You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
787 lines
36 KiB
787 lines
36 KiB
4 years ago
|
This Notice.txt file contains certain notices of software components included with the software that Qualcomm Atheros, Inc. ("Qualcomm Atheros") is required to provide you. Except where prohibited by the open source license, the content of this notices file is only provided to satisfy Qualcomm Atheros's attribution and notice requirement; your use of these software components together with the Qualcomm Atheros software (Qualcomm Atheros software hereinafter referred to as "Software") is subject to the terms of your agreement from Qualcomm Atheros. Compliance with all copyright laws and software license agreements included in the notice section of this file are the responsibility of the user. Except as may be granted by separate express written agreement, this file provides no license to any patents, trademarks, copyrights, or other intellectual property of Qualcomm Incorporated or any of its subsidiaries.
|
||
|
|
||
|
Qualcomm is a trademark of Qualcomm Incorporated, registered in the United States and other countries. All Qualcomm Incorporated trademarks are used with permission. Other products and brand names may be trademarks or registered trademarks of their respective owners.
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/*
|
||
|
* WPA definitions shared between hostapd and wpa_supplicant
|
||
|
* Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi>
|
||
|
*
|
||
|
* This software may be distributed under the terms of the BSD license.
|
||
|
* See README for more details.
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/* WPA/RSN - Shared functions for supplicant and authenticator
|
||
|
* EAP common peer/server definitions
|
||
|
* EAP peer state machines (RFC 4137)
|
||
|
* Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi>
|
||
|
*
|
||
|
* This software may be distributed under the terms of the BSD license.
|
||
|
* See README for more details.
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/*
|
||
|
* Copyright (c) 2011 Qualcomm Atheros, Inc.
|
||
|
* All Rights Reserved.
|
||
|
* Qualcomm Atheros Confidential and Proprietary.
|
||
|
* Notifications and licenses are retained for attribution purposes only.
|
||
|
*/
|
||
|
/*
|
||
|
* For this file, which was received with alternative licensing options for
|
||
|
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||
|
*/
|
||
|
|
||
|
/*
|
||
|
* AES-based functions
|
||
|
*
|
||
|
*
|
||
|
* - AES Key Wrap Algorithm (128-bit KEK) (RFC3394)
|
||
|
* - One-Key CBC MAC (OMAC1) hash with AES-128
|
||
|
* - AES-128 CTR mode encryption
|
||
|
* - AES-128 EAX mode encryption/decryption
|
||
|
* - AES-128 CBC
|
||
|
*
|
||
|
* Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or modify
|
||
|
* it under the terms of the GNU General Public License version 2 as
|
||
|
* published by the Free Software Foundation.
|
||
|
*
|
||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||
|
* license.
|
||
|
*
|
||
|
* See README and COPYING for more details.
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/*
|
||
|
* Copyright (c) 2011 Qualcomm Atheros, Inc.
|
||
|
* All Rights Reserved.
|
||
|
* Qualcomm Atheros Confidential and Proprietary.
|
||
|
* Notifications and licenses are retained for attribution purposes only.
|
||
|
*/
|
||
|
/*
|
||
|
* For this file, which was received with alternative licensing options for
|
||
|
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||
|
*/
|
||
|
|
||
|
/*
|
||
|
* SHA1 hash implementation and interface functions
|
||
|
* Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or modify
|
||
|
* it under the terms of the GNU General Public License version 2 as
|
||
|
* published by the Free Software Foundation.
|
||
|
*
|
||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||
|
* license.
|
||
|
*
|
||
|
* See README and COPYING for more details.
