mirror of
https://github.com/Telecominfraproject/wlan-ap.git
synced 2025-10-29 17:42:41 +00:00
wifi-ax/mac80211: make the 11.4 ath11k work inside the v5.4 kernel
Fixes: WIFI-7570 Signed-off-by: John Crispin <john@phrozen.org>
This commit is contained in:
@@ -944,7 +944,7 @@
|
||||
#endif
|
||||
qcom,caldb-size = <0x500000>;
|
||||
mem-region = <&q6_qcn6122_data2>;
|
||||
status = "disabled";
|
||||
status = "ok";
|
||||
};
|
||||
|
||||
&usb3 {
|
||||
|
||||
@@ -1,802 +0,0 @@
|
||||
This Notice.txt file contains certain notices of software components included with the software that Qualcomm Atheros, Inc.
|
||||
(“Qualcomm Atheros”) is required to provide you. Except where prohibited by the open source license, the content of this
|
||||
notices file is only provided to satisfy Qualcomm Atheros's attribution and notice requirement; your use of these software
|
||||
components together with the Qualcomm Atheros software (Qualcomm Atheros software hereinafter referred to as “Software”) is
|
||||
subject to the terms of your agreement from Qualcomm Atheros. Compliance with all copyright laws and software license agreements
|
||||
included in the notice section of this file are the responsibility of the user. Except as may be granted by separate express
|
||||
written agreement, this file provides no license to any patents, trademarks, copyrights, or other intellectual property of
|
||||
Qualcomm Incorporated or any of its subsidiaries.
|
||||
|
||||
Qualcomm is a trademark of Qualcomm Incorporated, registered in the United States and other countries. All Qualcomm Incorporated
|
||||
trademarks are used with permission. Other products and brand names may be trademarks or registered trademarks of their respective
|
||||
owners.
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* WPA definitions shared between hostapd and wpa_supplicant
|
||||
* Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi>
|
||||
*
|
||||
* This software may be distributed under the terms of the BSD license.
|
||||
* See README for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/* WPA/RSN - Shared functions for supplicant and authenticator
|
||||
* EAP common peer/server definitions
|
||||
* EAP peer state machines (RFC 4137)
|
||||
* Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi>
|
||||
*
|
||||
* This software may be distributed under the terms of the BSD license.
|
||||
* See README for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* Copyright (c) 2011 Qualcomm Technologies, Inc.
|
||||
* 2011 Qualcomm Atheros, Inc.
|
||||
* All Rights Reserved.
|
||||
* Confidential and Proprietary - Qualcomm Technologies, Inc.
|
||||
* Notifications and licenses are retained for attribution purposes only.
|
||||
*/
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* AES-based functions
|
||||
*
|
||||
*
|
||||
* - AES Key Wrap Algorithm (128-bit KEK) (RFC3394)
|
||||
* - One-Key CBC MAC (OMAC1) hash with AES-128
|
||||
* - AES-128 CTR mode encryption
|
||||
* - AES-128 EAX mode encryption/decryption
|
||||
* - AES-128 CBC
|
||||
*
|
||||
* Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* Copyright (c) 2011 Qualcomm Technologies, Inc.
|
||||
* 2011 Qualcomm Atheros, Inc.
|
||||
* All Rights Reserved.
|
||||
* Confidential and Proprietary - Qualcomm Technologies, Inc.
|
||||
* Notifications and licenses are retained for attribution purposes only.
|
||||
*/
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* SHA1 hash implementation and interface functions
|
||||
* Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* Copyright (c) 2011 Qualcomm Technologies, Inc.
|
||||
* 2011 Qualcomm Atheros, Inc.
|
||||
* All Rights Reserved.
|
||||
* Confidential and Proprietary - Qualcomm Technologies, Inc.
|
||||
* Notifications and licenses are retained for attribution purposes only.
|
||||
*/
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* WPA Supplicant / wrapper functions for crypto libraries
|
||||
* Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*
|
||||
* This file defines the cryptographic functions that need to be implemented
|
||||
* for wpa_supplicant and hostapd. When TLS is not used, internal
|
||||
* implementation of MD5, SHA1, and AES is used and no external libraries are
|
||||
* required. When TLS is enabled (e.g., by enabling EAP-TLS or EAP-PEAP), the
|
||||
* crypto library used by the TLS implementation is expected to be used for
|
||||
* non-TLS needs, too, in order to save space by not implementing these
|
||||
* functions twice.
|
||||
*
|
||||
* Wrapper code for using each crypto library is in its own file (crypto*.c)
|
||||
* and one of these files is build and linked in to provide the functions
|
||||
* defined here.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* WPA Supplicant - Common definitions
|
||||
* Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* WPA Supplicant - WPA state machine and EAPOL-Key processing
|
||||
* Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* WPA Supplicant / Configuration file structures
|
||||
* Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* Copyright (c) 2011 Qualcomm Technologies, Inc.
