Branch data Line data Source code
1 : : // Copyright (c) 2012-2022 The Bitcoin Core developers
2 : : // Distributed under the MIT software license, see the accompanying
3 : : // file COPYING or http://www.opensource.org/licenses/mit-license.php.
4 : :
5 : : #include <net_permissions.h>
6 : : #include <netaddress.h>
7 : : #include <netbase.h>
8 : : #include <netgroup.h>
9 : : #include <protocol.h>
10 : : #include <serialize.h>
11 : : #include <streams.h>
12 : : #include <test/util/setup_common.h>
13 : : #include <util/strencodings.h>
14 : : #include <util/translation.h>
15 : :
16 : : #include <string>
17 : : #include <numeric>
18 : :
19 : : #include <boost/test/unit_test.hpp>
20 : :
21 : : using namespace std::literals;
22 : : using namespace util::hex_literals;
23 : :
24 : : BOOST_FIXTURE_TEST_SUITE(netbase_tests, BasicTestingSetup)
25 : :
26 : 94 : static CNetAddr ResolveIP(const std::string& ip)
27 : : {
28 [ + - + - ]: 94 : return LookupHost(ip, false).value_or(CNetAddr{});
29 : : }
30 : :
31 : 4 : static CNetAddr CreateInternal(const std::string& host)
32 : : {
33 : 4 : CNetAddr addr;
34 [ + - ]: 4 : addr.SetInternal(host);
35 : 4 : return addr;
36 : 0 : }
37 : :
38 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(netbase_networks)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
39 : : {
40 [ + - + - : 2 : BOOST_CHECK(ResolveIP("127.0.0.1").GetNetwork() == NET_UNROUTABLE);
+ - + - ]
41 [ + - + - : 2 : BOOST_CHECK(ResolveIP("::1").GetNetwork() == NET_UNROUTABLE);
+ - + - ]
42 [ + - + - : 2 : BOOST_CHECK(ResolveIP("8.8.8.8").GetNetwork() == NET_IPV4);
+ - + - ]
43 [ + - + - : 2 : BOOST_CHECK(ResolveIP("2001::8888").GetNetwork() == NET_IPV6);
+ - + - ]
44 [ + - + - : 2 : BOOST_CHECK(ResolveIP("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion").GetNetwork() == NET_ONION);
+ - + - ]
45 [ + - + - : 2 : BOOST_CHECK(CreateInternal("foo.com").GetNetwork() == NET_INTERNAL);
+ - + - ]
46 : 1 : }
47 : :
48 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(netbase_properties)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
49 : : {
50 : :
51 [ + - + - : 2 : BOOST_CHECK(ResolveIP("127.0.0.1").IsIPv4());
+ - ]
52 [ + - + - : 2 : BOOST_CHECK(ResolveIP("::FFFF:192.168.1.1").IsIPv4());
+ - ]
53 [ + - + - : 2 : BOOST_CHECK(ResolveIP("::1").IsIPv6());
+ - ]
54 [ + - + - : 2 : BOOST_CHECK(ResolveIP("10.0.0.1").IsRFC1918());
+ - + - ]
55 [ + - + - : 2 : BOOST_CHECK(ResolveIP("192.168.1.1").IsRFC1918());
+ - + - ]
56 [ + - + - : 2 : BOOST_CHECK(ResolveIP("172.31.255.255").IsRFC1918());
+ - + - ]
57 [ + - + - : 2 : BOOST_CHECK(ResolveIP("198.18.0.0").IsRFC2544());
+ - + - ]
58 [ + - + - : 2 : BOOST_CHECK(ResolveIP("198.19.255.255").IsRFC2544());
+ - + - ]
59 [ + - + - : 2 : BOOST_CHECK(ResolveIP("2001:0DB8::").IsRFC3849());
+ - + - ]
60 [ + - + - : 2 : BOOST_CHECK(ResolveIP("169.254.1.1").IsRFC3927());
+ - + - ]
61 [ + - + - : 2 : BOOST_CHECK(ResolveIP("2002::1").IsRFC3964());
+ - + - ]
62 [ + - + - : 2 : BOOST_CHECK(ResolveIP("FC00::").IsRFC4193());
+ - + - ]
63 [ + - + - : 2 : BOOST_CHECK(ResolveIP("2001::2").IsRFC4380());
+ - + - ]
64 [ + - + - : 2 : BOOST_CHECK(ResolveIP("2001:10::").IsRFC4843());
+ - + - ]
65 [ + - + - : 2 : BOOST_CHECK(ResolveIP("2001:20::").IsRFC7343());
+ - + - ]
66 [ + - + - : 2 : BOOST_CHECK(ResolveIP("FE80::").IsRFC4862());
+ - + - ]
67 [ + - + - : 2 : BOOST_CHECK(ResolveIP("64:FF9B::").IsRFC6052());
+ - + - ]
68 [ + - + - : 2 : BOOST_CHECK(ResolveIP("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion").IsTor());
+ - ]
69 [ + - + - : 2 : BOOST_CHECK(ResolveIP("127.0.0.1").IsLocal());
+ - + - ]
70 [ + - + - : 2 : BOOST_CHECK(ResolveIP("::1").IsLocal());
+ - + - ]
71 [ + - + - : 2 : BOOST_CHECK(ResolveIP("8.8.8.8").IsRoutable());
+ - + - ]
72 [ + - + - : 2 : BOOST_CHECK(ResolveIP("2001::1").IsRoutable());
+ - + - ]
73 [ + - + - : 2 : BOOST_CHECK(ResolveIP("127.0.0.1").IsValid());
+ - + - ]
74 [ + - + - : 2 : BOOST_CHECK(CreateInternal("FD6B:88C0:8724:edb1:8e4:3588:e546:35ca").IsInternal());
+ - + - ]
75 [ + - + - : 2 : BOOST_CHECK(CreateInternal("bar.com").IsInternal());
+ - + - ]
76 : :
77 : 1 : }
78 : :
79 : 32 : bool static TestSplitHost(const std::string& test, const std::string& host, uint16_t port, bool validPort=true)
80 : : {
81 [ - + ]: 32 : std::string hostOut;
82 : 32 : uint16_t portOut{0};
83 [ - + + - ]: 32 : bool validPortOut = SplitHostPort(test, portOut, hostOut);
84 [ + - + - : 32 : return hostOut == host && portOut == port && validPortOut == validPort;
- + ]
85 : 32 : }
86 : :
87 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(netbase_splithost)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
88 : : {
89 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("www.bitcoincore.org", "www.bitcoincore.org", 0));
+ - + - ]
90 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("[www.bitcoincore.org]", "www.bitcoincore.org", 0));
+ - + - ]
91 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("www.bitcoincore.org:80", "www.bitcoincore.org", 80));
+ - + - ]
92 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("[www.bitcoincore.org]:80", "www.bitcoincore.org", 80));
+ - + - ]
93 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("127.0.0.1", "127.0.0.1", 0));
+ - + - ]
94 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("127.0.0.1:8333", "127.0.0.1", 8333));
+ - + - ]
95 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("[127.0.0.1]", "127.0.0.1", 0));
+ - + - ]
96 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("[127.0.0.1]:8333", "127.0.0.1", 8333));
+ - + - ]
97 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("::ffff:127.0.0.1", "::ffff:127.0.0.1", 0));
