Searched refs:hexify (Results 1 – 10 of 10) sorted by relevance
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/example/ |
D | echo_client.py | 329 util.hexify(original_key)) 431 accept, util.hexify(binary_accept)) 439 expected_accept, util.hexify(binary_expected_accept)) 555 'Key3: %r (%s)', self._key3, util.hexify(self._key3)) 639 'Challenge: %r (%s)', challenge, util.hexify(challenge)) 646 expected, util.hexify(expected)) 652 'Actual challenge response: %r (%s)', reply, util.hexify(reply))
|
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/test/ |
D | client_for_testing.py | 325 'Sec-WebSocket-Key: %s (%s)', key, util.hexify(original_key)) 408 accept, util.hexify(decoded_accept)) 416 util.hexify(original_expected_accept)) 540 'Key3: %r (%s)', self._key3, util.hexify(self._key3)) 633 'Challenge: %r (%s)', challenge, util.hexify(challenge)) 640 expected, util.hexify(expected)) 646 'Actual challenge response: %r (%s)', reply, util.hexify(reply))
|
D | test_util.py | 80 util.hexify('azAZ09 \t\r\n\x00\xff'))
|
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/handshake/ |
D | hybi00.py | 161 util.hexify(self._request.ws_challenge)) 165 util.hexify(self._request.ws_challenge_md5))
|
D | hybi.py | 168 util.hexify(accept_binary)) 366 util.hexify(decoded_key))
|
/external/valgrind/main/coregrind/m_gdbserver/ |
D | valgrind-low.c | 51 hexify (buf, rev, count); in heximage() 53 hexify (buf, bin, count); in heximage()
|
D | server.h | 325 int hexify (char *hex, const char *bin, int count);
|
D | remote-utils.c | 528 int hexify (char *hex, const char *bin, int count) in hexify() function 754 hexify(buf+1, s, len); in monitor_output()
|
D | server.c | 477 hexify (arg_own_buf, status, strlen(status)); in handle_query()
|
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/ |
D | util.py | 144 def hexify(s): function
|