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/*
|
||
|
* Copyright (c) 2011 Qualcomm Atheros, Inc.
|
||
|
* All Rights Reserved.
|
||
|
* Qualcomm Atheros Confidential and Proprietary.
|
||
|
* Notifications and licenses are retained for attribution purposes only.
|
||
|
*/
|
||
|
/*
|
||
|
* For this file, which was received with alternative licensing options for
|
||
|
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||
|
*/
|
||
|
|
||
|
/*
|
||
|
* WPA Supplicant / wrapper functions for crypto libraries
|
||
|
* Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or modify
|
||
|
* it under the terms of the GNU General Public License version 2 as
|
||
|
* published by the Free Software Foundation.
|
||
|
*
|
||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||
|
* license.
|
||
|
*
|
||
|
* See README and COPYING for more details.
|
||
|
*
|
||
|
* This file defines the cryptographic functions that need to be implemented
|
||
|
* for wpa_supplicant and hostapd. When TLS is not used, internal
|
||
|
* implementation of MD5, SHA1, and AES is used and no external libraries are
|
||
|
* required. When TLS is enabled (e.g., by enabling EAP-TLS or EAP-PEAP), the
|
||
|
* crypto library used by the TLS implementation is expected to be used for
|
||
|
* non-TLS needs, too, in order to save space by not implementing these
|
||
|
* functions twice.
|
||
|
*
|
||
|
* Wrapper code for using each crypto library is in its own file (crypto*.c)
|
||
|
* and one of these files is build and linked in to provide the functions
|
||
|
* defined here.
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/*
|
||
|
* For this file, which was received with alternative licensing options for
|
||
|
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||
|
*/
|
||
|
|
||
|
/*
|
||
|
* WPA Supplicant - Common definitions
|
||
|
* Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or modify
|
||
|
* it under the terms of the GNU General Public License version 2 as
|
||
|
* published by the Free Software Foundation.
|
||
|
*
|
||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||
|
* license.
|
||
|
*
|
||
|
* See README and COPYING for more details.
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/*
|
||
|
* For this file, which was received with alternative licensing options for
|
||
|
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||
|
*/
|
||
|
|
||
|
/*
|
||
|
* WPA Supplicant - WPA state machine and EAPOL-Key processing
|
||
|
* Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or modify
|
||
|
* it under the terms of the GNU General Public License version 2 as
|
||
|
* published by the Free Software Foundation.
|
||
|
*
|
||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||
|
* license.
|
||
|
*
|
||
|
* See README and COPYING for more details.
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/*
|
||
|
* For this file, which was received with alternative licensing options for
|
||
|
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||
|
*/
|
||
|
|
||
|
/*
|
||
|
* WPA Supplicant / Configuration file structures
|
||
|
* Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or modify
|
||
|
* it under the terms of the GNU General Public License version 2 as
|
||
|
* published by the Free Software Foundation.
|
||
|
*
|
||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||
|
* license.
|
||
|
*
|
||
|
* See README and COPYING for more details.
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/*
|
||
|
* Copyright (c) 2008, Atheros Communications Inc.
|
||
|
*
|
||
|
* Copyright (c) 2011 Qualcomm Atheros, Inc.
|
||
|
* Qualcomm Atheros, Inc. has chosen to take madwifi subject to the BSD license and terms.
|
||
|
*
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/*
|
||
|
* For this file, which was received with alternative licensing options for
|
||
|
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||
|
*/
|
||
|
|
||
|
/*
|
||
|
* wpa_supplicant - Internal WPA state machine definitions
|
||
|
* Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or modify
|
||
|
* it under the terms of the GNU General Public License version 2 as
|
||
|
* published by the Free Software Foundation.
|
||
|
*
|
||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||
|
* license.
|
||
|
*
|
||
|
* See README and COPYING for more details.
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/*
|
||
|
* For this file, which was received with alternative licensing options for
|
||
|
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||
|
*/
|
||
|
|
||
|
/*
|
||
|
* wpa_supplicant - WPA definitions
|
||
|
* Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or modify
|
||
|
* it under the terms of the GNU General Public License version 2 as
|
||
|
* published by the Free Software Foundation.
|
||
|
*
|
||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||
|
* license.
|
||
|
*
|
||
|
* See README and COPYING for more details.
