fix: Pass repeating_payload option to server (#867)
If client was started with --repeating-payload option, tell the server to use the repeating_payload also. Since repeating_payload is a client specific option at the moment and we don't tell the server if repeating_payload was set not not, server always uses randomized patterns in reverse and bidirectional modes disregarding what patterns the client was told to generate. So, if client was started with both --repeating-payload and --reverse, the server would still send the randomized data to the client which doesn't seem right. This commit fixes this issue. Signed-off-by: Sergey Nemov <sergey.nemov@intel.com>
Этот коммит содержится в:
родитель
99fa7cbeec
Коммит
e9e984de2b
@ -1670,6 +1670,8 @@ send_parameters(struct iperf_test *test)
|
||||
cJSON_AddNumberToObject(j, "get_server_output", iperf_get_test_get_server_output(test));
|
||||
if (test->udp_counters_64bit)
|
||||
cJSON_AddNumberToObject(j, "udp_counters_64bit", iperf_get_test_udp_counters_64bit(test));
|
||||
if (test->repeating_payload)
|
||||
cJSON_AddNumberToObject(j, "repeating_payload", test->repeating_payload);
|
||||
#if defined(HAVE_SSL)
|
||||
if (test->settings->client_username && test->settings->client_password && test->settings->client_rsa_pubkey){
|
||||
encode_auth_setting(test->settings->client_username, test->settings->client_password, test->settings->client_rsa_pubkey, &test->settings->authtoken);
|
||||
@ -1763,6 +1765,8 @@ get_parameters(struct iperf_test *test)
|
||||
iperf_set_test_get_server_output(test, 1);
|
||||
if ((j_p = cJSON_GetObjectItem(j, "udp_counters_64bit")) != NULL)
|
||||
iperf_set_test_udp_counters_64bit(test, 1);
|
||||
if ((j_p = cJSON_GetObjectItem(j, "repeating_payload")) != NULL)
|
||||
test->repeating_payload = 1;
|
||||
#if defined(HAVE_SSL)
|
||||
if ((j_p = cJSON_GetObjectItem(j, "authtoken")) != NULL)
|
||||
test->settings->authtoken = strdup(j_p->valuestring);
|
||||
|
Загрузка…
Ссылка в новой задаче
Block a user