if len(payload) * 2 != len(masked_expected_data):
return False
- # iterate over pairs: raw byte from payload and ASCII code for that byte
- # from masked payload (or XX if masked)
+ # iterate over pairs: raw byte from payload and ASCII code for that
+ # byte from masked payload (or XX if masked)
for i in range(len(payload)):
p = payload[i]
m = masked_expected_data[2 * i:2 * i + 2]
# Flush the ipfix collector, so we don't need any
# asinine time.sleep(5) action
- self.vapi.cli("ipfix flush") # FIXME this should be an API call
+ self.vapi.cli("ipfix flush")
# Make sure the 4 pkts we expect actually showed up
self.verify_ipfix(self.pg2)