|
||||
* 2008-2011 Qualcomm Atheros, Inc.
|
||||
* All Rights Reserved.
|
||||
* Confidential and Proprietary - Qualcomm Technologies, Inc.
|
||||
* Qualcomm Atheros, Inc. has chosen to take madwifi subject to the BSD license and terms.
|
||||
*
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* wpa_supplicant - Internal WPA state machine definitions
|
||||
* Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* wpa_supplicant - WPA definitions
|
||||
* Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* wpa_supplicant/hostapd / common helper functions, etc.
|
||||
* Copyright (c) 2002-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
* Australian Public Licence B (OZPLB)
|
||||
*
|
||||
* Version 1-0
|
||||
*
|
||||
* Copyright (c) 2004, National ICT Australia
|
||||
* Copyright (c) 2007, Open Kernel Labs, Inc.
|
||||
*
|
||||
* All rights reserved.
|
||||
*
|
||||
* Developed by: Embedded, Real-time and Operating Systems Program (ERTOS)
|
||||
* National ICT Australia
|
||||
* http://www.ertos.nicta.com.au
|
||||
*
|
||||
* Permission is granted by National ICT Australia, free of charge, to
|
||||
* any person obtaining a copy of this software and any associated
|
||||
* documentation files (the "Software") to deal with the Software without
|
||||
* restriction, including (without limitation) the rights to use, copy,
|
||||
* modify, adapt, merge, publish, distribute, communicate to the public,
|
||||
* sublicense, and/or sell, lend or rent out copies of the Software, and
|
||||
* to permit persons to whom the Software is furnished to do so, subject
|
||||
* to the following conditions:
|
||||
*
|
||||
* * Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimers.
|
||||
*
|
||||
* * Redistributions in binary form must reproduce the above
|
||||
* copyright notice, this list of conditions and the following
|
||||
* disclaimers in the documentation and/or other materials provided
|
||||
* with the distribution.
|
||||
*
|
||||
* * Neither the name of National ICT Australia, nor the names of its
|
||||
* contributors, may be used to endorse or promote products derived
|
||||
* from this Software without specific prior written permission.
|
||||
*
|
||||
* EXCEPT AS EXPRESSLY STATED IN THIS LICENCE AND TO THE FULL EXTENT
|
||||
* PERMITTED BY APPLICABLE LAW, THE SOFTWARE IS PROVIDED "AS-IS", AND
|
||||
* NATIONAL ICT AUSTRALIA AND ITS CONTRIBUTORS MAKE NO REPRESENTATIONS,
|
||||
* WARRANTIES OR CONDITIONS OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
|
||||
* BUT NOT LIMITED TO ANY REPRESENTATIONS, WARRANTIES OR CONDITIONS
|
||||
* REGARDING THE CONTENTS OR ACCURACY OF THE SOFTWARE, OR OF TITLE,
|
||||
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT,
|
||||
* THE ABSENCE OF LATENT OR OTHER DEFECTS, OR THE PRESENCE OR ABSENCE OF
|
||||
* ERRORS, WHETHER OR NOT DISCOVERABLE.
|
||||
*
|
||||
* TO THE FULL EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL
|
||||
* NATIONAL ICT AUSTRALIA OR ITS CONTRIBUTORS BE LIABLE ON ANY LEGAL
|
||||
* THEORY (INCLUDING, WITHOUT LIMITATION, IN AN ACTION OF CONTRACT,
|
||||
* NEGLIGENCE OR OTHERWISE) FOR ANY CLAIM, LOSS, DAMAGES OR OTHER
|
||||
* LIABILITY, INCLUDING (WITHOUT LIMITATION) LOSS OF PRODUCTION OR
|
||||
* OPERATION TIME, LOSS, DAMAGE OR CORRUPTION OF DATA OR RECORDS; OR LOSS
|
||||
* OF ANTICIPATED SAVINGS, OPPORTUNITY, REVENUE, PROFIT OR GOODWILL, OR
|
||||
* OTHER ECONOMIC LOSS; OR ANY SPECIAL, INCIDENTAL, INDIRECT,
|
||||
* CONSEQUENTIAL, PUNITIVE OR EXEMPLARY DAMAGES, ARISING OUT OF OR IN
|
||||
* CONNECTION WITH THIS LICENCE, THE SOFTWARE OR THE USE OF OR OTHER
|
||||
* DEALINGS WITH THE SOFTWARE, EVEN IF NATIONAL ICT AUSTRALIA OR ITS
|
||||
* CONTRIBUTORS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH CLAIM, LOSS,
|
||||
* DAMAGES OR OTHER LIABILITY.