+ - + - ]
98 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("[::ffff:127.0.0.1]:8333", "::ffff:127.0.0.1", 8333));
+ - + - ]
99 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("[::]:8333", "::", 8333));
+ - + - ]
100 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("::8333", "::8333", 0));
+ - + - ]
101 [ + - + - : 2 : BOOST_CHECK(TestSplitHost(":8333", "", 8333));
+ - + - ]
102 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("[]:8333", "", 8333));
+ - + - ]
103 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("", "", 0));
+ - + - ]
104 [ + - + - : 2 : BOOST_CHECK(TestSplitHost(":65535", "", 65535));
+ - + - ]
105 [ + - + - : 2 : BOOST_CHECK(TestSplitHost(":65536", ":65536", 0, false));
+ - + - ]
106 [ + - + - : 2 : BOOST_CHECK(TestSplitHost(":-1", ":-1", 0, false));
+ - + - ]
107 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("[]:70001", "[]:70001", 0, false));
+ - + - ]
108 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("[]:-1", "[]:-1", 0, false));
+ - + - ]
109 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("[]:-0", "[]:-0", 0, false));
+ - + - ]
110 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("[]:0", "", 0, false));
+ - + - ]
111 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("[]:1/2", "[]:1/2", 0, false));
+ - + - ]
112 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("[]:1E2", "[]:1E2", 0, false));
+ - + - ]
113 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("127.0.0.1:65536", "127.0.0.1:65536", 0, false));
+ - + - ]
114 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("127.0.0.1:0", "127.0.0.1", 0, false));
+ - + - ]
115 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("127.0.0.1:", "127.0.0.1:", 0, false));
+ - + - ]
116 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("127.0.0.1:1/2", "127.0.0.1:1/2", 0, false));
+ - + - ]
117 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("127.0.0.1:1E2", "127.0.0.1:1E2", 0, false));
+ - + - ]
118 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("www.bitcoincore.org:65536", "www.bitcoincore.org:65536", 0, false));
+ - + - ]
119 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("www.bitcoincore.org:0", "www.bitcoincore.org", 0, false));
+ - + - ]
120 [ + - + - : 2 : BOOST_CHECK(TestSplitHost("www.bitcoincore.org:", "www.bitcoincore.org:", 0, false));
+ - + - ]
121 : 1 : }
122 : :
123 : 9 : bool static TestParse(std::string src, std::string canon)
124 : : {
125 [ + - ]: 9 : CService addr(LookupNumeric(src, 65535));
126 [ + - ]: 9 : return canon == addr.ToStringAddrPort();
127 : 9 : }
128 : :
129 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(netbase_lookupnumeric)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
130 : : {
131 [ + - + - : 2 : BOOST_CHECK(TestParse("127.0.0.1", "127.0.0.1:65535"));
+ - + - ]
132 [ + - + - : 2 : BOOST_CHECK(TestParse("127.0.0.1:8333", "127.0.0.1:8333"));
+ - + - ]
133 [ + - + - : 2 : BOOST_CHECK(TestParse("::ffff:127.0.0.1", "127.0.0.1:65535"));
+ - + - ]
134 [ + - + - : 2 : BOOST_CHECK(TestParse("::", "[::]:65535"));
+ - + - ]
135 [ + - + - : 2 : BOOST_CHECK(TestParse("[::]:8333", "[::]:8333"));
+ - + - ]
136 [ + - + - : 2 : BOOST_CHECK(TestParse("[127.0.0.1]", "127.0.0.1:65535"));
+ - + - ]
137 [ + - + - : 2 : BOOST_CHECK(TestParse(":::", "[::]:0"));
+ - + - ]
138 : :
139 : : // verify that an internal address fails to resolve
140 [ + - + - : 2 : BOOST_CHECK(TestParse("[fd6b:88c0:8724:1:2:3:4:5]", "[::]:0"));
+ - + - ]
141 : : // and that a one-off resolves correctly
142 [ + - + - : 2 : BOOST_CHECK(TestParse("[fd6c:88c0:8724:1:2:3:4:5]", "[fd6c:88c0:8724:1:2:3:4:5]:65535"));
+ - + - ]
143 : 1 : }
144 : :
145 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(embedded_test)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
146 : : {
147 [ + - ]: 1 : CNetAddr addr1(ResolveIP("1.2.3.4"));
148 [ + - + - ]: 1 : CNetAddr addr2(ResolveIP("::FFFF:0102:0304"));
149 [ + - + - : 2 : BOOST_CHECK(addr2.IsIPv4());
+ - ]
150 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr1.ToStringAddr(), addr2.ToStringAddr());
+ - + - ]
151 : 1 : }
152 : :
153 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(subnet_test)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
154 : : {
155 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("1.2.3.0/24") == LookupSubNet("1.2.3.0/255.255.255.0"));
+ - + - +
- + - ]
156 [ + - + - : 3 : BOOST_CHECK(LookupSubNet("1.2.3.0/24") != LookupSubNet("1.2.4.0/255.255.255.0"));
+ - + - +
- ]
157 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("1.2.3.0/24").Match(ResolveIP("1.2.3.4")));
+ - + - +
- + - ]
158 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("1.2.2.0/24").Match(ResolveIP("1.2.3.4")));
+ - + - +
- + - ]
159 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("1.2.3.4").Match(ResolveIP("1.2.3.4")));
+ - + - +
- + - ]
160 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("1.2.3.4/32").Match(ResolveIP("1.2.3.4")));
+ - + - +
- + - ]
161 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("1.2.3.4").Match(ResolveIP("5.6.7.8")));
+ - + - +
- + - ]
162 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("1.2.3.4/32").Match(ResolveIP("5.6.7.8")));
+ - + - +
- + - ]
163 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("::ffff:127.0.0.1").Match(ResolveIP("127.0.0.1")));
+ - + - +
- + - ]
164 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8").Match(ResolveIP("1:2:3:4:5:6:7:8")));
+ - + - +
- + - ]
165 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("1:2:3:4:5:6:7:8").Match(ResolveIP("1:2:3:4:5:6:7:9")));
+ - + - +
- + - ]
