01eb428b39
Motivation: PR #6811 introduced a public utility methods to decode hex dump and its parts, but they are not visible from netty-common. Modifications: 1. Move the `decodeHexByte`, `decodeHexDump` and `decodeHexNibble` methods into `StringUtils`. 2. Apply these methods where applicable. 3. Remove similar methods from other locations (e.g. `HpackHex` test class). Result: Less code duplication.
789 lines
36 KiB
Java
789 lines
36 KiB
Java
/*
|
|
* Copyright 2012 The Netty Project
|
|
*
|
|
* The Netty Project licenses this file to you under the Apache License,
|
|
* version 2.0 (the "License"); you may not use this file except in compliance
|
|
* with the License. You may obtain a copy of the License at:
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
* License for the specific language governing permissions and limitations
|
|
* under the License.
|
|
*/
|
|
package io.netty.util;
|
|
|
|
import io.netty.util.internal.StringUtil;
|
|
import org.junit.Test;
|
|
|
|
import java.net.Inet6Address;
|
|
import java.net.InetAddress;
|
|
import java.net.InetSocketAddress;
|
|
import java.net.UnknownHostException;
|
|
import java.util.HashMap;
|
|
import java.util.Map;
|
|
import java.util.Map.Entry;
|
|
|
|
import static io.netty.util.NetUtil.*;
|
|
import static org.junit.Assert.assertEquals;
|
|
import static org.junit.Assert.assertFalse;
|
|
import static org.junit.Assert.assertNotNull;
|
|
import static org.junit.Assert.assertNull;
|
|
import static org.junit.Assert.assertTrue;
|
|
|
|
public class NetUtilTest {
|
|
|
|
private static final class TestMap extends HashMap<String, String> {
|
|
private static final long serialVersionUID = -298642816998608473L;
|
|
|
|
TestMap(String... values) {
|
|
for (int i = 0; i < values.length; i += 2) {
|
|
String key = values[i];
|
|
String value = values[i + 1];
|
|
put(key, value);
|
|
}
|
|
}
|
|
}
|
|
|
|
private static final Map<String, String> validIpV4Hosts = new TestMap(
|
|
"192.168.1.0", "c0a80100",
|
|
"10.255.255.254", "0afffffe",
|
|
"172.18.5.4", "ac120504",
|
|
"0.0.0.0", "00000000",
|
|
"127.0.0.1", "7f000001",
|
|
"255.255.255.255", "ffffffff",
|
|
"1.2.3.4", "01020304");
|
|
|
|
private static final Map<String, String> invalidIpV4Hosts = new TestMap(
|
|
"1.256.3.4", null,
|
|
"256.0.0.1", null,
|
|
"1.1.1.1.1", null,
|
|
"x.255.255.255", null,
|
|
"0.1:0.0", null,
|
|
"0.1.0.0:", null,
|
|
"127.0.0.", null,
|
|
"1.2..4", null,
|
|
"192.0.1", null,
|
|
"192.0.1.1.1", null,
|
|
"192.0.1.a", null,
|
|
"19a.0.1.1", null,
|
|
"a.0.1.1", null,
|
|
".0.1.1", null,
|
|
"127.0.0", null,
|
|
"192.0.1.256", null,
|
|
"0.0.200.259", null,
|
|
"1.1.-1.1", null,
|
|
"1.1. 1.1", null,
|
|
"1.1.1.1 ", null,
|
|
"1.1.+1.1", null,
|
|
"0.0x1.0.255", null,
|
|
"0.01x.0.255", null,
|
|
"0.x01.0.255", null,
|
|
"0.-.0.0", null,
|
|
"0..0.0", null,
|
|
"0.A.0.0", null,
|
|
"0.1111.0.0", null,
|
|
"...", null);
|
|
|
|
private static final Map<String, String> validIpV6Hosts = new TestMap(
|
|
"::ffff:5.6.7.8", "00000000000000000000ffff05060708",
|
|
"fdf8:f53b:82e4::53", "fdf8f53b82e400000000000000000053",
|
|
"fe80::200:5aee:feaa:20a2", "fe8000000000000002005aeefeaa20a2",
|
|
"2001::1", "20010000000000000000000000000001",
|
|
"2001:0000:4136:e378:8000:63bf:3fff:fdd2", "200100004136e378800063bf3ffffdd2",
|
|
"2001:0002:6c::430", "20010002006c00000000000000000430",
|
|
"2001:10:240:ab::a", "20010010024000ab000000000000000a",
|
|
"2002:cb0a:3cdd:1::1", "2002cb0a3cdd00010000000000000001",
|
|
"2001:db8:8:4::2", "20010db8000800040000000000000002",
|
|
"ff01:0:0:0:0:0:0:2", "ff010000000000000000000000000002",
|
|
"[fdf8:f53b:82e4::53]", "fdf8f53b82e400000000000000000053",
|
|
"[fe80::200:5aee:feaa:20a2]", "fe8000000000000002005aeefeaa20a2",
|
|
"[2001::1]", "20010000000000000000000000000001",
|
|
"[2001:0000:4136:e378:8000:63bf:3fff:fdd2]", "200100004136e378800063bf3ffffdd2",
|
|
"0:1:2:3:4:5:6:789a", "0000000100020003000400050006789a",
|
|
"0:1:2:3::f", "0000000100020003000000000000000f",
|
|
"0:0:0:0:0:0:10.0.0.1", "00000000000000000000ffff0a000001",
|
|
"0:0:0:0:0::10.0.0.1", "00000000000000000000ffff0a000001",
|
|
"0:0:0:0::10.0.0.1", "00000000000000000000ffff0a000001",
|
|
"::0:0:0:0:0:10.0.0.1", "00000000000000000000ffff0a000001",
|
|
"0::0:0:0:0:10.0.0.1", "00000000000000000000ffff0a000001",
|
|
"0:0::0:0:0:10.0.0.1", "00000000000000000000ffff0a000001",
|
|
"0:0:0::0:0:10.0.0.1", "00000000000000000000ffff0a000001",
|
|
"0:0:0:0::0:10.0.0.1", "00000000000000000000ffff0a000001",
|
|
"0:0:0:0:0:ffff:10.0.0.1", "00000000000000000000ffff0a000001",
|
|
"::ffff:192.168.0.1", "00000000000000000000ffffc0a80001",
|
|
// Test if various interface names after the percent sign are recognized.
