"); 290 subnet = LookupSubNet("1.2.3.4/255.128.0.0"); 291 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/9"); 292 subnet = LookupSubNet("1.2.3.4/255.0.0.0"); 293 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/8"); 294 subnet = LookupSubNet("1.2.3.4/254.0.0.0"); 295 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/7"); 296 subnet = LookupSubNet("1.2.3.4/252.0.0.0"); 297 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/6"); 298 subnet = LookupSubNet("1.2.3.4/248.0.0.0"); 299 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/5"); 300 subnet = LookupSubNet("1.2.3.4/240.0.0.0"); 301 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/4"); 302 subnet = LookupSubNet("1.2.3.4/224.0.0.0"); 303 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/3"); 304 subnet = LookupSubNet("1.2.3.4/192.0.0.0"); 305 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/2"); 306 subnet = LookupSubNet("1.2.3.4/128.0.0.0"); 307 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/1"); 308 subnet = LookupSubNet("1.2.3.4/0.0.0.0"); 309 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/0"); 310 311 subnet = LookupSubNet("1:2:3:4:5:6:7:8/ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff"); 312 BOOST_CHECK_EQUAL(subnet.ToString(), "1:2:3:4:5:6:7:8/128"); 313 subnet = LookupSubNet("1:2:3:4:5:6:7:8/ffff:0000:0000:0000:0000:0000:0000:0000"); 314 BOOST_CHECK_EQUAL(subnet.ToString(), "1::/16"); 315 subnet = LookupSubNet("1:2:3:4:5:6:7:8/0000:0000:0000:0000:0000:0000:0000:0000"); 316 BOOST_CHECK_EQUAL(subnet.ToString(), "::/0"); 317 // Invalid netmasks (with 1-bits after 0-bits) 318 subnet = LookupSubNet("1.2.3.4/255.255.232.0"); 319 BOOST_CHECK(!subnet.IsValid()); 320 subnet = LookupSubNet("1.2.3.4/255.0.255.255"); 321 BOOST_CHECK(!subnet.IsValid()); 322 subnet = LookupSubNet("1:2:3:4:5:6:7:8/ffff:ffff:ffff:fffe:ffff:ffff:ffff:ff0f"); 323 BOOST_CHECK(!subnet.IsValid()); 324 } 325 326 BOOST_AUTO_TEST_CASE(netbase_getgroup) 327 { 328 NetGroupManager netgroupman{std::vector<bool>()}; // use /16 329 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("127.0.0.1")) == std::vector<unsigned char>({0})); // Local -> !Routable() 330 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("257.0.0.1")) == std::vector<unsigned char>({0})); // !Valid -> !Routable() 331 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("10.0.0.1")) == std::vector<unsigned char>({0})); // RFC1918 -> !Routable() 332 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("169.254.1.1")) == std::vector<unsigned char>({0})); // RFC3927 -> !Routable() 333 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("1.2.3.4")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // IPv4 334 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("::FFFF:0:102:304")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC6145 335 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("64:FF9B::102:304")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC6052 336 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2002:102:304:9999:9999:9999:9999:9999")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC3964 337 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2001:0:9999:9999:9999:9999:FEFD:FCFB")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC4380 338 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2001:470:abcd:9999:9999:9999:9999:9999")) == std::vector<unsigned char>({(unsigned char)NET_IPV6, 32, 1, 4, 112, 175})); //he.net 339 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2001:2001:9999:9999:9999:9999:9999:9999")) == std::vector<unsigned char>({(unsigned char)NET_IPV6, 32, 1, 32, 1})); //IPv6 340 341 // baz.net sha256 hash: 