166 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:0/112").Match(ResolveIP("1:2:3:4:5:6:7:1234")));
+ - + - +
- + - ]
167 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("192.168.0.1/24").Match(ResolveIP("192.168.0.2")));
+ - + - +
- + - ]
168 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("192.168.0.20/29").Match(ResolveIP("192.168.0.18")));
+ - + - +
- + - ]
169 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("1.2.2.1/24").Match(ResolveIP("1.2.2.4")));
+ - + - +
- + - ]
170 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("1.2.2.110/31").Match(ResolveIP("1.2.2.111")));
+ - + - +
- + - ]
171 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("1.2.2.20/26").Match(ResolveIP("1.2.2.63")));
+ - + - +
- + - ]
172 : : // All-Matching IPv6 Matches arbitrary IPv6
173 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("::/0").Match(ResolveIP("1:2:3:4:5:6:7:1234")));
+ - + - +
- + - ]
174 : : // But not `::` or `0.0.0.0` because they are considered invalid addresses
175 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("::/0").Match(ResolveIP("::")));
+ - + - +
- + - ]
176 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("::/0").Match(ResolveIP("0.0.0.0")));
+ - + - +
- + - ]
177 : : // Addresses from one network (IPv4) don't belong to subnets of another network (IPv6)
178 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("::/0").Match(ResolveIP("1.2.3.4")));
+ - + - +
- + - ]
179 : : // All-Matching IPv4 does not Match IPv6
180 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("0.0.0.0/0").Match(ResolveIP("1:2:3:4:5:6:7:1234")));
+ - + - +
- + - ]
181 : : // Invalid subnets Match nothing (not even invalid addresses)
182 [ + - + - : 2 : BOOST_CHECK(!CSubNet().Match(ResolveIP("1.2.3.4")));
+ - + - +
- ]
183 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("").Match(ResolveIP("4.5.6.7")));
+ - + - +
- + - ]
184 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("bloop").Match(ResolveIP("0.0.0.0")));
+ - + - +
- + - ]
185 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("bloop").Match(ResolveIP("hab")));
+ - + - +
- + - ]
186 : : // Check valid/invalid
187 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("1.2.3.0/0").IsValid());
+ - + - ]
188 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("1.2.3.0/-1").IsValid());
+ - + - ]
189 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("1.2.3.0/+24").IsValid());
+ - + - ]
190 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("1.2.3.0/32").IsValid());
+ - + - ]
191 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("1.2.3.0/33").IsValid());
+ - + - ]
192 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("1.2.3.0/300").IsValid());
+ - + - ]
193 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8/0").IsValid());
+ - + - ]
194 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8/33").IsValid());
+ - + - ]
195 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("1:2:3:4:5:6:7:8/-1").IsValid());
+ - + - ]
196 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8/128").IsValid());
+ - + - ]
197 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("1:2:3:4:5:6:7:8/129").IsValid());
+ - + - ]
198 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("fuzzy").IsValid());
+ - + - ]
199 : :
200 : : //CNetAddr constructor test
201 [ + - + - : 2 : BOOST_CHECK(CSubNet(ResolveIP("127.0.0.1")).IsValid());
+ - + - +
- ]
202 [ + - + - : 2 : BOOST_CHECK(CSubNet(ResolveIP("127.0.0.1")).Match(ResolveIP("127.0.0.1")));
+ - + - +
- + - +
- ]
203 [ + - + - : 2 : BOOST_CHECK(!CSubNet(ResolveIP("127.0.0.1")).Match(ResolveIP("127.0.0.2")));
+ - + - +
- + - +
- ]
204 [ + - + - : 2 : BOOST_CHECK(CSubNet(ResolveIP("127.0.0.1")).ToString() == "127.0.0.1/32");
+ - + - +
- ]
205 : :
206 [ + - + - ]: 2 : CSubNet subnet = CSubNet(ResolveIP("1.2.3.4"), 32);
207 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/32");
+ - ]
208 [ + - + - : 1 : subnet = CSubNet(ResolveIP("1.2.3.4"), 8);
+ - ]
209 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/8");
+ - ]
210 [ + - + - : 1 : subnet = CSubNet(ResolveIP("1.2.3.4"), 0);
+ - ]
211 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/0");
+ - ]
212 : :
213 [ + - + - : 1 : subnet = CSubNet(ResolveIP("1.2.3.4"), ResolveIP("255.255.255.255"));
+ - + - +
- ]
214 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/32");
+ - ]
215 [ + - + - : 1 : subnet = CSubNet(ResolveIP("1.2.3.4"), ResolveIP("255.0.0.0"));
+ - + - +
- ]
216 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/8");
+ - ]
217 [ + - + - : 1 : subnet = CSubNet(ResolveIP("1.2.3.4"), ResolveIP("0.0.0.0"));
+ - + - +
- ]
218 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/0");
+ - ]
219 : :
220 [ + - + - : 2 : BOOST_CHECK(CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).IsValid());
+ - + - +
- + - +
- ]
221 [ + - + - : 2 : BOOST_CHECK(CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).Match(ResolveIP("1:2:3:4:5:6:7:8")));
+ - + - +
- + - + -
+ - + - ]
222 [ + - + - : 2 : BOOST_CHECK(!CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).Match(ResolveIP("1:2:3:4:5:6:7:9")));
+ - + - +
- + - + -
+ - + - ]
223 [ + - + - : 2 : BOOST_CHECK(CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).ToString() == "1:2:3:4:5:6:7:8/128");
+ - + - +
- + - +
- ]
224 : : // IPv4 address with IPv6 netmask or the other way around.
225 [ + - + - : 2 : BOOST_CHECK(!CSubNet(ResolveIP("1.1.1.1"), ResolveIP("ffff::")).IsValid());
+ - + - +
- + - + -
+ - + - ]
226 [ + - + - : 2 : BOOST_CHECK(!CSubNet(ResolveIP("::1"), ResolveIP("255.0.0.0")).IsValid());
+ - + - +
- + - + -
+ - + - ]
227 : :
228 : : // Create Non-IP subnets.
