mirror of
https://github.com/MariaDB/server.git
synced 2025-01-17 20:42:30 +01:00
4211b1cd48
Backporting functions from MySQL-5.6: - INET6_ATON() - INET6_NTOA() - IS_IPV4() - IS_IPV4_COMPAT() - IS_IPV4_MAPPED() - IS_IPV6()
868 lines
24 KiB
Text
868 lines
24 KiB
Text
#
|
|
# Testing of misc functions
|
|
#
|
|
|
|
--disable_warnings
|
|
DROP TABLE IF EXISTS t1, t2;
|
|
--enable_warnings
|
|
|
|
select format(1.5555,0),format(123.5555,1),format(1234.5555,2),format(12345.55555,3),format(123456.5555,4),format(1234567.5555,5),format("12345.2399",2);
|
|
|
|
select inet_ntoa(inet_aton("255.255.255.255.255.255.255.255"));
|
|
select inet_aton("255.255.255.255.255"),inet_aton("255.255.1.255"),inet_aton("0.1.255");
|
|
select inet_ntoa(1099511627775),inet_ntoa(4294902271),inet_ntoa(511);
|
|
|
|
select hex(inet_aton('127'));
|
|
select hex(inet_aton('127.1'));
|
|
select hex(inet_aton('127.1.1'));
|
|
|
|
select length(uuid()), charset(uuid()), length(unhex(replace(uuid(),_utf8'-',_utf8'')));
|
|
|
|
# As we can assume we are the only user for the mysqld server, the difference
|
|
# between two calls should be -1
|
|
set @a= uuid_short();
|
|
set @b= uuid_short();
|
|
select @b - @a;
|
|
|
|
#
|
|
# Test for core dump with nan
|
|
#
|
|
select length(format('nan', 2)) > 0;
|
|
|
|
#
|
|
# Test for bug #628
|
|
#
|
|
select concat("$",format(2500,2));
|
|
|
|
# Test for BUG#7716
|
|
create table t1 ( a timestamp );
|
|
insert into t1 values ( '2004-01-06 12:34' );
|
|
select a from t1 where left(a+0,6) in ( left(20040106,6) );
|
|
select a from t1 where left(a+0,6) = ( left(20040106,6) );
|
|
|
|
select a from t1 where right(a+0,6) in ( right(20040106123400,6) );
|
|
select a from t1 where right(a+0,6) = ( right(20040106123400,6) );
|
|
|
|
select a from t1 where mid(a+0,6,3) in ( mid(20040106123400,6,3) );
|
|
select a from t1 where mid(a+0,6,3) = ( mid(20040106123400,6,3) );
|
|
|
|
drop table t1;
|
|
|
|
|
|
#
|
|
# Bug#16501: IS_USED_LOCK does not appear to work
|
|
#
|
|
|
|
CREATE TABLE t1 (conn CHAR(7), connection_id INT);
|
|
INSERT INTO t1 VALUES ('default', CONNECTION_ID());
|
|
|
|
SELECT GET_LOCK('bug16501',600);
|
|
|
|
connect (con1,localhost,root,,);
|
|
INSERT INTO t1 VALUES ('con1', CONNECTION_ID());
|
|
SELECT IS_USED_LOCK('bug16501') = connection_id
|
|
FROM t1
|
|
WHERE conn = 'default';
|
|
send SELECT GET_LOCK('bug16501',600);
|
|
|
|
connection default;
|
|
SELECT IS_USED_LOCK('bug16501') = CONNECTION_ID();
|
|
SELECT RELEASE_LOCK('bug16501');
|
|
connection con1;
|
|
reap;
|
|
connection default;
|
|
SELECT IS_USED_LOCK('bug16501') = connection_id
|
|
FROM t1
|
|
WHERE conn = 'con1';
|
|
|
|
connection con1;
|
|
SELECT IS_USED_LOCK('bug16501') = CONNECTION_ID();
|
|
SELECT RELEASE_LOCK('bug16501');
|
|
SELECT IS_USED_LOCK('bug16501');
|
|
|
|
disconnect con1;
|
|
connection default;
|
|
|
|
DROP TABLE t1;
|
|
|
|
#
|
|
# Bug #21531: EXPORT_SET() doesn't accept args with coercible character sets
|
|
#
|
|
select export_set(3, _latin1'foo', _utf8'bar', ',', 4);
|
|
|
|
--echo End of 4.1 tests
|
|
|
|
|
|
#
|
|
# Test for BUG#9535
|
|
#
|
|
--disable_warnings
|
|
create table t1 as select uuid(), length(uuid());
|
|
--enable_warnings
|
|
show create table t1;
|
|
drop table t1;
|
|
|
|
#
|
|
# Bug #21466: INET_ATON() returns signed, not unsigned
|
|
#
|
|
|
|
create table t1 select INET_ATON('255.255.0.1') as `a`;
|
|
show create table t1;
|
|
drop table t1;
|
|
|
|
#
|
|
# Bug#26093 (SELECT BENCHMARK() for SELECT statements does not produce
|
|
# valid results)
|
|
#
|
|
|
|
--disable_warnings
|
|
drop table if exists table_26093;
|
|
drop function if exists func_26093_a;
|
|
drop function if exists func_26093_b;
|
|
--enable_warnings
|
|
|
|
create table table_26093(a int);
|
|
insert into table_26093 values
|
|
(1), (2), (3), (4), (5),
|
|
(6), (7), (8), (9), (10);
|
|
|
|
delimiter //;
|
|
|
|
create function func_26093_a(x int) returns int
|
|
begin
|
|
set @invoked := @invoked + 1;
|
|
return x;
|
|
end//
|
|
|
|
create function func_26093_b(x int, y int) returns int
|
|
begin
|
|
set @invoked := @invoked + 1;
|
|
return x;
|
|
end//
|
|
|
|
delimiter ;//
|
|
|
|
select avg(a) from table_26093;
|
|
|
|
select benchmark(100, (select avg(a) from table_26093));
|
|
|
|
set @invoked := 0;
|
|
select benchmark(100, (select avg(func_26093_a(a)) from table_26093));