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/*
|
||
|
* For this file, which was received with alternative licensing options for
|
||
|
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||
|
*/
|
||
|
|
||
|
/*
|
||
|
* wpa_supplicant/hostapd / common helper functions, etc.
|
||
|
* Copyright (c) 2002-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or modify
|
||
|
* it under the terms of the GNU General Public License version 2 as
|
||
|
* published by the Free Software Foundation.
|
||
|
*
|
||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||
|
* license.
|
||
|
*
|
||
|
* See README and COPYING for more details.
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
* Australian Public Licence B (OZPLB)
|
||
|
*
|
||
|
* Version 1-0
|
||
|
*
|
||
|
* Copyright (c) 2004, National ICT Australia
|
||
|
* Copyright (c) 2007, Open Kernel Labs, Inc.
|
||
|
*
|
||
|
* All rights reserved.
|
||
|
*
|
||
|
* Developed by: Embedded, Real-time and Operating Systems Program (ERTOS)
|
||
|
* National ICT Australia
|
||
|
* http://www.ertos.nicta.com.au
|
||
|
*
|
||
|
* Permission is granted by National ICT Australia, free of charge, to
|
||
|
* any person obtaining a copy of this software and any associated
|
||
|
* documentation files (the "Software") to deal with the Software without
|
||
|
* restriction, including (without limitation) the rights to use, copy,
|
||
|
* modify, adapt, merge, publish, distribute, communicate to the public,
|
||
|
* sublicense, and/or sell, lend or rent out copies of the Software, and
|
||
|
* to permit persons to whom the Software is furnished to do so, subject
|
||
|
* to the following conditions:
|
||
|
*
|
||
|
* * Redistributions of source code must retain the above copyright
|
||
|
* notice, this list of conditions and the following disclaimers.
|
||
|
*
|
||
|
* * Redistributions in binary form must reproduce the above
|
||
|
* copyright notice, this list of conditions and the following
|
||
|
* disclaimers in the documentation and/or other materials provided
|
||
|
* with the distribution.
|
||
|
*
|
||
|
* * Neither the name of National ICT Australia, nor the names of its
|
||
|
* contributors, may be used to endorse or promote products derived
|
||
|
* from this Software without specific prior written permission.
|
||
|
*
|
||
|
* EXCEPT AS EXPRESSLY STATED IN THIS LICENCE AND TO THE FULL EXTENT
|
||
|
* PERMITTED BY APPLICABLE LAW, THE SOFTWARE IS PROVIDED "AS-IS", AND
|
||
|
* NATIONAL ICT AUSTRALIA AND ITS CONTRIBUTORS MAKE NO REPRESENTATIONS,
|
||
|
* WARRANTIES OR CONDITIONS OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
|
||
|
* BUT NOT LIMITED TO ANY REPRESENTATIONS, WARRANTIES OR CONDITIONS
|
||
|
* REGARDING THE CONTENTS OR ACCURACY OF THE SOFTWARE, OR OF TITLE,
|
||
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT,
|
||
|
* THE ABSENCE OF LATENT OR OTHER DEFECTS, OR THE PRESENCE OR ABSENCE OF
|
||
|
* ERRORS, WHETHER OR NOT DISCOVERABLE.
|
||
|
*
|
||
|
* TO THE FULL EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL
|
||
|
* NATIONAL ICT AUSTRALIA OR ITS CONTRIBUTORS BE LIABLE ON ANY LEGAL
|
||
|
* THEORY (INCLUDING, WITHOUT LIMITATION, IN AN ACTION OF CONTRACT,
|
||
|
* NEGLIGENCE OR OTHERWISE) FOR ANY CLAIM, LOSS, DAMAGES OR OTHER
|
||
|
* LIABILITY, INCLUDING (WITHOUT LIMITATION) LOSS OF PRODUCTION OR
|
||
|
* OPERATION TIME, LOSS, DAMAGE OR CORRUPTION OF DATA OR RECORDS; OR LOSS
|
||
|
* OF ANTICIPATED SAVINGS, OPPORTUNITY, REVENUE, PROFIT OR GOODWILL, OR
|
||
|
* OTHER ECONOMIC LOSS; OR ANY SPECIAL, INCIDENTAL, INDIRECT,
|
||
|
* CONSEQUENTIAL, PUNITIVE OR EXEMPLARY DAMAGES, ARISING OUT OF OR IN
|
||
|
* CONNECTION WITH THIS LICENCE, THE SOFTWARE OR THE USE OF OR OTHER
|
||
|
* DEALINGS WITH THE SOFTWARE, EVEN IF NATIONAL ICT AUSTRALIA OR ITS
|
||
|
* CONTRIBUTORS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH CLAIM, LOSS,
|
||
|
* DAMAGES OR OTHER LIABILITY.
