--- /dev/null
+This Notice.txt file contains certain notices of software components included with the software that Qualcomm Atheros, Inc. \r
+(“Qualcomm Atheros”) is required to provide you. Except where prohibited by the open source license, the content of this \r
+notices file is only provided to satisfy Qualcomm Atheros's attribution and notice requirement; your use of these software \r
+components together with the Qualcomm Atheros software (Qualcomm Atheros software hereinafter referred to as “Software”) is \r
+subject to the terms of your agreement from Qualcomm Atheros. Compliance with all copyright laws and software license agreements \r
+included in the notice section of this file are the responsibility of the user. Except as may be granted by separate express \r
+written agreement, this file provides no license to any patents, trademarks, copyrights, or other intellectual property of \r
+Qualcomm Incorporated or any of its subsidiaries.\r
+\r
+Qualcomm is a trademark of Qualcomm Incorporated, registered in the United States and other countries. All Qualcomm Incorporated \r
+trademarks are used with permission. Other products and brand names may be trademarks or registered trademarks of their respective\r
+owners.\r
+\r
+--------------------\r
+\r
+ /* \r
+ * WPA definitions shared between hostapd and wpa_supplicant\r
+ * Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi>\r
+ * \r
+ * This software may be distributed under the terms of the BSD license.\r
+ * See README for more details. \r
+ */\r
+ \r
+--------------------\r
+\r
+ /* WPA/RSN - Shared functions for supplicant and authenticator\r
+ * EAP common peer/server definitions\r
+ * EAP peer state machines (RFC 4137)\r
+ * Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi>\r
+ * \r
+ * This software may be distributed under the terms of the BSD license.\r
+ * See README for more details.\r
+ */ \r
+\r
+--------------------\r
+\r
+/*\r
+ * Copyright (c) 2011 Qualcomm Atheros, Inc.\r
+ * All Rights Reserved.\r
+ * Qualcomm Atheros Confidential and Proprietary.\r
+ * Notifications and licenses are retained for attribution purposes only.\r
+ */\r
+/*\r
+ * For this file, which was received with alternative licensing options for\r
+ * distribution, Qualcomm Atheros, Inc. has selected the BSD license.\r
+ */\r
+\r
+/*\r
+ * AES-based functions\r
+ *\r
+ *\r
+ * - AES Key Wrap Algorithm (128-bit KEK) (RFC3394)\r
+ * - One-Key CBC MAC (OMAC1) hash with AES-128\r
+ * - AES-128 CTR mode encryption\r
+ * - AES-128 EAX mode encryption/decryption\r
+ * - AES-128 CBC\r
+ *\r
+ * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>\r
+ *\r
+ * This program is free software; you can redistribute it and/or modify\r
+ * it under the terms of the GNU General Public License version 2 as\r
+ * published by the Free Software Foundation.\r
+ *\r
+ * Alternatively, this software may be distributed under the terms of BSD\r
+ * license.\r
+ *\r
+ * See README and COPYING for more details.\r
+ */\r
+\r
+--------------------\r
+\r
+/*\r
+ * Copyright (c) 2011 Qualcomm Atheros, Inc.\r
+ * All Rights Reserved.\r
+ * Qualcomm Atheros Confidential and Proprietary.\r
+ * Notifications and licenses are retained for attribution purposes only.\r
+ */\r
+/*\r
+ * For this file, which was received with alternative licensing options for\r
+ * distribution, Qualcomm Atheros, Inc. has selected the BSD license.\r
+ */\r
+\r
+/*\r
+ * SHA1 hash implementation and interface functions\r
+ * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>\r
+ *\r
+ * This program is free software; you can redistribute it and/or modify\r
+ * it under the terms of the GNU General Public License version 2 as\r
+ * published by the Free Software Foundation.\r
+ *\r
+ * Alternatively, this software may be distributed under the terms of BSD\r
+ * license.\r
+ *\r
+ * See README and COPYING for more details.\r
+ */\r
+\r
+--------------------\r
+\r
+/*\r
+ * Copyright (c) 2011 Qualcomm Atheros, Inc.\r
+ * All Rights Reserved.\r
+ * Qualcomm Atheros Confidential and Proprietary.\r
+ * Notifications and licenses are retained for attribution purposes only.\r
+ */\r
+/*\r
+ * For this file, which was received with alternative licensing options for\r
+ * distribution, Qualcomm Atheros, Inc. has selected the BSD license.\r
+ */\r
+\r
+/*\r
+ * WPA Supplicant / wrapper functions for crypto libraries\r
+ * Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>\r
+ *\r
+ * This program is free software; you can redistribute it and/or modify\r