|
|
# Returns only 10, since intermediate results are cached.
|
|
select @invoked;
|
|
|
|
set @invoked := 0;
|
|
select benchmark(100, (select avg(func_26093_b(a, rand())) from table_26093));
|
|
# Returns 1000, due to rand() preventing caching.
|
|
select @invoked;
|
|
|
|
--error ER_SUBQUERY_NO_1_ROW
|
|
select benchmark(100, (select (a) from table_26093));
|
|
|
|
--error ER_OPERAND_COLUMNS
|
|
select benchmark(100, (select 1, 1));
|
|
|
|
drop table table_26093;
|
|
drop function func_26093_a;
|
|
drop function func_26093_b;
|
|
|
|
#
|
|
# Bug #30832: Assertion + crash with select name_const('test',now());
|
|
#
|
|
--error ER_WRONG_ARGUMENTS
|
|
SELECT NAME_CONST('test', NOW());
|
|
--error ER_WRONG_ARGUMENTS
|
|
SELECT NAME_CONST('test', UPPER('test'));
|
|
|
|
SELECT NAME_CONST('test', NULL);
|
|
SELECT NAME_CONST('test', 1);
|
|
SELECT NAME_CONST('test', -1);
|
|
SELECT NAME_CONST('test', 1.0);
|
|
SELECT NAME_CONST('test', -1.0);
|
|
SELECT NAME_CONST('test', 'test');
|
|
|
|
#
|
|
# Bug #34749: Server crash when using NAME_CONST() with an aggregate function
|
|
#
|
|
|
|
CREATE TABLE t1 (a INT);
|
|
INSERT INTO t1 VALUES (1),(2),(3);
|
|
# NAME_CONST() + aggregate.
|
|
SELECT NAME_CONST('flag',1) * MAX(a) FROM t1;
|
|
SELECT NAME_CONST('flag',1.5) * MAX(a) FROM t1;
|
|
# Now, wrap the INT_ITEM in Item_func_neg and watch the pretty explosions
|
|
SELECT NAME_CONST('flag',-1) * MAX(a) FROM t1;
|
|
SELECT NAME_CONST('flag',-1.5) * MAX(a) FROM t1;
|
|
--error ER_WRONG_ARGUMENTS
|
|
SELECT NAME_CONST('flag', SQRT(4)) * MAX(a) FROM t1;
|
|
--error ER_WRONG_ARGUMENTS
|
|
SELECT NAME_CONST('flag',-SQRT(4)) * MAX(a) FROM t1;
|
|
DROP TABLE t1;
|
|
|
|
#
|
|
# Bug #27545: erroneous usage of NAME_CONST with a name as the first parameter
|
|
# resolved against a column name of a derived table hangs the client
|
|
#
|
|
|
|
CREATE TABLE t1 (a int);
|
|
INSERT INTO t1 VALUES (5), (2);
|
|
|
|
--error ER_WRONG_ARGUMENTS
|
|
SELECT NAME_CONST(x,2) FROM (SELECT a x FROM t1) t;
|
|
|
|
DROP TABLE t1;
|
|
|
|
|
|
#
|
|
# Bug #32559: connection hangs on query with name_const
|
|
#
|
|
CREATE TABLE t1(a INT);
|
|
INSERT INTO t1 VALUES (), (), ();
|
|
--error ER_WRONG_ARGUMENTS
|
|
SELECT NAME_CONST(a, '1') FROM t1;
|
|
--error ER_WRONG_ARGUMENTS
|
|
SET INSERT_ID= NAME_CONST(a, a);
|
|
DROP TABLE t1;
|
|
|
|
#
|
|
# Bug #31349: ERROR 1062 (23000): Duplicate entry '' for key 'group_key'
|
|
#
|
|
create table t1 (a int not null);
|
|
insert into t1 values (-1), (-2);
|
|
select min(a) from t1 group by inet_ntoa(a);
|
|
drop table t1;
|
|
|
|
#
|
|
# BUG#34289 - Incorrect NAME_CONST substitution in stored procedures breaks
|
|
# replication
|
|
#
|
|
SELECT NAME_CONST('var', 'value') COLLATE latin1_general_cs;
|
|
|
|
#
|
|
# Bug #35848: UUID() returns UUIDs with the wrong time
|
|
#
|
|
select @@session.time_zone into @save_tz;
|
|
|
|
# make sure all times are UTC so the DayNr won't differ
|
|
set @@session.time_zone='UTC';
|
|
select uuid() into @my_uuid;
|
|
# if version nibble isn't 1, the following calculations will be rubbish
|
|
select mid(@my_uuid,15,1);
|
|
select 24 * 60 * 60 * 1000 * 1000 * 10 into @my_uuid_one_day;
|
|
select concat('0',mid(@my_uuid,16,3),mid(@my_uuid,10,4),left(@my_uuid,8)) into @my_uuidate;
|
|
select floor(conv(@my_uuidate,16,10)/@my_uuid_one_day) into @my_uuid_date;
|
|
select 141427 + datediff(curdate(),'1970-01-01') into @my_uuid_synthetic;
|
|
# these should be identical; date part of UUID should be current date
|
|
select @my_uuid_date - @my_uuid_synthetic;
|
|
|
|
set @@session.time_zone=@save_tz;
|
|
|
|
|
|
#
|
|
# Bug#42014: Crash, name_const with collate
|
|
#
|
|
CREATE TABLE t1 (a DATE);