|
||||
*
|
||||
* If applicable legislation implies representations, warranties, or
|
||||
* conditions, or imposes obligations or liability on National ICT
|
||||
* Australia or one of its contributors in respect of the Software that
|
||||
* cannot be wholly or partly excluded, restricted or modified, the
|
||||
* liability of National ICT Australia or the contributor is limited, to
|
||||
* the full extent permitted by the applicable legislation, at its
|
||||
* option, to:
|
||||
* a. in the case of goods, any one or more of the following:
|
||||
* i. the replacement of the goods or the supply of equivalent goods;
|
||||
* ii. the repair of the goods;
|
||||
* iii. the payment of the cost of replacing the goods or of acquiring
|
||||
* equivalent goods;
|
||||
* iv. the payment of the cost of having the goods repaired; or
|
||||
* b. in the case of services:
|
||||
* i. the supplying of the services again; or
|
||||
* ii. the payment of the cost of having the services supplied again.
|
||||
*
|
||||
* The construction, validity and performance of this licence is governed
|
||||
* by the laws in force in New South Wales, Australia.
|
||||
|
||||
--------------------
|
||||
|
||||
* Copyright (c) 2002-2004, Karlsruhe University
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or
|
||||
* code or tables extracted from it, as desired without restriction.
|
||||
*
|
||||
* First, the polynomial itself and its table of feedback terms. The
|
||||
* polynomial is
|
||||
* X^32+X^26+X^23+X^22+X^16+X^12+X^11+X^10+X^8+X^7+X^5+X^4+X^2+X^1+X^0
|
||||
*
|
||||
* Note that we take it "backwards" and put the highest-order term in
|
||||
* the lowest-order bit. The X^32 term is "implied"; the LSB is the
|
||||
* X^31 term, etc. The X^0 term (usually shown as "+1") results in
|
||||
* the MSB being 1
|
||||
*
|
||||
* Note that the usual hardware shift register implementation, which
|
||||
* is what we're using (we're merely optimizing it by doing eight-bit
|
||||
* chunks at a time) shifts bits into the lowest-order term. In our
|
||||
* implementation, that means shifting towards the right. Why do we
|
||||
* do it this way? Because the calculated CRC must be transmitted in
|
||||
* order from highest-order term to lowest-order term. UARTs transmit
|
||||
* characters in order from LSB to MSB. By storing the CRC this way
|
||||
* we hand it to the UART in the order low-byte to high-byte; the UART
|
||||
* sends each low-bit to hight-bit; and the result is transmission bit
|
||||
* by bit from highest- to lowest-order term without requiring any bit
|
||||
* shuffling on our part. Reception works similarly
|
||||
*
|
||||
* The feedback terms table consists of 256, 32-bit entries. Notes
|
||||
*
|
||||
* The table can be generated at runtime if desired; code to do so
|
||||
* is shown later. It might not be obvious, but the feedback
|
||||
* terms simply represent the results of eight shift/xor opera
|
||||
* tions for all combinations of data and CRC register values
|
||||
*
|
||||
* The values must be right-shifted by eight bits by the "updcrc
|
||||
* logic; the shift must be unsigned (bring in zeroes). On some
|
||||
* hardware you could probably optimize the shift in assembler by
|
||||
* using byte-swap instructions
|
||||
* polynomial $edb88320
|
||||
*
|
||||
*
|
||||
* CRC32 code derived from work by Gary S. Brown.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
* AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/
|
||||
*
|
||||
* Copyright (c) 2000-2001, Aaron D. Gifford
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. Neither the name of the copyright holder nor the names of contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
|
||||
--------------------
|
||||
|
||||
* Copyright (c) 1988, 1993
|
||||
* The Regents of the University of California. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* This product includes software developed by the University of
|
||||
* California, Berkeley and its contributors.
|
||||
* 4. Neither the name of the University nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
|
||||
--------------------
|
||||
|
||||
* Copyright (c) 1982, 1986, 1990, 1991, 1993 The Regents of the University of California.
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. Neither the name of the University nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
|
||||
--------------------
|
||||
# Copyright (c) 2012-2015 Qualcomm Technologies, Inc.
|
||||
# 2012-2015 Qualcomm Atheros, Inc.
|
||||
# All Rights Reserved.
|
||||
# Confidential and Proprietary - Qualcomm Technologies, Inc.
|
||||
#
|
||||
# Permission to use, copy, modify, and/or distribute this software for any
|
||||
# purpose with or without fee is hereby granted, provided that the above
|
||||
# copyright notice and this permission notice appear in all copies.
|
||||
#
|
||||
# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||||
# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||||
# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
||||
# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||||
# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
||||
# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
||||
# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||||
|
||||
--------------------
|
||||
|
||||
* Copyright (c) 1988, 1993
|
||||
* The Regents of the University of California. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* This product includes software developed by the University of
|
||||
* California, Berkeley and its contributors.
|
||||
* 4. Neither the name of the University nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
|
||||
--------------------
|
||||
|
||||
/* $OpenBSD: string.h,v 1.17 2006/01/06 18:53:04 millert Exp $ */
|
||||
/* $NetBSD: string.h,v 1.6 1994/10/26 00:56:30 cgd Exp $ */
|
||||
|
||||
/*-
|
||||
* Copyright (c) 1990 The Regents of the University of California.