12929400eb4607c4ac075f087167e75286b179c693eb059a01774b864e8fe505 342 std::vector<unsigned char> internal_group = {NET_INTERNAL, 0x12, 0x92, 0x94, 0x00, 0xeb, 0x46, 0x07, 0xc4, 0xac, 0x07}; 343 BOOST_CHECK(netgroupman.GetGroup(CreateInternal("baz.net")) == internal_group); 344 } 345 346 BOOST_AUTO_TEST_CASE(netbase_parsenetwork) 347 { 348 BOOST_CHECK_EQUAL(ParseNetwork("ipv4"), NET_IPV4); 349 BOOST_CHECK_EQUAL(ParseNetwork("ipv6"), NET_IPV6); 350 BOOST_CHECK_EQUAL(ParseNetwork("onion"), NET_ONION); 351 BOOST_CHECK_EQUAL(ParseNetwork("tor"), NET_ONION); 352 BOOST_CHECK_EQUAL(ParseNetwork("cjdns"), NET_CJDNS); 353 354 BOOST_CHECK_EQUAL(ParseNetwork("IPv4"), NET_IPV4); 355 BOOST_CHECK_EQUAL(ParseNetwork("IPv6"), NET_IPV6); 356 BOOST_CHECK_EQUAL(ParseNetwork("ONION"), NET_ONION); 357 BOOST_CHECK_EQUAL(ParseNetwork("TOR"), NET_ONION); 358 BOOST_CHECK_EQUAL(ParseNetwork("CJDNS"), NET_CJDNS); 359 360 BOOST_CHECK_EQUAL(ParseNetwork(":)"), NET_UNROUTABLE); 361 BOOST_CHECK_EQUAL(ParseNetwork("tÖr"), NET_UNROUTABLE); 362 BOOST_CHECK_EQUAL(ParseNetwork("\xfe\xff"), NET_UNROUTABLE); 363 BOOST_CHECK_EQUAL(ParseNetwork(""), NET_UNROUTABLE); 364 } 365 366 BOOST_AUTO_TEST_CASE(netpermissions_test) 367 { 368 bilingual_str error; 369 NetWhitebindPermissions whitebindPermissions; 370 NetWhitelistPermissions whitelistPermissions; 371 ConnectionDirection connection_direction; 372 373 // Detect invalid white bind 374 BOOST_CHECK(!NetWhitebindPermissions::TryParse("", whitebindPermissions, error)); 375 BOOST_CHECK(error.original.find("Cannot resolve -whitebind address") != std::string::npos); 376 BOOST_CHECK(!NetWhitebindPermissions::TryParse("127.0.0.1", whitebindPermissions, error)); 377 BOOST_CHECK(error.original.find("Need to specify a port with -whitebind") != std::string::npos); 378 BOOST_CHECK(!NetWhitebindPermissions::TryParse("", whitebindPermissions, error)); 379 380 // If no permission flags, assume backward compatibility 381 BOOST_CHECK(NetWhitebindPermissions::TryParse("1.2.3.4:32", whitebindPermissions, error)); 382 BOOST_CHECK(error.empty()); 383 BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::Implicit); 384 BOOST_CHECK(NetPermissions::HasFlag(whitebindPermissions.m_flags, NetPermissionFlags::Implicit)); 385 NetPermissions::ClearFlag(whitebindPermissions.m_flags, NetPermissionFlags::Implicit); 386 BOOST_CHECK(!NetPermissions::HasFlag(whitebindPermissions.m_flags, NetPermissionFlags::Implicit)); 387 BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::None); 388 NetPermissions::AddFlag(whitebindPermissions.m_flags, NetPermissionFlags::Implicit); 389 BOOST_CHECK(NetPermissions::HasFlag(whitebindPermissions.m_flags, NetPermissionFlags::Implicit)); 390 391 // Can set one permission 392 BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom@1.2.3.4:32", whitebindPermissions, error)); 393 BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::BloomFilter); 394 BOOST_CHECK(NetWhitebindPermissions::TryParse("@1.2.3.4:32", whitebindPermissions, error)); 395 BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::None); 396 397 NetWhitebindPermissions noban, noban_download, download_noban, download; 398 399 // "noban" implies "download" 400 BOOST_REQUIRE(NetWhitebindPermissions::TryParse("noban@1.2.3.4:32", noban, error)); 401 BOOST_CHECK_EQUAL(noban.m_flags, NetPermissionFlags::NoBan); 402 BOOST_CHECK(NetPermissions::HasFlag(noban.m_flags, NetPermissionFlags::Download)); 403 BOOST_CHECK(NetPermissions::HasFlag(noban.m_flags, NetPermissionFlags::NoBan)); 404 405 // "noban,download" is equivalent to "noban" 406 BOOST_REQUIRE(NetWhitebindPermissions::TryParse("noban,download@1.2.3.4:32", noban_download, error)); 407 