+ * it under the terms of the GNU General Public License version 2 as\r
+ * published by the Free Software Foundation.\r
+ *\r
+ * Alternatively, this software may be distributed under the terms of BSD\r
+ * license.\r
+ *\r
+ * See README and COPYING for more details.\r
+ *\r
+ * This file defines the cryptographic functions that need to be implemented\r
+ * for wpa_supplicant and hostapd. When TLS is not used, internal\r
+ * implementation of MD5, SHA1, and AES is used and no external libraries are\r
+ * required. When TLS is enabled (e.g., by enabling EAP-TLS or EAP-PEAP), the\r
+ * crypto library used by the TLS implementation is expected to be used for\r
+ * non-TLS needs, too, in order to save space by not implementing these\r
+ * functions twice.\r
+ *\r
+ * Wrapper code for using each crypto library is in its own file (crypto*.c)\r
+ * and one of these files is build and linked in to provide the functions\r
+ * defined here.\r
+ */\r
+\r
+--------------------\r
+\r
+/*\r
+ * For this file, which was received with alternative licensing options for\r
+ * distribution, Qualcomm Atheros, Inc. has selected the BSD license.\r
+ */\r
+\r
+/*\r
+ * WPA Supplicant - Common definitions\r
+ * Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>\r
+ *\r
+ * This program is free software; you can redistribute it and/or modify\r
+ * it under the terms of the GNU General Public License version 2 as\r
+ * published by the Free Software Foundation.\r
+ *\r
+ * Alternatively, this software may be distributed under the terms of BSD\r
+ * license.\r
+ *\r
+ * See README and COPYING for more details.\r
+ */\r
+\r
+--------------------\r
+\r
+/*\r
+ * For this file, which was received with alternative licensing options for\r
+ * distribution, Qualcomm Atheros, Inc. has selected the BSD license.\r
+ */\r
+\r
+/*\r
+ * WPA Supplicant - WPA state machine and EAPOL-Key processing\r
+ * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>\r
+ *\r
+ * This program is free software; you can redistribute it and/or modify\r
+ * it under the terms of the GNU General Public License version 2 as\r
+ * published by the Free Software Foundation.\r
+ *\r
+ * Alternatively, this software may be distributed under the terms of BSD\r
+ * license.\r
+ *\r
+ * See README and COPYING for more details.\r
+ */\r
+\r
+--------------------\r
+\r
+/*\r
+ * For this file, which was received with alternative licensing options for\r
+ * distribution, Qualcomm Atheros, Inc. has selected the BSD license.\r
+ */\r
+\r
+/*\r
+ * WPA Supplicant / Configuration file structures\r
+ * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>\r
+ *\r
+ * This program is free software; you can redistribute it and/or modify\r
+ * it under the terms of the GNU General Public License version 2 as\r
+ * published by the Free Software Foundation.\r
+ *\r
+ * Alternatively, this software may be distributed under the terms of BSD\r
+ * license.\r
+ *\r
+ * See README and COPYING for more details.\r
+ */\r
+\r
+--------------------\r
+\r
+ /*\r
+ * Copyright (c) 2008, Atheros Communications Inc.\r
+ *\r
+ * Copyright (c) 2011 Qualcomm Atheros, Inc.\r
+ * Qualcomm Atheros, Inc. has chosen to take madwifi subject to the BSD license and terms.\r
+ *\r
+ */\r
+\r
+--------------------\r
+\r
+/*\r
+ * For this file, which was received with alternative licensing options for\r
+ * distribution, Qualcomm Atheros, Inc. has selected the BSD license.\r
+ */\r
+\r
+/*\r
+ * wpa_supplicant - Internal WPA state machine definitions\r
+ * Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>\r
+ *\r
+ * This program is free software; you can redistribute it and/or modify\r
+ * it under the terms of the GNU General Public License version 2 as\r
+ * published by the Free Software Foundation.\r
+ *\r
+ * Alternatively, this software may be distributed under the terms of BSD\r
+ * license.\r
+ *\r
+ * See README and COPYING for more details.\r
+ */\r
+\r
+--------------------\r
+\r
+/*\r
+ * For this file, which was received with alternative licensing options for\r
+ * distribution, Qualcomm Atheros, Inc. has selected the BSD license.\r
+ */\r
+\r
+/*\r
+ * wpa_supplicant - WPA definitions\r
+ * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>\r
+ *\r
+ * This program is free software; you can redistribute it and/or modify\r
+ * it under the terms of the GNU General Public License version 2 as\r
+ * published by the Free Software Foundation.\r
+ *\r
+ * Alternatively, this software may be distributed under the terms of BSD\r