|
|
"[::1%1]", "00000000000000000000000000000001",
|
|
"[::1%eth0]", "00000000000000000000000000000001",
|
|
"[::1%%]", "00000000000000000000000000000001",
|
|
"0:0:0:0:0:ffff:10.0.0.1%", "00000000000000000000ffff0a000001",
|
|
"0:0:0:0:0:ffff:10.0.0.1%1", "00000000000000000000ffff0a000001",
|
|
"[0:0:0:0:0:ffff:10.0.0.1%1]", "00000000000000000000ffff0a000001",
|
|
"[0:0:0:0:0::10.0.0.1%1]", "00000000000000000000ffff0a000001",
|
|
"[::0:0:0:0:ffff:10.0.0.1%1]", "00000000000000000000ffff0a000001",
|
|
"::0:0:0:0:ffff:10.0.0.1%1", "00000000000000000000ffff0a000001",
|
|
"::1%1", "00000000000000000000000000000001",
|
|
"::1%eth0", "00000000000000000000000000000001",
|
|
"::1%%", "00000000000000000000000000000001",
|
|
// Tests with leading or trailing compression
|
|
"0:0:0:0:0:0:0::", "00000000000000000000000000000000",
|
|
"0:0:0:0:0:0::", "00000000000000000000000000000000",
|
|
"0:0:0:0:0::", "00000000000000000000000000000000",
|
|
"0:0:0:0::", "00000000000000000000000000000000",
|
|
"0:0:0::", "00000000000000000000000000000000",
|
|
"0:0::", "00000000000000000000000000000000",
|
|
"0::", "00000000000000000000000000000000",
|
|
"::", "00000000000000000000000000000000",
|
|
"::0", "00000000000000000000000000000000",
|
|
"::0:0", "00000000000000000000000000000000",
|
|
"::0:0:0", "00000000000000000000000000000000",
|
|
"::0:0:0:0", "00000000000000000000000000000000",
|
|
"::0:0:0:0:0", "00000000000000000000000000000000",
|
|
"::0:0:0:0:0:0", "00000000000000000000000000000000",
|
|
"::0:0:0:0:0:0:0", "00000000000000000000000000000000");
|
|
|
|
private static final Map<String, String> invalidIpV6Hosts = new TestMap(
|
|
// Test method with garbage.
|
|
"Obvious Garbage", null,
|
|
// Test method with preferred style, too many :
|
|
"0:1:2:3:4:5:6:7:8", null,
|
|
// Test method with preferred style, not enough :
|
|
"0:1:2:3:4:5:6", null,
|
|
// Test method with preferred style, bad digits.