BOOST_CHECK_EQUAL(noban_download.m_flags, noban.m_flags); 408 409 // "download,noban" is equivalent to "noban" 410 BOOST_REQUIRE(NetWhitebindPermissions::TryParse("download,noban@1.2.3.4:32", download_noban, error)); 411 BOOST_CHECK_EQUAL(download_noban.m_flags, noban.m_flags); 412 413 // "download" excludes (does not imply) "noban" 414 BOOST_REQUIRE(NetWhitebindPermissions::TryParse("download@1.2.3.4:32", download, error)); 415 BOOST_CHECK_EQUAL(download.m_flags, NetPermissionFlags::Download); 416 BOOST_CHECK(NetPermissions::HasFlag(download.m_flags, NetPermissionFlags::Download)); 417 BOOST_CHECK(!NetPermissions::HasFlag(download.m_flags, NetPermissionFlags::NoBan)); 418 419 // Happy path, can parse flags 420 BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,forcerelay@1.2.3.4:32", whitebindPermissions, error)); 421 // forcerelay should also activate the relay permission 422 BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::BloomFilter | NetPermissionFlags::ForceRelay | NetPermissionFlags::Relay); 423 BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,relay,noban@1.2.3.4:32", whitebindPermissions, error)); 424 BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::BloomFilter | NetPermissionFlags::Relay | NetPermissionFlags::NoBan); 425 BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,forcerelay,noban@1.2.3.4:32", whitebindPermissions, error)); 426 BOOST_CHECK(NetWhitebindPermissions::TryParse("all@1.2.3.4:32", whitebindPermissions, error)); 427 BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::All); 428 429 // Allow dups 430 BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,relay,noban,noban@1.2.3.4:32", whitebindPermissions, error)); 431 BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::BloomFilter | NetPermissionFlags::Relay | NetPermissionFlags::NoBan | NetPermissionFlags::Download); // "noban" implies "download" 432 433 // Allow empty 434 BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,relay,,noban@1.2.3.4:32", whitebindPermissions, error)); 435 BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::BloomFilter | NetPermissionFlags::Relay | NetPermissionFlags::NoBan); 436 BOOST_CHECK(NetWhitebindPermissions::TryParse(",@1.2.3.4:32", whitebindPermissions, error)); 437 BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::None); 438 BOOST_CHECK(NetWhitebindPermissions::TryParse(",,@1.2.3.4:32", whitebindPermissions, error)); 439 BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::None); 440 441 BOOST_CHECK(!NetWhitebindPermissions::TryParse("out,forcerelay@1.2.3.4:32", whitebindPermissions, error)); 442 BOOST_CHECK(error.original.find("whitebind may only be used for incoming connections (\"out\" was passed)") != std::string::npos); 443 444 // Detect invalid flag 445 BOOST_CHECK(!NetWhitebindPermissions::TryParse("bloom,forcerelay,oopsie@1.2.3.4:32", whitebindPermissions, error)); 446 BOOST_CHECK(error.original.find("Invalid P2P permission") != std::string::npos); 447 448 // Check netmask error 449 BOOST_CHECK(!NetWhitelistPermissions::TryParse("bloom,forcerelay,noban@1.2.3.4:32", whitelistPermissions, connection_direction, error)); 450 BOOST_CHECK(error.original.find("Invalid netmask specified in -whitelist") != std::string::npos); 451 452 // Happy path for whitelist parsing 453 BOOST_CHECK(NetWhitelistPermissions::TryParse("noban@1.2.3.4", whitelistPermissions, connection_direction, error)); 454 BOOST_CHECK_EQUAL(whitelistPermissions.m_flags, NetPermissionFlags::NoBan); 455 BOOST_CHECK(NetPermissions::HasFlag(whitelistPermissions.m_flags, NetPermissionFlags::NoBan)); 456 457 BOOST_CHECK(NetWhitelistPermissions::TryParse("bloom,forcerelay,noban,relay@1.2.3.4/32", whitelistPermissions, connection_direction, error)); 