summaryrefslogtreecommitdiff
path: root/ath11k/IPQ8074/hw2.0/Notice.txt
blob: 1c77b82f5b98081f353d5a2902a54a23dcf5d2a2 (plain)
    1 This Notice.txt file contains certain notices of software components included with the software that Qualcomm Atheros, Inc. ("Qualcomm Atheros") is required to provide you. Except where prohibited by the open source license, the content of this notices file is only provided to satisfy Qualcomm Atheros's attribution and notice requirement; your use of these software components together with the Qualcomm Atheros software (Qualcomm Atheros software hereinafter referred to as "Software") is subject to the terms of your agreement from Qualcomm Atheros. Compliance with all copyright laws and software license agreements included in the notice section of this file are the responsibility of the user. Except as may be granted by separate express written agreement, this file provides no license to any patents, trademarks, copyrights, or other intellectual property of Qualcomm Incorporated or any of its subsidiaries.
    2 
    3 Qualcomm is a trademark of Qualcomm Incorporated, registered in the United States and other countries. All Qualcomm Incorporated trademarks are used with permission. Other products and brand names may be trademarks or registered trademarks of their respective owners.
    4 
    5 --------------------
    6 
    7  /*                                                                              
    8   * WPA definitions shared between hostapd and wpa_supplicant
    9   * Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi>
   10   *         
   11   * This software may be distributed under the terms of the BSD license.
   12   * See README for more details.                  
   13   */
   14   
   15 --------------------
   16 
   17  /* WPA/RSN - Shared functions for supplicant and authenticator
   18   * EAP common peer/server definitions
   19   * EAP peer state machines (RFC 4137)
   20   * Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi>
   21   *        
   22   * This software may be distributed under the terms of the BSD license.
   23   * See README for more details.
   24   */  
   25 
   26 --------------------
   27 
   28 /*
   29  * Copyright (c) 2011 Qualcomm Atheros, Inc.
   30  * All Rights Reserved.
   31  * Qualcomm Atheros Confidential and Proprietary.
   32  * Notifications and licenses are retained for attribution purposes only.
   33  */
   34 /*
   35  * For this file, which was received with alternative licensing options for
   36  * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
   37  */
   38 
   39 /*
   40  * AES-based functions
   41  *
   42  *
   43  * - AES Key Wrap Algorithm (128-bit KEK) (RFC3394)
   44  * - One-Key CBC MAC (OMAC1) hash with AES-128
   45  * - AES-128 CTR mode encryption
   46  * - AES-128 EAX mode encryption/decryption
   47  * - AES-128 CBC
   48  *
   49  * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
   50  *
   51  * This program is free software; you can redistribute it and/or modify
   52  * it under the terms of the GNU General Public License version 2 as
   53  * published by the Free Software Foundation.
   54  *
   55  * Alternatively, this software may be distributed under the terms of BSD
   56  * license.
   57  *
   58  * See README and COPYING for more details.
   59  */
   60 
   61 --------------------
   62 
   63 /*
   64  * Copyright (c) 2011 Qualcomm Atheros, Inc.
   65  * All Rights Reserved.
   66  * Qualcomm Atheros Confidential and Proprietary.
   67  * Notifications and licenses are retained for attribution purposes only.
   68  */
   69 /*
   70  * For this file, which was received with alternative licensing options for
   71  * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
   72  */
   73 
   74 /*
   75  * SHA1 hash implementation and interface functions
   76  * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
   77  *
   78  * This program is free software; you can redistribute it and/or modify
   79  * it under the terms of the GNU General Public License version 2 as
   80  * published by the Free Software Foundation.
   81  *
   82  * Alternatively, this software may be distributed under the terms of BSD
   83  * license.
   84  *
   85  * See README and COPYING for more details.
   86  */
   87 
   88 --------------------
   89 
   90 /*
   91  * Copyright (c) 2011 Qualcomm Atheros, Inc.
   92  * All Rights Reserved.
   93  * Qualcomm Atheros Confidential and Proprietary.
   94  * Notifications and licenses are retained for attribution purposes only.
   95  */
   96 /*
   97  * For this file, which was received with alternative licensing options for
   98  * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
   99  */
  100 
  101 /*
  102  * WPA Supplicant / wrapper functions for crypto libraries
  103  * Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
  104  *
  105  * This program is free software; you can redistribute it and/or modify
  106  * it under the terms of the GNU General Public License version 2 as
  107  * published by the Free Software Foundation.