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. Neither the name of the University nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* @(#)string.h 5.10 (Berkeley) 3/9/91
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
// Copyright (c) 1991, 1993
|
||||
// The Regents of the University of California. All rights reserved.
|
||||
// $ATH_LICENSE_NULL$
|
||||
//
|
||||
// Redistribution and use in source and binary forms, with or without
|
||||
// modification, are permitted provided that the following conditions
|
||||
// are met:
|
||||
// 1. Redistributions of source code must retain the above copyright
|
||||
// notice, this list of conditions and the following disclaimer.
|
||||
// 2. Redistributions in binary form must reproduce the above copyright
|
||||
// notice, this list of conditions and the following disclaimer in the
|
||||
// documentation and/or other materials provided with the distribution.
|
||||
// 3. All advertising materials mentioning features or use of this software
|
||||
// must display the following acknowledgement:
|
||||
// This product includes software developed by the University of
|
||||
// California, Berkeley and its contributors.
|
||||
// 4. Neither the name of the University nor the names of its contributors
|
||||
// may be used to endorse or promote products derived from this software
|
||||
// without specific prior written permission.
|
||||
//
|
||||
// THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||||
// ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
// ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||||
// FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
// DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
// OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
// HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
// LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
// OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
// SUCH DAMAGE.
|
||||
|
||||
--------------------
|
||||
|
||||
* Copyright (c) 1998, 2010 Todd C. Miller <Todd.Miller@courtesan.com>
|
||||
*
|
||||
* Permission to use, copy, modify, and distribute this software for any
|
||||
* purpose with or without fee is hereby granted, provided that the above
|
||||
* copyright notice and this permission notice appear in all copies.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||||
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||||
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
||||
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||||
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
||||
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
||||
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com>
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. The name of the author may not be used to endorse or promote products
|
||||
* derived from this software without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
|
||||
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
|
||||
* AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
||||
* THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
|
||||
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
||||
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
|
||||
* OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
|
||||
* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
||||
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
** Copyright (c) 2004-2010, Atheros Communications Inc.
|
||||
**
|
||||
** Permission to use, copy, modify, and/or distribute this software for any
|
||||
** purpose with or without fee is hereby granted, provided that the above
|
||||
** copyright notice and this permission notice appear in all copies.
|
||||
**
|
||||
** THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||||
** WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||||
** MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
||||
** ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||||
** WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
||||
** ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
||||
** OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||||
**
|
||||
** This module is the Atheros specific ioctl/iwconfig/iwpriv interface
|
||||
** to the ATH object, normally instantiated as wifiX, where X is the
|
||||
** instance number (e.g. wifi0, wifi1).
|
||||
**
|
||||
** This provides a mechanism to configure the ATH object within the
|
||||
** Linux OS enviornment. This file is OS specific.
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* Copyright (c) 2012 Qualcomm Technologies, Inc.
|
||||
* 2012 Qualcomm Atheros, Inc.
|
||||
* All Rights Reserved.
|
||||
* Confidential and Proprietary - Qualcomm Technologies, Inc.
|
||||
*/
|
||||
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
//-
|
||||
// Copyright (c) 2002-2004 Sam Leffler, Errno Consulting
|
||||
// All rights reserved.
|
||||
// $ATH_LICENSE_NULL$
|
||||
//
|
||||
// Redistribution and use in source and binary forms, with or without
|
||||
// modification, are permitted provided that the following conditions
|
||||
// are met:
|
||||
// 1. Redistributions of source code must retain the above copyright
|
||||
// notice, this list of conditions and the following disclaimer,
|
||||
// without modification.
|
||||
// 2. Redistributions in binary form must reproduce at minimum a disclaimer
|
||||
// similar to the "NO WARRANTY" disclaimer below ("Disclaimer") and any
|
||||
// redistribution must be conditioned upon including a substantially
|
||||
// similar Disclaimer requirement for further binary redistribution.
|
||||
// 3. Neither the names of the above-listed copyright holders nor the names
|
||||
// of any contributors may be used to endorse or promote products derived
|
||||
// from this software without specific prior written permission.
|
||||
//
|
||||
// Alternatively, this software may be distributed under the terms of the
|
||||
// GNU General Public License ("GPL") version 2 as published by the Free
|
||||
// Software Foundation.
|
||||
//
|
||||
// NO WARRANTY
|
||||
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||||
// ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||||
// LIMITED TO, THE IMPLIED WARRANTIES OF NONINFRINGEMENT, MERCHANTIBILITY
|
||||
// AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
||||
// THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY,
|
||||
// OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||||
// SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||||
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
|
||||
// IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
// ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
|
||||
// THE POSSIBILITY OF SUCH DAMAGES.
