1 This Notice.txt file contains certain notices of software components included with the software that Qualcomm Atheros, Inc. ("Qualcomm Atheros") is required to provide you. Except where prohibited by the open source license, the content of this notices file is only provided to satisfy Qualcomm Atheros's attribution and notice requirement; your use of these software components together with the Qualcomm Atheros software (Qualcomm Atheros software hereinafter referred to as "Software") is subject to the terms of your agreement from Qualcomm Atheros. Compliance with all copyright laws and software license agreements included in the notice section of this file are the responsibility of the user. Except as may be granted by separate express written agreement, this file provides no license to any patents, trademarks, copyrights, or other intellectual property of Qualcomm Incorporated or any of its subsidiaries.
2
3 Qualcomm is a trademark of Qualcomm Incorporated, registered in the United States and other countries. All Qualcomm Incorporated trademarks are used with permission. Other products and brand names may be trademarks or registered trademarks of their respective owners.
4
5 --------------------
6
7 /*
8 * WPA definitions shared between hostapd and wpa_supplicant
9 * Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi>
10 *
11 * This software may be distributed under the terms of the BSD license.
12 * See README for more details.
13 */
14
15 --------------------
16
17 /* WPA/RSN - Shared functions for supplicant and authenticator
18 * EAP common peer/server definitions
19 * EAP peer state machines (RFC 4137)
20 * Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi>
21 *
22 * This software may be distributed under the terms of the BSD license.
23 * See README for more details.
24 */
25
26 --------------------
27
28 /*
29 * Copyright (c) 2011 Qualcomm Atheros, Inc.
30 * All Rights Reserved.
31 * Qualcomm Atheros Confidential and Proprietary.
32 * Notifications and licenses are retained for attribution purposes only.
33 */
34 /*
35 * For this file, which was received with alternative licensing options for
36 * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
37 */
38
39 /*
40 * AES-based functions
41 *
42 *
43 * - AES Key Wrap Algorithm (128-bit KEK) (RFC3394)
44 * - One-Key CBC MAC (OMAC1) hash with AES-128
45 * - AES-128 CTR mode encryption
46 * - AES-128 EAX mode encryption/decryption
47 * - AES-128 CBC
48 *
49 * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
50 *
51 * This program is free software; you can redistribute it and/or modify
52 * it under the terms of the GNU General Public License version 2 as
53 * published by the Free Software Foundation.
54 *
55 * Alternatively, this software may be distributed under the terms of BSD
56 * license.
57 *
58 * See README and COPYING for more details.
59 */
60
61 --------------------
62
63 /*
64 * Copyright (c) 2011 Qualcomm Atheros, Inc.
65 * All Rights Reserved.
66 * Qualcomm Atheros Confidential and Proprietary.
67 * Notifications and licenses are retained for attribution purposes only.
68 */
69 /*
70 * For this file, which was received with alternative licensing options for
71 * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
72 */
73
74 /*
75 * SHA1 hash implementation and interface functions
76 * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
77 *
78 * This program is free software; you can redistribute it and/or modify
79 * it under the terms of the GNU General Public License version 2 as
80 * published by the Free Software Foundation.
81 *
82 * Alternatively, this software may be distributed under the terms of BSD
83 * license.
84 *
85 * See README and COPYING for more details.
86 */
87
88 --------------------
89
90 /*
91 * Copyright (c) 2011 Qualcomm Atheros, Inc.
92 * All Rights Reserved.
93 * Qualcomm Atheros Confidential and Proprietary.
94 * Notifications and licenses are retained for attribution purposes only.
95 */
96 /*
97 * For this file, which was received with alternative licensing options for
98 * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
99 */
100
101 /*
102 * WPA Supplicant / wrapper functions for crypto libraries
103 * Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
104 *
105 * This program is free software; you can redistribute it and/or modify
106 * it under the terms of the GNU General Public License version 2 as
107 * published by the Free Software Foundation.
108 *
109 * Alternatively, this software may be distributed under the terms of BSD
110 * license.
111 *
112 * See README and COPYING for more details.
113 *
114 * This file defines the cryptographic functions that need to be implemented
115 * for wpa_supplicant and hostapd. When TLS is not used, internal
116 * implementation of MD5, SHA1, and AES is used and no external libraries are
117 * required. When TLS is enabled (e.g., by enabling EAP-TLS or EAP-PEAP), the
118 * crypto library used by the TLS implementation is expected to be used for
119 * non-TLS needs, too, in order to save space by not implementing these
120 * functions twice.
