Lines Matching refs:ack

454 			       struct i2400m_bootrom_header *ack,  in __i2400m_bm_ack_verify()  argument
461 i2400m, opcode, ack, ack_size); in __i2400m_bm_ack_verify()
462 if (ack_size < sizeof(*ack)) { in __i2400m_bm_ack_verify()
466 opcode, ack_size, sizeof(*ack)); in __i2400m_bm_ack_verify()
469 result = i2400m_is_boot_barker(i2400m, ack, ack_size); in __i2400m_bm_ack_verify()
476 && memcmp(ack, i2400m_ACK_BARKER, sizeof(*ack)) == 0) { in __i2400m_bm_ack_verify()
485 ack->data_size = le32_to_cpu(ack->data_size); in __i2400m_bm_ack_verify()
486 ack->target_addr = le32_to_cpu(ack->target_addr); in __i2400m_bm_ack_verify()
487 ack->block_checksum = le32_to_cpu(ack->block_checksum); in __i2400m_bm_ack_verify()
490 opcode, i2400m_brh_get_opcode(ack), in __i2400m_bm_ack_verify()
491 i2400m_brh_get_response(ack), in __i2400m_bm_ack_verify()
492 i2400m_brh_get_use_checksum(ack), in __i2400m_bm_ack_verify()
493 i2400m_brh_get_response_required(ack), in __i2400m_bm_ack_verify()
494 i2400m_brh_get_direct_access(ack)); in __i2400m_bm_ack_verify()
496 if (i2400m_brh_get_signature(ack) != 0xcbbc) { in __i2400m_bm_ack_verify()
498 "0x%04x\n", opcode, i2400m_brh_get_signature(ack)); in __i2400m_bm_ack_verify()
501 if (opcode != -1 && opcode != i2400m_brh_get_opcode(ack)) { in __i2400m_bm_ack_verify()
504 opcode, i2400m_brh_get_opcode(ack), opcode); in __i2400m_bm_ack_verify()
507 if (i2400m_brh_get_response(ack) != 0) { /* failed? */ in __i2400m_bm_ack_verify()
509 opcode, i2400m_brh_get_response(ack)); in __i2400m_bm_ack_verify()
512 if (ack_size < ack->data_size + sizeof(*ack)) { in __i2400m_bm_ack_verify()
516 (size_t) le32_to_cpu(ack->data_size) + sizeof(*ack)); in __i2400m_bm_ack_verify()
532 i2400m, opcode, ack, ack_size, (int) result); in __i2400m_bm_ack_verify()
585 struct i2400m_bootrom_header *ack, size_t ack_size, in i2400m_bm_cmd() argument
593 i2400m, cmd, cmd_size, ack, ack_size); in i2400m_bm_cmd()
594 BUG_ON(ack_size < sizeof(*ack)); in i2400m_bm_cmd()
611 result = i2400m->bus_bm_wait_for_ack(i2400m, ack, ack_size); in i2400m_bm_cmd()
620 result = __i2400m_bm_ack_verify(i2400m, opcode, ack, ack_size, flags); in i2400m_bm_cmd()
631 i2400m, cmd, cmd_size, ack, ack_size, (int) result); in i2400m_bm_cmd()
657 struct i2400m_bootrom_header ack; in i2400m_download_chunk() local
672 &ack, sizeof(ack), 0); in i2400m_download_chunk()
711 struct i2400m_bootrom_header ack; in i2400m_dnload_bcf() local
747 &ack, sizeof(ack), I2400M_BM_CMD_RAW); in i2400m_dnload_bcf()
795 struct i2400m_bootrom_header *cmd, ack; in i2400m_dnload_finalize() local
832 &ack, sizeof(ack), I2400M_BM_CMD_RAW); in i2400m_dnload_finalize()
888 struct i2400m_bootrom_header ack; in i2400m_bootrom_init() local
894 BUILD_BUG_ON(sizeof(ack) != sizeof(i2400m_ACK_BARKER)); in i2400m_bootrom_init()
909 result = i2400m_bm_cmd(i2400m, NULL, 0, &ack, sizeof(ack), in i2400m_bootrom_init()
941 &ack, sizeof(ack), in i2400m_bootrom_init()
962 d_dump(1, dev, &ack, result); in i2400m_bootrom_init()
973 &ack, sizeof(ack), I2400M_BM_CMD_RAW); in i2400m_bootrom_init()
1032 struct i2400m_bootrom_header ack; in i2400m_read_mac_addr() member
1042 &ack_buf.ack, sizeof(ack_buf), 0); in i2400m_read_mac_addr()
1120 struct i2400m_bootrom_header ack; in i2400m_dnload_init_signed() local
1130 &ack, sizeof(ack), 0); in i2400m_dnload_init_signed()