|
|
SELECT * FROM t1 WHERE a = NAME_CONST('reportDate',
|
|
_binary'2009-01-09' COLLATE 'binary');
|
|
DROP TABLE t1;
|
|
|
|
#
|
|
# Bug#35515: Aliases of variables in binary log are ignored with NAME_CONST
|
|
#
|
|
select NAME_CONST('_id',1234) as id;
|
|
|
|
--echo End of 5.0 tests
|
|
|
|
#
|
|
# Bug #30389: connection_id() always return 0 in embedded server
|
|
#
|
|
|
|
select connection_id() > 0;
|
|
|
|
--echo #
|
|
--echo # Bug #54461: crash with longblob and union or update with subquery
|
|
--echo #
|
|
|
|
CREATE TABLE t1 (a INT, b LONGBLOB);
|
|
INSERT INTO t1 VALUES (1, '2'), (2, '3'), (3, '2');
|
|
|
|
SELECT DISTINCT LEAST(a, (SELECT b FROM t1 LIMIT 1)) FROM t1 UNION SELECT 1;
|
|
SELECT DISTINCT GREATEST(a, (SELECT b FROM t1 LIMIT 1)) FROM t1 UNION SELECT 1;
|
|
|
|
DROP TABLE t1;
|
|
|
|
|
|
#
|
|
# Bug #57283: inet_ntoa() crashes
|
|
#
|
|
SELECT INET_NTOA(0);
|
|
SELECT '1' IN ('1', INET_NTOA(0));
|
|
|
|
#
|
|
# MDEV-5655 Server crashes on NAME_CONST containing AND/OR expressions
|
|
#
|
|
--error ER_WRONG_ARGUMENTS
|
|
SELECT NAME_CONST('a', -(1 OR 2)) OR 1;
|
|
--error ER_WRONG_ARGUMENTS
|
|
SELECT NAME_CONST('a', -(1 AND 2)) AND 1;
|
|
SELECT NAME_CONST('a', -(1)) OR 1;
|
|
|
|
--echo #
|
|
--echo #MDEV-5446: Assertion `!table || (!table->read_set ||
|
|
--echo #bitmap_is_set(table->read_set, field_index))' fails on
|
|
--echo #EXPLAIN EXTENDED with VALUES function
|
|
--echo #
|
|
CREATE TABLE t1 (a INT, b INT) ENGINE=MyISAM;
|
|
INSERT INTO t1 VALUES (1,10);
|
|
CREATE VIEW v1 AS SELECT * FROM t1;
|
|
|
|
EXPLAIN EXTENDED SELECT VALUES(b) FROM v1;
|
|
|
|
drop view v1;
|
|
drop table t1;
|
|
|
|
--echo End of 5.3 tests
|
|
|
|
--echo #
|
|
--echo # Bug #52165: Assertion failed: file .\dtoa.c, line 465
|
|
--echo #
|
|
|
|
CREATE TABLE t1 (a SET('a'), b INT);
|
|
INSERT INTO t1 VALUES ('', 0);
|
|
|
|
SELECT COALESCE(a) = COALESCE(b) FROM t1;
|
|
|
|
DROP TABLE t1;
|
|
|
|
|
|
--echo #
|
|
--echo # Bug #54461: crash with longblob and union or update with subquery
|
|
--echo #
|
|
|
|
CREATE TABLE t1 (a INT, b LONGBLOB);
|
|
INSERT INTO t1 VALUES (1, '2'), (2, '3'), (3, '2');
|
|
|
|
SELECT DISTINCT LEAST(a, (SELECT b FROM t1 LIMIT 1)) FROM t1 UNION SELECT 1;
|
|
SELECT DISTINCT GREATEST(a, (SELECT b FROM t1 LIMIT 1)) FROM t1 UNION SELECT 1;
|
|
|
|
DROP TABLE t1;
|
|
|
|
|
|
#
|
|
# Bug #57283: inet_ntoa() crashes
|
|
#
|
|
SELECT INET_NTOA(0);
|
|
SELECT '1' IN ('1', INET_NTOA(0));
|
|
|
|
|
|
--echo #
|
|
--echo # End of 5.1 tests
|
|
--echo #
|
|
|
|
|
|
--echo #
|
|
--echo # Bug #58199: name_const in the having clause crashes
|
|
--echo #
|
|
|
|
CREATE TABLE t1 (a INT);
|
|
|
|
# NAME_CONST() would seg.fault when used wrongly in a HAVING clause
|
|
--error ER_WRONG_ARGUMENTS
|
|
SELECT 1 from t1 HAVING NAME_CONST('', a);
|
|
|
|
DROP TABLE t1;
|
|
|
|
--echo #
|
|
--echo # Test or correct maybe_null of last_value
|
|
--echo #
|
|
CREATE TABLE t1 (a char(2) not null );
|
|
INSERT INTO t1 VALUES (4),(7),(1);
|
|
set @optimizer_switch_save= @@optimizer_switch;
|
|
set optimizer_switch='materialization=off';
|
|
CREATE TABLE tv (e char(2) not null ) engine=mysql;
|
|
INSERT INTO tv VALUES (1);
|
|
CREATE ALGORITHM=MERGE VIEW v_merge AS SELECT * FROM tv;
|
|
CREATE ALGORITHM=MERGE VIEW vm AS SELECT * FROM tv;
|
|
explain extended
|
|
select a from t1 left join v_merge on (a=e) where last_value(NULL,e) not in (select last_value(NULL,e) from vm);
|
|
explain extended
|
|
select a from t1 left join v_merge on (a=e) where e not in (select last_value(NULL,e) from vm);
|
|
set optimizer_switch=@optimizer_switch_save;
|
|
drop view v_merge, vm;
|
|
drop table t1,tv;
|
|
|
|
|
|
--echo #
|
|