|
||
|
*
|
||
|
* If applicable legislation implies representations, warranties, or
|
||
|
* conditions, or imposes obligations or liability on National ICT
|
||
|
* Australia or one of its contributors in respect of the Software that
|
||
|
* cannot be wholly or partly excluded, restricted or modified, the
|
||
|
* liability of National ICT Australia or the contributor is limited, to
|
||
|
* the full extent permitted by the applicable legislation, at its
|
||
|
* option, to:
|
||
|
* a. in the case of goods, any one or more of the following:
|
||
|
* i. the replacement of the goods or the supply of equivalent goods;
|
||
|
* ii. the repair of the goods;
|
||
|
* iii. the payment of the cost of replacing the goods or of acquiring
|
||
|
* equivalent goods;
|
||
|
* iv. the payment of the cost of having the goods repaired; or
|
||
|
* b. in the case of services:
|
||
|
* i. the supplying of the services again; or
|
||
|
* ii. the payment of the cost of having the services supplied again.
|
||
|
*
|
||
|
* The construction, validity and performance of this licence is governed
|
||
|
* by the laws in force in New South Wales, Australia.
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
* Copyright (c) 2002-2004, Karlsruhe University
|
||
|
*
|
||
|
* Redistribution and use in source and binary forms, with or without
|
||
|
* modification, are permitted provided that the following conditions
|
||
|
* are met:
|
||
|
* 1. Redistributions of source code must retain the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer.
|
||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer in the
|
||
|
* documentation and/or other materials provided with the distribution.
|
||
|
*
|
||
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
||
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||
|
* SUCH DAMAGE.
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/*
|
||
|
* COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or
|
||
|
* code or tables extracted from it, as desired without restriction.
|
||
|
*
|
||
|
* First, the polynomial itself and its table of feedback terms. The
|
||
|
* polynomial is
|
||
|
* X^32+X^26+X^23+X^22+X^16+X^12+X^11+X^10+X^8+X^7+X^5+X^4+X^2+X^1+X^0
|
||
|
*
|
||
|
* Note that we take it "backwards" and put the highest-order term in
|
||
|
* the lowest-order bit. The X^32 term is "implied"; the LSB is the
|
||
|
* X^31 term, etc. The X^0 term (usually shown as "+1") results in
|
||
|
* the MSB being 1
|
||
|
*
|
||
|
* Note that the usual hardware shift register implementation, which
|
||
|
* is what we're using (we're merely optimizing it by doing eight-bit
|
||
|
* chunks at a time) shifts bits into the lowest-order term. In our
|
||
|
* implementation, that means shifting towards the right. Why do we
|
||
|
* do it this way? Because the calculated CRC must be transmitted in
|
||
|
* order from highest-order term to lowest-order term. UARTs transmit
|
||
|
* characters in order from LSB to MSB. By storing the CRC this way
|
||
|
* we hand it to the UART in the order low-byte to high-byte; the UART
|
||
|
* sends each low-bit to hight-bit; and the result is transmission bit
|
||
|
* by bit from highest- to lowest-order term without requiring any bit
|
||
|
* shuffling on our part. Reception works similarly
|
||
|
*
|
||
|
* The feedback terms table consists of 256, 32-bit entries. Notes
|
||
|
*
|
||
|
* The table can be generated at runtime if desired; code to do so
|
||
|
* is shown later. It might not be obvious, but the feedback
|
||
|
* terms simply represent the results of eight shift/xor opera
|
||
|
* tions for all combinations of data and CRC register values
|
||
|
*
|
||
|
* The values must be right-shifted by eight bits by the "updcrc
|
||
|
* logic; the shift must be unsigned (bring in zeroes). On some
|
||
|
* hardware you could probably optimize the shift in assembler by
|
||
|
* using byte-swap instructions
|
||
|
* polynomial $edb88320
|
||
|
*
|
||
|
*
|
||
|
* CRC32 code derived from work by Gary S. Brown.