458 BOOST_CHECK_EQUAL(whitelistPermissions.m_flags, NetPermissionFlags::BloomFilter | NetPermissionFlags::ForceRelay | NetPermissionFlags::NoBan | NetPermissionFlags::Relay); 459 BOOST_CHECK(error.empty()); 460 BOOST_CHECK_EQUAL(whitelistPermissions.m_subnet.ToString(), "1.2.3.4/32"); 461 BOOST_CHECK(NetWhitelistPermissions::TryParse("bloom,forcerelay,noban,relay,mempool@1.2.3.4/32", whitelistPermissions, connection_direction, error)); 462 BOOST_CHECK(NetWhitelistPermissions::TryParse("in,relay@1.2.3.4", whitelistPermissions, connection_direction, error)); 463 BOOST_CHECK_EQUAL(connection_direction, ConnectionDirection::In); 464 BOOST_CHECK(NetWhitelistPermissions::TryParse("out,bloom@1.2.3.4", whitelistPermissions, connection_direction, error)); 465 BOOST_CHECK_EQUAL(connection_direction, ConnectionDirection::Out); 466 BOOST_CHECK(NetWhitelistPermissions::TryParse("in,out,bloom@1.2.3.4", whitelistPermissions, connection_direction, error)); 467 BOOST_CHECK_EQUAL(connection_direction, ConnectionDirection::Both); 468 469 const auto strings = NetPermissions::ToStrings(NetPermissionFlags::All); 470 BOOST_CHECK_EQUAL(strings.size(), 7U); 471 BOOST_CHECK(std::find(strings.begin(), strings.end(), "bloomfilter") != strings.end()); 472 BOOST_CHECK(std::find(strings.begin(), strings.end(), "forcerelay") != strings.end()); 473 BOOST_CHECK(std::find(strings.begin(), strings.end(), "relay") != strings.end()); 474 BOOST_CHECK(std::find(strings.begin(), strings.end(), "noban") != strings.end()); 475 BOOST_CHECK(std::find(strings.begin(), strings.end(), "mempool") != strings.end()); 476 BOOST_CHECK(std::find(strings.begin(), strings.end(), "download") != strings.end()); 477 BOOST_CHECK(std::find(strings.begin(), strings.end(), "addr") != strings.end()); 478 } 479 480 BOOST_AUTO_TEST_CASE(netbase_dont_resolve_strings_with_embedded_nul_characters) 481 { 482 BOOST_CHECK(LookupHost("127.0.0.1"s, false).has_value()); 483 BOOST_CHECK(!LookupHost("127.0.0.1\0"s, false).has_value()); 484 BOOST_CHECK(!LookupHost("127.0.0.1\0example.com"s, false).has_value()); 485 BOOST_CHECK(!LookupHost("127.0.0.1\0example.com\0"s, false).has_value()); 486 487 BOOST_CHECK(LookupSubNet("1.2.3.0/24"s).IsValid()); 488 BOOST_CHECK(!LookupSubNet("1.2.3.0/24\0"s).IsValid()); 489 BOOST_CHECK(!LookupSubNet("1.2.3.0/24\0example.com"s).IsValid()); 490 BOOST_CHECK(!LookupSubNet("1.2.3.0/24\0example.com\0"s).IsValid()); 491 BOOST_CHECK(LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion"s).IsValid()); 492 BOOST_CHECK(!LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion\0"s).IsValid()); 493 BOOST_CHECK(!LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion\0example.com"s).IsValid()); 494 BOOST_CHECK(!LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion\0example.com\0"s).IsValid()); 495 } 496 497 // Since CNetAddr (un)ser is tested separately in net_tests.cpp here we only 498 // try a few edge cases for port, service flags and time. 499 500 static const std::vector<CAddress> fixture_addresses({ 501 CAddress{ 502 CService(CNetAddr(in6_addr(IN6ADDR_LOOPBACK_INIT)), 0 /* port */), 503 NODE_NONE, 504 NodeSeconds{0x4966bc61s}, /* Fri Jan 9 02:54:25 UTC 2009 */ 505 }, 506 CAddress{ 507 CService(CNetAddr(in6_addr(IN6ADDR_LOOPBACK_INIT)), 0x00f1 /* port */), 508 NODE_NETWORK, 509 NodeSeconds{0x83766279s}, /* Tue Nov 22 11:22:33 UTC 2039 */ 510 }, 511 CAddress{ 512 CService(CNetAddr(in6_addr(IN6ADDR_LOOPBACK_INIT)), 0xf1f2 /* port */), 513 static_cast<ServiceFlags>(NODE_WITNESS | NODE_COMPACT_FILTERS | NODE_NETWORK_LIMITED), 514 NodeSeconds{0xffffffffs}, /* Sun Feb 7 06:28:15 UTC 2106 */ 515 }, 516 }); 517 518 // fixture_addresses should equal to this when serialized in V1 format. 