  108  *
  109  * Alternatively, this software may be distributed under the terms of BSD
  110  * license.
  111  *
  112  * See README and COPYING for more details.
  113  *
  114  * This file defines the cryptographic functions that need to be implemented
  115  * for wpa_supplicant and hostapd. When TLS is not used, internal
  116  * implementation of MD5, SHA1, and AES is used and no external libraries are
  117  * required. When TLS is enabled (e.g., by enabling EAP-TLS or EAP-PEAP), the
  118  * crypto library used by the TLS implementation is expected to be used for
  119  * non-TLS needs, too, in order to save space by not implementing these
  120  * functions twice.
  121  *
  122  * Wrapper code for using each crypto library is in its own file (crypto*.c)
  123  * and one of these files is build and linked in to provide the functions
  124  * defined here.
  125  */
  126 
  127 --------------------
  128 
  129 /*
  130  * For this file, which was received with alternative licensing options for
  131  * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
  132  */
  133 
  134 /*
  135  * WPA Supplicant - Common definitions
  136  * Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
  137  *
  138  * This program is free software; you can redistribute it and/or modify
  139  * it under the terms of the GNU General Public License version 2 as
  140  * published by the Free Software Foundation.
  141  *
  142  * Alternatively, this software may be distributed under the terms of BSD
  143  * license.
  144  *
  145  * See README and COPYING for more details.
  146  */
  147 
  148 --------------------
  149 
  150 /*
  151  * For this file, which was received with alternative licensing options for
  152  * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
  153  */
  154 
  155 /*
  156  * WPA Supplicant - WPA state machine and EAPOL-Key processing
  157  * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
  158  *
  159  * This program is free software; you can redistribute it and/or modify
  160  * it under the terms of the GNU General Public License version 2 as
  161  * published by the Free Software Foundation.
  162  *
  163  * Alternatively, this software may be distributed under the terms of BSD
  164  * license.
  165  *
  166  * See README and COPYING for more details.
  167  */
  168 
  169 --------------------
  170 
  171 /*
  172  * For this file, which was received with alternative licensing options for
  173  * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
  174  */
  175 
  176 /*
  177  * WPA Supplicant / Configuration file structures
  178  * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
  179  *
  180  * This program is free software; you can redistribute it and/or modify
  181  * it under the terms of the GNU General Public License version 2 as
  182  * published by the Free Software Foundation.
  183  *
  184  * Alternatively, this software may be distributed under the terms of BSD
  185  * license.
  186  *
  187  * See README and COPYING for more details.
  188  */
  189 
  190 --------------------
  191 
  192  /*
  193   * Copyright (c) 2008, Atheros Communications Inc.
  194   *
  195   * Copyright (c) 2011 Qualcomm Atheros, Inc.
  196   * Qualcomm Atheros, Inc. has chosen to take madwifi subject to the BSD license and terms.
  197   *
  198   */
  199 
  200 --------------------
  201 
  202 /*
  203  * For this file, which was received with alternative licensing options for
  204  * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
  205  */
  206 
  207 /*
  208  * wpa_supplicant - Internal WPA state machine definitions
  209  * Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
  210  *
  211  * This program is free software; you can redistribute it and/or modify
  212  * it under the terms of the GNU General Public License version 2 as
  213  * published by the Free Software Foundation.
  214  *
  215  * Alternatively, this software may be distributed under the terms of BSD
  216  * license.
  217  *
  218  * See README and COPYING for more details.
  219  */
  220 
  221 --------------------
  222 
  223 /*
  224  * For this file, which was received with alternative licensing options for
  225  * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
  226  */
  227 
  228 /*
  229  * wpa_supplicant - WPA definitions
  230  * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
  231  *
  232  * This program is free software; you can redistribute it and/or modify
  233  * it under the terms of the GNU General Public License version 2 as
  234  * published by the Free Software Foundation.
  235  *
  236  * Alternatively, this software may be distributed under the terms of BSD
  237  * license.
  238  *
  239  * See README and COPYING for more details.
  240  */
  241 
  242 --------------------
  243 
  244 /*
  245  * For this file, which was received with alternative licensing options for
  246  * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
  247  */
  248 
  249 /*
  250  * wpa_supplicant/hostapd / common helper functions, etc.
