Searched refs:oversize (Results 1 – 6 of 6) sorted by relevance
/external/syslinux/core/lwip/src/core/ |
D | tcp_out.c | 217 u16_t *oversize, struct tcp_pcb *pcb, u8_t apiflags, in tcp_pbuf_prealloc() argument 257 *oversize = p->len - length; in tcp_pbuf_prealloc() 360 u16_t oversize = 0; in tcp_write() local 442 oversize = pcb->unsent_oversize; in tcp_write() 443 if (oversize > 0) { in tcp_write() 446 oversize_used = oversize < len ? oversize : len; in tcp_write() 448 oversize -= oversize_used; in tcp_write() 452 LWIP_ASSERT("inconsistend oversize vs. len", (oversize == 0) || (pos == len)); in tcp_write() 471 …if ((concat_p = tcp_pbuf_prealloc(PBUF_RAW, seglen, space, &oversize, pcb, apiflags, 1)) == NULL) { in tcp_write() 478 last_unsent->oversize_left = oversize; in tcp_write() [all …]
|
/external/ltp/testcases/network/stress/ns-tools/ |
D | ns-common.c | 228 u_int32_t bit_change_seed(size_t bitsize, size_t oversize) in bit_change_seed() argument 232 rand_val = rand() / ((RAND_MAX + 1U) / (bitsize + oversize)); in bit_change_seed()
|
D | ns-traffic.h | 230 u_int32_t bit_change_seed(size_t bitsize, size_t oversize);
|
/external/libpcap/ |
D | README.dag | 111 applications may incorrectly report capture errors or oversize packets
|
/external/iputils/ |
D | RELNOTES | 560 is large enough. Fix is to allow oversize by root (it is necessary
|
/external/icu/icu4j/main/shared/data/ |
D | Transliterator_Han_Latin_Definition.txt | 8116 幀太長 < oversize\-frame; 15554 太長 < oversize; 24225 幀太長 > oversize\-frame; 31692 太長 > oversize;
|