|
|
"0:1:2:3:4:5:6:x", null,
|
|
// Test method with preferred style, adjacent :
|
|
"0:1:2:3:4:5:6::7", null,
|
|
// Too many : separators trailing
|
|
"0:1:2:3:4:5:6:7::", null,
|
|
// Too many : separators leading
|
|
"::0:1:2:3:4:5:6:7", null,
|
|
// Too many : separators trailing
|
|
"1:2:3:4:5:6:7:", null,
|
|
// Too many : separators leading
|
|
":1:2:3:4:5:6:7", null,
|
|
// Compression with : separators trailing
|
|
"0:1:2:3:4:5::7:", null,
|
|
"0:1:2:3:4::7:", null,
|
|
"0:1:2:3::7:", null,
|
|
"0:1:2::7:", null,
|
|
"0:1::7:", null,
|
|
"0::7:", null,
|
|
// Compression at start with : separators trailing
|
|
"::0:1:2:3:4:5:7:", null,
|
|
"::0:1:2:3:4:7:", null,
|
|
"::0:1:2:3:7:", null,
|
|
"::0:1:2:7:", null,
|
|
"::0:1:7:", null,
|
|
"::7:", null,
|
|
// The : separators leading and trailing
|
|
":1:2:3:4:5:6:7:", null,
|
|
":1:2:3:4:5:6:", null,
|
|
":1:2:3:4:5:", null,
|
|
":1:2:3:4:", null,
|
|
":1:2:3:", null,
|
|
":1:2:", null,
|
|
":1:", null,
|
|
// Compression with : separators leading
|
|
":1::2:3:4:5:6:7", null,
|
|
":1::3:4:5:6:7", null,
|
|
":1::4:5:6:7", null,
|
|
":1::5:6:7", null,
|
|
":1::6:7", null,
|
|
":1::7", null,
|
|
":1:2:3:4:5:6::7", null,
|
|
":1:3:4:5:6::7", null,
|
|
":1:4:5:6::7", null,
|
|
":1:5:6::7", null,
|
|
":1:6::7", null,
|
|
":1::", null,
|
|
// Compression trailing with : separators leading
|
|
":1:2:3:4:5:6:7::", null,
|
|
":1:3:4:5:6:7::", null,
|
|
":1:4:5:6:7::", null,
|
|
":1:5:6:7::", null,
|
|
":1:6:7::", null,
|
|
":1:7::", null,
|
|
// Double compression
|
|
"1::2:3:4:5:6::", null,
|
|
"::1:2:3:4:5::6", null,
|
|
"::1:2:3:4:5:6::", null,
|
|
"::1:2:3:4:5::", null,
|
|
"::1:2:3:4::", null,
|
|
"::1:2:3::", null,
|
|
"::1:2::", null,
|
|
"::0::", null,
|
|
"12::0::12", null,
|
|
// Too many : separators leading 0
|
|
"0::1:2:3:4:5:6:7", null,
|
|
// Test method with preferred style, too many digits.
|
|
"0:1:2:3:4:5:6:789abcdef", null,
|
|
// Test method with compressed style, bad digits.
|
|
"0:1:2:3::x", null,
|
|
// Test method with compressed style, too many adjacent :
|
|
"0:1:2:::3", null,
|
|
// Test method with compressed style, too many digits.
|
|
"0:1:2:3::abcde", null,
|
|
// Test method with compressed style, not enough :
|
|
"0:1", null,
|
|
// Test method with ipv4 style, bad ipv6 digits.
|
|
"0:0:0:0:0:x:10.0.0.1", null,
|
|
// Test method with ipv4 style, bad ipv4 digits.
|
|
"0:0:0:0:0:0:10.0.0.x", null,
|
|
// Test method with ipv4 style, too many ipv6 digits.
|
|
"0:0:0:0:0:00000:10.0.0.1", null,
|
|
// Test method with ipv4 style, too many :
|
|
"0:0:0:0:0:0:0:10.0.0.1", null,
|
|
// Test method with ipv4 style, not enough :
|
|
"0:0:0:0:0:10.0.0.1", null,
|
|
// Test method with ipv4 style, too many .
|
|
"0:0:0:0:0:0:10.0.0.0.1", null,
|
|
// Test method with ipv4 style, not enough .
|
|
"0:0:0:0:0:0:10.0.1", null,
|
|
// Test method with ipv4 style, adjacent .
|
|
"0:0:0:0:0:0:10..0.0.1", null,
|
|
// Test method with ipv4 style, leading .
|
|
"0:0:0:0:0:0:.0.0.1", null,
|
|
// Test method with ipv4 style, leading .
|
|
"0:0:0:0:0:0:.10.0.0.1", null,
|
|
// Test method with ipv4 style, trailing .
|
|
"0:0:0:0:0:0:10.0.0.", null,
|
|
// Test method with ipv4 style, trailing .
|
|
"0:0:0:0:0:0:10.0.0.1.", null,
|
|
// Test method with compressed ipv4 style, bad ipv6 digits.
|
|
"::fffx:192.168.0.1", null,
|
|
// Test method with compressed ipv4 style, bad ipv4 digits.
|
|
"::ffff:192.168.0.x", null,
|
|
// Test method with compressed ipv4 style, too many adjacent :
|
|
":::ffff:192.168.0.1", null,
|
|
// Test method with compressed ipv4 style, too many ipv6 digits.
|
|
"::fffff:192.168.0.1", null,
|
|
// Test method with compressed ipv4 style, too many ipv4 digits.
|
|
"::ffff:1923.168.0.1", null,
|
|
// Test method with compressed ipv4 style, not enough :
|
|
":ffff:192.168.0.1", null,
|
|
// Test method with compressed ipv4 style, too many .
|
|
"::ffff:192.168.0.1.2", null,
|
|
// Test method with compressed ipv4 style, not enough .
|
|
"::ffff:192.168.0", null,
|
|
// Test method with compressed ipv4 style, adjacent .
|
|
"::ffff:192.168..0.1", null,
|
|
// Test method, bad ipv6 digits.
|
|
"x:0:0:0:0:0:10.0.0.1", null,
|
|
// Test method, bad ipv4 digits.
|
|
"0:0:0:0:0:0:x.0.0.1", null,
|
|
// Test method, too many ipv6 digits.