--echo # GET_LOCK, RELEASE_LOCK, IS_USED_LOCK functions test
|
|
--echo #
|
|
|
|
--echo # IS_USED_LOCK, IS_FREE_LOCK: the lock is not acquired
|
|
--echo # Note: IS_USED_LOCK returns NULL if the lock is unused
|
|
select is_used_lock('test');
|
|
select is_free_lock('test');
|
|
|
|
--echo # GET_LOCK returns 1 if it manages to acquire a lock
|
|
select get_lock('test', 0);
|
|
|
|
--echo # IS_USED_LOCK, IS_FREE_LOCK: the lock is acquired
|
|
select is_free_lock('test');
|
|
select is_used_lock('test') = connection_id();
|
|
|
|
connect (con1,localhost,root,,);
|
|
--echo # -> Switching to connection 'con1'
|
|
connection con1;
|
|
--echo # IS_USED_LOCK, IS_FREE_LOCK: the lock is acquired in another
|
|
--echo # connection
|
|
select is_used_lock('test') = connection_id();
|
|
select is_free_lock('test');
|
|
|
|
--echo # GET_LOCK returns 0 if it can't acquire a lock (wait timeout)
|
|
select get_lock('test', 0);
|
|
|
|
--echo # RELEASE_LOCK returns 0 if the lock belongs to another connection
|
|
select release_lock('test');
|
|
|
|
--echo # -> Switching to connection 'default'
|
|
connection default;
|
|
|
|
--echo # RELEASE_LOCK returns 1 if it successfully releases a lock
|
|
select release_lock('test');
|
|
--echo # RELEASE_LOCK returns NULL if it doesn't release a lock and there is no such lock
|
|
select release_lock('test');
|
|
|
|
--echo # Test that get_lock() returns NULL if error.
|
|
select get_lock('test', 0);
|
|
--echo # -> Switching to connection 'con1'
|
|
connection con1;
|
|
create table t1 select connection_id() as id;
|
|
send select get_lock('test', 7200);
|
|
|
|
--echo # -> Switching to connection 'default'
|
|
connection default;
|
|
let $wait_condition= SELECT count(*) > 0 FROM information_schema.processlist WHERE info LIKE 'select%' AND state='User lock';
|
|
source include/wait_condition.inc;
|
|
select (@id := id) - id from t1;
|
|
kill query @id;
|
|
|
|
--echo # -> Switching to connection 'con1'
|
|
connection con1;
|
|
reap;
|
|
|
|
--echo # -> Switching to connection 'default'
|
|
connection default;
|
|
|
|
--echo # GET_LOCK() works recursively
|
|
select get_lock('test', 0);
|
|
select get_lock('test', 0);
|
|
select get_lock('test', 0);
|
|
|
|
--echo # RELEASE_LOCK() needs to be called recursively then, too
|
|
select release_lock('test');
|
|
select release_lock('test');
|
|
select release_lock('test');
|
|
|
|
--echo # Once the last instance of the lock is released,
|
|
--echo # the next call returns NULL
|
|
select release_lock('test');
|
|
|
|
|
|
--echo # Multiple locks in the same session are OK
|
|
select get_lock('test1', 0);
|
|
select get_lock('test2', 0);
|
|
select get_lock('test3', 0);
|
|
|
|
select release_lock('test1');
|
|
select release_lock('test2');
|
|
select release_lock('test3');
|
|
|
|
--echo # Deadlocks are detected e.g. in case of a mutual wait
|
|
select get_lock('test1', 0);
|
|
|
|
--echo # -> Switching to connection 'con1'
|
|
connection con1;
|
|
select get_lock('test2', 0);
|
|
send select get_lock('test1', 7200);
|
|
|
|
--echo # -> Switching to connection 'default'
|
|
connection default;
|
|
let $wait_condition= SELECT count(*) > 0 FROM information_schema.processlist WHERE info LIKE 'select%' AND state='User lock';
|
|
source include/wait_condition.inc;
|
|
--error ER_LOCK_DEADLOCK
|
|
select get_lock('test2', 7200);
|
|
|
|
select release_lock('test1');
|
|
|
|
--echo # -> Switching to connection 'con1'
|
|
connection con1;
|
|
reap;
|
|
select release_lock('test2');
|
|
select release_lock('test1');
|
|
|
|
--echo # -> Switching to connection 'default'
|
|
connection default;
|
|
|
|
--echo # LOCK/UNLOCK TABLES works fine with a user lock.