229 : :
230 : 1 : const CNetAddr tor_addr{
231 [ + - + - ]: 1 : ResolveIP("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion")};
232 : :
233 [ + - ]: 1 : subnet = CSubNet(tor_addr);
234 [ + - + - : 2 : BOOST_CHECK(subnet.IsValid());
+ - + - ]
235 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), tor_addr.ToStringAddr());
+ - + - ]
236 [ + - + - : 2 : BOOST_CHECK(subnet.Match(tor_addr));
+ - + - ]
237 [ + - + - : 2 : BOOST_CHECK(
+ - + - +
- + - ]
238 : : !subnet.Match(ResolveIP("kpgvmscirrdqpekbqjsvw5teanhatztpp2gl6eee4zkowvwfxwenqaid.onion")));
239 [ + - + - : 2 : BOOST_CHECK(!subnet.Match(ResolveIP("1.2.3.4")));
+ - + - +
- + - ]
240 : :
241 [ + - + - : 2 : BOOST_CHECK(!CSubNet(tor_addr, 200).IsValid());
+ - + - +
- ]
242 [ + - + - : 2 : BOOST_CHECK(!CSubNet(tor_addr, ResolveIP("255.0.0.0")).IsValid());
+ - + - +
- + - +
- ]
243 : :
244 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.255.255");
245 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/32");
+ - ]
246 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.255.254");
247 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/31");
+ - ]
248 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.255.252");
249 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/30");
+ - ]
250 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.255.248");
251 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/29");
+ - ]
252 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.255.240");
253 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/28");
+ - ]
254 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.255.224");
255 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/27");
+ - ]
256 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.255.192");
257 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/26");
+ - ]
258 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.255.128");
259 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/25");
+ - ]
260 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.255.0");
261 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/24");
+ - ]
262 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.254.0");
263 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.2.0/23");
+ - ]
264 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.252.0");
265 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/22");
+ - ]
266 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.248.0");
267 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/21");
+ - ]
268 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.240.0");
269 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/20");
+ - ]
270 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.224.0");
271 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/19");
+ - ]
272 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.192.0");
273 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/18");
+ - ]
274 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.128.0");
275 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/17");
+ - ]
276 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.0.0");
277 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/16");
+ - ]
278 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.254.0.0");
279 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/15");
+ - ]
280 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.252.0.0");
281 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/14");
+ - ]
282 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.248.0.0");
283 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/13");
+ - ]
284 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.240.0.0");
285 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/12");
+ - ]
286 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.224.0.0");
287 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/11");
+ - ]
288 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.192.0.0");
289 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/10");
+ - ]
290 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.128.0.0");
291 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/9");
+ - ]
292 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.0.0.0");
293 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/8");
+ - ]
294 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/254.0.0.0");
295 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/7");
+ - ]
296 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/252.0.0.0");
297 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/6");
+ - ]
298 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/248.0.0.0");
299 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/5");
+ - ]
300 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/240.0.0.0");
301 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/4");
+ - ]
302 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/224.0.0.0");
303 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/3");
+ - ]
304 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/192.0.0.0");
305 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/2");
+ - ]
306 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/128.0.0.0");
307 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/1");
+ - ]
308 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/0.0.0.0");
309 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/0");
+ - ]
310 : :
311 [ + - + - ]: 1 : subnet = LookupSubNet("1:2:3:4:5:6:7:8/ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff");
312 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1:2:3:4:5:6:7:8/128");
+ - ]
313 [ + - + - ]: 1 : subnet = LookupSubNet("1:2:3:4:5:6:7:8/ffff:0000:0000:0000:0000:0000:0000:0000");
314 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "1::/16");
+ - ]
315 [ + - + - ]: 1 : subnet = LookupSubNet("1:2:3:4:5:6:7:8/0000:0000:0000:0000:0000:0000:0000:0000");
316 [ + - + - : 1 : BOOST_CHECK_EQUAL(subnet.ToString(), "::/0");
+ - ]
317 : : // Invalid netmasks (with 1-bits after 0-bits)
318 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.255.232.0");
319 [ + - + - : 2 : BOOST_CHECK(!subnet.IsValid());
+ - + - ]
320 [ + - + - ]: 1 : subnet = LookupSubNet("1.2.3.4/255.0.255.255");
321 [ + - + - : 2 : BOOST_CHECK(!subnet.IsValid());
+ - + - ]
322 [ + - + - ]: 1 : subnet = LookupSubNet("1:2:3:4:5:6:7:8/ffff:ffff:ffff:fffe:ffff:ffff:ffff:ff0f");
323 [ + - + - : 2 : BOOST_CHECK(!subnet.IsValid());
+ - ]
324 : 1 : }
325 : :
326 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(netbase_getgroup)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
327 : : {
328 : 1 : NetGroupManager netgroupman{std::vector<bool>()}; // use /16
329 [ + - + - : 2 : BOOST_CHECK(netgroupman.GetGroup(ResolveIP("127.0.0.1")) == std::vector<unsigned char>({0})); // Local -> !Routable()
+ - + - +
- + - +
- ]
330 [ + - + - : 2 : BOOST_CHECK(netgroupman.GetGroup(ResolveIP("257.0.0.1")) == std::vector<unsigned char>({0})); // !Valid -> !Routable()
+ - + - +
- + - +
- ]
331 [ + - + - : 2 : BOOST_CHECK(netgroupman.GetGroup(ResolveIP("10.0.0.1")) == std::vector<unsigned char>({0})); // RFC1918 -> !Routable()
+ - + - +
- + - +
- ]
332 [ + - + - : 2 : BOOST_CHECK(netgroupman.GetGroup(ResolveIP("169.254.1.1")) == std::vector<unsigned char>({0})); // RFC3927 -> !Routable()
+ - + - +
- + - +
- ]