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* AES SIV (RFC 5297)
|
||||
* Copyright (c) 2013 Cozybit, Inc.
|
||||
*
|
||||
* This software may be distributed under the terms of the BSD license.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
* Copyright 2018 The Android Open Source Project
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
|
||||
--------------------
|
||||
|
||||
/* ===== start - public domain SHA256 implementation ===== */
|
||||
|
||||
/* This is based on SHA256 implementation in LibTomCrypt that was released into
|
||||
* public domain by Tom St Denis. */
|
||||
|
||||
--------------------
|
||||
|
||||
// This code implements the MD5 message-digest algorithm.
|
||||
// The algorithm is due to Ron Rivest. This code was
|
||||
// written by Colin Plumb in 1993, no copyright is claimed.
|
||||
// This code is in the public domain; do with it what you wish.
|
||||
//
|
||||
// Equivalent code is available from RSA Data Security, Inc.
|
||||
// This code has been tested against that, and is equivalent,
|
||||
// except that you don't need to include two pages of legalese
|
||||
// with every copy.
|
||||
//
|
||||
|
||||
--------------------
|
||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -1,3 +1,3 @@
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/m3_fw.b00
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/m3_fw.b01
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/m3_fw.b02
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/m3_fw.b00
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/m3_fw.b01
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/m3_fw.b02
|
||||
|
||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -1,23 +1,13 @@
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b00
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b01
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b02
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b03
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b04
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b05
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b07
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b08
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b09
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b10
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b11
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b13
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b14
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b15
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b16
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b17
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b18
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b20
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b21
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b22
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b23
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b25
|
||||
build/ms/bin/5018.wlanfw2.map_spr_spr_eval_cs/PIL_IMAGES/q6_fw.b26
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/q6_fw.b00
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/q6_fw.b01
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/q6_fw.b02
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/q6_fw.b03
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/q6_fw.b04
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/q6_fw.b05
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/q6_fw.b07
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/q6_fw.b08
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/q6_fw.b09
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/q6_fw.b10
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/q6_fw.b11
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/q6_fw.b13
|
||||
build/ms/bin/5018.wlanfw.eval/PIL_IMAGES/q6_fw.b14
|
||||
|
||||
Binary file not shown.
@@ -1,802 +0,0 @@
|
||||
This Notice.txt file contains certain notices of software components included with the software that Qualcomm Atheros, Inc.
|
||||
(“Qualcomm Atheros”) is required to provide you. Except where prohibited by the open source license, the content of this
|
||||
notices file is only provided to satisfy Qualcomm Atheros's attribution and notice requirement; your use of these software
|
||||
components together with the Qualcomm Atheros software (Qualcomm Atheros software hereinafter referred to as “Software”) is
|
||||
subject to the terms of your agreement from Qualcomm Atheros. Compliance with all copyright laws and software license agreements
|
||||
included in the notice section of this file are the responsibility of the user. Except as may be granted by separate express
|
||||
written agreement, this file provides no license to any patents, trademarks, copyrights, or other intellectual property of
|
||||
Qualcomm Incorporated or any of its subsidiaries.
|
||||
|
||||
Qualcomm is a trademark of Qualcomm Incorporated, registered in the United States and other countries. All Qualcomm Incorporated
|
||||
trademarks are used with permission. Other products and brand names may be trademarks or registered trademarks of their respective
|
||||
owners.
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* WPA definitions shared between hostapd and wpa_supplicant
|
||||
* Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi>
|
||||
*
|
||||
* This software may be distributed under the terms of the BSD license.
|
||||
* See README for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/* WPA/RSN - Shared functions for supplicant and authenticator
|
||||
* EAP common peer/server definitions
|
||||
* EAP peer state machines (RFC 4137)
|
||||
* Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi>
|
||||
*
|
||||
* This software may be distributed under the terms of the BSD license.
|
||||
* See README for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* Copyright (c) 2011 Qualcomm Technologies, Inc.
|
||||
* 2011 Qualcomm Atheros, Inc.
|
||||
* All Rights Reserved.
|
||||
* Confidential and Proprietary - Qualcomm Technologies, Inc.
|
||||
* Notifications and licenses are retained for attribution purposes only.
|
||||
*/
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* AES-based functions
|
||||
*
|
||||
*
|
||||
* - AES Key Wrap Algorithm (128-bit KEK) (RFC3394)
|
||||
* - One-Key CBC MAC (OMAC1) hash with AES-128
|
||||
* - AES-128 CTR mode encryption
|
||||
* - AES-128 EAX mode encryption/decryption
|
||||
* - AES-128 CBC
|
||||
*
|
||||
* Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* Copyright (c) 2011 Qualcomm Technologies, Inc.
