summaryrefslogtreecommitdiff
path: root/qca/NOTICE.txt
blob: 931302076c7966057ce197da4725dd419b8ece40 (plain)
    1 
    2 This Notice.txt file contains certain notices of software components included
    3 with the software that Qualcomm Atheros, Inc. ("Qualcomm Atheros") is required
    4 to provide you. Except where prohibited by the open source license, the content
    5 of this notices file is only provided to satisfy Qualcomm Atheros's attribution
    6 and notice requirement; your use of these software components together with the
    7 Qualcomm Atheros software (Qualcomm Atheros software hereinafter referred to
    8 as "Software") is subject to the terms of your agreement from Qualcomm Atheros.
    9 Compliance with all copyright laws and software license agreements included in
   10 the notice section of this file are the responsibility of the user. Except as
   11 may be granted by separate express written agreement, this file provides no
   12 license to any patents, trademarks, copyrights, or other intellectual property
   13 of Qualcomm Incorporated or any of its subsidiaries.
   14 
   15 Qualcomm is a trademark of Qualcomm Incorporated, registered in the United States
   16 and other countries. All Qualcomm Incorporated trademarks are used with permission.
   17 Other products and brand names may be trademarks or registered trademarks of their
   18 respective owners.
   19 
   20 NOTICES:
   21 
   22 ===============================================================================
   23 
   24  1.
   25 
   26 /*
   27  * FILE:    sha2.c
   28  * AUTHOR:    Aaron D. Gifford <me@aarongifford.com>
   29  *
   30  * Copyright (c) 2000-2001, Aaron D. Gifford
   31  * All rights reserved.
   32  *
   33  * Redistribution and use in source and binary forms, with or without
   34  * modification, are permitted provided that the following conditions
   35  * are met:
   36  * 1. Redistributions of source code must retain the above copyright
   37  *    notice, this list of conditions and the following disclaimer.
   38  * 2. Redistributions in binary form must reproduce the above copyright
   39  *    notice, this list of conditions and the following disclaimer in the
   40  *    documentation and/or other materials provided with the distribution.
   41  * 3. Neither the name of the copyright holder nor the names of contributors
   42  *    may be used to endorse or promote products derived from this software
   43  *    without specific prior written permission.
   44  *
   45  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
   46  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   47  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   48  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
   49  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   50  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   51  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   52  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   53  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   54  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   55  * SUCH DAMAGE.
   56  *
   57  * $Id: sha2.c,v 1.1 2001/11/08 00:01:51 adg Exp adg $
   58  */
   59 File: LLM_sp_sha2.c
   60 
   61 
   62 /*
   63  * FILE:    sha2.h
   64  * AUTHOR:    Aaron D. Gifford <me@aarongifford.com>
   65  *
   66  * Copyright (c) 2000-2001, Aaron D. Gifford
   67  * All rights reserved.
   68  *
   69  * Redistribution and use in source and binary forms, with or without
   70  * modification, are permitted provided that the following conditions
   71  * are met:
   72  * 1. Redistributions of source code must retain the above copyright
   73  *    notice, this list of conditions and the following disclaimer.
   74  * 2. Redistributions in binary form must reproduce the above copyright
   75  *    notice, this list of conditions and the following disclaimer in the
   76  *    documentation and/or other materials provided with the distribution.
   77  * 3. Neither the name of the copyright holder nor the names of contributors
   78  *    may be used to endorse or promote products derived from this software
   79  *    without specific prior written permission.
   80  *
   81  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
   82  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   83  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   84  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
   85  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   86  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   87  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   88  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   89  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   90  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   91  * SUCH DAMAGE.
   92  *
   93  * $Id: sha2.h,v 1.1 2001/11/08 00:02:01 adg Exp adg $
   94  */
   95 File: LLM_sp_sha2.h
   96 
   97 ===============================================================================
   98 
   99  2.
  100 
  101 /* utility to create the register check tables
  102 * this includes inlined list.h safe for userspace.
  103 *
  104 * Copyright 2009 Jerome Glisse
  105 * Copyright 2009 Red Hat Inc.
  106 *
  107 * Authors:
  108 *    Jerome Glisse
  109 *    Dave Airlie
  110 */
  111 /*All rights reserved.
  112 Redistribution and use in source and binary forms, with or without modification
  113 are permitted provided that the following conditions are met:
  114   1. Redistributions of source code must retain the above copyright notice,
  115      this list of conditions and the following disclaimer.
  116   2. Redistributions in binary form must reproduce the above copyright notice,
  117      this list of conditions and the following disclaimer in the documentation
  118      and/or other materials provided with the distribution.
  119   3. Neither the name of the <ORGANIZATION> nor the names of its contributors
  120      may be used to endorse or promote products derived from this software
  121      without specific prior written permission.
  122 
  123 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
  124 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
  125 WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
  126 DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
  127 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  128 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
  129 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
  130 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
  131 OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  132 OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  133 */
  134 File: comm_lib.h
  135 
  136 ===============================================================================
  137 
  138  3.
