Lines Matching refs:ack
451 struct i2400m_bootrom_header *ack, in __i2400m_bm_ack_verify() argument
458 i2400m, opcode, ack, ack_size); in __i2400m_bm_ack_verify()
459 if (ack_size < sizeof(*ack)) { in __i2400m_bm_ack_verify()
463 opcode, ack_size, sizeof(*ack)); in __i2400m_bm_ack_verify()
466 result = i2400m_is_boot_barker(i2400m, ack, ack_size); in __i2400m_bm_ack_verify()
473 && memcmp(ack, i2400m_ACK_BARKER, sizeof(*ack)) == 0) { in __i2400m_bm_ack_verify()
482 ack->data_size = le32_to_cpu(ack->data_size); in __i2400m_bm_ack_verify()
483 ack->target_addr = le32_to_cpu(ack->target_addr); in __i2400m_bm_ack_verify()
484 ack->block_checksum = le32_to_cpu(ack->block_checksum); in __i2400m_bm_ack_verify()
487 opcode, i2400m_brh_get_opcode(ack), in __i2400m_bm_ack_verify()
488 i2400m_brh_get_response(ack), in __i2400m_bm_ack_verify()
489 i2400m_brh_get_use_checksum(ack), in __i2400m_bm_ack_verify()
490 i2400m_brh_get_response_required(ack), in __i2400m_bm_ack_verify()
491 i2400m_brh_get_direct_access(ack)); in __i2400m_bm_ack_verify()
493 if (i2400m_brh_get_signature(ack) != 0xcbbc) { in __i2400m_bm_ack_verify()
495 "0x%04x\n", opcode, i2400m_brh_get_signature(ack)); in __i2400m_bm_ack_verify()
498 if (opcode != -1 && opcode != i2400m_brh_get_opcode(ack)) { in __i2400m_bm_ack_verify()
501 opcode, i2400m_brh_get_opcode(ack), opcode); in __i2400m_bm_ack_verify()
504 if (i2400m_brh_get_response(ack) != 0) { /* failed? */ in __i2400m_bm_ack_verify()
506 opcode, i2400m_brh_get_response(ack)); in __i2400m_bm_ack_verify()
509 if (ack_size < ack->data_size + sizeof(*ack)) { in __i2400m_bm_ack_verify()
513 (size_t) le32_to_cpu(ack->data_size) + sizeof(*ack)); in __i2400m_bm_ack_verify()
529 i2400m, opcode, ack, ack_size, (int) result); in __i2400m_bm_ack_verify()
582 struct i2400m_bootrom_header *ack, size_t ack_size, in i2400m_bm_cmd() argument
590 i2400m, cmd, cmd_size, ack, ack_size); in i2400m_bm_cmd()
591 BUG_ON(ack_size < sizeof(*ack)); in i2400m_bm_cmd()
608 result = i2400m->bus_bm_wait_for_ack(i2400m, ack, ack_size); in i2400m_bm_cmd()
617 result = __i2400m_bm_ack_verify(i2400m, opcode, ack, ack_size, flags); in i2400m_bm_cmd()
628 i2400m, cmd, cmd_size, ack, ack_size, (int) result); in i2400m_bm_cmd()
654 struct i2400m_bootrom_header ack; in i2400m_download_chunk() local
669 &ack, sizeof(ack), 0); in i2400m_download_chunk()
708 struct i2400m_bootrom_header ack; in i2400m_dnload_bcf() local
744 &ack, sizeof(ack), I2400M_BM_CMD_RAW); in i2400m_dnload_bcf()
792 struct i2400m_bootrom_header *cmd, ack; in i2400m_dnload_finalize() local
829 &ack, sizeof(ack), I2400M_BM_CMD_RAW); in i2400m_dnload_finalize()
885 struct i2400m_bootrom_header ack; in i2400m_bootrom_init() local
891 BUILD_BUG_ON(sizeof(ack) != sizeof(i2400m_ACK_BARKER)); in i2400m_bootrom_init()
906 result = i2400m_bm_cmd(i2400m, NULL, 0, &ack, sizeof(ack), in i2400m_bootrom_init()
938 &ack, sizeof(ack), in i2400m_bootrom_init()
959 d_dump(1, dev, &ack, result); in i2400m_bootrom_init()
970 &ack, sizeof(ack), I2400M_BM_CMD_RAW); in i2400m_bootrom_init()
1029 struct i2400m_bootrom_header ack; in i2400m_read_mac_addr() member
1039 &ack_buf.ack, sizeof(ack_buf), 0); in i2400m_read_mac_addr()
1117 struct i2400m_bootrom_header ack; in i2400m_dnload_init_signed() local
1127 &ack, sizeof(ack), 0); in i2400m_dnload_init_signed()