519 // When this is unserialized from V1 format it should equal to fixture_addresses. 520 static constexpr const char* stream_addrv1_hex = 521 "03" // number of entries 522 523 "61bc6649" // time, Fri Jan 9 02:54:25 UTC 2009 524 "0000000000000000" // service flags, NODE_NONE 525 "00000000000000000000000000000001" // address, fixed 16 bytes (IPv4 embedded in IPv6) 526 "0000" // port 527 528 "79627683" // time, Tue Nov 22 11:22:33 UTC 2039 529 "0100000000000000" // service flags, NODE_NETWORK 530 "00000000000000000000000000000001" // address, fixed 16 bytes (IPv6) 531 "00f1" // port 532 533 "ffffffff" // time, Sun Feb 7 06:28:15 UTC 2106 534 "4804000000000000" // service flags, NODE_WITNESS | NODE_COMPACT_FILTERS | NODE_NETWORK_LIMITED 535 "00000000000000000000000000000001" // address, fixed 16 bytes (IPv6) 536 "f1f2"; // port 537 538 // fixture_addresses should equal to this when serialized in V2 format. 539 // When this is unserialized from V2 format it should equal to fixture_addresses. 540 static constexpr const char* stream_addrv2_hex = 541 "03" // number of entries 542 543 "61bc6649" // time, Fri Jan 9 02:54:25 UTC 2009 544 "00" // service flags, COMPACTSIZE(NODE_NONE) 545 "02" // network id, IPv6 546 "10" // address length, COMPACTSIZE(16) 547 "00000000000000000000000000000001" // address 548 "0000" // port 549 550 "79627683" // time, Tue Nov 22 11:22:33 UTC 2039 551 "01" // service flags, COMPACTSIZE(NODE_NETWORK) 552 "02" // network id, IPv6 553 "10" // address length, COMPACTSIZE(16) 554 "00000000000000000000000000000001" // address 555 "00f1" // port 556 557 "ffffffff" // time, Sun Feb 7 06:28:15 UTC 2106 558 "fd4804" // service flags, COMPACTSIZE(NODE_WITNESS | NODE_COMPACT_FILTERS | NODE_NETWORK_LIMITED) 559 "02" // network id, IPv6 560 "10" // address length, COMPACTSIZE(16) 561 "00000000000000000000000000000001" // address 562 "f1f2"; // port 563 564 BOOST_AUTO_TEST_CASE(caddress_serialize_v1) 565 { 566 DataStream s{}; 567 568 s << CAddress::V1_NETWORK(fixture_addresses); 569 BOOST_CHECK_EQUAL(HexStr(s), stream_addrv1_hex); 570 } 571 572 BOOST_AUTO_TEST_CASE(caddress_unserialize_v1) 573 { 574 DataStream s{ParseHex(stream_addrv1_hex)}; 575 std::vector<CAddress> addresses_unserialized; 576 577 s >> CAddress::V1_NETWORK(addresses_unserialized); 578 BOOST_CHECK(fixture_addresses == addresses_unserialized); 579 } 580 581 BOOST_AUTO_TEST_CASE(caddress_serialize_v2) 582 { 583 DataStream s{}; 584 585 s << CAddress::V2_NETWORK(fixture_addresses); 586 BOOST_CHECK_EQUAL(HexStr(s), stream_addrv2_hex); 587 } 588 589 BOOST_AUTO_TEST_CASE(caddress_unserialize_v2) 590 { 591 DataStream s{ParseHex(stream_addrv2_hex)}; 592 std::vector<CAddress> addresses_unserialized; 593 594 s >> CAddress::V2_NETWORK(addresses_unserialized); 595 BOOST_CHECK(fixture_addresses == addresses_unserialized); 596 } 597 598 BOOST_AUTO_TEST_CASE(isbadport) 599 { 600 BOOST_CHECK(IsBadPort(1)); 601 BOOST_CHECK(IsBadPort(22)); 602 BOOST_CHECK(IsBadPort(6000)); 603 604 BOOST_CHECK(!IsBadPort(80)); 605 BOOST_CHECK(!IsBadPort(443)); 606 BOOST_CHECK(!IsBadPort(8333)); 607 608 // Check all possible ports and ensure we only flag the expected amount as bad 609 std::list<int> ports(std::numeric_limits<uint16_t>::max()); 610 std::iota(ports.begin(), ports.end(), 1); 611 BOOST_CHECK_EQUAL(std::ranges::count_if(ports, IsBadPort), 85); 612 } 613 614 615 BOOST_AUTO_TEST_CASE(asmap_test_vectors) 616 { 617 // Randomly generated encoded ASMap with 128 ranges, up to 20-bit AS numbers. 