Home
last modified time | relevance | path

Searched refs:hexify (Results 1 – 10 of 10) sorted by relevance

/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/example/
Decho_client.py329 util.hexify(original_key))
431 accept, util.hexify(binary_accept))
439 expected_accept, util.hexify(binary_expected_accept))
555 'Key3: %r (%s)', self._key3, util.hexify(self._key3))
639 'Challenge: %r (%s)', challenge, util.hexify(challenge))
646 expected, util.hexify(expected))
652 'Actual challenge response: %r (%s)', reply, util.hexify(reply))
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/test/
Dclient_for_testing.py325 'Sec-WebSocket-Key: %s (%s)', key, util.hexify(original_key))
408 accept, util.hexify(decoded_accept))
416 util.hexify(original_expected_accept))
540 'Key3: %r (%s)', self._key3, util.hexify(self._key3))
633 'Challenge: %r (%s)', challenge, util.hexify(challenge))
640 expected, util.hexify(expected))
646 'Actual challenge response: %r (%s)', reply, util.hexify(reply))
Dtest_util.py80 util.hexify('azAZ09 \t\r\n\x00\xff'))
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/handshake/
Dhybi00.py161 util.hexify(self._request.ws_challenge))
165 util.hexify(self._request.ws_challenge_md5))
Dhybi.py168 util.hexify(accept_binary))
366 util.hexify(decoded_key))
/external/valgrind/main/coregrind/m_gdbserver/
Dvalgrind-low.c51 hexify (buf, rev, count); in heximage()
53 hexify (buf, bin, count); in heximage()
Dserver.h325 int hexify (char *hex, const char *bin, int count);
Dremote-utils.c528 int hexify (char *hex, const char *bin, int count) in hexify() function
754 hexify(buf+1, s, len); in monitor_output()
Dserver.c477 hexify (arg_own_buf, status, strlen(status)); in handle_query()
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/
Dutil.py144 def hexify(s): function