+ * license.\r
+ *\r
+ * See README and COPYING for more details.\r
+ */\r
+\r
+--------------------\r
+\r
+/*\r
+ * For this file, which was received with alternative licensing options for\r
+ * distribution, Qualcomm Atheros, Inc. has selected the BSD license.\r
+ */\r
+\r
+/*\r
+ * wpa_supplicant/hostapd / common helper functions, etc.\r
+ * Copyright (c) 2002-2005, Jouni Malinen <jkmaline@cc.hut.fi>\r
+ *\r
+ * This program is free software; you can redistribute it and/or modify\r
+ * it under the terms of the GNU General Public License version 2 as\r
+ * published by the Free Software Foundation.\r
+ *\r
+ * Alternatively, this software may be distributed under the terms of BSD\r
+ * license.\r
+ *\r
+ * See README and COPYING for more details.\r
+ */\r
+\r
+--------------------\r
+\r
+ * Australian Public Licence B (OZPLB)\r
+ *\r
+ * Version 1-0\r
+ *\r
+ * Copyright (c) 2004, National ICT Australia\r
+ * Copyright (c) 2007, Open Kernel Labs, Inc.\r
+ *\r
+ * All rights reserved. \r
+ *\r
+ * Developed by: Embedded, Real-time and Operating Systems Program (ERTOS)\r
+ * National ICT Australia\r
+ * http://www.ertos.nicta.com.au\r
+ *\r
+ * Permission is granted by National ICT Australia, free of charge, to\r
+ * any person obtaining a copy of this software and any associated\r
+ * documentation files (the "Software") to deal with the Software without\r
+ * restriction, including (without limitation) the rights to use, copy,\r
+ * modify, adapt, merge, publish, distribute, communicate to the public,\r
+ * sublicense, and/or sell, lend or rent out copies of the Software, and\r
+ * to permit persons to whom the Software is furnished to do so, subject\r
+ * to the following conditions:\r
+ *\r
+ * * Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimers.\r
+ *\r
+ * * Redistributions in binary form must reproduce the above\r
+ * copyright notice, this list of conditions and the following\r
+ * disclaimers in the documentation and/or other materials provided\r
+ * with the distribution.\r
+ *\r
+ * * Neither the name of National ICT Australia, nor the names of its\r
+ * contributors, may be used to endorse or promote products derived\r
+ * from this Software without specific prior written permission.\r
+ *\r
+ * EXCEPT AS EXPRESSLY STATED IN THIS LICENCE AND TO THE FULL EXTENT\r
+ * PERMITTED BY APPLICABLE LAW, THE SOFTWARE IS PROVIDED "AS-IS", AND\r
+ * NATIONAL ICT AUSTRALIA AND ITS CONTRIBUTORS MAKE NO REPRESENTATIONS,\r
+ * WARRANTIES OR CONDITIONS OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING\r
+ * BUT NOT LIMITED TO ANY REPRESENTATIONS, WARRANTIES OR CONDITIONS\r
+ * REGARDING THE CONTENTS OR ACCURACY OF THE SOFTWARE, OR OF TITLE,\r
+ * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT,\r
+ * THE ABSENCE OF LATENT OR OTHER DEFECTS, OR THE PRESENCE OR ABSENCE OF\r
+ * ERRORS, WHETHER OR NOT DISCOVERABLE.\r
+ *\r
+ * TO THE FULL EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL\r
+ * NATIONAL ICT AUSTRALIA OR ITS CONTRIBUTORS BE LIABLE ON ANY LEGAL\r
+ * THEORY (INCLUDING, WITHOUT LIMITATION, IN AN ACTION OF CONTRACT,\r
+ * NEGLIGENCE OR OTHERWISE) FOR ANY CLAIM, LOSS, DAMAGES OR OTHER\r
+ * LIABILITY, INCLUDING (WITHOUT LIMITATION) LOSS OF PRODUCTION OR\r
+ * OPERATION TIME, LOSS, DAMAGE OR CORRUPTION OF DATA OR RECORDS; OR LOSS\r
+ * OF ANTICIPATED SAVINGS, OPPORTUNITY, REVENUE, PROFIT OR GOODWILL, OR\r
+ * OTHER ECONOMIC LOSS; OR ANY SPECIAL, INCIDENTAL, INDIRECT,\r
+ * CONSEQUENTIAL, PUNITIVE OR EXEMPLARY DAMAGES, ARISING OUT OF OR IN\r
+ * CONNECTION WITH THIS LICENCE, THE SOFTWARE OR THE USE OF OR OTHER\r
+ * DEALINGS WITH THE SOFTWARE, EVEN IF NATIONAL ICT AUSTRALIA OR ITS\r
+ * CONTRIBUTORS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH CLAIM, LOSS,\r
+ * DAMAGES OR OTHER LIABILITY.\r
+ *\r
+ * If applicable legislation implies representations, warranties, or\r
+ * conditions, or imposes obligations or liability on National ICT\r
+ * Australia or one of its contributors in respect of the Software that\r
+ * cannot be wholly or partly excluded, restricted or modified, the\r
+ * liability of National ICT Australia or the contributor is limited, to\r
+ * the full extent permitted by the applicable legislation, at its\r
+ * option, to:\r
+ * a. in the case of goods, any one or more of the following:\r
+ * i. the replacement of the goods or the supply of equivalent goods;\r
+ * ii. the repair of the goods;\r
+ * iii. the payment of the cost of replacing the goods or of acquiring\r
+ * equivalent goods;\r
