Searched refs:response (Results 1 - 25 of 65) sorted by relevance

123

/netgear-R7800-V1.0.2.28/target/linux/at91/image/dfboot/src/
H A Dmci_device.c51 // wait for CMDRDY Status flag to read the response
59 // Test error ==> if crc error and response R3 ==> don't check error
63 // if the command is SEND_OP_COND the CRC error flag is always present (cf : R3 response)
91 // wait for CMDRDY Status flag to read the response
329 int AT91F_MCI_GetCSD (AT91PS_MciDevice pMCI_Device, unsigned int relative_card_address , unsigned int * response) argument
337 response[0] = AT91C_BASE_MCI->MCI_RSPR[0];
338 response[1] = AT91C_BASE_MCI->MCI_RSPR[1];
339 response[2] = AT91C_BASE_MCI->MCI_RSPR[2];
340 response[3] = AT91C_BASE_MCI->MCI_RSPR[3];
361 unsigned int response local
384 AT91F_MCI_MMC_GetAllCID(AT91PS_MciDevice pMCI_Device, unsigned int *response) argument
483 unsigned int response =0x0; local
506 AT91F_MCI_SDCard_GetCID(AT91PS_MciDevice pMCI_Device, unsigned int *response) argument
[all...]
/netgear-R7800-V1.0.2.28/package/simulated-driver/src/
H A Dsfe_drv.c63 * message type of queued response message
71 * queued response message,
96 struct list_head msg_queue; /* response message queue*/
99 struct work_struct work; /* work to send response message back to caller*/
192 * send all pending response message to ECM by calling callback function included in message
199 struct sfe_drv_response_msg *response; local
202 while ((response = list_first_entry_or_null(&sfe_drv_ctx->msg_queue, struct sfe_drv_response_msg, node))) {
203 list_del(&response->node);
207 * send response message back to caller
209 if (response
244 struct sfe_drv_response_msg *response; local
281 sfe_drv_enqueue_msg(struct sfe_drv_ctx_instance_internal *sfe_drv_ctx, struct sfe_drv_response_msg *response) argument
418 struct sfe_drv_response_msg *response; local
572 struct sfe_drv_response_msg *response; local
796 struct sfe_drv_response_msg *response; local
947 struct sfe_drv_response_msg *response; local
[all...]
/netgear-R7800-V1.0.2.28/scripts/flashing/
H A Dadam2flash.pl90 shift->command("USER",@_)->response()
98 while(length($ok = $ftp->response()) < 1) {
117 shift->command("REBOOT")->response() == Net::FTP::CMD_OK
143 $ftp->command("MEDIA FLSH")->response();
H A Dadsl2mue_flash.pl91 shift->command("USER",@_)->response()
99 while(length($ok = $ftp->response()) < 1) {
118 shift->command("REBOOT")->response() == Net::FTP::CMD_OK
152 $ftp->command("MEDIA FLSH")->response();
H A Dadam2flash-502T.pl154 shift->command("USER",@_)->response()
162 while(length($ok = $ftp->response()) < 1) {
181 shift->command("REBOOT")->response() == Net::FTP::CMD_OK
279 ($ftp->command("SETENV","mtd1,$expectedmtd1")->response() == Net::FTP::CMD_OK) or die "can't set mtd1";
308 ($ftp->command("MEDIA FLSH")->response() == Net::FTP::CMD_OK) or die "can't set MEDIA FLSH";
H A Dadam2flash-fritzbox.pl102 sub _USER { shift->command("USER",@_)->response() }
103 sub _PASV { shift->command("P\@SW")->response() == Net::FTP::CMD_OK }
109 while(length($ok = $ftp->response()) < 1) {
125 sub _REBOOT { shift->command("REBOOT")->response() == Net::FTP::CMD_OK }
178 $ftp->command("MEDIA FLSH")->response();
/netgear-R7800-V1.0.2.28/package/qca-nss-drv/src/
H A Dnss_lso_rx.c72 if (ncm->response != NSS_CMN_RESPONSE_ACK) {
74 * Check response
76 nss_info("%p: Received response %d for type %d, interface %d", nss_ctx, ncm->response, ncm->type, ncm->interface);
H A Dnss_dynamic_interface.c36 * Is this a valid request/response packet?
58 if (ncm->response == NSS_CMN_RESPONSE_ACK) {
59 nss_info("%p alloc_node response ack if_num %d\n", nss_ctx, ndim->msg.alloc_node.if_num);
72 if (ncm->response == NSS_CMN_RESPONSE_ACK) {
73 nss_info("%p dealloc_node response ack if_num %d\n", nss_ctx, ndim->msg.dealloc_node.if_num);
82 nss_warning("%p: Received response %d for type %d, interface %d",
83 nss_ctx, ncm->response, ncm->type, ncm->interface);
104 * Callback to handle the message response from NSS FW.
111 di.response = ncm->response;
[all...]
H A Dnss_eth_rx.c67 * Is this a valid request/response packet?
80 if (ncm->response != NSS_CMN_RESPONSE_ACK) {
82 * Check response
84 nss_info("%p: Received response %d for type %d, interface %d",
85 nss_ctx, ncm->response, ncm->type, ncm->interface);
H A Dnss_n2h.c127 * Is this a valid request/response packet?
144 nss_info("%p: empty pool buf cfg response from FW", nss_ctx);
148 nss_info("%p: flush payloads cmd response from FW", nss_ctx);
156 if (ncm->response != NSS_CMN_RESPONSE_ACK) {
