aboutsummaryrefslogtreecommitdiffstats
path: root/bootstrap.sh
AgeCommit message (Expand)AuthorFilesLines
2018-02-13Increase virl2 and virl3 servers IP capacity in bootstrap.shJan Gelety1-2/+2
2017-11-29CSIT-859: KW to add crypto SW device to startup.confJan Gelety1-1/+1
2017-10-31Update of VPP_STABLE_VER files and DPDK_STABLE_VER fileJan Gelety1-1/+1
2017-07-03Remove DPDK package download from vpp-csit* jobsPeter Mikus1-4/+0
2017-06-29CSIT-687: Directory structure reorganizationTibor Frank1-2/+2
2017-06-22FIX of IP quota calculationJan Gelety1-10/+10
2017-06-05CSIT-607 Optimize VIRL job scheduling algorithmPeter Mikus1-2/+434
2017-02-09Enable to pass vpp pacakges to VIRL in case of vpp patchJan Gelety1-2/+2
2017-01-27Add Centos specific bootstrap files.Thomas F Herbert1-366/+3
2017-01-25Remove _base from test suite dir namesJan Gelety1-1/+1
2017-01-24Correction of dpdk packages download when vpp deb packages providedJan Gelety1-5/+4
2017-01-24csit-func-tc-naming-change - phase 1Jan Gelety1-1/+1
2017-01-23Update of VPP_STABLE_VERJan Gelety1-2/+7
2017-01-02CSIT-488 TLDK jbb validation jobs need cmake installedpmikus1-1/+1
2016-12-12Correct the checking of return values.Tibor Frank1-3/+3
2016-11-30CSIT-467 Add libpcap-dev packages to VIRL imagepmikus1-1/+1
2016-10-14CSIT-351: Testing Ubuntu 16.04.1 changespmikus1-1/+4
2016-10-08Switch VIRL image version to 1.3pmikus1-1/+1
2016-10-03CSIT-235: Switched Port Analyzer mirroring (SPAN) - IPv4selias1-1/+1
2016-09-25Use tmp directory for log filesJan Gelety1-4/+8
2016-09-20CSIT-360: Parallel test sets runJan Gelety1-83/+247
2016-09-12CSIT-383: IPSEC IPv4 negative test casesJan Gelety1-1/+1
2016-08-29Update of VPP_STABLE_VERJan Gelety1-7/+8
2016-08-25CSIT-28: IPSEC basic conectivity test - IPv4Jan Gelety1-1/+1
2016-08-15CSIT-226: Install vpp-plugins deb package on DUTMatej Klotton1-0/+1
2016-07-22CSIT-220: Rename directories in tests directoryMatej Klotton1-1/+2
2016-07-01TEST: PERF pybot output set width to 150 charactersMiroslav Miklus1-1/+1
2016-06-29CSIT-181: Remove fds tests from vpp-csit-verify and csit-vpp-verify jobsJan Gelety1-0/+1
2016-06-17Use common file names to store VPP stable build data in branchesJan Gelety1-5/+4
2016-06-10Use files to store VPP stable build dataJan Gelety1-6/+7
2016-06-02CSIT-128: Remove EXPECTED_FAILING tag from VXLAN over IPv6 test casesJan Gelety1-1/+1
2016-06-02CSIT-114: Eliminate repeated download of PIP packagesCarsten Koester1-1/+1
2016-05-31CSIT-98: MAC split-horizon group, part IIJan Gelety1-2/+2
2016-05-16Add VIRL host selection mechanism to bootstrapCarsten Koester1-12/+52
2016-05-16CSIT-18: Add GRE tunnel libraries and tests.Matej Klotton1-1/+1
2016-05-05VPP build update for lisp testsJan Gelety1-1/+1
2016-04-27Update vpp version in bootstrap.shJan Gelety1-6/+8
2016-04-21Topology schemaTibor Frank1-0/+11
2016-04-15Update of bootstrap.sh file.Jan Gelety1-9/+9
2016-03-29Fix of bootstrap.sh for vpp-csit-verify-virl jobJan Gelety1-23/+1
2016-03-11Update VPP version downloaded from Nexus.Matej Klotton1-7/+6
2016-03-07Modify sweep ping test casesJuraj Sloboda1-3/+2
2016-03-07Add with-statment support to VatTerminal.Matej Klotton1-1/+13
2016-03-01Install dependencies prior test execution.Stefan Kobza1-8/+22
2016-02-29Add VXLAN testMatej Klotton1-0/+1
2016-02-23Automate VIRL simulation life cycle.Stefan Kobza1-6/+119
2016-02-19Add hw/vm tags, add single link tag.Stefan Kobza1-2/+7
2016-02-18Cleanup bootstrap.sh.Stefan Kobza1-72/+5
2016-02-17Test VIRL connection.Stefan Kobza1-31/+81
2016-02-11Update of latest tests.Stefan Kobza1-12/+14