|
||||
* 2011 Qualcomm Atheros, Inc.
|
||||
* All Rights Reserved.
|
||||
* Confidential and Proprietary - Qualcomm Technologies, Inc.
|
||||
* Notifications and licenses are retained for attribution purposes only.
|
||||
*/
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* SHA1 hash implementation and interface functions
|
||||
* Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* Copyright (c) 2011 Qualcomm Technologies, Inc.
|
||||
* 2011 Qualcomm Atheros, Inc.
|
||||
* All Rights Reserved.
|
||||
* Confidential and Proprietary - Qualcomm Technologies, Inc.
|
||||
* Notifications and licenses are retained for attribution purposes only.
|
||||
*/
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* WPA Supplicant / wrapper functions for crypto libraries
|
||||
* Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*
|
||||
* This file defines the cryptographic functions that need to be implemented
|
||||
* for wpa_supplicant and hostapd. When TLS is not used, internal
|
||||
* implementation of MD5, SHA1, and AES is used and no external libraries are
|
||||
* required. When TLS is enabled (e.g., by enabling EAP-TLS or EAP-PEAP), the
|
||||
* crypto library used by the TLS implementation is expected to be used for
|
||||
* non-TLS needs, too, in order to save space by not implementing these
|
||||
* functions twice.
|
||||
*
|
||||
* Wrapper code for using each crypto library is in its own file (crypto*.c)
|
||||
* and one of these files is build and linked in to provide the functions
|
||||
* defined here.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* WPA Supplicant - Common definitions
|
||||
* Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* WPA Supplicant - WPA state machine and EAPOL-Key processing
|
||||
* Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* WPA Supplicant / Configuration file structures
|
||||
* Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* Copyright (c) 2011 Qualcomm Technologies, Inc.
|
||||
* 2008-2011 Qualcomm Atheros, Inc.
|
||||
* All Rights Reserved.
|
||||
* Confidential and Proprietary - Qualcomm Technologies, Inc.
|
||||
* Qualcomm Atheros, Inc. has chosen to take madwifi subject to the BSD license and terms.
|
||||
*
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* wpa_supplicant - Internal WPA state machine definitions
|
||||
* Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* wpa_supplicant - WPA definitions
|
||||
* Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
/*
|
||||
* wpa_supplicant/hostapd / common helper functions, etc.
|
||||
* Copyright (c) 2002-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* Alternatively, this software may be distributed under the terms of BSD
|
||||
* license.
|
||||
*
|
||||
* See README and COPYING for more details.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
* Australian Public Licence B (OZPLB)
|
||||
*
|
||||
* Version 1-0
|
||||
*
|
||||
* Copyright (c) 2004, National ICT Australia
|
||||
* Copyright (c) 2007, Open Kernel Labs, Inc.
|
||||
*
|
||||
* All rights reserved.
|
||||
*
|
||||
* Developed by: Embedded, Real-time and Operating Systems Program (ERTOS)
|
||||
* National ICT Australia
|
||||
* http://www.ertos.nicta.com.au
|
||||
*
|
||||
* Permission is granted by National ICT Australia, free of charge, to
|
||||
* any person obtaining a copy of this software and any associated
|
||||
* documentation files (the "Software") to deal with the Software without
|
||||
* restriction, including (without limitation) the rights to use, copy,
|
||||
* modify, adapt, merge, publish, distribute, communicate to the public,
|
||||
* sublicense, and/or sell, lend or rent out copies of the Software, and
|
||||
* to permit persons to whom the Software is furnished to do so, subject
|
||||
* to the following conditions:
|
||||
*
|
||||
* * Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimers.
|
||||
*
|
||||
* * Redistributions in binary form must reproduce the above
|
||||
* copyright notice, this list of conditions and the following
|
||||
* disclaimers in the documentation and/or other materials provided
|
||||
* with the distribution.
|
||||
*
|
||||
* * Neither the name of National ICT Australia, nor the names of its
|
||||
* contributors, may be used to endorse or promote products derived
|
||||
* from this Software without specific prior written permission.
|
||||
*
|
||||
* EXCEPT AS EXPRESSLY STATED IN THIS LICENCE AND TO THE FULL EXTENT
|
||||
* PERMITTED BY APPLICABLE LAW, THE SOFTWARE IS PROVIDED "AS-IS", AND
|
||||
* NATIONAL ICT AUSTRALIA AND ITS CONTRIBUTORS MAKE NO REPRESENTATIONS,
|
||||
* WARRANTIES OR CONDITIONS OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
|
||||
* BUT NOT LIMITED TO ANY REPRESENTATIONS, WARRANTIES OR CONDITIONS
|
||||
* REGARDING THE CONTENTS OR ACCURACY OF THE SOFTWARE, OR OF TITLE,
|
||||
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT,
|
||||
* THE ABSENCE OF LATENT OR OTHER DEFECTS, OR THE PRESENCE OR ABSENCE OF
|
||||
* ERRORS, WHETHER OR NOT DISCOVERABLE.