  251  * Copyright (c) 2002-2005, Jouni Malinen <jkmaline@cc.hut.fi>
  252  *
  253  * This program is free software; you can redistribute it and/or modify
  254  * it under the terms of the GNU General Public License version 2 as
  255  * published by the Free Software Foundation.
  256  *
  257  * Alternatively, this software may be distributed under the terms of BSD
  258  * license.
  259  *
  260  * See README and COPYING for more details.
  261  */
  262 
  263 --------------------
  264 
  265  * Australian Public Licence B (OZPLB)
  266  *
  267  * Version 1-0
  268  *
  269  * Copyright (c) 2004, National ICT Australia
  270  * Copyright (c) 2007, Open Kernel Labs, Inc.
  271  *
  272  * All rights reserved. 
  273  *
  274  * Developed by: Embedded, Real-time and Operating Systems Program (ERTOS)
  275  *               National ICT Australia
  276  *               http://www.ertos.nicta.com.au
  277  *
  278  * Permission is granted by National ICT Australia, free of charge, to
  279  * any person obtaining a copy of this software and any associated
  280  * documentation files (the "Software") to deal with the Software without
  281  * restriction, including (without limitation) the rights to use, copy,
  282  * modify, adapt, merge, publish, distribute, communicate to the public,
  283  * sublicense, and/or sell, lend or rent out copies of the Software, and
  284  * to permit persons to whom the Software is furnished to do so, subject
  285  * to the following conditions:
  286  *
  287  *     * Redistributions of source code must retain the above copyright
  288  *       notice, this list of conditions and the following disclaimers.
  289  *
  290  *     * Redistributions in binary form must reproduce the above
  291  *       copyright notice, this list of conditions and the following
  292  *       disclaimers in the documentation and/or other materials provided
  293  *       with the distribution.
  294  *
  295  *     * Neither the name of National ICT Australia, nor the names of its
  296  *       contributors, may be used to endorse or promote products derived
  297  *       from this Software without specific prior written permission.
  298  *
  299  * EXCEPT AS EXPRESSLY STATED IN THIS LICENCE AND TO THE FULL EXTENT
  300  * PERMITTED BY APPLICABLE LAW, THE SOFTWARE IS PROVIDED "AS-IS", AND
  301  * NATIONAL ICT AUSTRALIA AND ITS CONTRIBUTORS MAKE NO REPRESENTATIONS,
  302  * WARRANTIES OR CONDITIONS OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
  303  * BUT NOT LIMITED TO ANY REPRESENTATIONS, WARRANTIES OR CONDITIONS
  304  * REGARDING THE CONTENTS OR ACCURACY OF THE SOFTWARE, OR OF TITLE,
  305  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT,
  306  * THE ABSENCE OF LATENT OR OTHER DEFECTS, OR THE PRESENCE OR ABSENCE OF
  307  * ERRORS, WHETHER OR NOT DISCOVERABLE.
  308  *
  309  * TO THE FULL EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL
  310  * NATIONAL ICT AUSTRALIA OR ITS CONTRIBUTORS BE LIABLE ON ANY LEGAL
  311  * THEORY (INCLUDING, WITHOUT LIMITATION, IN AN ACTION OF CONTRACT,
  312  * NEGLIGENCE OR OTHERWISE) FOR ANY CLAIM, LOSS, DAMAGES OR OTHER
  313  * LIABILITY, INCLUDING (WITHOUT LIMITATION) LOSS OF PRODUCTION OR
  314  * OPERATION TIME, LOSS, DAMAGE OR CORRUPTION OF DATA OR RECORDS; OR LOSS
  315  * OF ANTICIPATED SAVINGS, OPPORTUNITY, REVENUE, PROFIT OR GOODWILL, OR
  316  * OTHER ECONOMIC LOSS; OR ANY SPECIAL, INCIDENTAL, INDIRECT,
  317  * CONSEQUENTIAL, PUNITIVE OR EXEMPLARY DAMAGES, ARISING OUT OF OR IN
  318  * CONNECTION WITH THIS LICENCE, THE SOFTWARE OR THE USE OF OR OTHER
  319  * DEALINGS WITH THE SOFTWARE, EVEN IF NATIONAL ICT AUSTRALIA OR ITS
  320  * CONTRIBUTORS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH CLAIM, LOSS,
  321  * DAMAGES OR OTHER LIABILITY.