  139 
  140 /* crypto/aes/aes.h -*- mode:C; c-file-style: "eay" -*- */
  141 /* ====================================================================
  142  * Copyright (c) 1998-2002 The OpenSSL Project.  All rights reserved.
  143  *
  144  * Redistribution and use in source and binary forms, with or without
  145  * modification, are permitted provided that the following conditions
  146  * are met:
  147  *
  148  * 1. Redistributions of source code must retain the above copyright
  149  *    notice, this list of conditions and the following disclaimer.
  150  *
  151  * 2. Redistributions in binary form must reproduce the above copyright
  152  *    notice, this list of conditions and the following disclaimer in
  153  *    the documentation and/or other materials provided with the
  154  *    distribution.
  155  *
  156  * 3. All advertising materials mentioning features or use of this
  157  *    software must display the following acknowledgment:
  158  *    "This product includes software developed by the OpenSSL Project
  159  *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  160  *
  161  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  162  *    endorse or promote products derived from this software without
  163  *    prior written permission. For written permission, please contact
  164  *    openssl-core@openssl.org.
  165  *
  166  * 5. Products derived from this software may not be called "OpenSSL"
  167  *    nor may "OpenSSL" appear in their names without prior written
  168  *    permission of the OpenSSL Project.
  169  *
  170  * 6. Redistributions of any form whatsoever must retain the following
  171  *    acknowledgment:
  172  *    "This product includes software developed by the OpenSSL Project
  173  *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  174  *
  175  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  176  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  177  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  178  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
  179  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  180  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  181  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  182  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  183  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  184  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  185  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  186  * OF THE POSSIBILITY OF SUCH DAMAGE.
  187  * ====================================================================
  188  *
  189  */
  190 File Name list: aes.h, aes_locl.h
  191 
  192 ===============================================================================
  193 
  194  4.
  195 
  196 /* crypto/aes/aes_core.c -*- mode:C; c-file-style: "eay" -*- */
  197 /**
  198  * rijndael-alg-fst.c
  199  *
  200  * @version 3.0 (December 2000)
  201  *
  202  * Optimised ANSI C code for the Rijndael cipher (now AES)
  203  *
  204  * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
  205  * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
  206  * @author Paulo Barreto <paulo.barreto@terra.com.br>
  207  *
  208  * This code is hereby placed in the public domain.
  209  *
  210  * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
  211  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
  212  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  213  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
  214  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  215  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
  216  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
  217  * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
  218  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
  219  * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
  220  * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  221  */
  222 File: aes_core.c
  223 
  224 ===============================================================================
  225 
  226  5.
  227 
  228 /*===========================================================================
  229 
  230                       EDIT HISTORY FOR FILE
  231 
  232   $Header: //depot/asic/msmshared/sec/sec/MSM_SEC.03.03.08.xx/aes.h#1 $
  233   $DateTime: 2006/12/11 00:43:21 $ $Author: davidf $
  234 
  235 when       who     what, where, why
  236 --------   ---     ----------------------------------------------------------
  237 11/12/04   rv      changes to correct LINT errors
  238 02/02/04   rwh     Small mods to open source.
  239 
  240 ===========================================================================*/
  241 
  242  /*
  243    I retain copyright in this code but I encourage its free use provided
  244    that I don't carry any responsibility for the results. I am especially
  245    happy to see it used in free and open source software. If you do use
  246    it I would appreciate an acknowledgement of its origin in the code or
  247    the product that results and I would also appreciate knowing a liitle
  248    about the use to which it is being put.
  249 
  250    Dr B. R. Gladman <brg@gladman.uk.net> 1st June 2001.
  251 
  252 */
  253 File: aes.h
  254 
  255 /*===========================================================================
  256 
  257                       EDIT HISTORY FOR FILE
  258 
  259   $Header: //depot/asic/msmshared/sec/sec/MSM_SEC.03.03.08.xx/aes_tab.h#1 $
  260   $DateTime: 2006/12/11 00:43:21 $ $Author: davidf $
  261 
  262 when       who     what, where, why
  263 --------   ---     ----------------------------------------------------------
  264 11/12/04   rv      changes to correct LINT errors
  265 02/02/04   rwh     Small mods to open source.
  266 
  267 ===========================================================================*/
  268 /*lint -e146 -e303 */
  269 /* 146: Assuming a binary constant */
  270 /* 303: String too long (try +macros) */
  271 
  272 
  273  /*
  274    I retain copyright in this code but I encourage its free use provided
  275    that I don't carry any responsibility for the results. I am especially
  276    happy to see it used in free and open source software. If you do use
  277    it I would appreciate an acknowledgement of its origin in the code or
  278    the product that results and I would also appreciate knowing a liitle
  279    about the use to which it is being put.
  280 
  281    Dr B. R. Gladman <brg@gladman.uk.net> 1st June 2001.
  282  */
  283 File: aes_tab.h
  284 
  285 ===============================================================================
  286 6.