158 * Check response
160 nss_info("%p: Received response %d for type %d, interface %d",
161 nss_ctx, ncm->response, ncm->type, ncm->interface);
169 if (nnm->cm.response == NSS_CMM_RESPONSE_NOTIFY) {
172 * back and app data when response is NSS_CMM_RESPONSE_NOTIFY
199 if (nnm->cm.response !
[all...]
H A Dnss_wifi_if.c113 if (nwim->cm.response == NSS_CMM_RESPONSE_NOTIFY) {
169 if (ncm->response != NSS_CMN_RESPONSE_ACK) {
170 nss_warning("%p: wifi_if Error response %d\n",
171 handle->nss_ctx, ncm->response);
172 nwip->response = NSS_TX_FAILURE;
177 nwip->response = NSS_TX_SUCCESS;
261 nwip->response = NSS_TX_FAILURE;
264 status = nwip->response;
H A Dnss_ipv4.c176 if (nim->cm.response == NSS_CMM_RESPONSE_NOTIFY) {
385 if (nim->cm.response != NSS_CMN_RESPONSE_ACK) {
391 i4cfgp.response = NSS_FAILURE;
401 i4cfgp.response = NSS_SUCCESS;
456 if (NSS_FAILURE == i4cfgp.response) {
478 if (nim->cm.response != NSS_CMN_RESPONSE_ACK) {
H A Dnss_ipv6.c132 * Is this a valid request/response packet?
179 if (nim->cm.response == NSS_CMM_RESPONSE_NOTIFY) {
388 if (nim->cm.response != NSS_CMN_RESPONSE_ACK) {
393 i6cfgp.response = NSS_FAILURE;
403 i6cfgp.response = NSS_SUCCESS;
456 if (NSS_FAILURE == i6cfgp.response) {
478 if (nim->cm.response != NSS_CMN_RESPONSE_ACK) {
H A Dnss_phys_if.c32 int response; member in struct:nss_phys_if_pvt
153 nss_warning("%p: response for another interface: %d", nss_ctx, ncm->interface);
191 if (ncm->response == NSS_CMM_RESPONSE_NOTIFY) {
216 if(nim->cm.response != NSS_CMN_RESPONSE_ACK) {
217 nss_warning("phys_if Error response %d\n", nim->cm.response);
218 phif.response = NSS_TX_FAILURE;
223 phif.response = NSS_TX_SUCCESS;
373 * Send a message to physical interface & wait for the response.
395 phif.response
[all...]
H A Dnss_profiler.c59 if (ncm->response != NSS_CMM_RESPONSE_NOTIFY && ncm->cb) {
60 nss_info("%p: reply CB %x for %d %d\n", nss_ctx, ncm->cb, ncm->type, ncm->response);
H A Dnss_tx_rx_offload.c143 * Is this a valid request/response packet?
160 if (ncm->response != NSS_CMN_RESPONSE_ACK) {
162 * Check response
164 nss_info("%p: Received response %d for type %d, interface %d",
165 nss_ctx, ncm->response, ncm->type, ncm->interface);
H A Dnss_crypto.c110 if (ncm->response == NSS_CMN_RESPONSE_LAST) {
111 nss_crypto_warning("%p: rx message response for if %d, type %d, is invalid: %d", nss_ctx, ncm->interface,
112 ncm->type, ncm->response);
116 if (ncm->response == NSS_CMM_RESPONSE_NOTIFY) {
H A Dnss_tx_rx_virt_if.c90 nss_warning("%p: response for another interface: %d", nss_ctx, ncm->interface);
121 if (ncm->response == NSS_CMM_RESPONSE_NOTIFY) {
149 if (ncm->response != NSS_CMN_RESPONSE_ACK) {
150 nss_warning("%p: redir_if Error response %d\n", handle->nss_ctx, ncm->response);
151 nvip->response = NSS_TX_FAILURE;
156 nvip->response = NSS_TX_SUCCESS;
506 nrip->response = NSS_TX_FAILURE;
509 status = nrip->response;
/netgear-R7800-V1.0.2.28/target/linux/s3c24xx/files-2.6.30/drivers/ar6000/ar6000/
H A Dar6000_raw_if.c112 HTC_SERVICE_CONNECT_RESP response; local
137 A_MEMZERO(&response,sizeof(response));
143 &response);
146 if (response.ConnectRespCode == HTC_SERVICE_NO_MORE_EP) {
154 arSetRawStream2EndpointIDMap(ar,StreamID,response.Endpoint);
/netgear-R7800-V1.0.2.28/package/qca-nss-drv/src/exports/
H A Dnss_cmn.h80 * Common response structure
102 enum nss_cmn_response response; /**< Primary response */ member in struct:nss_cmn_msg
103 uint32_t type; /**< Decetralized request #, to be used to match response # */
104 uint32_t error; /**< Decentralized specific error message, response == EMSG */
H A Dnss_dynamic_interface.h92 enum nss_cmn_response response; /* Message response */ member in struct:nss_dynamic_interface_pvt
H A Dnss_capwapmgr.h37 * Keep a NSS FW response table to wakeup sync message caller.
43 enum nss_cmn_response response; member in struct:nss_capwapmgr_response
H A Dnss_virt_if.h113 int response; member in struct:nss_virt_if_pvt
138 * @param cb callback to be invoked when the response from the FW is received
158 * @param cb callback to be invoked when the response from the FW is received
H A Dnss_wifi_if.h105 int response; /**< Response received on a wifi if_num */ member in struct:nss_wifi_if_pvt
/netgear-R7800-V1.0.2.28/package/qca-nss-crypto/src/src/
H A Dnss_crypto_if.c301 if (nim->cm.response != NSS_CMN_RESPONSE_ACK) {
303 nim->cm.response, nim->cm.error);
314 if (nim->cm.response != NSS_CMN_RESPONSE_ACK) {
316 nim->cm.response, nim->cm.error);

Completed in 92 milliseconds

123