121 *
122 * Wrapper code for using each crypto library is in its own file (crypto*.c)
123 * and one of these files is build and linked in to provide the functions
124 * defined here.
125 */
126
127 --------------------
128
129 /*
130 * For this file, which was received with alternative licensing options for
131 * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
132 */
133
134 /*
135 * WPA Supplicant - Common definitions
136 * Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
137 *
138 * This program is free software; you can redistribute it and/or modify
139 * it under the terms of the GNU General Public License version 2 as
140 * published by the Free Software Foundation.
141 *
142 * Alternatively, this software may be distributed under the terms of BSD
143 * license.
144 *
145 * See README and COPYING for more details.
146 */
147
148 --------------------
149
150 /*
151 * For this file, which was received with alternative licensing options for
152 * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
153 */
154
155 /*
156 * WPA Supplicant - WPA state machine and EAPOL-Key processing
157 * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
158 *
159 * This program is free software; you can redistribute it and/or modify
160 * it under the terms of the GNU General Public License version 2 as
161 * published by the Free Software Foundation.
162 *
163 * Alternatively, this software may be distributed under the terms of BSD
164 * license.
165 *
166 * See README and COPYING for more details.
167 */
168
169 --------------------
170
171 /*
172 * For this file, which was received with alternative licensing options for
173 * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
174 */
175
176 /*
177 * WPA Supplicant / Configuration file structures
178 * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
179 *
180 * This program is free software; you can redistribute it and/or modify
181 * it under the terms of the GNU General Public License version 2 as
182 * published by the Free Software Foundation.
183 *
184 * Alternatively, this software may be distributed under the terms of BSD
185 * license.
186 *
187 * See README and COPYING for more details.
188 */
189
190 --------------------
191
192 /*
193 * Copyright (c) 2008, Atheros Communications Inc.
194 *
195 * Copyright (c) 2011 Qualcomm Atheros, Inc.
196 * Qualcomm Atheros, Inc. has chosen to take madwifi subject to the BSD license and terms.
197 *
198 */
199
200 --------------------
201
202 /*
203 * For this file, which was received with alternative licensing options for
204 * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
205 */
206
207 /*
208 * wpa_supplicant - Internal WPA state machine definitions
209 * Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
210 *
211 * This program is free software; you can redistribute it and/or modify
212 * it under the terms of the GNU General Public License version 2 as
213 * published by the Free Software Foundation.
214 *
215 * Alternatively, this software may be distributed under the terms of BSD
216 * license.
217 *
218 * See README and COPYING for more details.
219 */
220
221 --------------------
222
223 /*
224 * For this file, which was received with alternative licensing options for
225 * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
226 */
227
228 /*
229 * wpa_supplicant - WPA definitions
230 * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
231 *
232 * This program is free software; you can redistribute it and/or modify
233 * it under the terms of the GNU General Public License version 2 as
234 * published by the Free Software Foundation.
235 *
236 * Alternatively, this software may be distributed under the terms of BSD
237 * license.
238 *
239 * See README and COPYING for more details.
240 */
241
242 --------------------
243
244 /*
245 * For this file, which was received with alternative licensing options for
246 * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
247 */
248
249 /*
250 * wpa_supplicant/hostapd / common helper functions, etc.
251 * Copyright (c) 2002-2005, Jouni Malinen <jkmaline@cc.hut.fi>
252 *
253 * This program is free software; you can redistribute it and/or modify
254 * it under the terms of the GNU General Public License version 2 as
255 * published by the Free Software Foundation.
256 *
257 * Alternatively, this software may be distributed under the terms of BSD
258 * license.
259 *
260 * See README and COPYING for more details.
261 */
262
263 --------------------
264
265 * Australian Public Licence B (OZPLB)
266 *
267 * Version 1-0
268 *
269 * Copyright (c) 2004, National ICT Australia
270 * Copyright (c) 2007, Open Kernel Labs, Inc.
271 *
272 * All rights reserved.
273 *
274 * Developed by: Embedded, Real-time and Operating Systems Program (ERTOS)
275 * National ICT Australia
276 * http://www.ertos.nicta.com.au
277 *
278 * Permission is granted by National ICT Australia, free of charge, to
279 * any person obtaining a copy of this software and any associated
280 * documentation files (the "Software") to deal with the Software without
281 * restriction, including (without limitation) the rights to use, copy,
282 * modify, adapt, merge, publish, distribute, communicate to the public,
283 * sublicense, and/or sell, lend or rent out copies of the Software, and
284 * to permit persons to whom the Software is furnished to do so, subject
285 * to the following conditions:
286 *
287 * * Redistributions of source code must retain the above copyright
288 * notice, this list of conditions and the following disclaimers.