|
|
"00000:0:0:0:0:0:10.0.0.1", null,
|
|
// Test method, too many ipv4 digits.
|
|
"0:0:0:0:0:0:10.0.0.1000", null,
|
|
// Test method, too many :
|
|
"0:0:0:0:0:0:0:10.0.0.1", null,
|
|
// Test method, not enough :
|
|
"0:0:0:0:0:10.0.0.1", null,
|
|
// Test method, out of order trailing :
|
|
"0:0:0:0:0:10.0.0.1:", null,
|
|
// Test method, out of order leading :
|
|
":0:0:0:0:0:10.0.0.1", null,
|
|
// Test method, out of order leading :
|
|
"0:0:0:0::10.0.0.1:", null,
|
|
// Test method, out of order trailing :
|
|
":0:0:0:0::10.0.0.1", null,
|
|
// Test method, too many .
|
|
"0:0:0:0:0:0:10.0.0.0.1", null,
|
|
// Test method, not enough .
|
|
"0:0:0:0:0:0:10.0.1", null,
|
|
// Test method, adjacent .
|
|
"0:0:0:0:0:0:10.0.0..1", null,
|
|
// Empty contents
|
|
"", null,
|
|
// Invalid single compression
|
|
":", null,
|
|
":::", null,
|
|
// Trailing : (max number of : = 8)
|
|
"2001:0:4136:e378:8000:63bf:3fff:fdd2:", null,
|
|
// Leading : (max number of : = 8)
|
|
":aaaa:bbbb:cccc:dddd:eeee:ffff:1111:2222", null,
|
|
// Invalid character
|
|
"1234:2345:3456:4567:5678:6789::X890", null,
|
|
// Trailing . in IPv4
|
|
"::ffff:255.255.255.255.", null,
|
|
// To many characters in IPv4
|
|
"::ffff:0.0.1111.0", null,
|
|
// Test method, adjacent .
|
|
"::ffff:0.0..0", null,
|
|
// Not enough IPv4 entries trailing .
|
|
"::ffff:127.0.0.", null,
|
|
// Invalid trailing IPv4 character
|
|
"::ffff:127.0.0.a", null,
|
|
// Invalid leading IPv4 character
|
|
"::ffff:a.0.0.1", null,
|
|
// Invalid middle IPv4 character
|
|
"::ffff:127.a.0.1", null,
|
|
// Invalid middle IPv4 character
|
|
"::ffff:127.0.a.1", null,
|
|
// Not enough IPv4 entries no trailing .
|
|
"::ffff:1.2.4", null,
|
|
// Extra IPv4 entry
|
|
"::ffff:192.168.0.1.255", null,
|
|
// Not enough IPv6 content
|
|
":ffff:192.168.0.1.255", null,
|
|
// Intermixed IPv4 and IPv6 symbols
|
|
"::ffff:255.255:255.255.", null,
|
|
// Invalid IPv4 mapped address - invalid ipv4 separator
|
|
"0:0:0::0:0:00f.0.0.1", null,
|
|
// Invalid IPv4 mapped address - not enough f's
|
|
"0:0:0:0:0:fff:1.0.0.1", null,
|
|
// Invalid IPv4 mapped address - not IPv4 mapped, not IPv4 compatible
|
|
"0:0:0:0:0:ff00:1.0.0.1", null,
|
|
// Invalid IPv4 mapped address - not IPv4 mapped, not IPv4 compatible
|
|
"0:0:0:0:0:ff:1.0.0.1", null,
|
|
// Invalid IPv4 mapped address - too many f's
|
|
"0:0:0:0:0:fffff:1.0.0.1", null,
|
|
// Invalid IPv4 mapped address - too many bytes (too many 0's)
|
|
"0:0:0:0:0:0:ffff:1.0.0.1", null,
|
|
// Invalid IPv4 mapped address - too many bytes (too many 0's)
|
|
"::0:0:0:0:0:ffff:1.0.0.1", null,
|
|
// Invalid IPv4 mapped address - too many bytes (too many 0's)
|
|
"0:0:0:0:0:0::1.0.0.1", null,
|
|
// Invalid IPv4 mapped address - too many bytes (too many 0's)
|
|
"0:0:0:0:0:00000:1.0.0.1", null,
|
|
// Invalid IPv4 mapped address - too few bytes (not enough 0's)
|
|
"0:0:0:0:ffff:1.0.0.1", null,
|
|
// Invalid IPv4 mapped address - too few bytes (not enough 0's)
|
|
"ffff:192.168.0.1", null,
|
|
// Invalid IPv4 mapped address - 0's after the mapped ffff indicator
|
|
"0:0:0:0:0:ffff::10.0.0.1", null,
|
|
// Invalid IPv4 mapped address - 0's after the mapped ffff indicator
|
|
"0:0:0:0:ffff::10.0.0.1", null,
|
|
// Invalid IPv4 mapped address - 0's after the mapped ffff indicator
|
|
"0:0:0:ffff::10.0.0.1", null,
|
|