  322  *
  323  * If applicable legislation implies representations, warranties, or
  324  * conditions, or imposes obligations or liability on National ICT
  325  * Australia or one of its contributors in respect of the Software that
  326  * cannot be wholly or partly excluded, restricted or modified, the
  327  * liability of National ICT Australia or the contributor is limited, to
  328  * the full extent permitted by the applicable legislation, at its
  329  * option, to:
  330  * a.  in the case of goods, any one or more of the following:
  331  * i.  the replacement of the goods or the supply of equivalent goods;
  332  * ii.  the repair of the goods;
  333  * iii. the payment of the cost of replacing the goods or of acquiring
  334  *  equivalent goods;
  335  * iv.  the payment of the cost of having the goods repaired; or
  336  * b.  in the case of services:
  337  * i.  the supplying of the services again; or
  338  * ii.  the payment of the cost of having the services supplied again.
  339  *
  340  * The construction, validity and performance of this licence is governed
  341  * by the laws in force in New South Wales, Australia.
  342 
  343 --------------------
  344 
  345  * Copyright (c) 2002-2004, Karlsruhe University
  346  *
  347  * Redistribution and use in source and binary forms, with or without
  348  * modification, are permitted provided that the following conditions
  349  * are met:
  350  * 1. Redistributions of source code must retain the above copyright
  351  *    notice, this list of conditions and the following disclaimer.
  352  * 2. Redistributions in binary form must reproduce the above copyright
  353  *    notice, this list of conditions and the following disclaimer in the
  354  *    documentation and/or other materials provided with the distribution.
  355  *
  356  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
  357  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  358  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  359  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  360  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  361  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  362  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  363  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  364  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  365  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  366  * SUCH DAMAGE.
  367 
  368 --------------------
  369 
  370  /*                                                                              
  371   *  COPYRIGHT (C) 1986 Gary S. Brown.  You may use this program, or             
  372   *  code or tables extracted from it, as desired without restriction.           
  373   *                                                                              
  374   *  First, the polynomial itself and its table of feedback terms.  The          
  375   *  polynomial is                                                               
  376   *  X^32+X^26+X^23+X^22+X^16+X^12+X^11+X^10+X^8+X^7+X^5+X^4+X^2+X^1+X^0         
  377   *                                                                              
  378   *  Note that we take it "backwards" and put the highest-order term in          
  379   *  the lowest-order bit.  The X^32 term is "implied"; the LSB is the           
  380   *  X^31 term, etc.  The X^0 term (usually shown as "+1") results in            
  381   *  the MSB being 1                                                             
  382   *                                                                              
  383   *  Note that the usual hardware shift register implementation, which           
  384   *  is what we're using (we're merely optimizing it by doing eight-bit          
  385   *  chunks at a time) shifts bits into the lowest-order term.  In our           
  386   *  implementation, that means shifting towards the right.  Why do we           
  387   *  do it this way?  Because the calculated CRC must be transmitted in          
  388   *  order from highest-order term to lowest-order term.  UARTs transmit         
  389   *  characters in order from LSB to MSB.  By storing the CRC this way           
  390   *  we hand it to the UART in the order low-byte to high-byte; the UART         
  391   *  sends each low-bit to hight-bit; and the result is transmission bit         
  392   *  by bit from highest- to lowest-order term without requiring any bit         
  393   *  shuffling on our part.  Reception works similarly                           
  394   *                                                                              
  395   *  The feedback terms table consists of 256, 32-bit entries.  Notes            
  396   *                                                                              
  397   *      The table can be generated at runtime if desired; code to do so         
  398   *      is shown later.  It might not be obvious, but the feedback              
  399   *      terms simply represent the results of eight shift/xor opera             
  400   *      tions for all combinations of data and CRC register values              
  401   *                                                                              
  402   *      The values must be right-shifted by eight bits by the "updcrc           
  403   *      logic; the shift must be unsigned (bring in zeroes).  On some           
  404   *      hardware you could probably optimize the shift in assembler by          
  405   *      using byte-swap instructions                                            
  406   *      polynomial $edb88320                                                    
  407   *                                                                              
  408   *                                                                              
  409   * CRC32 code derived from work by Gary S. Brown.                               