289 *
290 * * Redistributions in binary form must reproduce the above
291 * copyright notice, this list of conditions and the following
292 * disclaimers in the documentation and/or other materials provided
293 * with the distribution.
294 *
295 * * Neither the name of National ICT Australia, nor the names of its
296 * contributors, may be used to endorse or promote products derived
297 * from this Software without specific prior written permission.
298 *
299 * EXCEPT AS EXPRESSLY STATED IN THIS LICENCE AND TO THE FULL EXTENT
300 * PERMITTED BY APPLICABLE LAW, THE SOFTWARE IS PROVIDED "AS-IS", AND
301 * NATIONAL ICT AUSTRALIA AND ITS CONTRIBUTORS MAKE NO REPRESENTATIONS,
302 * WARRANTIES OR CONDITIONS OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
303 * BUT NOT LIMITED TO ANY REPRESENTATIONS, WARRANTIES OR CONDITIONS
304 * REGARDING THE CONTENTS OR ACCURACY OF THE SOFTWARE, OR OF TITLE,
305 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT,
306 * THE ABSENCE OF LATENT OR OTHER DEFECTS, OR THE PRESENCE OR ABSENCE OF
307 * ERRORS, WHETHER OR NOT DISCOVERABLE.
308 *
309 * TO THE FULL EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL
310 * NATIONAL ICT AUSTRALIA OR ITS CONTRIBUTORS BE LIABLE ON ANY LEGAL
311 * THEORY (INCLUDING, WITHOUT LIMITATION, IN AN ACTION OF CONTRACT,
312 * NEGLIGENCE OR OTHERWISE) FOR ANY CLAIM, LOSS, DAMAGES OR OTHER
313 * LIABILITY, INCLUDING (WITHOUT LIMITATION) LOSS OF PRODUCTION OR
314 * OPERATION TIME, LOSS, DAMAGE OR CORRUPTION OF DATA OR RECORDS; OR LOSS
315 * OF ANTICIPATED SAVINGS, OPPORTUNITY, REVENUE, PROFIT OR GOODWILL, OR
316 * OTHER ECONOMIC LOSS; OR ANY SPECIAL, INCIDENTAL, INDIRECT,
317 * CONSEQUENTIAL, PUNITIVE OR EXEMPLARY DAMAGES, ARISING OUT OF OR IN
318 * CONNECTION WITH THIS LICENCE, THE SOFTWARE OR THE USE OF OR OTHER
319 * DEALINGS WITH THE SOFTWARE, EVEN IF NATIONAL ICT AUSTRALIA OR ITS
320 * CONTRIBUTORS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH CLAIM, LOSS,
321 * DAMAGES OR OTHER LIABILITY.
322 *
323 * If applicable legislation implies representations, warranties, or
324 * conditions, or imposes obligations or liability on National ICT
325 * Australia or one of its contributors in respect of the Software that
326 * cannot be wholly or partly excluded, restricted or modified, the
327 * liability of National ICT Australia or the contributor is limited, to
328 * the full extent permitted by the applicable legislation, at its
329 * option, to:
330 * a. in the case of goods, any one or more of the following:
331 * i. the replacement of the goods or the supply of equivalent goods;
332 * ii. the repair of the goods;
333 * iii. the payment of the cost of replacing the goods or of acquiring
334 * equivalent goods;
335 * iv. the payment of the cost of having the goods repaired; or
336 * b. in the case of services:
337 * i. the supplying of the services again; or
338 * ii. the payment of the cost of having the services supplied again.
339 *
340 * The construction, validity and performance of this licence is governed
341 * by the laws in force in New South Wales, Australia.
342
343 --------------------
344
345 * Copyright (c) 2002-2004, Karlsruhe University
346 *
347 * Redistribution and use in source and binary forms, with or without
348 * modification, are permitted provided that the following conditions
349 * are met:
350 * 1. Redistributions of source code must retain the above copyright
351 * notice, this list of conditions and the following disclaimer.
352 * 2. Redistributions in binary form must reproduce the above copyright
353 * notice, this list of conditions and the following disclaimer in the
354 * documentation and/or other materials provided with the distribution.
355 *
356 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
357 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
358 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
359 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
360 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
361 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
362 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
363 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
364 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
365 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
366 * SUCH DAMAGE.
367
368 --------------------
369
370 /*
371 * COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or
372 * code or tables extracted from it, as desired without restriction.