// Invalid IPv4 mapped address - 0's after the mapped ffff indicator
|
|
"0:0:ffff::10.0.0.1", null,
|
|
// Invalid IPv4 mapped address - 0's after the mapped ffff indicator
|
|
"0:ffff::10.0.0.1", null,
|
|
// Invalid IPv4 mapped address - 0's after the mapped ffff indicator
|
|
"ffff::10.0.0.1", null,
|
|
// Invalid IPv4 mapped address - not all 0's before the mapped separator
|
|
"1:0:0:0:0:ffff:10.0.0.1", null,
|
|
// Address that is similar to IPv4 mapped, but is invalid
|
|
"0:0:0:0:ffff:ffff:1.0.0.1", null,
|
|
// Valid number of separators, but invalid IPv4 format
|
|
"::1:2:3:4:5:6.7.8.9", null,
|
|
// Too many digits
|
|
"0:0:0:0:0:0:ffff:10.0.0.1", null,
|
|
// Invalid IPv4 format
|
|
":1.2.3.4", null,
|
|
// Invalid IPv4 format
|
|
"::.2.3.4", null,
|
|
// Invalid IPv4 format
|
|
"::ffff:0.1.2.", null);
|
|
|
|
private static final Map<byte[], String> ipv6ToAddressStrings = new HashMap<byte[], String>() {
|
|
private static final long serialVersionUID = 2999763170377573184L;
|
|
{
|
|
// From the RFC 5952 http://tools.ietf.org/html/rfc5952#section-4
|
|
put(new byte[] {
|
|
32, 1, 13, -72,
|
|
0, 0, 0, 0,
|
|
0, 0, 0, 0,
|
|
0, 0, 0, 1
|
|
},
|
|
"2001:db8::1");
|
|
put(new byte[] {
|
|
32, 1, 13, -72,
|
|
0, 0, 0, 0,
|
|
0, 0, 0, 0,
|
|
0, 2, 0, 1
|
|
},
|
|
"2001:db8::2:1");
|
|
put(new byte[] {
|
|
32, 1, 13, -72,
|
|
0, 0, 0, 1,
|
|
0, 1, 0, 1,
|
|
0, 1, 0, 1
|
|
},
|
|
"2001:db8:0:1:1:1:1:1");
|
|
|
|
// Other examples
|
|
put(new byte[] {
|
|
32, 1, 13, -72,
|
|
0, 0, 0, 0,
|
|
0, 0, 0, 0,
|
|
0, 2, 0, 1
|
|
},
|
|
"2001:db8::2:1");
|
|
put(new byte[] {
|
|
32, 1, 0, 0,
|
|
0, 0, 0, 1,
|
|
0, 0, 0, 0,
|
|
0, 0, 0, 1
|
|
},
|
|
"2001:0:0:1::1");
|
|
put(new byte[] {
|
|
32, 1, 13, -72,
|
|
0, 0, 0, 0,
|
|
0, 1, 0, 0,
|
|
0, 0, 0, 1
|
|
},
|
|
"2001:db8::1:0:0:1");
|
|
put(new byte[] {
|
|
32, 1, 13, -72,
|
|
0, 0, 0, 0,
|
|
0, 1, 0, 0,
|
|
0, 0, 0, 0
|
|
},
|
|
"2001:db8:0:0:1::");
|
|
put(new byte[] {
|
|
32, 1, 13, -72,
|
|
0, 0, 0, 0,
|
|
0, 0, 0, 0,
|
|
0, 2, 0, 0
|
|
},
|
|
"2001:db8::2:0");
|
|
put(new byte[] {
|
|
0, 0, 0, 0,
|
|
0, 0, 0, 0,
|
|
0, 0, 0, 0,
|
|
0, 0, 0, 1
|
|
},
|
|
"::1");
|
|
put(new byte[] {
|
|
0, 0, 0, 0,
|
|
0, 0, 0, 1,
|
|
0, 0, 0, 0,
|
|
0, 0, 0, 1
|
|
},
|
|
"::1:0:0:0:1");
|
|
put(new byte[] {
|
|
0, 0, 0, 0,
|
|
1, 0, 0, 1,
|
|
0, 0, 0, 0,
|
|
1, 0, 0, 0
|
|
},
|
|
"::100:1:0:0:100:0");
|
|
put(new byte[] {
|
|
32, 1, 0, 0,
|
|
65, 54, -29, 120,
|
|
-128, 0, 99, -65,
|
|
63, -1, -3, -46
|
|
},
|
|
"2001:0:4136:e378:8000:63bf:3fff:fdd2");
|
|
put(new byte[] {
|
|
-86, -86, -69, -69,
|
|
-52, -52, -35, -35,
|
|
-18, -18, -1, -1,
|
|
17, 17, 34, 34
|
|
},
|
|
"aaaa:bbbb:cccc:dddd:eeee:ffff:1111:2222");
|
|
put(new byte[] {
|
|
0, 0, 0, 0,
|
|
0, 0, 0, 0,
|
|
0, 0, 0, 0,
|
|
0, 0, 0, 0
|
|
},
|
|
"::");
|
|
}
|
|
};
|
|
|
|
private static final Map<String, String> ipv4MappedToIPv6AddressStrings = new TestMap(
|
|
// IPv4 addresses
|
|
"255.255.255.255", "::ffff:255.255.255.255",
|
|
"0.0.0.0", "::ffff:0.0.0.0",
|
|
"127.0.0.1", "::ffff:127.0.0.1",
|
|
"1.2.3.4", "::ffff:1.2.3.4",
|
|
"192.168.0.1", "::ffff:192.168.0.1",
|
|
|
|
// IPv4 compatible addresses are deprecated [1], so we don't support outputting them, but we do support
|
|
// parsing them into IPv4 mapped addresses. These values are treated the same as a plain IPv4 address above.