|
||||
*
|
||||
* TO THE FULL EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL
|
||||
* NATIONAL ICT AUSTRALIA OR ITS CONTRIBUTORS BE LIABLE ON ANY LEGAL
|
||||
* THEORY (INCLUDING, WITHOUT LIMITATION, IN AN ACTION OF CONTRACT,
|
||||
* NEGLIGENCE OR OTHERWISE) FOR ANY CLAIM, LOSS, DAMAGES OR OTHER
|
||||
* LIABILITY, INCLUDING (WITHOUT LIMITATION) LOSS OF PRODUCTION OR
|
||||
* OPERATION TIME, LOSS, DAMAGE OR CORRUPTION OF DATA OR RECORDS; OR LOSS
|
||||
* OF ANTICIPATED SAVINGS, OPPORTUNITY, REVENUE, PROFIT OR GOODWILL, OR
|
||||
* OTHER ECONOMIC LOSS; OR ANY SPECIAL, INCIDENTAL, INDIRECT,
|
||||
* CONSEQUENTIAL, PUNITIVE OR EXEMPLARY DAMAGES, ARISING OUT OF OR IN
|
||||
* CONNECTION WITH THIS LICENCE, THE SOFTWARE OR THE USE OF OR OTHER
|
||||
* DEALINGS WITH THE SOFTWARE, EVEN IF NATIONAL ICT AUSTRALIA OR ITS
|
||||
* CONTRIBUTORS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH CLAIM, LOSS,
|
||||
* DAMAGES OR OTHER LIABILITY.
|
||||
*
|
||||
* If applicable legislation implies representations, warranties, or
|
||||
* conditions, or imposes obligations or liability on National ICT
|
||||
* Australia or one of its contributors in respect of the Software that
|
||||
* cannot be wholly or partly excluded, restricted or modified, the
|
||||
* liability of National ICT Australia or the contributor is limited, to
|
||||
* the full extent permitted by the applicable legislation, at its
|
||||
* option, to:
|
||||
* a. in the case of goods, any one or more of the following:
|
||||
* i. the replacement of the goods or the supply of equivalent goods;
|
||||
* ii. the repair of the goods;
|
||||
* iii. the payment of the cost of replacing the goods or of acquiring
|
||||
* equivalent goods;
|
||||
* iv. the payment of the cost of having the goods repaired; or
|
||||
* b. in the case of services:
|
||||
* i. the supplying of the services again; or
|
||||
* ii. the payment of the cost of having the services supplied again.
|
||||
*
|
||||
* The construction, validity and performance of this licence is governed
|
||||
* by the laws in force in New South Wales, Australia.
|
||||
|
||||
--------------------
|
||||
|
||||
* Copyright (c) 2002-2004, Karlsruhe University
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or
|
||||
* code or tables extracted from it, as desired without restriction.
|
||||
*
|
||||
* First, the polynomial itself and its table of feedback terms. The
|
||||
* polynomial is
|
||||
* X^32+X^26+X^23+X^22+X^16+X^12+X^11+X^10+X^8+X^7+X^5+X^4+X^2+X^1+X^0
|
||||
*
|
||||
* Note that we take it "backwards" and put the highest-order term in
|
||||
* the lowest-order bit. The X^32 term is "implied"; the LSB is the
|
||||
* X^31 term, etc. The X^0 term (usually shown as "+1") results in
|
||||
* the MSB being 1
|
||||
*
|
||||
* Note that the usual hardware shift register implementation, which
|
||||
* is what we're using (we're merely optimizing it by doing eight-bit
|
||||
* chunks at a time) shifts bits into the lowest-order term. In our
|
||||
* implementation, that means shifting towards the right. Why do we
|
||||
* do it this way? Because the calculated CRC must be transmitted in
|
||||
* order from highest-order term to lowest-order term. UARTs transmit
|
||||
* characters in order from LSB to MSB. By storing the CRC this way
|
||||
* we hand it to the UART in the order low-byte to high-byte; the UART
|
||||
* sends each low-bit to hight-bit; and the result is transmission bit
|
||||
* by bit from highest- to lowest-order term without requiring any bit
|
||||
* shuffling on our part. Reception works similarly
|
||||
*
|
||||
* The feedback terms table consists of 256, 32-bit entries. Notes
|
||||
*
|
||||
* The table can be generated at runtime if desired; code to do so
|
||||
* is shown later. It might not be obvious, but the feedback
|
||||
* terms simply represent the results of eight shift/xor opera
|
||||
* tions for all combinations of data and CRC register values
|
||||
*
|
||||
* The values must be right-shifted by eight bits by the "updcrc
|
||||
* logic; the shift must be unsigned (bring in zeroes). On some
|
||||
* hardware you could probably optimize the shift in assembler by
|
||||
* using byte-swap instructions
|
||||
* polynomial $edb88320
|
||||
*
|
||||
*
|
||||
* CRC32 code derived from work by Gary S. Brown.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
* AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/
|
||||
*
|
||||
* Copyright (c) 2000-2001, Aaron D. Gifford
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. Neither the name of the copyright holder nor the names of contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
|
||||
--------------------
|
||||
|
||||
* Copyright (c) 1988, 1993
|
||||
* The Regents of the University of California. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* This product includes software developed by the University of
|
||||
* California, Berkeley and its contributors.