n>diff) { return memcmp_s_inline (s1, s1max, s2, s2max, diff); } /** * @brief compare string s2 to string s1, and their difference is returned in * indicator * * ISO/IEC 9899:2017(C11), Porgramming languages -- C * Annex K; Bounds-checking interfaces * * @param *s1 pointer to string to compare against * @param s1max maximum length of s1, excluding null * @param *s2 pointer to string to compare with s1 * @param *indicator pointer to the comparison result, which is an integer * greater than, equal to, or less than zero according to * s1 is greater than, equal to, or less than s2. * * @constraints No null pointers * s1max shall not be zero * s1 shall be null terminated * n shall not be greater than the smaller of s1max and strlen * of s1 * * @return EOK success * indicator when the return code is EOK * >0 s1 greater s2 * 0 s1 == s2 * <0 s1 < s2 * EINVAL runtime constraint error * */ errno_t strcmp_s (const char *s1, rsize_t s1max, const char *s2, int *indicator) { return strcmp_s_inline (s1, s1max, s2, indicator); } /** * @brief compare string s2 to string s1, no more than n characters, and their * difference is returned in indicator * * ISO/IEC 9899:2017(C11), Porgramming languages -- C * Annex K; Bounds-checking interfaces * * @param *s1 pointer to string to compare against * @param s1max maximum length of s1, excluding null * @param *s2 pointer to string to compare with s1 * @param n maximum number of characters to compare * @param *indicator pointer to the comparison result, which is an integer * greater than, equal to, or less than zero according to * s1 is greater than, equal to, or less than s2. * * @constraints No null pointers * s1max shall not be zero * s1 shall be null terminated * * @return EOK success * indicator when the return code is EOK * >0 s1 greater s2 * 0 s1 == s2 * <0 s1 < s2 * EINVAL runtime constraint error * */ errno_t strncmp_s (const char *s1, rsize_t s1max, const char *s2, rsize_t n, int *indicator) { return strncmp_s_inline (s1, s1max, s2, n, indicator); } /** * @brief copy src string to dest string * * ISO/IEC 9899:2017(C11), Porgramming languages -- C * Annex K; Bounds-checking interfaces * * @param *dest pointer to string to copy to * @param dmax maximum length of resulting dest string, including null * @param *src pointer to string to copy from * * @constraints No null pointers * dmax shall not be zero * dmax shall be greater than string length of src * no memory overlap between src and dest * * @return EOK success * EINVAL runtime constraint error * */ errno_t strcpy_s (char *__restrict__ dest, rsize_t dmax, const char *__restrict__ src) { return strcpy_s_inline (dest, dmax, src); } /** * @brief copy src string to dest string, no more than n characters * * ISO/IEC 9899:2017(C11), Porgramming languages -- C * Annex K; Bounds-checking interfaces * * @param *dest pointer to string to copy to * @param dmax maximum length of resulting dest string, including null * @param *src pointer to string to copy from * @param n maximum number of characters to copy from src, excluding null * * @constraints No null pointers * dmax shall not be zero * no memory overlap between src and dest * * @return EOK success * EINVAL runtime constraint error * EOVERFLOW truncated operation. dmax - 1 characters were copied. * dest is null terminated. * */ errno_t strncpy_s (char *__restrict__ dest, rsize_t dmax, const char *__restrict__ src, rsize_t n) { return strncpy_s_inline (dest, dmax, src, n); } /** * @brief append src string to dest string, including null * * ISO/IEC 9899:2017(C11), Porgramming languages -- C * Annex K; Bounds-checking interfaces * * @param *dest pointer to string to append to * @param dmax maximum length of resulting dest string, including null * @param *src pointer to string to append from * * @constraints No null pointers * dmax shall not be zero * dest shall be null terminated * given m = dmax - strnlen (dest, dmax) * n = strnlen (src, m) * n shall not be >= m * no memory overlap between src and dest * * @return EOK success * EINVAL runtime constraint error * */ errno_t strcat_s (char *__restrict__ dest, rsize_t dmax, const char *__restrict__ src) { return strcat_s_inline (dest, dmax, src); } /** * @brief append src string to dest string, including null, no more than n * characters * * ISO/IEC 9899:2017(C11), Porgramming languages -- C * Annex K; Bounds-checking interfaces * * @param *dest pointer to string to append to * @param dmax maximum length of resulting dest string, including null * @param *src pointer to string to append from * @param n maximum