check_iperf3: use vulnerable openssl settings since debian packages aren't updated while bsd is
This commit is contained in:
parent
b8c915c1ae
commit
5026314923
|
@ -105,7 +105,7 @@ export IPERF3_PASSWORD="$PASSWORD"
|
||||||
# Run iperf3 command with optional arguments
|
# Run iperf3 command with optional arguments
|
||||||
for ((i = 1; i <= RETRY; i++)); do
|
for ((i = 1; i <= RETRY; i++)); do
|
||||||
if [[ -n "$RSA_PUBLIC_KEY" ]] && [[ -n "$USERNAME" ]]; then
|
if [[ -n "$RSA_PUBLIC_KEY" ]] && [[ -n "$USERNAME" ]]; then
|
||||||
OUTPUT=$(iperf3 -c "$SERVER" -i 1 -t 30 -f m --rsa-public-key-path "$RSA_PUBLIC_KEY" --username "$USERNAME" 2>&1)
|
OUTPUT=$(iperf3 -c "$SERVER" -i 1 -t 30 -f m --rsa-public-key-path "$RSA_PUBLIC_KEY" --username "$USERNAME" --use-pkcs1-padding 2>&1)
|
||||||
else
|
else
|
||||||
OUTPUT=$(iperf3 -c "$SERVER" -i 1 -t 10 -f m 2>&1)
|
OUTPUT=$(iperf3 -c "$SERVER" -i 1 -t 10 -f m 2>&1)
|
||||||
fi
|
fi
|
||||||
|
|
Loading…
Reference in New Issue