373 *
374 * First, the polynomial itself and its table of feedback terms. The
375 * polynomial is
376 * X^32+X^26+X^23+X^22+X^16+X^12+X^11+X^10+X^8+X^7+X^5+X^4+X^2+X^1+X^0
377 *
378 * Note that we take it "backwards" and put the highest-order term in
379 * the lowest-order bit. The X^32 term is "implied"; the LSB is the
380 * X^31 term, etc. The X^0 term (usually shown as "+1") results in
381 * the MSB being 1
382 *
383 * Note that the usual hardware shift register implementation, which
384 * is what we're using (we're merely optimizing it by doing eight-bit
385 * chunks at a time) shifts bits into the lowest-order term. In our
386 * implementation, that means shifting towards the right. Why do we
387 * do it this way? Because the calculated CRC must be transmitted in
388 * order from highest-order term to lowest-order term. UARTs transmit
389 * characters in order from LSB to MSB. By storing the CRC this way
390 * we hand it to the UART in the order low-byte to high-byte; the UART
391 * sends each low-bit to hight-bit; and the result is transmission bit
392 * by bit from highest- to lowest-order term without requiring any bit
393 * shuffling on our part. Reception works similarly
394 *
395 * The feedback terms table consists of 256, 32-bit entries. Notes
396 *
397 * The table can be generated at runtime if desired; code to do so
398 * is shown later. It might not be obvious, but the feedback
399 * terms simply represent the results of eight shift/xor opera
400 * tions for all combinations of data and CRC register values
401 *
402 * The values must be right-shifted by eight bits by the "updcrc
403 * logic; the shift must be unsigned (bring in zeroes). On some
404 * hardware you could probably optimize the shift in assembler by
405 * using byte-swap instructions
406 * polynomial $edb88320
407 *
408 *
409 * CRC32 code derived from work by Gary S. Brown.
410 */
411
412 --------------------
413
414 * AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/
415 *
416 * Copyright (c) 2000-2001, Aaron D. Gifford
417 * All rights reserved.
418 *
419 * Redistribution and use in source and binary forms, with or without
420 * modification, are permitted provided that the following conditions
421 * are met:
422 * 1. Redistributions of source code must retain the above copyright
423 * notice, this list of conditions and the following disclaimer.
424 * 2. Redistributions in binary form must reproduce the above copyright
425 * notice, this list of conditions and the following disclaimer in the
426 * documentation and/or other materials provided with the distribution.
427 * 3. Neither the name of the copyright holder nor the names of contributors
428 * may be used to endorse or promote products derived from this software
429 * without specific prior written permission.
430 *
431 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
432 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
433 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
434 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
435 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
436 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
437 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
438 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
439 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
440 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
441 * SUCH DAMAGE.
442
443 --------------------
444
445 * Copyright (c) 1988, 1993
446 * The Regents of the University of California. All rights reserved.
447 *
448 * Redistribution and use in source and binary forms, with or without
449 * modification, are permitted provided that the following conditions
450 * are met:
451 * 1. Redistributions of source code must retain the above copyright
452 * notice, this list of conditions and the following disclaimer.
453 * 2. Redistributions in binary form must reproduce the above copyright
454 * notice, this list of conditions and the following disclaimer in the
455 * documentation and/or other materials provided with the distribution.
456 * 3. All advertising materials mentioning features or use of this software
457 * must display the following acknowledgement:
458 * This product includes software developed by the University of
459 * California, Berkeley and its contributors.
460 * 4. Neither the name of the University nor the names of its contributors
461 * may be used to endorse or promote products derived from this software
462 * without specific prior written permission.
463 *
464 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
465 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
466 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
467 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
468 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
469 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
470 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
471 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
472 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
473 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
474 * SUCH DAMAGE.
475
476 --------------------
477
478 * Copyright (c) 1982, 1986, 1990, 1991, 1993 The Regents of the University of California.
479 * All rights reserved.
480 *
481 * Redistribution and use in source and binary forms, with or without
482 * modification, are permitted provided that the following conditions
483 * are met:
484 * 1. Redistributions of source code must retain the above copyright
485 * notice, this list of conditions and the following disclaimer.
486 * 2. Redistributions in binary form must reproduce the above copyright
487 * notice, this list of conditions and the following disclaimer in the
488 * documentation and/or other materials provided with the distribution.
489 * 3. Neither the name of the University nor the names of its contributors
490 * may be used to endorse or promote products derived from this software
491 * without specific prior written permission.