|
|
lock table t1 write;
|
|
select get_lock('test', 0);
|
|
unlock tables;
|
|
commit;
|
|
select release_lock('test');
|
|
|
|
--echo # GLOBAL READ LOCK works with fine with user locks
|
|
select get_lock('test1', 0);
|
|
flush tables with read lock;
|
|
select get_lock('test2', 0);
|
|
unlock tables;
|
|
commit;
|
|
select release_lock('test1');
|
|
select release_lock('test2');
|
|
|
|
--echo # BEGIN/COMMIT/ROLLBACK don't unlock user locks.
|
|
begin;
|
|
select get_lock('test1', 0);
|
|
select get_lock('test2', 0);
|
|
select count(*) from t1;
|
|
rollback;
|
|
select release_lock('test1');
|
|
select release_lock('test2');
|
|
|
|
--echo # Deadlocks between user locks and LOCK TABLES locks
|
|
--echo # are detected OK.
|
|
select get_lock('test', 0);
|
|
|
|
--echo # -> Switching to connection 'con1'
|
|
connection con1;
|
|
lock table t1 write;
|
|
send select get_lock('test', 7200);
|
|
|
|
--echo # -> Switching to connection 'default'
|
|
connection default;
|
|
let $wait_condition= SELECT count(*) > 0 FROM information_schema.processlist WHERE info LIKE 'select%' AND state = 'User lock';
|
|
source include/wait_condition.inc;
|
|
--error ER_LOCK_DEADLOCK
|
|
lock table t1 read;
|
|
|
|
select release_lock('test');
|
|
|
|
--echo # -> Switching to connection 'con1'
|
|
connection con1;
|
|
reap;
|
|
select release_lock('test');
|
|
unlock tables;
|
|
|
|
--echo # cleanup
|
|
disconnect con1;
|
|
connection default;
|
|
drop table t1;
|
|
|
|
--echo # check too long identifier names
|
|
select get_lock(repeat('a', 192), 0);
|
|
select is_used_lock(repeat('a', 192)) = connection_id();
|
|
select is_free_lock(repeat('a', 192));
|
|
select release_lock(repeat('a', 192));
|
|
--error ER_TOO_LONG_IDENT
|
|
select get_lock(repeat('a', 193), 0);
|
|
--error ER_TOO_LONG_IDENT
|
|
select is_used_lock(repeat('a', 193));
|
|
--error ER_TOO_LONG_IDENT
|
|
select is_free_lock(repeat('a', 193));
|
|
--error ER_TOO_LONG_IDENT
|
|
select release_lock(repeat('a', 193));
|
|
|
|
--echo #
|
|
--echo # End of 5.5 tests
|
|
--echo #
|
|
|
|
|
|
--echo
|
|
--echo # --
|
|
--echo # -- WL#5787: IPv6-capable INET_ATON and INET_NTOA functions.
|
|
--echo # --
|
|
|
|
--echo
|
|
--echo # -- INET6_ATON: checking NULL, invalid types, out-of range values...
|
|
--echo
|
|
|
|
SELECT INET6_ATON(NULL) IS NULL;
|
|
SELECT INET6_ATON(123) IS NULL;
|
|
SELECT INET6_ATON(123.45) IS NULL;
|
|
SELECT INET6_ATON(NOW()) IS NULL;
|
|
|
|
SELECT INET6_ATON('1.2.3') IS NULL;
|
|
SELECT INET6_ATON('1.2.3.') IS NULL;
|
|
SELECT INET6_ATON('1..3.4') IS NULL;
|
|
SELECT INET6_ATON('-1.2.3.4') IS NULL;
|
|
SELECT INET6_ATON('1.2.3.256') IS NULL;
|
|
SELECT INET6_ATON('1.2.3.4.5') IS NULL;
|
|
SELECT INET6_ATON('0001.2.3.4') IS NULL;
|
|
SELECT INET6_ATON('0x1.2.3.4') IS NULL;
|
|
SELECT INET6_ATON('a.2.3.4') IS NULL;
|
|
|
|
SELECT INET6_ATON('1.2.3.4:80') IS NULL;
|
|
SELECT INET6_ATON('1.2.3.4/32') IS NULL;
|
|
|
|
SELECT INET6_ATON('mysql.com') IS NULL;
|
|
|
|
SELECT INET6_ATON(':::') IS NULL;
|
|
SELECT INET6_ATON(':1:2:3') IS NULL;
|
|
SELECT INET6_ATON('1:2:3:') IS NULL;
|
|
SELECT INET6_ATON(':1::2:3') IS NULL;
|
|
SELECT INET6_ATON('1::2:3:') IS NULL;
|
|
SELECT INET6_ATON('::00001') IS NULL;
|
|
SELECT INET6_ATON('::00001:2') IS NULL;
|
|
SELECT INET6_ATON('::12345') IS NULL;
|
|
SELECT INET6_ATON('1020::3040::5060') IS NULL;
|
|
SELECT INET6_ATON('::ABCZ') IS NULL;
|
|
|
|
SELECT INET6_ATON('::0x1.2.3.4') IS NULL;
|
|
SELECT INET6_ATON('::1.0x2.3.4') IS NULL;
|
|
SELECT INET6_ATON('::a.b.c.d') IS NULL;
|
|
|
|
SELECT INET6_ATON('::FFFF:0x1.2.3.4') IS NULL;
|
|
SELECT INET6_ATON('::FFFF:1.0x2.3.4') IS NULL;
|
|
SELECT INET6_ATON('::FFFF:a.b.c.d') IS NULL;
|
|
|
|
SELECT INET6_ATON('::1.2.3.4:ABCD') IS NULL;
|
|
|
|
--echo # NOTE: such addresses are supported because getaddrinfo() supports them.