  410   */    
  411  
  412 --------------------
  413 
  414  * AUTHOR:  Aaron D. Gifford - http://www.aarongifford.com/
  415  *
  416  * Copyright (c) 2000-2001, Aaron D. Gifford
  417  * All rights reserved.
  418  *
  419  * Redistribution and use in source and binary forms, with or without
  420  * modification, are permitted provided that the following conditions
  421  * are met:
  422  * 1. Redistributions of source code must retain the above copyright
  423  *    notice, this list of conditions and the following disclaimer.
  424  * 2. Redistributions in binary form must reproduce the above copyright
  425  *    notice, this list of conditions and the following disclaimer in the
  426  *    documentation and/or other materials provided with the distribution.
  427  * 3. Neither the name of the copyright holder nor the names of contributors
  428  *    may be used to endorse or promote products derived from this software
  429  *    without specific prior written permission.
  430  *
  431  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
  432  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  433  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  434  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
  435  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  436  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  437  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  438  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  439  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  440  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  441  * SUCH DAMAGE.
  442 
  443 --------------------
  444 
  445  * Copyright (c) 1988, 1993
  446  *	The Regents of the University of California.  All rights reserved.
  447  *
  448  * Redistribution and use in source and binary forms, with or without
  449  * modification, are permitted provided that the following conditions
  450  * are met:
  451  * 1. Redistributions of source code must retain the above copyright
  452  *    notice, this list of conditions and the following disclaimer.
  453  * 2. Redistributions in binary form must reproduce the above copyright
  454  *    notice, this list of conditions and the following disclaimer in the
  455  *    documentation and/or other materials provided with the distribution.
  456  * 3. All advertising materials mentioning features or use of this software
  457  *    must display the following acknowledgement:
  458  *	This product includes software developed by the University of
  459  *	California, Berkeley and its contributors.
  460  * 4. Neither the name of the University nor the names of its contributors
  461  *    may be used to endorse or promote products derived from this software
  462  *    without specific prior written permission.
  463  *
  464  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
  465  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  466  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  467  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
  468  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  469  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  470  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  471  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  472  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  473  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  474  * SUCH DAMAGE.
  475 
  476 --------------------
  477 
  478  * Copyright (c) 1982, 1986, 1990, 1991, 1993 The Regents of the University of California.
  479  * All rights reserved.
  480  *
  481  * Redistribution and use in source and binary forms, with or without
  482  * modification, are permitted provided that the following conditions
  483  * are met:
  484  * 1. Redistributions of source code must retain the above copyright
  485  *    notice, this list of conditions and the following disclaimer.
  486  * 2. Redistributions in binary form must reproduce the above copyright
  487  *    notice, this list of conditions and the following disclaimer in the
  488  *    documentation and/or other materials provided with the distribution.
  489  * 3. Neither the name of the University nor the names of its contributors
  490  *    may be used to endorse or promote products derived from this software
  491  *    without specific prior written permission.
  492  *
  493  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
  494  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  495  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  496  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
  497  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  498  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  499  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  500  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  501  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  502  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  503  * SUCH DAMAGE.
  504 
  505 --------------------
  506 
  507 # Copyright (c) 2012-2015 Qualcomm Atheros, Inc.
  508 #
  509 # Permission to use, copy, modify, and/or distribute this software for any
  510 # purpose with or without fee is hereby granted, provided that the above
  511 # copyright notice and this permission notice appear in all copies.
  512 #
  513 # THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  514 # WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  515 # MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  516 # ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  517 # WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  518 # ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  519 # OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  520 
  521 --------------------
  522 
  523  * Copyright (c) 1988, 1993
  524  *	The Regents of the University of California.  All rights reserved.
  525  *
  526  * Redistribution and use in source and binary forms, with or without
  527  * modification, are permitted provided that the following conditions
  528  * are met:
  529  * 1. Redistributions of source code must retain the above copyright
  530  *    notice, this list of conditions and the following disclaimer.
  531  * 2. Redistributions in binary form must reproduce the above copyright
  532  *    notice, this list of conditions and the following disclaimer in the
  533  *    documentation and/or other materials provided with the distribution.
  534  * 3. All advertising materials mentioning features or use of this software
  535  *    must display the following acknowledgement:
  536  *	This product includes software developed by the University of
  537  *	California, Berkeley and its contributors.