characters to append (excluding null) * * @constraints No null pointers * dmax shall not be zero * dest shall be null terminated * dmax - strnlen (dest, dmax) shall not be zero * no memory overlap between src and dest * * @return EOK success * EINVAL runtime constraint error * EOVERFLOW truncated operation. dmax - 1 characters were appended. * dest is null terminated. * */ errno_t strncat_s (char *__restrict__ dest, rsize_t dmax, const char *__restrict__ src, rsize_t n) { return strncat_s_inline (dest, dmax, src, n); } /** * @brief tokenize string s1 with delimiter specified in s2. This is a stateful * API when it is iterately called, it returns the next token from s1 * which is delimited by s2. s1max and ptr maintain the stateful * information for the same caller and must not be altered by the * caller during the iteration for the correct result * * ISO/IEC 9899:2017(C11), Porgramming languages -- C * Annex K; Bounds-checking interfaces * * @param *s1 pointer to string to be searched for substring * @param *s1max restricted maximum length of s1 * @param *s2 pointer to substring to search (16 characters max, * including null) * @param **ptr in/out pointer which maintains the stateful information * * @constraints s2, s1max, and ptr shall not be null * if s1 is null, contents of ptr shall not be null * s1 and s2 shall be null terminated * * @return non-null pointer to the first character of a token * s1max and ptr are modified to contain the state * null runtime constraint error or token is not found * * Example: * char *str2 = " "; * char str1[100]; * uword len; * char *p2str = 0; * char *tok1, *tok2, *tok3, *tok4, *tok5, *tok6, *tok7; * * strncpy (str1, "brevity is the soul of wit", sizeof (str1)); * len = strlen (str1); * tok1 = strtok_s (str1, &len, str2, &p2str); * tok2 = strtok_s (0, &len, str2, &p2str); * tok3 = strtok_s (0, &len, str2, &p2str); * tok4 = strtok_s (0, &len, str2, &p2str); * tok5 = strtok_s (0, &len, str2, &p2str); * tok6 = strtok_s (0, &len, str2, &p2str); * tok7 = strtok_s (0, &len, str2, &p2str); * * After the above series of calls, * tok1 = "brevity", tok2 = "is", tok3 = "the", tok4 = "soul", tok5 = "of", * tok6 = "wit", tok7 = null */ char * strtok_s (char *__restrict__ s1, rsize_t * __restrict__ s1max, const char *__restrict__ s2, char **__restrict__ ptr) { return strtok_s_inline (s1, s1max, s2, ptr); } /** * @brief compute the length in s, no more than maxsize * * ISO/IEC 9899:2017(C11), Porgramming languages -- C * Annex K; Bounds-checking interfaces * * @param *s pointer to string * @param maxsize restricted maximum length * * @constraints No null pointers * maxsize shall not be zero * * @return size_t the string length in s, excluding null character, and no * more than maxsize or 0 if there is a constraint error * */ size_t strnlen_s (const char *s, size_t maxsize) { return strnlen_s_inline (s, maxsize); } /** * @brief locate the first occurrence of the substring s2 in s1 * * ISO/IEC 9899:2017(C11), Porgramming languages -- C * Annex K; Bounds-checking interfaces * * @param *s1 pointer to string to be searched for substring * @param s1max restricted maximum length of s1 * @param *s2 pointer to substring to search * @param s2max restricted maximum length of s2 * @param **substring pointer to pointer substring to be returned * * @constraints No null pointers * s1max and s2max shall not be zero * s1 and s2 shall be null terminated * * @return EOK success * substring when the return code is EOK, it contains the pointer which * points to s1 that matches s2 * EINVAL runtime constraint error * ESRCH no match * * Example: * char *sub = 0; * char *s1 = "success is not final, failure is not fatal."; * * strstr_s (s1, strlen (s1), "failure", strlen ("failure"), &sub); * * After the above call, * sub = "failure is not fatal." */ errno_t strstr_s (char *s1, rsize_t s1max, const char *s2, rsize_t s2max, char **substring) { return strstr_s_inline (s1, s1max, s2, s2max, substring); } /* * fd.io coding-style-patch-verification: ON * * Local Variables: * eval: (c-set-style "gnu") * End: */