333 [ + - + - : 2 : BOOST_CHECK(netgroupman.GetGroup(ResolveIP("1.2.3.4")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // IPv4
+ - + - +
- + - +
- ]
334 [ + - + - : 2 : BOOST_CHECK(netgroupman.GetGroup(ResolveIP("::FFFF:0:102:304")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC6145
+ - + - +
- + - +
- ]
335 [ + - + - : 2 : BOOST_CHECK(netgroupman.GetGroup(ResolveIP("64:FF9B::102:304")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC6052
+ - + - +
- + - +
- ]
336 [ + - + - : 2 : BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2002:102:304:9999:9999:9999:9999:9999")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC3964
+ - + - +
- + - +
- ]
337 [ + - + - : 2 : BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2001:0:9999:9999:9999:9999:FEFD:FCFB")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC4380
+ - + - +
- + - +
- ]
338 [ + - + - : 2 : BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2001:470:abcd:9999:9999:9999:9999:9999")) == std::vector<unsigned char>({(unsigned char)NET_IPV6, 32, 1, 4, 112, 175})); //he.net
+ - + - +
- + - +
- ]
339 [ + - + - : 2 : BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2001:2001:9999:9999:9999:9999:9999:9999")) == std::vector<unsigned char>({(unsigned char)NET_IPV6, 32, 1, 32, 1})); //IPv6
+ - + - +
- + - +
- ]
340 : :
341 : : // baz.net sha256 hash: 12929400eb4607c4ac075f087167e75286b179c693eb059a01774b864e8fe505
342 [ + - ]: 1 : std::vector<unsigned char> internal_group = {NET_INTERNAL, 0x12, 0x92, 0x94, 0x00, 0xeb, 0x46, 0x07, 0xc4, 0xac, 0x07};
343 [ + - + - : 2 : BOOST_CHECK(netgroupman.GetGroup(CreateInternal("baz.net")) == internal_group);
+ - + - +
- ]
344 : 1 : }
345 : :
346 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(netbase_parsenetwork)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
347 : : {
348 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(ParseNetwork("ipv4"), NET_IPV4);
349 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(ParseNetwork("ipv6"), NET_IPV6);
350 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(ParseNetwork("onion"), NET_ONION);
351 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(ParseNetwork("tor"), NET_ONION);
352 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(ParseNetwork("cjdns"), NET_CJDNS);
353 : :
354 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(ParseNetwork("IPv4"), NET_IPV4);
355 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(ParseNetwork("IPv6"), NET_IPV6);
356 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(ParseNetwork("ONION"), NET_ONION);
357 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(ParseNetwork("TOR"), NET_ONION);
358 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(ParseNetwork("CJDNS"), NET_CJDNS);
359 : :
360 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(ParseNetwork(":)"), NET_UNROUTABLE);
361 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(ParseNetwork("tÖr"), NET_UNROUTABLE);
362 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(ParseNetwork("\xfe\xff"), NET_UNROUTABLE);
363 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(ParseNetwork(""), NET_UNROUTABLE);
364 : 1 : }
365 : :
366 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(netpermissions_test)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
367 : : {
368 [ + - ]: 1 : bilingual_str error;
369 [ + - ]: 1 : NetWhitebindPermissions whitebindPermissions;
370 [ + - ]: 1 : NetWhitelistPermissions whitelistPermissions;
371 : 1 : ConnectionDirection connection_direction;
372 : :
373 : : // Detect invalid white bind
374 [ + - + - : 2 : BOOST_CHECK(!NetWhitebindPermissions::TryParse("", whitebindPermissions, error));
+ - + - +
- ]
375 [ + - + - : 2 : BOOST_CHECK(error.original.find("Cannot resolve -whitebind address") != std::string::npos);
+ - ]
376 [ + - + - : 2 : BOOST_CHECK(!NetWhitebindPermissions::TryParse("127.0.0.1", whitebindPermissions, error));
+ - + - +
- ]
377 [ + - + - : 2 : BOOST_CHECK(error.original.find("Need to specify a port with -whitebind") != std::string::npos);
+ - ]
378 [ + - + - : 2 : BOOST_CHECK(!NetWhitebindPermissions::TryParse("", whitebindPermissions, error));
+ - + - +
- ]
379 : :
380 : : // If no permission flags, assume backward compatibility
381 [ + - + - : 2 : BOOST_CHECK(NetWhitebindPermissions::TryParse("1.2.3.4:32", whitebindPermissions, error));
+ - + - +
- ]
382 [ + - + - : 2 : BOOST_CHECK(error.empty());
+ - ]
383 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::Implicit);
384 [ + - + - : 2 : BOOST_CHECK(NetPermissions::HasFlag(whitebindPermissions.m_flags, NetPermissionFlags::Implicit));
+ - ]
385 [ + - ]: 1 : NetPermissions::ClearFlag(whitebindPermissions.m_flags, NetPermissionFlags::Implicit);
386 [ + - + - : 2 : BOOST_CHECK(!NetPermissions::HasFlag(whitebindPermissions.m_flags, NetPermissionFlags::Implicit));
+ - ]
387 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::None);
388 [ + - ]: 1 : NetPermissions::AddFlag(whitebindPermissions.m_flags, NetPermissionFlags::Implicit);
389 [ + - + - : 2 : BOOST_CHECK(NetPermissions::HasFlag(whitebindPermissions.m_flags, NetPermissionFlags::Implicit));
+ - ]
390 : :
391 : : // Can set one permission
392 [ + - + - : 2 : BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom@1.2.3.4:32", whitebindPermissions, error));
+ - + - +
- ]
393 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::BloomFilter);
394 [ + - + - : 2 : BOOST_CHECK(NetWhitebindPermissions::TryParse("@1.2.3.4:32", whitebindPermissions, error));
+ - + - +
- ]
395 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::None);
396 : :
397 [ + - + - : 1 : NetWhitebindPermissions noban, noban_download, download_noban, download;
+ - + - ]
398 : :
399 : : // "noban" implies "download"
400 [ + - + - : 2 : BOOST_REQUIRE(NetWhitebindPermissions::TryParse("noban@1.2.3.4:32", noban, error));
+ - + - +
- ]
401 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(noban.m_flags, NetPermissionFlags::NoBan);
402 [ + - + - : 2 : BOOST_CHECK(NetPermissions::HasFlag(noban.m_flags, NetPermissionFlags::Download));
+ - ]
403 [ + - + - : 2 : BOOST_CHECK(NetPermissions::HasFlag(noban.m_flags, NetPermissionFlags::NoBan));
+ - ]
404 : :
405 : : // "noban,download" is equivalent to "noban"
406 [ + - + - : 2 : BOOST_REQUIRE(NetWhitebindPermissions::TryParse("noban,download@1.2.3.4:32", noban_download, error));
+ - + - +
- ]
407 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(noban_download.m_flags, noban.m_flags);
408 : :
409 : : // "download,noban" is equivalent to "noban"
410 [ + - + - : 2 : BOOST_REQUIRE(NetWhitebindPermissions::TryParse("download,noban@1.2.3.4:32", download_noban, error));
+ - + - +
- ]
411 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(download_noban.m_flags, noban.m_flags);
412 : :
413 : : // "download" excludes (does not imply) "noban"
414 [ + - + - : 2 : BOOST_REQUIRE(NetWhitebindPermissions::TryParse("download@1.2.3.4:32", download, error));
+ - + - +
- ]
415 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(download.m_flags, NetPermissionFlags::Download);
416 [ + - + - : 2 : BOOST_CHECK(NetPermissions::HasFlag(download.m_flags, NetPermissionFlags::Download));
+ - ]
417 [ + - + - : 2 : BOOST_CHECK(!NetPermissions::HasFlag(download.m_flags, NetPermissionFlags::NoBan));
+ - ]
418 : :
419 : : // Happy path, can parse flags
420 [ + - + - : 2 : BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,forcerelay@1.2.3.4:32", whitebindPermissions, error));