|
|
// [1] https://tools.ietf.org/html/rfc4291#section-2.5.5.1
|
|
"0:0:0:0:0:0:255.254.253.252", "::ffff:255.254.253.252",
|
|
"0:0:0:0:0::1.2.3.4", "::ffff:1.2.3.4",
|
|
"0:0:0:0::1.2.3.4", "::ffff:1.2.3.4",
|
|
"::0:0:0:0:0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0::0:0:0:0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0:0::0:0:0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0:0:0::0:0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0:0:0:0::0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0:0:0:0:0::1.2.3.4", "::ffff:1.2.3.4",
|
|
"::0:0:0:0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0::0:0:0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0:0::0:0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0:0:0::0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0:0:0:0::1.2.3.4", "::ffff:1.2.3.4",
|
|
"::0:0:0:0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0::0:0:0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0:0::0:0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0:0:0::0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0:0:0:0::1.2.3.4", "::ffff:1.2.3.4",
|
|
"::0:0:0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0::0:0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0:0::0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0:0:0::1.2.3.4", "::ffff:1.2.3.4",
|
|
"::0:0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0::0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"0:0::1.2.3.4", "::ffff:1.2.3.4",
|
|
"::0:1.2.3.4", "::ffff:1.2.3.4",
|
|
"::1.2.3.4", "::ffff:1.2.3.4",
|
|
|
|
// IPv4 mapped (fully specified)
|
|
"0:0:0:0:0:ffff:1.2.3.4", "::ffff:1.2.3.4",
|
|
|
|
// IPv6 addresses
|
|
// Fully specified
|
|
"2001:0:4136:e378:8000:63bf:3fff:fdd2", "2001:0:4136:e378:8000:63bf:3fff:fdd2",
|
|
"aaaa:bbbb:cccc:dddd:eeee:ffff:1111:2222", "aaaa:bbbb:cccc:dddd:eeee:ffff:1111:2222",
|
|
"0:0:0:0:0:0:0:0", "::",
|
|
"0:0:0:0:0:0:0:1", "::1",
|
|
|
|
// Compressing at the beginning
|
|
"::1:0:0:0:1", "::1:0:0:0:1",
|
|
"::1:ffff:ffff", "::1:ffff:ffff",
|
|
"::", "::",
|
|
"::1", "::1",
|
|
"::ffff", "::ffff",
|
|
"::ffff:0", "::ffff:0",
|
|
"::ffff:ffff", "::ffff:ffff",
|
|
"::0987:9876:8765", "::987:9876:8765",
|
|
"::0987:9876:8765:7654", "::987:9876:8765:7654",
|
|
"::0987:9876:8765:7654:6543", "::987:9876:8765:7654:6543",
|
|
"::0987:9876:8765:7654:6543:5432", "::987:9876:8765:7654:6543:5432",
|
|
// Note the compression is removed (rfc 5952 section 4.2.2)
|
|
"::0987:9876:8765:7654:6543:5432:3210", "0:987:9876:8765:7654:6543:5432:3210",
|
|
|
|
// Compressing at the end
|
|
// Note the compression is removed (rfc 5952 section 4.2.2)
|
|
"2001:db8:abcd:bcde:cdef:def1:ef12::", "2001:db8:abcd:bcde:cdef:def1:ef12:0",
|
|
"2001:db8:abcd:bcde:cdef:def1::", "2001:db8:abcd:bcde:cdef:def1::",
|
|
"2001:db8:abcd:bcde:cdef::", "2001:db8:abcd:bcde:cdef::",
|
|
"2001:db8:abcd:bcde::", "2001:db8:abcd:bcde::",
|
|
"2001:db8:abcd::", "2001:db8:abcd::",
|
|
"2001:1234::", "2001:1234::",
|
|
"2001::", "2001::",
|
|
"0::", "::",
|
|
|
|
// Compressing in the middle
|
|
"1234:2345::7890", "1234:2345::7890",
|
|
"1234::2345:7890", "1234::2345:7890",
|
|
"1234:2345:3456::7890", "1234:2345:3456::7890",
|
|
"1234:2345::3456:7890", "1234:2345::3456:7890",
|
|
"1234::2345:3456:7890", "1234::2345:3456:7890",
|
|
"1234:2345:3456:4567::7890", "1234:2345:3456:4567::7890",
|
|
"1234:2345:3456::4567:7890", "1234:2345:3456::4567:7890",
|
|
"1234:2345::3456:4567:7890", "1234:2345::3456:4567:7890",
|
|
"1234::2345:3456:4567:7890", "1234::2345:3456:4567:7890",
|
|
"1234:2345:3456:4567:5678::7890", "1234:2345:3456:4567:5678::7890",
|
|
"1234:2345:3456:4567::5678:7890", "1234:2345:3456:4567::5678:7890",
|
|
"1234:2345:3456::4567:5678:7890", "1234:2345:3456::4567:5678:7890",