  538  * 4. Neither the name of the University nor the names of its contributors
  539  *    may be used to endorse or promote products derived from this software
  540  *    without specific prior written permission.
  541  *
  542  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
  543  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  544  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  545  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
  546  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  547  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  548  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  549  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  550  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  551  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  552  * SUCH DAMAGE.
  553 
  554 --------------------
  555 
  556 /*	$OpenBSD: string.h,v 1.17 2006/01/06 18:53:04 millert Exp $	*/
  557 /*	$NetBSD: string.h,v 1.6 1994/10/26 00:56:30 cgd Exp $	*/
  558 
  559 /*-
  560  * Copyright (c) 1990 The Regents of the University of California.
  561  * All rights reserved.
  562  *
  563  * Redistribution and use in source and binary forms, with or without
  564  * modification, are permitted provided that the following conditions
  565  * are met:
  566  * 1. Redistributions of source code must retain the above copyright
  567  *    notice, this list of conditions and the following disclaimer.
  568  * 2. Redistributions in binary form must reproduce the above copyright
  569  *    notice, this list of conditions and the following disclaimer in the
  570  *    documentation and/or other materials provided with the distribution.
  571  * 3. Neither the name of the University nor the names of its contributors
  572  *    may be used to endorse or promote products derived from this software
  573  *    without specific prior written permission.
  574  *
  575  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
  576  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  577  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  578  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
  579  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  580  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  581  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  582  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  583  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  584  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  585  * SUCH DAMAGE.
  586  *
  587  *	@(#)string.h	5.10 (Berkeley) 3/9/91
  588  */
  589 
  590 --------------------
  591 
  592     // Copyright (c) 1991, 1993
  593 	//  The Regents of the University of California.  All rights reserved.
  594 	// $ATH_LICENSE_NULL$
  595 	//
  596 	// Redistribution and use in source and binary forms, with or without
  597 	// modification, are permitted provided that the following conditions
  598 	// are met:
  599 	// 1. Redistributions of source code must retain the above copyright
  600 	//    notice, this list of conditions and the following disclaimer.
  601 	// 2. Redistributions in binary form must reproduce the above copyright
  602 	//    notice, this list of conditions and the following disclaimer in the
  603 	//    documentation and/or other materials provided with the distribution.
  604 	// 3. All advertising materials mentioning features or use of this software
  605 	//    must display the following acknowledgement:
  606 	//      This product includes software developed by the University of
  607 	//      California, Berkeley and its contributors.
  608 	// 4. Neither the name of the University nor the names of its contributors
  609 	//    may be used to endorse or promote products derived from this software
  610 	//    without specific prior written permission.
  611 	//
  612 	// THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
  613 	// ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  614 	// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  615 	// ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
  616 	// FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  617 	// DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  618 	// OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  619 	// HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  620 	// LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  621 	// OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  622 	// SUCH DAMAGE.
  623 
  624 --------------------
  625 
  626  * Copyright (c) 1998, 2010 Todd C. Miller <Todd.Miller@courtesan.com>
  627  *
  628  * Permission to use, copy, modify, and distribute this software for any
  629  * purpose with or without fee is hereby granted, provided that the above
  630  * copyright notice and this permission notice appear in all copies.
  631  *
  632  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  633  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  634  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  635  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  636  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  637  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  638  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  639 
  640 --------------------
  641 
  642 /*
  643  * Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com>
  644  * All rights reserved.
  645  *
  646  * Redistribution and use in source and binary forms, with or without
  647  * modification, are permitted provided that the following conditions
  648  * are met:
  649  * 1. Redistributions of source code must retain the above copyright
  650  * notice, this list of conditions and the following disclaimer.
  651  * 2. Redistributions in binary form must reproduce the above copyright
  652  * notice, this list of conditions and the following disclaimer in the
  653  * documentation and/or other materials provided with the distribution.
  654  * 3. The name of the author may not be used to endorse or promote products
  655  * derived from this software without specific prior written permission.
  656  *
  657  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
  658  * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
  659  * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
  660  * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
  661  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
  662  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
  663  * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
  664  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
  665  * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
  666  * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  667  */
  668 
  669 --------------------
  670 
  671 ** Copyright (c) 2004-2010, Atheros Communications Inc.