492 *
493 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
494 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
495 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
496 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
497 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
498 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
499 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
500 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
501 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
502 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
503 * SUCH DAMAGE.
504
505 --------------------
506
507 # Copyright (c) 2012-2015 Qualcomm Atheros, Inc.
508 #
509 # Permission to use, copy, modify, and/or distribute this software for any
510 # purpose with or without fee is hereby granted, provided that the above
511 # copyright notice and this permission notice appear in all copies.
512 #
513 # THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
514 # WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
515 # MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
516 # ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
517 # WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
518 # ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
519 # OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
520
521 --------------------
522
523 * Copyright (c) 1988, 1993
524 * The Regents of the University of California. All rights reserved.
525 *
526 * Redistribution and use in source and binary forms, with or without
527 * modification, are permitted provided that the following conditions
528 * are met:
529 * 1. Redistributions of source code must retain the above copyright
530 * notice, this list of conditions and the following disclaimer.
531 * 2. Redistributions in binary form must reproduce the above copyright
532 * notice, this list of conditions and the following disclaimer in the
533 * documentation and/or other materials provided with the distribution.
534 * 3. All advertising materials mentioning features or use of this software
535 * must display the following acknowledgement:
536 * This product includes software developed by the University of
537 * California, Berkeley and its contributors.
538 * 4. Neither the name of the University nor the names of its contributors
539 * may be used to endorse or promote products derived from this software
540 * without specific prior written permission.
541 *
542 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
543 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
544 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
545 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
546 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
547 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
548 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
549 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
550 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
551 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
552 * SUCH DAMAGE.
553
554 --------------------
555
556 /* $OpenBSD: string.h,v 1.17 2006/01/06 18:53:04 millert Exp $ */
557 /* $NetBSD: string.h,v 1.6 1994/10/26 00:56:30 cgd Exp $ */
558
559 /*-
560 * Copyright (c) 1990 The Regents of the University of California.
561 * All rights reserved.
562 *
563 * Redistribution and use in source and binary forms, with or without
564 * modification, are permitted provided that the following conditions
565 * are met:
566 * 1. Redistributions of source code must retain the above copyright
567 * notice, this list of conditions and the following disclaimer.
568 * 2. Redistributions in binary form must reproduce the above copyright
569 * notice, this list of conditions and the following disclaimer in the
570 * documentation and/or other materials provided with the distribution.
571 * 3. Neither the name of the University nor the names of its contributors
572 * may be used to endorse or promote products derived from this software
573 * without specific prior written permission.
574 *
575 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
576 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
577 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
578 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
579 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
580 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
581 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
582 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
583 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
584 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
585 * SUCH DAMAGE.
586 *
587 * @(#)string.h 5.10 (Berkeley) 3/9/91
588 */
589
590 --------------------
591
592 // Copyright (c) 1991, 1993
593 // The Regents of the University of California. All rights reserved.
594 // $ATH_LICENSE_NULL$
595 //
596 // Redistribution and use in source and binary forms, with or without
597 // modification, are permitted provided that the following conditions
598 // are met:
599 // 1. Redistributions of source code must retain the above copyright
600 // notice, this list of conditions and the following disclaimer.
601 // 2. Redistributions in binary form must reproduce the above copyright
602 // notice, this list of conditions and the following disclaimer in the
603 // documentation and/or other materials provided with the distribution.
604 // 3. All advertising materials mentioning features or use of this software
605 // must display the following acknowledgement:
606 // This product includes software developed by the University of
607 // California, Berkeley and its contributors.
608 // 4. Neither the name of the University nor the names of its contributors
609 // may be used to endorse or promote products derived from this software
610 // without specific prior written permission.
611 //
612 // THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
613 // ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
614 // IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
615 // ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
616 // FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
617 // DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
618 // OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
619 // HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
620 // LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
621 // OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
622 // SUCH DAMAGE.
623
624 --------------------
625
626 * Copyright (c) 1998, 2010 Todd C. Miller <Todd.Miller@courtesan.com>
627 *
628 * Permission to use, copy, modify, and distribute this software for any
629 * purpose with or without fee is hereby granted, provided that the above
630 * copyright notice and this permission notice appear in all copies.
631 *
632 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
633 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
634 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
635 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
636 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
637 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
638 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
639
640 --------------------
641
642 /*
643 * Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com>
644 * All rights reserved.
645 *
646 * Redistribution and use in source and binary forms, with or without
647 * modification, are permitted provided that the following conditions
648 * are met:
649 * 1. Redistributions of source code must retain the above copyright
650 * notice, this list of conditions and the following disclaimer.