  287 ===============================================================================
  288 #FILE:Conftest.py
  289 # Copyright (c) 2003 Stichting NLnet Labs
  290 # Copyright (c) 2001, 2002, 2003 Steven Knight
  291 #
  292 # Permission is hereby granted, free of charge, to any person obtaining
  293 # a copy of this software and associated documentation files (the
  294 # "Software"), to deal in the Software without restriction, including
  295 # without limitation the rights to use, copy, modify, merge, publish,
  296 # distribute, sublicense, and/or sell copies of the Software, and to
  297 # permit persons to whom the Software is furnished to do so, subject to
  298 # the following conditions:
  299 #
  300 # The above copyright notice and this permission notice shall be included
  301 # in all copies or substantial portions of the Software.
  302 #
  303 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY
  304 # KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
  305 # WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
  306 # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
  307 # LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
  308 # OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
  309 # WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
  310 #
  311 #
  312 #
  313 ===============================================================================
  314 File: Conftest.py
  315 
  316 ===============================================================================
  317 7.
  318 ===============================================================================
  319 / ***
  320  *
  321  * Fowler/Noll/Vo- hash
  322  *
  323  * The basis of this hash algorithm was taken from an idea sent
  324  * as reviewer comments to the IEEE POSIX P1003.2 committee by:
  325  *
  326  *      Phong Vo (http://www.research.att.com/info/kpv/)
  327  *      Glenn Fowler (http://www.research.att.com/~gsf/)
  328  *
  329  * In a subsequent ballot round:
  330  *
  331  *      Landon Curt Noll (http://www.isthe.com/chongo/)
  332  *
  333  * improved on their algorithm.  Some people tried this hash
  334  * and found that it worked rather well.  In an EMail message
  335  * to Landon, they named it the ``Fowler/Noll/Vo'' or FNV hash.
  336  *
  337  * FNV hashes are designed to be fast while maintaining a low
  338  * collision rate. The FNV speed allows one to quickly hash lots
  339  * of data while maintaining a reasonable collision rate.  See:
  340  *
  341  *      http://www.isthe.com/chongo/tech/comp/fnv/index.html
  342  *
  343  * for more details as well as other forms of the FNV hash.
  344  *
  345  *
  346  * Please do not copyright this code.  This code is in the public domain.
  347  *
  348  * LANDON CURT NOLL DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,
  349  * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
  350  * EVENT SHALL LANDON CURT NOLL BE LIABLE FOR ANY SPECIAL, INDIRECT OR
  351  * CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF
  352  * USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR
  353  * OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  354  * PERFORMANCE OF THIS SOFTWARE.
  355  *
  356  * By:
  357  *	chongo <Landon Curt Noll> /\oo/\
  358  *      http://www.isthe.com/chongo/
  359  *
  360  * Share and Enjoy!	:-)
  361  */
  362 File: fm_fnv_hash.h, fm_fnv_hash.c
  363 
  364 ===============================================================================
  365 8.
  366 ===============================================================================
  367 
  368 /*
  369  *  $Header: //source/qcom/qct/core/api/kernel/main/latest/libstd/stringl/stringl.h#13 $
  370  *  $DateTime: 2013/07/24 11:35:54 $
  371  */
  372 
  373 /*	$OpenBSD: string.h,v 1.17 2006/01/06 18:53:04 millert Exp $	*/
  374 /*	$NetBSD: string.h,v 1.6 1994/10/26 00:56:30 cgd Exp $	*/
  375 
  376 /*-
  377  * Copyright (c) 1990 The Regents of the University of California.
  378  * All rights reserved.
  379  *
  380  * Redistribution and use in source and binary forms, with or without
  381  * modification, are permitted provided that the following conditions
  382  * are met:
  383  * 1. Redistributions of source code must retain the above copyright
  384  *    notice, this list of conditions and the following disclaimer.
  385  * 2. Redistributions in binary form must reproduce the above copyright
  386  *    notice, this list of conditions and the following disclaimer in the
  387  *    documentation and/or other materials provided with the distribution.
  388  * 3. Neither the name of the University nor the names of its contributors
  389  *    may be used to endorse or promote products derived from this software
  390  *    without specific prior written permission.
  391  *
  392  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
  393  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  394  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  395  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
  396  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  397  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  398  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  399  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  400  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  401  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  402  * SUCH DAMAGE.
  403  *
  404  *	@(#)string.h	5.10 (Berkeley) 3/9/91
  405  */
  406 File: stringl.h
  407 
  408 ===============================================================================
  409 9.
  410 ===============================================================================
  411 /*
  412  * Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com>
  413  *
  414  * Permission to use, copy, modify, and distribute this software for any
  415  * purpose with or without fee is hereby granted, provided that the above
  416  * copyright notice and this permission notice appear in all copies.
  417  *
  418  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  419  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  420  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  421  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  422  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  423  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  424  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  425  */
  426 File: wcslcpy.c, wcslcat.c, wstrlcpy.c, strlcat.c, strlcpy.c, wstrlcat.c

Generated by cgit