  672 **
  673 ** Permission to use, copy, modify, and/or distribute this software for any
  674 ** purpose with or without fee is hereby granted, provided that the above
  675 ** copyright notice and this permission notice appear in all copies.
  676 **
  677 ** THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  678 ** WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  679 ** MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  680 ** ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  681 ** WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  682 ** ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  683 ** OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  684 **
  685 ** This module is the Atheros specific ioctl/iwconfig/iwpriv interface
  686 ** to the ATH object, normally instantiated as wifiX, where X is the
  687 ** instance number (e.g. wifi0, wifi1).
  688 **
  689 ** This provides a mechanism to configure the ATH object within the
  690 ** Linux OS enviornment.  This file is OS specific.
  691 
  692 --------------------
  693 
  694 /*
  695  * Copyright (c) 2012 Qualcomm Atheros, Inc.
  696  * All Rights Reserved.
  697  * Qualcomm Atheros Confidential and Proprietary.
  698  */
  699 
  700 /*
  701  * For this file, which was received with alternative licensing options for   
  702  * distribution, Qualcomm Atheros, Inc. has selected the BSD license.
  703  */
  704 
  705 //-
  706 // Copyright (c) 2002-2004 Sam Leffler, Errno Consulting
  707 // All rights reserved.
  708 // $ATH_LICENSE_NULL$
  709 //
  710 // Redistribution and use in source and binary forms, with or without
  711 // modification, are permitted provided that the following conditions
  712 // are met:
  713 // 1. Redistributions of source code must retain the above copyright
  714 //    notice, this list of conditions and the following disclaimer,
  715 //    without modification.
  716 // 2. Redistributions in binary form must reproduce at minimum a disclaimer
  717 //    similar to the "NO WARRANTY" disclaimer below ("Disclaimer") and any
  718 //    redistribution must be conditioned upon including a substantially
  719 //    similar Disclaimer requirement for further binary redistribution.
  720 // 3. Neither the names of the above-listed copyright holders nor the names
  721 //    of any contributors may be used to endorse or promote products derived
  722 //    from this software without specific prior written permission.
  723 //
  724 // Alternatively, this software may be distributed under the terms of the
  725 // GNU General Public License ("GPL") version 2 as published by the Free
  726 // Software Foundation.
  727 //
  728 // NO WARRANTY
  729 // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
  730 // ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
  731 // LIMITED TO, THE IMPLIED WARRANTIES OF NONINFRINGEMENT, MERCHANTIBILITY
  732 // AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
  733 // THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY,
  734 // OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
  735 // SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
  736 // INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
  737 // IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  738 // ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
  739 // THE POSSIBILITY OF SUCH DAMAGES.
  740 
  741 --------------------
  742   
  743   /*
  744    * AES SIV (RFC 5297)
  745    * Copyright (c) 2013 Cozybit, Inc.
  746    *
  747    * This software may be distributed under the terms of the BSD license.
  748    */
  749    
  750 --------------------
  751 
  752  * Copyright 2018 The Android Open Source Project
  753  *
  754  * Licensed under the Apache License, Version 2.0 (the "License");
  755  * you may not use this file except in compliance with the License.
  756  * You may obtain a copy of the License at
  757  *
  758  * http://www.apache.org/licenses/LICENSE-2.0
  759  *
  760  * Unless required by applicable law or agreed to in writing, software
  761  * distributed under the License is distributed on an "AS IS" BASIS,
  762  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  763  * See the License for the specific language governing permissions and
  764  * limitations under the License.
  765 
  766 --------------------
  767 
  768 /* ===== start - public domain SHA256 implementation ===== */
  769 
  770 /* This is based on SHA256 implementation in LibTomCrypt that was released into
  771  * public domain by Tom St Denis. */
  772 
  773 --------------------
  774 
  775 // This code implements the MD5 message-digest algorithm.
  776 // The algorithm is due to Ron Rivest.  This code was
  777 // written by Colin Plumb in 1993, no copyright is claimed.
  778 // This code is in the public domain; do with it what you wish.
  779 //
  780 // Equivalent code is available from RSA Data Security, Inc.
  781 // This code has been tested against that, and is equivalent,
  782 // except that you don't need to include two pages of legalese
  783 // with every copy.
  784 //
  785  
  786 --------------------

Generated by cgit