|
|
"1234:2345::3456:4567:5678:7890", "1234:2345::3456:4567:5678:7890",
|
|
"1234::2345:3456:4567:5678:7890", "1234::2345:3456:4567:5678:7890",
|
|
// Note the compression is removed (rfc 5952 section 4.2.2)
|
|
"1234:2345:3456:4567:5678:6789::7890", "1234:2345:3456:4567:5678:6789:0:7890",
|
|
// Note the compression is removed (rfc 5952 section 4.2.2)
|
|
"1234:2345:3456:4567:5678::6789:7890", "1234:2345:3456:4567:5678:0:6789:7890",
|
|
// Note the compression is removed (rfc 5952 section 4.2.2)
|
|
"1234:2345:3456:4567::5678:6789:7890", "1234:2345:3456:4567:0:5678:6789:7890",
|
|
// Note the compression is removed (rfc 5952 section 4.2.2)
|
|
"1234:2345:3456::4567:5678:6789:7890", "1234:2345:3456:0:4567:5678:6789:7890",
|
|
// Note the compression is removed (rfc 5952 section 4.2.2)
|
|
"1234:2345::3456:4567:5678:6789:7890", "1234:2345:0:3456:4567:5678:6789:7890",
|
|
// Note the compression is removed (rfc 5952 section 4.2.2)
|
|
"1234::2345:3456:4567:5678:6789:7890", "1234:0:2345:3456:4567:5678:6789:7890",
|
|
|
|
// IPv4 mapped addresses
|
|
"::ffff:255.255.255.255", "::ffff:255.255.255.255",
|
|
"::ffff:0.0.0.0", "::ffff:0.0.0.0",
|
|
"::ffff:127.0.0.1", "::ffff:127.0.0.1",
|
|
"::ffff:1.2.3.4", "::ffff:1.2.3.4",
|
|
"::ffff:192.168.0.1", "::ffff:192.168.0.1");
|
|
|
|
@Test
|
|
public void testLocalhost() {
|
|
assertNotNull(LOCALHOST);
|
|
}
|
|
|
|
@Test
|
|
public void testLoopback() {
|
|
assertNotNull(LOOPBACK_IF);
|
|
}
|
|
|
|
@Test
|
|
public void testIsValidIpV4Address() {
|
|
for (String host : validIpV4Hosts.keySet()) {
|
|
assertTrue(host, isValidIpV4Address(host));
|
|
}
|
|
for (String host : invalidIpV4Hosts.keySet()) {
|
|
assertFalse(host, isValidIpV4Address(host));
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testIsValidIpV6Address() {
|
|
for (String host : validIpV6Hosts.keySet()) {
|
|
assertTrue(host, isValidIpV6Address(host));
|
|
if (host.charAt(0) != '[' && !host.contains("%")) {
|
|
assertNotNull(host, getByName(host, true));
|
|
|
|
String hostMod = '[' + host + ']';
|
|
assertTrue(hostMod, isValidIpV6Address(hostMod));
|
|
|
|
hostMod = host + '%';
|
|
assertTrue(hostMod, isValidIpV6Address(hostMod));
|
|
|
|
hostMod = host + "%eth1";
|
|
assertTrue(hostMod, isValidIpV6Address(hostMod));
|
|
|
|
hostMod = '[' + host + "%]";
|
|
assertTrue(hostMod, isValidIpV6Address(hostMod));
|
|
|
|
hostMod = '[' + host + "%1]";
|
|
assertTrue(hostMod, isValidIpV6Address(hostMod));
|
|
|
|
hostMod = '[' + host + "]%";
|
|
assertFalse(hostMod, isValidIpV6Address(hostMod));
|
|
|
|
hostMod = '[' + host + "]%1";
|
|
assertFalse(hostMod, isValidIpV6Address(hostMod));
|
|
}
|
|
}
|
|
for (String host : invalidIpV6Hosts.keySet()) {
|
|
assertFalse(host, isValidIpV6Address(host));
|
|
assertNull(host, getByName(host));
|
|
|
|
String hostMod = '[' + host + ']';
|
|
assertFalse(hostMod, isValidIpV6Address(hostMod));
|
|
|
|
hostMod = host + '%';
|
|
assertFalse(hostMod, isValidIpV6Address(hostMod));
|
|
|
|
hostMod = host + "%eth1";
|
|
assertFalse(hostMod, isValidIpV6Address(hostMod));
|
|
|
|
hostMod = '[' + host + "%]";
|
|
assertFalse(hostMod, isValidIpV6Address(hostMod));
|
|
|
|
hostMod = '[' + host + "%1]";
|
|
assertFalse(hostMod, isValidIpV6Address(hostMod));
|
|
|
|
hostMod = '[' + host + "]%";
|
|
assertFalse(hostMod, isValidIpV6Address(hostMod));
|
|
|
|
hostMod = '[' + host + "]%1";
|
|
assertFalse(hostMod, isValidIpV6Address(hostMod));
|
|
|
|
hostMod = host + ']';
|
|
assertFalse(hostMod, isValidIpV6Address(hostMod));
|
|
|
|
hostMod = '[' + host;
|
|
assertFalse(hostMod, isValidIpV6Address(hostMod));
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testCreateByteArrayFromIpAddressString() {
|
|
for (Entry<String, String> e : validIpV4Hosts.entrySet()) {