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
* AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/
|
||
|
*
|
||
|
* Copyright (c) 2000-2001, Aaron D. Gifford
|
||
|
* All rights reserved.
|
||
|
*
|
||
|
* Redistribution and use in source and binary forms, with or without
|
||
|
* modification, are permitted provided that the following conditions
|
||
|
* are met:
|
||
|
* 1. Redistributions of source code must retain the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer.
|
||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer in the
|
||
|
* documentation and/or other materials provided with the distribution.
|
||
|
* 3. Neither the name of the copyright holder nor the names of contributors
|
||
|
* may be used to endorse or promote products derived from this software
|
||
|
* without specific prior written permission.
|
||
|
*
|
||
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
|
||
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
|
||
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||
|
* SUCH DAMAGE.
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
* Copyright (c) 1988, 1993
|
||
|
* The Regents of the University of California. All rights reserved.
|
||
|
*
|
||
|
* Redistribution and use in source and binary forms, with or without
|
||
|
* modification, are permitted provided that the following conditions
|
||
|
* are met:
|
||
|
* 1. Redistributions of source code must retain the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer.
|
||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer in the
|
||
|
* documentation and/or other materials provided with the distribution.
|
||
|
* 3. All advertising materials mentioning features or use of this software
|
||
|
* must display the following acknowledgement:
|
||
|
* This product includes software developed by the University of
|
||
|
* California, Berkeley and its contributors.
|
||
|
* 4. Neither the name of the University nor the names of its contributors
|
||
|
* may be used to endorse or promote products derived from this software
|
||
|
* without specific prior written permission.
|
||
|
*
|
||
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||
|
* SUCH DAMAGE.
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
* Copyright (c) 1982, 1986, 1990, 1991, 1993 The Regents of the University of California.
|
||
|
* All rights reserved.
|
||
|
*
|
||
|
* Redistribution and use in source and binary forms, with or without
|
||
|
* modification, are permitted provided that the following conditions
|
||
|
* are met:
|
||
|
* 1. Redistributions of source code must retain the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer.
|
||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer in the
|
||
|
* documentation and/or other materials provided with the distribution.
|
||
|
* 3. Neither the name of the University nor the names of its contributors
|
||
|
* may be used to endorse or promote products derived from this software
|
||
|
* without specific prior written permission.
|
||
|
*
|
||
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||
|
* SUCH DAMAGE.
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
# Copyright (c) 2012-2015 Qualcomm Atheros, Inc.
|
||
|
#
|
||
|
# Permission to use, copy, modify, and/or distribute this software for any
|
||
|
# purpose with or without fee is hereby granted, provided that the above
|
||
|
# copyright notice and this permission notice appear in all copies.
|
||
|
#
|
||
|
# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||
|
# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||
|
# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
||
|
# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||
|
# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
||
|
# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
||
|
# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
* Copyright (c) 1988, 1993
|
||
|
* The Regents of the University of California. All rights reserved.
|
||
|
*
|
||
|
* Redistribution and use in source and binary forms, with or without
|
||
|
* modification, are permitted provided that the following conditions
|
||
|
* are met:
|
||
|
* 1. Redistributions of source code must retain the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer.
|
||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer in the
|
||
|
* documentation and/or other materials provided with the distribution.
|
||
|
* 3. All advertising materials mentioning features or use of this software
|
||
|
* must display the following acknowledgement:
|
||
|
* This product includes software developed by the University of
|
||
|
* California, Berkeley and its contributors.
|
||
|
* 4. Neither the name of the University nor the names of its contributors
|
||
|
* may be used to endorse or promote products derived from this software
|
||
|
* without specific prior written permission.
|
||
|
*
|
||
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||
|
* SUCH DAMAGE.
