On Wed, 02 Jul 2014, Doug Anderson wrote:
> On Wed, Jul 2, 2014 at 12:23 AM, Lee Jones wrote:
> > On Fri, 27 Jun 2014, Doug Anderson wrote:
> >
> >> We know how many bytes the EC should be sending us (which is also the
> >> number of bytes transferred) and also how many bytes the EC actually
> >>
On Wed, 02 Jul 2014, Doug Anderson wrote:
On Wed, Jul 2, 2014 at 12:23 AM, Lee Jones lee.jo...@linaro.org wrote:
On Fri, 27 Jun 2014, Doug Anderson wrote:
We know how many bytes the EC should be sending us (which is also the
number of bytes transferred) and also how many bytes the EC
Lee,
On Wed, Jul 2, 2014 at 12:23 AM, Lee Jones wrote:
> On Fri, 27 Jun 2014, Doug Anderson wrote:
>
>> We know how many bytes the EC should be sending us (which is also the
>> number of bytes transferred) and also how many bytes the EC actually
>> wanted to send to us. When computing the
On Fri, 27 Jun 2014, Doug Anderson wrote:
> We know how many bytes the EC should be sending us (which is also the
> number of bytes transferred) and also how many bytes the EC actually
> wanted to send to us. When computing the checksum and copying back
> data let's make sure we take the lesser
On Fri, 27 Jun 2014, Doug Anderson wrote:
We know how many bytes the EC should be sending us (which is also the
number of bytes transferred) and also how many bytes the EC actually
wanted to send to us. When computing the checksum and copying back
data let's make sure we take the lesser of
Lee,
On Wed, Jul 2, 2014 at 12:23 AM, Lee Jones lee.jo...@linaro.org wrote:
On Fri, 27 Jun 2014, Doug Anderson wrote:
We know how many bytes the EC should be sending us (which is also the
number of bytes transferred) and also how many bytes the EC actually
wanted to send to us. When
On 27 June 2014 12:56, Doug Anderson wrote:
> We know how many bytes the EC should be sending us (which is also the
> number of bytes transferred) and also how many bytes the EC actually
> wanted to send to us. When computing the checksum and copying back
> data let's make sure we take the
On 27 June 2014 12:56, Doug Anderson diand...@chromium.org wrote:
We know how many bytes the EC should be sending us (which is also the
number of bytes transferred) and also how many bytes the EC actually
wanted to send to us. When computing the checksum and copying back
data let's make sure
We know how many bytes the EC should be sending us (which is also the
number of bytes transferred) and also how many bytes the EC actually
wanted to send to us. When computing the checksum and copying back
data let's make sure we take the lesser of the two of those. We'll
also complain if the EC
We know how many bytes the EC should be sending us (which is also the
number of bytes transferred) and also how many bytes the EC actually
wanted to send to us. When computing the checksum and copying back
data let's make sure we take the lesser of the two of those. We'll
also complain if the EC
10 matches
Mail list logo