|
|
--echo # This is just to record the current behaviour.
|
|
SELECT HEX(INET6_ATON('::ABCD:1.2.3.4'));
|
|
|
|
--echo
|
|
--echo # -- INET6_ATON: checking binary representation...
|
|
--echo
|
|
|
|
SELECT HEX(INET6_ATON('0.0.0.0'));
|
|
SELECT HEX(INET6_ATON('00.00.00.00'));
|
|
SELECT HEX(INET6_ATON('000.000.000.000'));
|
|
SELECT HEX(INET6_ATON('1.2.3.4'));
|
|
SELECT HEX(INET6_ATON('01.02.03.04'));
|
|
SELECT HEX(INET6_ATON('001.002.003.004'));
|
|
SELECT HEX(INET6_ATON('255.255.255.255'));
|
|
SELECT HEX(INET6_ATON('::'));
|
|
SELECT HEX(INET6_ATON('0::0'));
|
|
SELECT HEX(INET6_ATON('1::2'));
|
|
SELECT HEX(INET6_ATON('0::'));
|
|
SELECT HEX(INET6_ATON('1::'));
|
|
SELECT HEX(INET6_ATON('::0'));
|
|
SELECT HEX(INET6_ATON('::1'));
|
|
SELECT HEX(INET6_ATON('1:2:3:4:5:6:7:8'));
|
|
SELECT HEX(INET6_ATON('::2:3:4:5:6:7:8'));
|
|
SELECT HEX(INET6_ATON('1::3:4:5:6:7:8'));
|
|
SELECT HEX(INET6_ATON('1:2::4:5:6:7:8'));
|
|
SELECT HEX(INET6_ATON('1:2:3::5:6:7:8'));
|
|
SELECT HEX(INET6_ATON('1:2:3:4::6:7:8'));
|
|
SELECT HEX(INET6_ATON('1:2:3:4:5::7:8'));
|
|
SELECT HEX(INET6_ATON('1:2:3:4:5:6::8'));
|
|
SELECT HEX(INET6_ATON('1:2:3:4:5:6:7::'));
|
|
SELECT HEX(INET6_ATON('0000:0000::0000:0001'));
|
|
SELECT HEX(INET6_ATON('1234:5678:9abc:def0:4321:8765:cba9:0fed'));
|
|
SELECT HEX(INET6_ATON('0000:0000:0000:0000:0000:0000:0000:0001'));
|
|
SELECT HEX(INET6_ATON('::C0A8:0102'));
|
|
SELECT HEX(INET6_ATON('::c0a8:0102'));
|
|
SELECT HEX(INET6_ATON('::192.168.1.2'));
|
|
SELECT HEX(INET6_ATON('::FfFf:C0a8:0102'));
|
|
SELECT HEX(INET6_ATON('::ffff:c0a8:0102'));
|
|
SELECT HEX(INET6_ATON('::ffff:192.168.1.2'));
|
|
SELECT HEX(INET6_ATON('::01.2.3.4'));
|
|
SELECT HEX(INET6_ATON('::1.02.3.4'));
|
|
SELECT HEX(INET6_ATON('::1.2.03.4'));
|
|
SELECT HEX(INET6_ATON('::1.2.3.04'));
|
|
SELECT HEX(INET6_ATON('::1.2.3.00'));
|
|
SELECT HEX(INET6_ATON('::FFFF:01.2.3.4'));
|
|
SELECT HEX(INET6_ATON('::FFFF:1.02.3.4'));
|
|
SELECT HEX(INET6_ATON('::FFFF:1.2.03.4'));
|
|
SELECT HEX(INET6_ATON('::FFFF:1.2.3.04'));
|
|
SELECT HEX(INET6_ATON('::FFFF:1.2.3.00'));
|
|
|
|
--echo
|
|
--echo # -- INET6_ATON: checking the length is either 4 or 16...
|
|
--echo
|
|
|
|
SELECT LENGTH(INET6_ATON('0.0.0.0'));
|
|
SELECT LENGTH(INET6_ATON('255.255.255.255'));
|
|
SELECT LENGTH(INET6_ATON('::'));
|
|
SELECT LENGTH(INET6_ATON('1020:3040:5060:7080:90A0:B0C0:D0E0:F010'));
|
|
|
|
--echo
|
|
--echo # -- INET6_NTOA: checking NULL, invalid types, out-of range values...