651 * 2. Redistributions in binary form must reproduce the above copyright
652 * notice, this list of conditions and the following disclaimer in the
653 * documentation and/or other materials provided with the distribution.
654 * 3. The name of the author may not be used to endorse or promote products
655 * derived from this software without specific prior written permission.
656 *
657 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
658 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
659 * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
660 * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
661 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
662 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
663 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
664 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
665 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
666 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
667 */
668
669 --------------------
670
671 ** Copyright (c) 2004-2010, Atheros Communications Inc.
672 **
673 ** Permission to use, copy, modify, and/or distribute this software for any
674 ** purpose with or without fee is hereby granted, provided that the above
675 ** copyright notice and this permission notice appear in all copies.
676 **
677 ** THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
678 ** WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
679 ** MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
680 ** ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
681 ** WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
682 ** ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
683 ** OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
684 **
685 ** This module is the Atheros specific ioctl/iwconfig/iwpriv interface
686 ** to the ATH object, normally instantiated as wifiX, where X is the
687 ** instance number (e.g. wifi0, wifi1).
688 **
689 ** This provides a mechanism to configure the ATH object within the
690 ** Linux OS enviornment. This file is OS specific.
691
692 --------------------
693
694 /*
695 * Copyright (c) 2012 Qualcomm Atheros, Inc.
696 * All Rights Reserved.
697 * Qualcomm Atheros Confidential and Proprietary.
698 */
699
700 /*
701 * For this file, which was received with alternative licensing options for
702 * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
703 */
704
705 //-
706 // Copyright (c) 2002-2004 Sam Leffler, Errno Consulting
707 // All rights reserved.
708 // $ATH_LICENSE_NULL$
709 //
710 // Redistribution and use in source and binary forms, with or without
711 // modification, are permitted provided that the following conditions
712 // are met:
713 // 1. Redistributions of source code must retain the above copyright
714 // notice, this list of conditions and the following disclaimer,
715 // without modification.
716 // 2. Redistributions in binary form must reproduce at minimum a disclaimer
717 // similar to the "NO WARRANTY" disclaimer below ("Disclaimer") and any
718 // redistribution must be conditioned upon including a substantially
719 // similar Disclaimer requirement for further binary redistribution.
720 // 3. Neither the names of the above-listed copyright holders nor the names
721 // of any contributors may be used to endorse or promote products derived
722 // from this software without specific prior written permission.
723 //
724 // Alternatively, this software may be distributed under the terms of the
725 // GNU General Public License ("GPL") version 2 as published by the Free
726 // Software Foundation.
727 //
728 // NO WARRANTY
729 // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
730 // ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
731 // LIMITED TO, THE IMPLIED WARRANTIES OF NONINFRINGEMENT, MERCHANTIBILITY
732 // AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
733 // THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY,
734 // OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
735 // SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
736 // INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
737 // IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
738 // ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
739 // THE POSSIBILITY OF SUCH DAMAGES.
740
741 --------------------
742
743 /*
744 * AES SIV (RFC 5297)
745 * Copyright (c) 2013 Cozybit, Inc.
746 *
747 * This software may be distributed under the terms of the BSD license.
748 */
749
750 --------------------
751
752 * Copyright 2018 The Android Open Source Project
753 *
754 * Licensed under the Apache License, Version 2.0 (the "License");
755 * you may not use this file except in compliance with the License.
756 * You may obtain a copy of the License at
757 *
758 * http://www.apache.org/licenses/LICENSE-2.0
759 *
760 * Unless required by applicable law or agreed to in writing, software
761 * distributed under the License is distributed on an "AS IS" BASIS,
762 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
763 * See the License for the specific language governing permissions and
764 * limitations under the License.
765
766 --------------------
767
768 /* ===== start - public domain SHA256 implementation ===== */
769
770 /* This is based on SHA256 implementation in LibTomCrypt that was released into
771 * public domain by Tom St Denis. */
772
773 --------------------
774
775 // This code implements the MD5 message-digest algorithm.
776 // The algorithm is due to Ron Rivest. This code was
777 // written by Colin Plumb in 1993, no copyright is claimed.
778 // This code is in the public domain; do with it what you wish.
779 //
780 // Equivalent code is available from RSA Data Security, Inc.
781 // This code has been tested against that, and is equivalent,
782 // except that you don't need to include two pages of legalese
783 // with every copy.
784 //
785
786 --------------------
|