+ * iv. the payment of the cost of having the goods repaired; or\r
+ * b. in the case of services:\r
+ * i. the supplying of the services again; or\r
+ * ii. the payment of the cost of having the services supplied again.\r
+ *\r
+ * The construction, validity and performance of this licence is governed\r
+ * by the laws in force in New South Wales, Australia.\r
+\r
+--------------------\r
+\r
+ * Copyright (c) 2002-2004, Karlsruhe University\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+\r
+--------------------\r
+\r
+ /* \r
+ * COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or \r
+ * code or tables extracted from it, as desired without restriction. \r
+ * \r
+ * First, the polynomial itself and its table of feedback terms. The \r
+ * polynomial is \r
+ * X^32+X^26+X^23+X^22+X^16+X^12+X^11+X^10+X^8+X^7+X^5+X^4+X^2+X^1+X^0 \r
+ * \r
+ * Note that we take it "backwards" and put the highest-order term in \r
+ * the lowest-order bit. The X^32 term is "implied"; the LSB is the \r
+ * X^31 term, etc. The X^0 term (usually shown as "+1") results in \r
+ * the MSB being 1 \r
+ * \r
+ * Note that the usual hardware shift register implementation, which \r
+ * is what we're using (we're merely optimizing it by doing eight-bit \r
+ * chunks at a time) shifts bits into the lowest-order term. In our \r
+ * implementation, that means shifting towards the right. Why do we \r
+ * do it this way? Because the calculated CRC must be transmitted in \r
+ * order from highest-order term to lowest-order term. UARTs transmit \r
+ * characters in order from LSB to MSB. By storing the CRC this way \r
+ * we hand it to the UART in the order low-byte to high-byte; the UART \r
+ * sends each low-bit to hight-bit; and the result is transmission bit \r
+ * by bit from highest- to lowest-order term without requiring any bit \r
+ * shuffling on our part. Reception works similarly \r
+ * \r
+ * The feedback terms table consists of 256, 32-bit entries. Notes \r
+ * \r
+ * The table can be generated at runtime if desired; code to do so \r
+ * is shown later. It might not be obvious, but the feedback \r
+ * terms simply represent the results of eight shift/xor opera \r
+ * tions for all combinations of data and CRC register values \r
+ * \r
+ * The values must be right-shifted by eight bits by the "updcrc \r
+ * logic; the shift must be unsigned (bring in zeroes). On some \r
+ * hardware you could probably optimize the shift in assembler by \r
+ * using byte-swap instructions \r
+ * polynomial $edb88320 \r
+ * \r
+ * \r
+ * CRC32 code derived from work by Gary S. Brown. \r
+ */ \r
+ \r
+--------------------\r
+\r
+ * AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/\r
+ *\r
+ * Copyright (c) 2000-2001, Aaron D. Gifford\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the copyright holder nor the names of contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+\r
+--------------------\r
+\r
+ * Copyright (c) 1988, 1993\r
+ * The Regents of the University of California. All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. All advertising materials mentioning features or use of this software\r
+ * must display the following acknowledgement:\r
+ * This product includes software developed by the University of\r
+ * California, Berkeley and its contributors.\r
+ * 4. Neither the name of the University nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+\r
+--------------------\r
+\r
+ * Copyright (c) 1982, 1986, 1990, 1991, 1993 The Regents of the University of California.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the University nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+\r
+--------------------\r
+\r
+# Copyright (c) 2012-2015 Qualcomm Atheros, Inc.\r
+#\r
+# Permission to use, copy, modify, and/or distribute this software for any\r
+# purpose with or without fee is hereby granted, provided that the above\r
+# copyright notice and this permission notice appear in all copies.\r
+#\r
+# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES\r
+# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF\r
+# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR\r
+# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES\r
+# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN\r
+# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF\r
+# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.\r
+\r
+--------------------\r
+\r
+ * Copyright (c) 1988, 1993\r
+ * The Regents of the University of California. All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. All advertising materials mentioning features or use of this software\r