+ - + - +
- ]
421 : : // forcerelay should also activate the relay permission
422 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::BloomFilter | NetPermissionFlags::ForceRelay | NetPermissionFlags::Relay);
423 [ + - + - : 2 : BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,relay,noban@1.2.3.4:32", whitebindPermissions, error));
+ - + - +
- ]
424 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::BloomFilter | NetPermissionFlags::Relay | NetPermissionFlags::NoBan);
425 [ + - + - : 2 : BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,forcerelay,noban@1.2.3.4:32", whitebindPermissions, error));
+ - + - +
- ]
426 [ + - + - : 2 : BOOST_CHECK(NetWhitebindPermissions::TryParse("all@1.2.3.4:32", whitebindPermissions, error));
+ - + - +
- ]
427 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::All);
428 : :
429 : : // Allow dups
430 [ + - + - : 2 : BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,relay,noban,noban@1.2.3.4:32", whitebindPermissions, error));
+ - + - +
- ]
431 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::BloomFilter | NetPermissionFlags::Relay | NetPermissionFlags::NoBan | NetPermissionFlags::Download); // "noban" implies "download"
432 : :
433 : : // Allow empty
434 [ + - + - : 2 : BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,relay,,noban@1.2.3.4:32", whitebindPermissions, error));
+ - + - +
- ]
435 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::BloomFilter | NetPermissionFlags::Relay | NetPermissionFlags::NoBan);
436 [ + - + - : 2 : BOOST_CHECK(NetWhitebindPermissions::TryParse(",@1.2.3.4:32", whitebindPermissions, error));
+ - + - +
- ]
437 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::None);
438 [ + - + - : 2 : BOOST_CHECK(NetWhitebindPermissions::TryParse(",,@1.2.3.4:32", whitebindPermissions, error));
+ - + - +
- ]
439 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(whitebindPermissions.m_flags, NetPermissionFlags::None);
440 : :
441 [ + - + - : 2 : BOOST_CHECK(!NetWhitebindPermissions::TryParse("out,forcerelay@1.2.3.4:32", whitebindPermissions, error));
+ - + - +
- ]
442 [ + - + - : 2 : BOOST_CHECK(error.original.find("whitebind may only be used for incoming connections (\"out\" was passed)") != std::string::npos);
+ - ]
443 : :
444 : : // Detect invalid flag
445 [ + - + - : 2 : BOOST_CHECK(!NetWhitebindPermissions::TryParse("bloom,forcerelay,oopsie@1.2.3.4:32", whitebindPermissions, error));
+ - + - +
- ]
446 [ + - + - : 2 : BOOST_CHECK(error.original.find("Invalid P2P permission") != std::string::npos);
+ - ]
447 : :
448 : : // Check netmask error
449 [ + - + - : 2 : BOOST_CHECK(!NetWhitelistPermissions::TryParse("bloom,forcerelay,noban@1.2.3.4:32", whitelistPermissions, connection_direction, error));
+ - + - +
- ]
450 [ + - + - : 2 : BOOST_CHECK(error.original.find("Invalid netmask specified in -whitelist") != std::string::npos);
+ - ]
451 : :
452 : : // Happy path for whitelist parsing
453 [ + - + - : 2 : BOOST_CHECK(NetWhitelistPermissions::TryParse("noban@1.2.3.4", whitelistPermissions, connection_direction, error));
+ - + - +
- ]
454 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(whitelistPermissions.m_flags, NetPermissionFlags::NoBan);
455 [ + - + - : 2 : BOOST_CHECK(NetPermissions::HasFlag(whitelistPermissions.m_flags, NetPermissionFlags::NoBan));
+ - ]
456 : :
457 [ + - + - : 2 : BOOST_CHECK(NetWhitelistPermissions::TryParse("bloom,forcerelay,noban,relay@1.2.3.4/32", whitelistPermissions, connection_direction, error));
+ - + - +
- ]
458 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(whitelistPermissions.m_flags, NetPermissionFlags::BloomFilter | NetPermissionFlags::ForceRelay | NetPermissionFlags::NoBan | NetPermissionFlags::Relay);
459 [ + - + - : 2 : BOOST_CHECK(error.empty());
+ - ]
460 [ + - + - : 1 : BOOST_CHECK_EQUAL(whitelistPermissions.m_subnet.ToString(), "1.2.3.4/32");
+ - ]
461 [ + - + - : 2 : BOOST_CHECK(NetWhitelistPermissions::TryParse("bloom,forcerelay,noban,relay,mempool@1.2.3.4/32", whitelistPermissions, connection_direction, error));
+ - + - +
- ]
462 [ + - + - : 2 : BOOST_CHECK(NetWhitelistPermissions::TryParse("in,relay@1.2.3.4", whitelistPermissions, connection_direction, error));
+ - + - +
- ]
463 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(connection_direction, ConnectionDirection::In);
464 [ + - + - : 2 : BOOST_CHECK(NetWhitelistPermissions::TryParse("out,bloom@1.2.3.4", whitelistPermissions, connection_direction, error));
+ - + - +
- ]
465 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(connection_direction, ConnectionDirection::Out);
466 [ + - + - : 2 : BOOST_CHECK(NetWhitelistPermissions::TryParse("in,out,bloom@1.2.3.4", whitelistPermissions, connection_direction, error));
+ - + - +
- ]
467 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(connection_direction, ConnectionDirection::Both);
468 : :
469 [ + - ]: 1 : const auto strings = NetPermissions::ToStrings(NetPermissionFlags::All);
470 [ + - - + : 1 : BOOST_CHECK_EQUAL(strings.size(), 7U);
+ - ]
471 [ + - + - : 2 : BOOST_CHECK(std::find(strings.begin(), strings.end(), "bloomfilter") != strings.end());
+ - ]
472 [ + - + - : 2 : BOOST_CHECK(std::find(strings.begin(), strings.end(), "forcerelay") != strings.end());
+ - ]
473 [ + - + - : 2 : BOOST_CHECK(std::find(strings.begin(), strings.end(), "relay") != strings.end());
+ - ]
474 [ + - + - : 2 : BOOST_CHECK(std::find(strings.begin(), strings.end(), "noban") != strings.end());
+ - ]
475 [ + - + - : 2 : BOOST_CHECK(std::find(strings.begin(), strings.end(), "mempool") != strings.end());
+ - ]
476 [ + - + - : 2 : BOOST_CHECK(std::find(strings.begin(), strings.end(), "download") != strings.end());
+ - ]
477 [ + - + - ]: 2 : BOOST_CHECK(std::find(strings.begin(), strings.end(), "addr") != strings.end());
478 : 2 : }
479 : :
480 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(netbase_dont_resolve_strings_with_embedded_nul_characters)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
481 : : {
482 [ + - + - : 3 : BOOST_CHECK(LookupHost("127.0.0.1"s, false).has_value());
+ - ]
483 [ + - + - : 3 : BOOST_CHECK(!LookupHost("127.0.0.1\0"s, false).has_value());
+ - ]
484 [ + - + - : 3 : BOOST_CHECK(!LookupHost("127.0.0.1\0example.com"s, false).has_value());
+ - ]
485 [ + - + - : 3 : BOOST_CHECK(!LookupHost("127.0.0.1\0example.com\0"s, false).has_value());
+ - ]
486 : :
487 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("1.2.3.0/24"s).IsValid());
+ - + - ]
488 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("1.2.3.0/24\0"s).IsValid());
+ - + - ]
489 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("1.2.3.0/24\0example.com"s).IsValid());
+ - + - ]
490 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("1.2.3.0/24\0example.com\0"s).IsValid());
+ - + - ]
491 [ + - + - : 2 : BOOST_CHECK(LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion"s).IsValid());
+ - + - ]
492 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion\0"s).IsValid());
+ - + - ]
493 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion\0example.com"s).IsValid());
+ - + - ]
494 [ + - + - : 2 : BOOST_CHECK(!LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion\0example.com\0"s).IsValid());
+ - + - ]
495 : 1 : }
496 : :
497 : : // Since CNetAddr (un)ser is tested separately in net_tests.cpp here we only
498 : : // try a few edge cases for port, service flags and time.