|
|
--echo
|
|
|
|
SELECT INET6_NTOA(NULL);
|
|
SELECT INET6_NTOA(123);
|
|
SELECT INET6_NTOA(123.456);
|
|
SELECT INET6_NTOA(NOW());
|
|
SELECT INET6_NTOA(UNHEX('C0A801')); # 3 bytes -> NULL
|
|
SELECT INET6_NTOA(UNHEX('C0A80102')); # 4 bytes -> 192.168.1.2
|
|
SELECT INET6_NTOA(UNHEX('C0A8010203')); # 5 bytes -> NULL
|
|
SELECT INET6_NTOA(UNHEX('0102030405060708090A0B0C0D0E0F')); # 15 bytes -> NULL
|
|
SELECT INET6_NTOA(UNHEX('0102030405060708090A0B0C0D0E0F10')); # 16 bytes -> IP
|
|
SELECT INET6_NTOA(UNHEX('0102030405060708090A0B0C0D0E0F1011')); # 17 bytes -> NULL
|
|
|
|
SELECT INET6_NTOA('1234'), INET6_NTOA(BINARY('1234'));
|
|
SELECT INET6_NTOA('0123456789abcdef'), INET6_NTOA(BINARY('0123456789abcdef'));
|
|
|
|
--echo
|
|
--echo # -- Checking double-conversion...
|
|
--echo
|
|
|
|
SELECT INET6_NTOA(INET6_ATON('::'));
|
|
SELECT INET6_NTOA(INET6_ATON('0::0'));
|
|
SELECT INET6_NTOA(INET6_ATON('1::2'));
|
|
SELECT INET6_NTOA(INET6_ATON('0::'));
|
|
SELECT INET6_NTOA(INET6_ATON('1::'));
|
|
SELECT INET6_NTOA(INET6_ATON('::0'));
|
|
SELECT INET6_NTOA(INET6_ATON('::1'));
|
|
SELECT INET6_NTOA(INET6_ATON('1:2:3:4:5:6:7:8'));
|
|
SELECT INET6_NTOA(INET6_ATON('::2:3:4:5:6:7:8'));
|
|
SELECT INET6_NTOA(INET6_ATON('1::3:4:5:6:7:8'));
|
|
SELECT INET6_NTOA(INET6_ATON('1:2::4:5:6:7:8'));
|
|
SELECT INET6_NTOA(INET6_ATON('1:2:3::5:6:7:8'));
|
|
SELECT INET6_NTOA(INET6_ATON('1:2:3:4::6:7:8'));
|
|
SELECT INET6_NTOA(INET6_ATON('1:2:3:4:5::7:8'));
|
|
SELECT INET6_NTOA(INET6_ATON('1:2:3:4:5:6::8'));
|
|
SELECT INET6_NTOA(INET6_ATON('1:2:3:4:5:6:7::'));
|
|
SELECT INET6_NTOA(INET6_ATON('0000:0000::0000:0001'));
|
|
SELECT INET6_NTOA(INET6_ATON('1234:5678:9abc:def0:4321:8765:cba9:0fed'));
|
|
SELECT INET6_NTOA(INET6_ATON('0000:0000:0000:0000:0000:0000:0000:0001'));
|
|
SELECT INET6_NTOA(INET6_ATON('::C0A8:0102'));
|
|
SELECT INET6_NTOA(INET6_ATON('::c0a8:0102'));
|
|
SELECT INET6_NTOA(INET6_ATON('::192.168.1.2'));
|
|
SELECT INET6_NTOA(INET6_ATON('::FfFf:C0a8:0102'));
|
|
SELECT INET6_NTOA(INET6_ATON('::ffff:c0a8:0102'));
|
|
SELECT INET6_NTOA(INET6_ATON('::ffff:192.168.1.2'));
|
|
SELECT INET6_NTOA(INET6_ATON('::01.2.3.4'));
|
|
SELECT INET6_NTOA(INET6_ATON('::1.02.3.4'));
|
|
SELECT INET6_NTOA(INET6_ATON('::1.2.03.4'));
|
|
SELECT INET6_NTOA(INET6_ATON('::1.2.3.04'));
|
|
SELECT INET6_NTOA(INET6_ATON('::1.2.3.00'));
|
|
SELECT INET6_NTOA(INET6_ATON('::FFFF:01.2.3.4'));
|
|
SELECT INET6_NTOA(INET6_ATON('::FFFF:1.02.3.4'));
|
|
SELECT INET6_NTOA(INET6_ATON('::FFFF:1.2.03.4'));
|
|
SELECT INET6_NTOA(INET6_ATON('::FFFF:1.2.3.04'));
|
|
SELECT INET6_NTOA(INET6_ATON('::FFFF:1.2.3.00'));
|
|
|
|
--echo
|
|
--echo # -- Comparing INET_ATON() and INET6_ATON()...
|
|
--echo
|
|
|
|
SELECT HEX(INET_ATON('192.168.1.2'));
|
|
SELECT HEX(INET6_ATON('192.168.1.2'));
|
|
|
|
SELECT HEX(INET_ATON('255.255.255.255'));
|
|
SELECT HEX(INET6_ATON('255.255.255.255'));
|
|
|
|
SELECT HEX(INET_ATON('192.168.08.2'));
|
|
SELECT HEX(INET6_ATON('192.168.08.2'));
|
|
|
|
SELECT HEX(INET_ATON('192.168.0x8.2'));
|
|
SELECT HEX(INET6_ATON('192.168.0x8.2'));
|
|
|
|
SELECT HEX(INET_ATON('1.2.255'));
|
|
SELECT HEX(INET6_ATON('1.2.255'));
|
|
|
|
SELECT HEX(INET_ATON('1.2.256'));
|
|
SELECT HEX(INET6_ATON('1.2.256'));
|
|
|
|
SELECT HEX(INET_ATON('1.0002.3.4'));
|
|
SELECT HEX(INET6_ATON('1.0002.3.4'));
|
|
|
|
SELECT HEX(INET_ATON('1.2.3.4.5'));
|
|
SELECT HEX(INET6_ATON('1.2.3.4.5'));
|
|
|
|
--echo
|
|
--echo # -- Checking mix of INET- and INET6- functions...