+ * must display the following acknowledgement:\r
+ * This product includes software developed by the University of\r
+ * California, Berkeley and its contributors.\r
+ * 4. Neither the name of the University nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+\r
+--------------------\r
+\r
+/* $OpenBSD: string.h,v 1.17 2006/01/06 18:53:04 millert Exp $ */\r
+/* $NetBSD: string.h,v 1.6 1994/10/26 00:56:30 cgd Exp $ */\r
+\r
+/*-\r
+ * Copyright (c) 1990 The Regents of the University of California.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the University nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * @(#)string.h 5.10 (Berkeley) 3/9/91\r
+ */\r
+\r
+--------------------\r
+\r
+ // Copyright (c) 1991, 1993\r
+ // The Regents of the University of California. All rights reserved.\r
+ // $ATH_LICENSE_NULL$\r
+ //\r
+ // Redistribution and use in source and binary forms, with or without\r
+ // modification, are permitted provided that the following conditions\r
+ // are met:\r
+ // 1. Redistributions of source code must retain the above copyright\r
+ // notice, this list of conditions and the following disclaimer.\r
+ // 2. Redistributions in binary form must reproduce the above copyright\r
+ // notice, this list of conditions and the following disclaimer in the\r
+ // documentation and/or other materials provided with the distribution.\r
+ // 3. All advertising materials mentioning features or use of this software\r
+ // must display the following acknowledgement:\r
+ // This product includes software developed by the University of\r
+ // California, Berkeley and its contributors.\r
+ // 4. Neither the name of the University nor the names of its contributors\r
+ // may be used to endorse or promote products derived from this software\r
+ // without specific prior written permission.\r
+ //\r
+ // THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND\r
+ // ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ // IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ // ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE\r
+ // FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ // DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ // OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ // HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ // LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ // OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ // SUCH DAMAGE.\r
+\r
+--------------------\r
+\r
+ * Copyright (c) 1998, 2010 Todd C. Miller <Todd.Miller@courtesan.com>\r
+ *\r
+ * Permission to use, copy, modify, and distribute this software for any\r
+ * purpose with or without fee is hereby granted, provided that the above\r
+ * copyright notice and this permission notice appear in all copies.\r
+ *\r
+ * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES\r
+ * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF\r
+ * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR\r
+ * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES\r
+ * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN\r
+ * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF\r
+ * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.\r
+\r
+--------------------\r
+\r
+/*\r
+ * Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com>\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. The name of the author may not be used to endorse or promote products\r
+ * derived from this software without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,\r
+ * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY\r
+ * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL\r
+ * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,\r
+ * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,\r
+ * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;\r
+ * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\r
+ * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR\r
+ * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF\r
+ * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\r
+ */\r
+\r
+--------------------\r
+\r
+** Copyright (c) 2004-2010, Atheros Communications Inc.\r
+**\r
+** Permission to use, copy, modify, and/or distribute this software for any\r
+** purpose with or without fee is hereby granted, provided that the above\r
+** copyright notice and this permission notice appear in all copies.\r
+**\r
+** THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES\r
+** WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF\r
+** MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR\r
+** ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES\r
+** WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN\r
+** ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF\r
+** OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.\r
+**\r
+** This module is the Atheros specific ioctl/iwconfig/iwpriv interface\r
+** to the ATH object, normally instantiated as wifiX, where X is the\r
+** instance number (e.g. wifi0, wifi1).\r
+**\r
+** This provides a mechanism to configure the ATH object within the\r
+** Linux OS enviornment. This file is OS specific.\r
+\r
+--------------------\r
+\r
+/*\r
+ * Copyright (c) 2012 Qualcomm Atheros, Inc.\r
+ * All Rights Reserved.\r
+ * Qualcomm Atheros Confidential and Proprietary.\r
+ */\r
+\r
+/*\r
+ * For this file, which was received with alternative licensing options for \r
+ * distribution, Qualcomm Atheros, Inc. has selected the BSD license.\r
+ */\r
+\r
+//-\r
+// Copyright (c) 2002-2004 Sam Leffler, Errno Consulting\r
+// All rights reserved.\r
+// $ATH_LICENSE_NULL$\r
+//\r
+// Redistribution and use in source and binary forms, with or without\r
+// modification, are permitted provided that the following conditions\r
+// are met:\r
+// 1. Redistributions of source code must retain the above copyright\r
+// notice, this list of conditions and the following disclaimer,\r
+// without modification.\r
+// 2. Redistributions in binary form must reproduce at minimum a disclaimer\r
+// similar to the "NO WARRANTY" disclaimer below ("Disclaimer") and any\r
+// redistribution must be conditioned upon including a substantially\r
+// similar Disclaimer requirement for further binary redistribution.\r
+// 3. Neither the names of the above-listed copyright holders nor the names\r
+// of any contributors may be used to endorse or promote products derived\r
+// from this software without specific prior written permission.\r
+//\r
+// Alternatively, this software may be distributed under the terms of the\r
+// GNU General Public License ("GPL") version 2 as published by the Free\r
+// Software Foundation.\r
+//\r
+// NO WARRANTY\r
+// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS\r
+// ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT\r
+// LIMITED TO, THE IMPLIED WARRANTIES OF NONINFRINGEMENT, MERCHANTIBILITY\r
+// AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL\r
+// THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY,\r
+// OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF\r
+// SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS\r
+// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER\r
+// IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)\r
+// ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF\r
+// THE POSSIBILITY OF SUCH DAMAGES.\r
+\r
+--------------------\r
+ \r
+ /*\r
+ * AES SIV (RFC 5297)\r
+ * Copyright (c) 2013 Cozybit, Inc.\r
+ *\r
+ * This software may be distributed under the terms of the BSD license.\r
+ */\r
+ \r
+--------------------\r
+\r
+ * Copyright 2018 The Android Open Source Project\r
+ *\r
+ * Licensed under the Apache License, Version 2.0 (the "License");\r
+ * you may not use this file except in compliance with the License.\r
+ * You may obtain a copy of the License at\r
+ *\r
+ * http://www.apache.org/licenses/LICENSE-2.0\r
+ *\r
+ * Unless required by applicable law or agreed to in writing, software\r
+ * distributed under the License is distributed on an "AS IS" BASIS,\r
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r
+ * See the License for the specific language governing permissions and\r
+ * limitations under the License.\r
+\r
+--------------------\r
+\r
+/* ===== start - public domain SHA256 implementation ===== */\r
+\r
+/* This is based on SHA256 implementation in LibTomCrypt that was released into\r
+ * public domain by Tom St Denis. */\r
+\r
+--------------------\r
+\r
+// This code implements the MD5 message-digest algorithm.\r
+// The algorithm is due to Ron Rivest. This code was\r
+// written by Colin Plumb in 1993, no copyright is claimed.\r
+// This code is in the public domain; do with it what you wish.\r
+//\r
+// Equivalent code is available from RSA Data Security, Inc.\r
+// This code has been tested against that, and is equivalent,\r
+// except that you don't need to include two pages of legalese\r
+// with every copy.\r
+//\r
+ \r
+--------------------\r