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/* $OpenBSD: string.h,v 1.17 2006/01/06 18:53:04 millert Exp $ */
|
||
|
/* $NetBSD: string.h,v 1.6 1994/10/26 00:56:30 cgd Exp $ */
|
||
|
|
||
|
/*-
|
||
|
* Copyright (c) 1990 The Regents of the University of California.
|
||
|
* All rights reserved.
|
||
|
*
|
||
|
* Redistribution and use in source and binary forms, with or without
|
||
|
* modification, are permitted provided that the following conditions
|
||
|
* are met:
|
||
|
* 1. Redistributions of source code must retain the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer.
|
||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer in the
|
||
|
* documentation and/or other materials provided with the distribution.
|
||
|
* 3. Neither the name of the University nor the names of its contributors
|
||
|
* may be used to endorse or promote products derived from this software
|
||
|
* without specific prior written permission.
|
||
|
*
|
||
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||
|
* SUCH DAMAGE.
|
||
|
*
|
||
|
* @(#)string.h 5.10 (Berkeley) 3/9/91
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
// Copyright (c) 1991, 1993
|
||
|
// The Regents of the University of California. All rights reserved.
|
||
|
// $ATH_LICENSE_NULL$
|
||
|
//
|
||
|
// Redistribution and use in source and binary forms, with or without
|
||
|
// modification, are permitted provided that the following conditions
|
||
|
// are met:
|
||
|
// 1. Redistributions of source code must retain the above copyright
|
||
|
// notice, this list of conditions and the following disclaimer.
|
||
|
// 2. Redistributions in binary form must reproduce the above copyright
|
||
|
// notice, this list of conditions and the following disclaimer in the
|
||
|
// documentation and/or other materials provided with the distribution.
|
||
|
// 3. All advertising materials mentioning features or use of this software
|
||
|
// must display the following acknowledgement:
|
||
|
// This product includes software developed by the University of
|
||
|
// California, Berkeley and its contributors.
|
||
|
// 4. Neither the name of the University nor the names of its contributors
|
||
|
// may be used to endorse or promote products derived from this software
|
||
|
// without specific prior written permission.
|
||
|
//
|
||
|
// THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||
|
// ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||
|
// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||
|
// ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||
|
// FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||
|
// DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||
|
// OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||
|
// HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||
|
// LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||
|
// OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||
|
// SUCH DAMAGE.
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
* Copyright (c) 1998, 2010 Todd C. Miller <Todd.Miller@courtesan.com>
|
||
|
*
|
||
|
* Permission to use, copy, modify, and distribute this software for any
|
||
|
* purpose with or without fee is hereby granted, provided that the above
|
||
|
* copyright notice and this permission notice appear in all copies.
|
||
|
*
|
||
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
||
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
||
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
||
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/*
|
||
|
* Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com>
|
||
|
* All rights reserved.
|
||
|
*
|
||
|
* Redistribution and use in source and binary forms, with or without
|
||
|
* modification, are permitted provided that the following conditions
|
||
|
* are met:
|
||
|
* 1. Redistributions of source code must retain the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer.
|
||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer in the
|
||
|
* documentation and/or other materials provided with the distribution.
|
||
|
* 3. The name of the author may not be used to endorse or promote products
|
||
|
* derived from this software without specific prior written permission.
|
||
|
*
|
||
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
|
||
|
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
|
||
|
* AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
||
|
* THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
|
||
|
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
||
|
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
|
||
|
* OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
||
|
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
|
||
|
* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
||
|
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
** Copyright (c) 2004-2010, Atheros Communications Inc.
|
||
|
**
|
||
|
** Permission to use, copy, modify, and/or distribute this software for any
|
||
|
** purpose with or without fee is hereby granted, provided that the above
|
||
|
** copyright notice and this permission notice appear in all copies.
|
||
|
**
|
||
|
** THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||
|
** WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||
|
** MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
||
|
** ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||
|
** WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
||
|
** ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
||
|
** OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||
|
**
|
||
|
** This module is the Atheros specific ioctl/iwconfig/iwpriv interface
|
||
|
** to the ATH object, normally instantiated as wifiX, where X is the
|
||
|
** instance number (e.g. wifi0, wifi1).
|
||
|
**
|
||
|
** This provides a mechanism to configure the ATH object within the
|
||
|
** Linux OS enviornment. This file is OS specific.
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/*
|
||
|
* Copyright (c) 2012 Qualcomm Atheros, Inc.