618 constexpr auto ASMAP_DATA{ 619 "fd38d50f7d5d665357f64bba6bfc190d6078a7e68e5d3ac032edf47f8b5755f87881bfd3633d9aa7c1fa279b3" 620 "6fe26c63bbc9de44e0f04e5a382d8e1cddbe1c26653bc939d4327f287e8b4d1f8aff33176787cb0ff7cb28e3f" 621 "daef0f8f47357f801c9f7ff7a99f7f9c9f99de7f3156ae00f23eb27a303bc486aa3ccc31ec19394c2f8a53ddd" 622 "ea3cc56257f3b7e9b1f488be9c1137db823759aa4e071eef2e984aaf97b52d5f88d0f373dd190fe45e06efef1" 623 "df7278be680a73a74c76db4dd910f1d30752c57fe2bc9f079f1a1e1b036c2a69219f11c5e11980a3fa51f4f82" 624 "d36373de73b1863a8c27e36ae0e4f705be3d76ecff038a75bc0f92ba7e7f6f4080f1c47c34d095367ecf4406c" 625 "1e3bbc17ba4d6f79ea3f031b876799ac268b1e0ea9babf0f9a8e5f6c55e363c6363df46afc696d7afceaf49b6" 626 "e62df9e9dc27e70664cafe5c53df66dd0b8237678ada90e73f05ec60e6f6e96c3cbb1ea2f9dece115d5bdba10" 627 "33e53662a7d72a29477b5beb35710591d3e23e5f0379baea62ffdee535bcdf879cbf69b88d7ea37c8015381cf" 628 "63dc33d28f757a4a5e15d6a08"_hex}; 629 630 // Convert to std::vector<bool> format that the ASMap interpreter uses. 631 std::vector<bool> asmap_bits; 632 asmap_bits.reserve(ASMAP_DATA.size() * 8); 633 for (auto byte : ASMAP_DATA) { 634 for (int bit = 0; bit < 8; ++bit) { 635 asmap_bits.push_back((std::to_integer<uint8_t>(byte) >> bit) & 1); 636 } 637 } 638 639 // Construct NetGroupManager with this data. 640 NetGroupManager netgroup{std::move(asmap_bits)}; 641 BOOST_CHECK(netgroup.UsingASMap()); 642 643 // Check some randomly-generated IPv6 addresses in it (biased towards the very beginning and 644 // very end of the 128-bit range). 645 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("0:1559:183:3728:224c:65a5:62e6:e991", false)), 961340); 646 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("d0:d493:faa0:8609:e927:8b75:293c:f5a4", false)), 961340); 647 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("2a0:26f:8b2c:2ee7:c7d1:3b24:4705:3f7f", false)), 693761); 648 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("a77:7cd4:4be5:a449:89f2:3212:78c6:ee38", false)), 0); 649 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("1336:1ad6:2f26:4fe3:d809:7321:6e0d:4615", false)), 672176); 650 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("1d56:abd0:a52f:a8d5:d5a7:a610:581d:d792", false)), 499880); 651 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("378e:7290:54e5:bd36:4760:971c:e9b9:570d", false)), 0); 652 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("406c:820b:272a:c045:b74e:fc0a:9ef2:cecc", false)), 248495); 653 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("46c2:ae07:9d08:2d56:d473:2bc7:57e3:20ac", false)), 248495); 654 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("50d2:3db6:52fa:2e7:12ec:5bc4:1bd1:49f9", false)), 124471); 655 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("53e1:1812:ffa:dccf:f9f2:64be:75fa:795", false)), 539993); 656 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("544d:eeba:3990:35d1:ad66:f9a3:576d:8617", false)), 374443); 657 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("6a53:40dc:8f1d:3ffa:efeb:3aa3:df88:b94b", false)), 435070); 658 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("87aa:d1c9:9edb:91e7:aab1:9eb9:baa0:de18", false)), 244121); 659 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("9f00:48fa:88e3:4b67:a6f3:e6d2:5cc1:5be2", false)), 862116); 660 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("c49f:9cc6:86ad:ba08:4580:315e:dbd1:8a62", false)), 969411); 661 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("dff5:8021:61d:b17d:406d:7888:fdac:4a20", false)), 969411); 662 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("e888:6791:2960:d723:bcfd:47e1:2d8c:599f", false)), 824019); 663 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("ffff:d499:8c4b:4941:bc81:d5b9:b51e:85a8", false)), 824019); 664 } 665 666 BOOST_AUTO_TEST_SUITE_END()