499 : :
500 : : static const std::vector<CAddress> fixture_addresses({
501 : : CAddress{
502 : : CService(CNetAddr(in6_addr(IN6ADDR_LOOPBACK_INIT)), 0 /* port */),
503 : : NODE_NONE,
504 : : NodeSeconds{0x4966bc61s}, /* Fri Jan 9 02:54:25 UTC 2009 */
505 : : },
506 : : CAddress{
507 : : CService(CNetAddr(in6_addr(IN6ADDR_LOOPBACK_INIT)), 0x00f1 /* port */),
508 : : NODE_NETWORK,
509 : : NodeSeconds{0x83766279s}, /* Tue Nov 22 11:22:33 UTC 2039 */
510 : : },
511 : : CAddress{
512 : : CService(CNetAddr(in6_addr(IN6ADDR_LOOPBACK_INIT)), 0xf1f2 /* port */),
513 : : static_cast<ServiceFlags>(NODE_WITNESS | NODE_COMPACT_FILTERS | NODE_NETWORK_LIMITED),
514 : : NodeSeconds{0xffffffffs}, /* Sun Feb 7 06:28:15 UTC 2106 */
515 : : },
516 : : });
517 : :
518 : : // fixture_addresses should equal to this when serialized in V1 format.
519 : : // When this is unserialized from V1 format it should equal to fixture_addresses.
520 : : static constexpr const char* stream_addrv1_hex =
521 : : "03" // number of entries
522 : :
523 : : "61bc6649" // time, Fri Jan 9 02:54:25 UTC 2009
524 : : "0000000000000000" // service flags, NODE_NONE
525 : : "00000000000000000000000000000001" // address, fixed 16 bytes (IPv4 embedded in IPv6)
526 : : "0000" // port
527 : :
528 : : "79627683" // time, Tue Nov 22 11:22:33 UTC 2039
529 : : "0100000000000000" // service flags, NODE_NETWORK
530 : : "00000000000000000000000000000001" // address, fixed 16 bytes (IPv6)
531 : : "00f1" // port
532 : :
533 : : "ffffffff" // time, Sun Feb 7 06:28:15 UTC 2106
534 : : "4804000000000000" // service flags, NODE_WITNESS | NODE_COMPACT_FILTERS | NODE_NETWORK_LIMITED
535 : : "00000000000000000000000000000001" // address, fixed 16 bytes (IPv6)
536 : : "f1f2"; // port
537 : :
538 : : // fixture_addresses should equal to this when serialized in V2 format.
539 : : // When this is unserialized from V2 format it should equal to fixture_addresses.
540 : : static constexpr const char* stream_addrv2_hex =
541 : : "03" // number of entries
542 : :
543 : : "61bc6649" // time, Fri Jan 9 02:54:25 UTC 2009
544 : : "00" // service flags, COMPACTSIZE(NODE_NONE)
545 : : "02" // network id, IPv6
546 : : "10" // address length, COMPACTSIZE(16)
547 : : "00000000000000000000000000000001" // address
548 : : "0000" // port
549 : :
550 : : "79627683" // time, Tue Nov 22 11:22:33 UTC 2039
551 : : "01" // service flags, COMPACTSIZE(NODE_NETWORK)
552 : : "02" // network id, IPv6
553 : : "10" // address length, COMPACTSIZE(16)
554 : : "00000000000000000000000000000001" // address
555 : : "00f1" // port
556 : :
557 : : "ffffffff" // time, Sun Feb 7 06:28:15 UTC 2106
558 : : "fd4804" // service flags, COMPACTSIZE(NODE_WITNESS | NODE_COMPACT_FILTERS | NODE_NETWORK_LIMITED)
559 : : "02" // network id, IPv6
560 : : "10" // address length, COMPACTSIZE(16)
561 : : "00000000000000000000000000000001" // address
562 : : "f1f2"; // port
563 : :
564 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(caddress_serialize_v1)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
565 : : {
566 : 1 : DataStream s{};
567 : :
568 [ + - ]: 1 : s << CAddress::V1_NETWORK(fixture_addresses);
569 [ + - - + : 1 : BOOST_CHECK_EQUAL(HexStr(s), stream_addrv1_hex);
+ - + - ]
570 : 1 : }
571 : :
572 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(caddress_unserialize_v1)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
573 : : {
574 [ - + + - ]: 1 : DataStream s{ParseHex(stream_addrv1_hex)};
575 : 1 : std::vector<CAddress> addresses_unserialized;
576 : :
577 [ + - ]: 1 : s >> CAddress::V1_NETWORK(addresses_unserialized);
578 [ + - + - : 2 : BOOST_CHECK(fixture_addresses == addresses_unserialized);
+ - ]
579 : 1 : }
580 : :
581 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(caddress_serialize_v2)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
582 : : {
583 : 1 : DataStream s{};
584 : :
585 [ + - ]: 1 : s << CAddress::V2_NETWORK(fixture_addresses);
586 [ + - - + : 1 : BOOST_CHECK_EQUAL(HexStr(s), stream_addrv2_hex);
+ - + - ]
587 : 1 : }
588 : :
589 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(caddress_unserialize_v2)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
590 : : {
591 [ - + + - ]: 1 : DataStream s{ParseHex(stream_addrv2_hex)};
592 : 1 : std::vector<CAddress> addresses_unserialized;
593 : :
594 [ + - ]: 1 : s >> CAddress::V2_NETWORK(addresses_unserialized);
595 [ + - + - : 2 : BOOST_CHECK(fixture_addresses == addresses_unserialized);
+ - ]
596 : 1 : }
597 : :
598 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(isbadport)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
599 : : {
600 [ + - + - ]: 2 : BOOST_CHECK(IsBadPort(1));
601 [ + - + - ]: 2 : BOOST_CHECK(IsBadPort(22));
602 [ + - + - ]: 2 : BOOST_CHECK(IsBadPort(6000));
603 : :
604 [ + - + - ]: 2 : BOOST_CHECK(!IsBadPort(80));
605 [ + - + - ]: 2 : BOOST_CHECK(!IsBadPort(443));
606 [ + - + - ]: 2 : BOOST_CHECK(!IsBadPort(8333));
607 : :
608 : : // Check all possible ports and ensure we only flag the expected amount as bad
609 : 1 : std::list<int> ports(std::numeric_limits<uint16_t>::max());
610 : 1 : std::iota(ports.begin(), ports.end(), 1);
611 [ + - + - : 1 : BOOST_CHECK_EQUAL(std::ranges::count_if(ports, IsBadPort), 85);
+ - ]
612 : 1 : }
613 : :
614 : :
615 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(asmap_test_vectors)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
616 : : {
617 : : // Randomly generated encoded ASMap with 128 ranges, up to 20-bit AS numbers.