|
||
|
* All Rights Reserved.
|
||
|
* Qualcomm Atheros Confidential and Proprietary.
|
||
|
*/
|
||
|
|
||
|
/*
|
||
|
* For this file, which was received with alternative licensing options for
|
||
|
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||
|
*/
|
||
|
|
||
|
//-
|
||
|
// Copyright (c) 2002-2004 Sam Leffler, Errno Consulting
|
||
|
// All rights reserved.
|
||
|
// $ATH_LICENSE_NULL$
|
||
|
//
|
||
|
// Redistribution and use in source and binary forms, with or without
|
||
|
// modification, are permitted provided that the following conditions
|
||
|
// are met:
|
||
|
// 1. Redistributions of source code must retain the above copyright
|
||
|
// notice, this list of conditions and the following disclaimer,
|
||
|
// without modification.
|
||
|
// 2. Redistributions in binary form must reproduce at minimum a disclaimer
|
||
|
// similar to the "NO WARRANTY" disclaimer below ("Disclaimer") and any
|
||
|
// redistribution must be conditioned upon including a substantially
|
||
|
// similar Disclaimer requirement for further binary redistribution.
|
||
|
// 3. Neither the names of the above-listed copyright holders nor the names
|
||
|
// of any contributors may be used to endorse or promote products derived
|
||
|
// from this software without specific prior written permission.
|
||
|
//
|
||
|
// Alternatively, this software may be distributed under the terms of the
|
||
|
// GNU General Public License ("GPL") version 2 as published by the Free
|
||
|
// Software Foundation.
|
||
|
//
|
||
|
// NO WARRANTY
|
||
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||
|
// ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||
|
// LIMITED TO, THE IMPLIED WARRANTIES OF NONINFRINGEMENT, MERCHANTIBILITY
|
||
|
// AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
||
|
// THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY,
|
||
|
// OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||
|
// SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
|
||
|
// IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||
|
// ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
|
||
|
// THE POSSIBILITY OF SUCH DAMAGES.
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/*
|
||
|
* AES SIV (RFC 5297)
|
||
|
* Copyright (c) 2013 Cozybit, Inc.
|
||
|
*
|
||
|
* This software may be distributed under the terms of the BSD license.
|
||
|
*/
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
* Copyright 2018 The Android Open Source Project
|
||
|
*
|
||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
* you may not use this file except in compliance with the License.
|
||
|
* You may obtain a copy of the License at
|
||
|
*
|
||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||
|
*
|
||
|
* Unless required by applicable law or agreed to in writing, software
|
||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
* See the License for the specific language governing permissions and
|
||
|
* limitations under the License.
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
/* ===== start - public domain SHA256 implementation ===== */
|
||
|
|
||
|
/* This is based on SHA256 implementation in LibTomCrypt that was released into
|
||
|
* public domain by Tom St Denis. */
|
||
|
|
||
|
--------------------
|
||
|
|
||
|
// This code implements the MD5 message-digest algorithm.
|
||
|
// The algorithm is due to Ron Rivest. This code was
|
||
|
// written by Colin Plumb in 1993, no copyright is claimed.
|
||
|
// This code is in the public domain; do with it what you wish.
|
||
|
//
|
||
|
// Equivalent code is available from RSA Data Security, Inc.
|
||
|
// This code has been tested against that, and is equivalent,
|
||
|
// except that you don't need to include two pages of legalese
|
||
|
// with every copy.
|
||
|
//
|
||
|
|
||
|
--------------------
|