|
|
--echo
|
|
|
|
SELECT HEX(INET6_ATON(INET_NTOA(INET_ATON('1.2.3.4')))) AS x;
|
|
|
|
--echo
|
|
--echo # -- Checking IS_IPV4() / IS_IPV6()...
|
|
--echo
|
|
|
|
SELECT IS_IPV4(NULL);
|
|
SELECT IS_IPV4(1);
|
|
SELECT IS_IPV4(1.0);
|
|
SELECT IS_IPV4('1.2.3.4');
|
|
SELECT IS_IPV4('001.02.000.255');
|
|
SELECT IS_IPV4('::1.2.0.255');
|
|
SELECT IS_IPV4('::1');
|
|
SELECT IS_IPV4(BINARY('1.2.3.4'));
|
|
|
|
SELECT IS_IPV6(NULL);
|
|
SELECT IS_IPV6(1);
|
|
SELECT IS_IPV6(1.0);
|
|
SELECT IS_IPV6('1.2.3.4');
|
|
SELECT IS_IPV6('001.02.000.255');
|
|
SELECT IS_IPV6('::001.02.000.255');
|
|
SELECT IS_IPV6('::1.2.0.255');
|
|
SELECT IS_IPV6('::1');
|
|
SELECT IS_IPV6('0000:0000:0000:0000:0000:0000:0000:0001');
|
|
SELECT IS_IPV6(BINARY('0000:0000:0000:0000:0000:0000:0000:0001'));
|
|
|
|
--echo
|
|
--echo # -- Checking IS_IPV4_MAPPED() and IS_IPV4_COMPAT()...
|
|
--echo
|
|
|
|
SELECT IS_IPV4_MAPPED(INET6_ATON('1.2.3.4')),
|
|
IS_IPV4_COMPAT(INET6_ATON('1.2.3.4'));
|
|
SELECT IS_IPV4_MAPPED(INET6_ATON('::1.2.3.4')),
|
|
IS_IPV4_COMPAT(INET6_ATON('::1.2.3.4'));
|
|
SELECT IS_IPV4_MAPPED(INET6_ATON('::FFFF:1.2.3.4')),
|
|
IS_IPV4_COMPAT(INET6_ATON('::FFFF:1.2.3.4'));
|
|
SELECT IS_IPV4_MAPPED(INET6_ATON('::ABCD:1.2.3.4')),
|
|
IS_IPV4_COMPAT(INET6_ATON('::ABCD:1.2.3.4'));
|
|
SELECT IS_IPV4_MAPPED(INET6_ATON('::1')),
|
|
IS_IPV4_COMPAT(INET6_ATON('::1'));
|
|
SELECT IS_IPV4_MAPPED(INET6_ATON('::')),
|
|
IS_IPV4_COMPAT(INET6_ATON('::'));
|
|
|
|
# NOTE: IS_IPV4_COMPAT() / IS_IPV4_MAPPED() could work with "regular strings in
|
|
# binary collation" too, but there is no way to create a "regular string"
|
|
# starting with \0.
|
|
|
|
--echo
|
|
--echo # -- Checking IS_IPV4_COMPAT()...
|
|
--echo
|
|
|
|
--echo
|
|
--echo # -- Working with a table...
|
|
--echo
|
|
|
|
--disable_warnings
|
|
DROP TABLE IF EXISTS t1;
|
|
DROP TABLE IF EXISTS t2;
|
|
--enable_warnings
|
|
|
|
CREATE TABLE t1(ip INT UNSIGNED);
|
|
CREATE TABLE t2(ip VARBINARY(16));
|
|
|
|
--echo
|
|
|
|
INSERT INTO t1 VALUES
|
|
(INET_ATON('1.2.3.4')), (INET_ATON('255.255.255.255'));
|
|
SELECT INET_NTOA(ip) FROM t1;
|
|
|
|
--echo
|
|
|
|
INSERT INTO t2 SELECT INET6_ATON(INET_NTOA(ip)) FROM t1;
|
|
SELECT INET6_NTOA(ip), HEX(ip), LENGTH(ip) FROM t2;
|
|
DELETE FROM t2;
|
|
|
|
--echo
|
|
|
|
INSERT INTO t2 VALUES
|
|
(INET6_ATON('1.2.3.4')), (INET6_ATON('255.255.255.255')),
|
|
(INET6_ATON('::1.2.3.4')), (INET6_ATON('::ffff:255.255.255.255')),
|
|
(INET6_ATON('::')), (INET6_ATON('::1')),
|
|
(INET6_ATON('1020:3040:5060:7080:90A0:B0C0:D0E0:F010'));
|
|
SELECT INET6_NTOA(ip), HEX(ip), LENGTH(ip) FROM t2;
|
|
|
|
--echo
|
|
|
|
DROP TABLE t1;
|
|
DROP TABLE t2;
|
|
|
|
--echo
|
|
--echo # -- Done.
|
|
--echo
|