|
|
String ip = e.getKey();
|
|
assertHexDumpEquals(e.getValue(), createByteArrayFromIpAddressString(ip), ip);
|
|
}
|
|
for (Entry<String, String> e : invalidIpV4Hosts.entrySet()) {
|
|
String ip = e.getKey();
|
|
assertHexDumpEquals(e.getValue(), createByteArrayFromIpAddressString(ip), ip);
|
|
}
|
|
for (Entry<String, String> e : validIpV6Hosts.entrySet()) {
|
|
String ip = e.getKey();
|
|
assertHexDumpEquals(e.getValue(), createByteArrayFromIpAddressString(ip), ip);
|
|
}
|
|
for (Entry<String, String> e : invalidIpV6Hosts.entrySet()) {
|
|
String ip = e.getKey();
|
|
assertHexDumpEquals(e.getValue(), createByteArrayFromIpAddressString(ip), ip);
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testBytesToIpAddress() throws UnknownHostException {
|
|
for (Entry<String, String> e : validIpV4Hosts.entrySet()) {
|
|
assertEquals(e.getKey(), bytesToIpAddress(createByteArrayFromIpAddressString(e.getKey())));
|
|
assertEquals(e.getKey(), bytesToIpAddress(validIpV4ToBytes(e.getKey())));
|
|
}
|
|
for (Entry<byte[], String> testEntry : ipv6ToAddressStrings.entrySet()) {
|
|
assertEquals(testEntry.getValue(), bytesToIpAddress(testEntry.getKey()));
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testIp6AddressToString() throws UnknownHostException {
|
|
for (Entry<byte[], String> testEntry : ipv6ToAddressStrings.entrySet()) {
|
|
assertEquals(testEntry.getValue(), toAddressString(InetAddress.getByAddress(testEntry.getKey())));
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testIp4AddressToString() throws UnknownHostException {
|
|
for (Entry<String, String> e : validIpV4Hosts.entrySet()) {
|
|
assertEquals(e.getKey(), toAddressString(InetAddress.getByAddress(unhex(e.getValue()))));
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testIpv4MappedIp6GetByName() {
|
|
for (Entry<String, String> testEntry : ipv4MappedToIPv6AddressStrings.entrySet()) {
|
|
String srcIp = testEntry.getKey();
|
|
String dstIp = testEntry.getValue();
|
|
Inet6Address inet6Address = getByName(srcIp, true);
|
|
assertNotNull(srcIp + ", " + dstIp, inet6Address);
|
|
assertEquals(srcIp, dstIp, toAddressString(inet6Address, true));
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testInvalidIpv4MappedIp6GetByName() {
|
|
for (String host : invalidIpV4Hosts.keySet()) {
|
|
assertNull(host, getByName(host, true));
|
|
}
|
|
|
|
for (String host : invalidIpV6Hosts.keySet()) {
|
|
assertNull(host, getByName(host, true));
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testIp6InetSocketAddressToString() throws UnknownHostException {
|
|
for (Entry<byte[], String> testEntry : ipv6ToAddressStrings.entrySet()) {
|
|
assertEquals('[' + testEntry.getValue() + "]:9999",
|
|
toSocketAddressString(new InetSocketAddress(InetAddress.getByAddress(testEntry.getKey()), 9999)));
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testIp4SocketAddressToString() throws UnknownHostException {
|
|
for (Entry<String, String> e : validIpV4Hosts.entrySet()) {
|
|
assertEquals(e.getKey() + ":9999",
|
|
toSocketAddressString(new InetSocketAddress(InetAddress.getByAddress(unhex(e.getValue())), 9999)));
|
|
}
|
|
}
|
|
|
|
private static void assertHexDumpEquals(String expected, byte[] actual, String message) {
|
|
assertEquals(message, expected, hex(actual));
|
|
}
|
|
|
|
private static String hex(byte[] value) {
|
|
if (value == null) {
|
|
return null;
|
|
}
|
|
|
|
StringBuilder buf = new StringBuilder(value.length << 1);
|
|
for (byte b: value) {
|
|
String hex = StringUtil.byteToHexString(b);
|
|
if (hex.length() == 1) {
|
|
buf.append('0');
|
|
}
|
|
buf.append(hex);
|
|
}
|
|
return buf.toString();
|
|
}
|
|
|
|
private static byte[] unhex(String value) {
|
|
return value != null ? StringUtil.decodeHexDump(value) : null;
|
|
}
|
|
}
|