618 : 1 : constexpr auto ASMAP_DATA{
619 : : "fd38d50f7d5d665357f64bba6bfc190d6078a7e68e5d3ac032edf47f8b5755f87881bfd3633d9aa7c1fa279b3"
620 : : "6fe26c63bbc9de44e0f04e5a382d8e1cddbe1c26653bc939d4327f287e8b4d1f8aff33176787cb0ff7cb28e3f"
621 : : "daef0f8f47357f801c9f7ff7a99f7f9c9f99de7f3156ae00f23eb27a303bc486aa3ccc31ec19394c2f8a53ddd"
622 : : "ea3cc56257f3b7e9b1f488be9c1137db823759aa4e071eef2e984aaf97b52d5f88d0f373dd190fe45e06efef1"
623 : : "df7278be680a73a74c76db4dd910f1d30752c57fe2bc9f079f1a1e1b036c2a69219f11c5e11980a3fa51f4f82"
624 : : "d36373de73b1863a8c27e36ae0e4f705be3d76ecff038a75bc0f92ba7e7f6f4080f1c47c34d095367ecf4406c"
625 : : "1e3bbc17ba4d6f79ea3f031b876799ac268b1e0ea9babf0f9a8e5f6c55e363c6363df46afc696d7afceaf49b6"
626 : : "e62df9e9dc27e70664cafe5c53df66dd0b8237678ada90e73f05ec60e6f6e96c3cbb1ea2f9dece115d5bdba10"
627 : : "33e53662a7d72a29477b5beb35710591d3e23e5f0379baea62ffdee535bcdf879cbf69b88d7ea37c8015381cf"
628 : : "63dc33d28f757a4a5e15d6a08"_hex};
629 : :
630 : : // Convert to std::vector<bool> format that the ASMap interpreter uses.
631 : 1 : std::vector<bool> asmap_bits;
632 [ + - ]: 1 : asmap_bits.reserve(ASMAP_DATA.size() * 8);
633 [ + + ]: 414 : for (auto byte : ASMAP_DATA) {
634 [ + + ]: 3717 : for (int bit = 0; bit < 8; ++bit) {
635 [ + - ]: 3304 : asmap_bits.push_back((std::to_integer<uint8_t>(byte) >> bit) & 1);
636 : : }
637 : : }
638 : :
639 : : // Construct NetGroupManager with this data.
640 : 1 : NetGroupManager netgroup{std::move(asmap_bits)};
641 [ + - + - : 2 : BOOST_CHECK(netgroup.UsingASMap());
+ - + - ]
642 : :
643 : : // Check some randomly-generated IPv6 addresses in it (biased towards the very beginning and
644 : : // very end of the 128-bit range).
645 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("0:1559:183:3728:224c:65a5:62e6:e991", false)), 961340);
+ - + - +
- + - ]
646 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("d0:d493:faa0:8609:e927:8b75:293c:f5a4", false)), 961340);
+ - + - +
- + - ]
647 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("2a0:26f:8b2c:2ee7:c7d1:3b24:4705:3f7f", false)), 693761);
+ - + - +
- + - ]
648 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("a77:7cd4:4be5:a449:89f2:3212:78c6:ee38", false)), 0);
+ - + - +
- + - ]
649 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("1336:1ad6:2f26:4fe3:d809:7321:6e0d:4615", false)), 672176);
+ - + - +
- + - ]
650 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("1d56:abd0:a52f:a8d5:d5a7:a610:581d:d792", false)), 499880);
+ - + - +
- + - ]
651 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("378e:7290:54e5:bd36:4760:971c:e9b9:570d", false)), 0);
+ - + - +
- + - ]
652 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("406c:820b:272a:c045:b74e:fc0a:9ef2:cecc", false)), 248495);
+ - + - +
- + - ]
653 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("46c2:ae07:9d08:2d56:d473:2bc7:57e3:20ac", false)), 248495);
+ - + - +
- + - ]
654 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("50d2:3db6:52fa:2e7:12ec:5bc4:1bd1:49f9", false)), 124471);
+ - + - +
- + - ]
655 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("53e1:1812:ffa:dccf:f9f2:64be:75fa:795", false)), 539993);
+ - + - +
- + - ]
656 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("544d:eeba:3990:35d1:ad66:f9a3:576d:8617", false)), 374443);
+ - + - +
- + - ]
657 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("6a53:40dc:8f1d:3ffa:efeb:3aa3:df88:b94b", false)), 435070);
+ - + - +
- + - ]
658 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("87aa:d1c9:9edb:91e7:aab1:9eb9:baa0:de18", false)), 244121);
+ - + - +
- + - ]
659 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("9f00:48fa:88e3:4b67:a6f3:e6d2:5cc1:5be2", false)), 862116);
+ - + - +
- + - ]
660 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("c49f:9cc6:86ad:ba08:4580:315e:dbd1:8a62", false)), 969411);
+ - + - +
- + - ]
661 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("dff5:8021:61d:b17d:406d:7888:fdac:4a20", false)), 969411);
+ - + - +
- + - ]
662 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("e888:6791:2960:d723:bcfd:47e1:2d8c:599f", false)), 824019);
+ - + - +
- + - ]
663 [ + - + - : 1 : BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("ffff:d499:8c4b:4941:bc81:d5b9:b51e:85a8", false)), 824019);
+ - + - +
- + - ]
664 : 1 : }
665 : :
666 : : BOOST_AUTO_TEST_SUITE_END()
|