|
||||
* 4. Neither the name of the University nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
|
||||
--------------------
|
||||
|
||||
* Copyright (c) 1982, 1986, 1990, 1991, 1993 The Regents of the University of California.
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. Neither the name of the University nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
|
||||
--------------------
|
||||
# Copyright (c) 2012-2015 Qualcomm Technologies, Inc.
|
||||
# 2012-2015 Qualcomm Atheros, Inc.
|
||||
# All Rights Reserved.
|
||||
# Confidential and Proprietary - Qualcomm Technologies, Inc.
|
||||
#
|
||||
# Permission to use, copy, modify, and/or distribute this software for any
|
||||
# purpose with or without fee is hereby granted, provided that the above
|
||||
# copyright notice and this permission notice appear in all copies.
|
||||
#
|
||||
# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||||
# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||||
# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
||||
# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||||
# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
||||
# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
||||
# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||||
|
||||
--------------------
|
||||
|
||||
* Copyright (c) 1988, 1993
|
||||
* The Regents of the University of California. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* This product includes software developed by the University of
|
||||
* California, Berkeley and its contributors.
|
||||
* 4. Neither the name of the University nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
|
||||
--------------------
|
||||
|
||||
/* $OpenBSD: string.h,v 1.17 2006/01/06 18:53:04 millert Exp $ */
|
||||
/* $NetBSD: string.h,v 1.6 1994/10/26 00:56:30 cgd Exp $ */
|
||||
|
||||
/*-
|
||||
* Copyright (c) 1990 The Regents of the University of California.
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. Neither the name of the University nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* @(#)string.h 5.10 (Berkeley) 3/9/91
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
// Copyright (c) 1991, 1993
|
||||
// The Regents of the University of California. All rights reserved.
|
||||
// $ATH_LICENSE_NULL$
|
||||
//
|
||||
// Redistribution and use in source and binary forms, with or without
|
||||
// modification, are permitted provided that the following conditions
|
||||
// are met:
|
||||
// 1. Redistributions of source code must retain the above copyright
|
||||
// notice, this list of conditions and the following disclaimer.
|
||||
// 2. Redistributions in binary form must reproduce the above copyright
|
||||
// notice, this list of conditions and the following disclaimer in the
|
||||
// documentation and/or other materials provided with the distribution.
|
||||
// 3. All advertising materials mentioning features or use of this software
|
||||
// must display the following acknowledgement:
|
||||
// This product includes software developed by the University of
|
||||
// California, Berkeley and its contributors.
|
||||
// 4. Neither the name of the University nor the names of its contributors
|
||||
// may be used to endorse or promote products derived from this software
|
||||
// without specific prior written permission.
|
||||
//
|
||||
// THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||||
// ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
// ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||||
// FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
// DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
// OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
// HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
// LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
// OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
// SUCH DAMAGE.
|
||||
|
||||
--------------------
|
||||
|
||||
* Copyright (c) 1998, 2010 Todd C. Miller <Todd.Miller@courtesan.com>
|
||||
*
|
||||
* Permission to use, copy, modify, and distribute this software for any
|
||||
* purpose with or without fee is hereby granted, provided that the above
|
||||
* copyright notice and this permission notice appear in all copies.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||||
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||||
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
||||
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||||
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
||||
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
||||
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com>
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. The name of the author may not be used to endorse or promote products
|
||||
* derived from this software without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
|
||||
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
|
||||
* AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
||||
* THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
|
||||
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
||||
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
|
||||
* OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
|
||||
* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
||||
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
** Copyright (c) 2004-2010, Atheros Communications Inc.
|
||||
**
|
||||
** Permission to use, copy, modify, and/or distribute this software for any
|
||||
** purpose with or without fee is hereby granted, provided that the above
|
||||
** copyright notice and this permission notice appear in all copies.
|
||||
**
|
||||
** THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||||
** WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||||
** MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
||||
** ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||||
** WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
||||
** ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
||||
** OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||||
**
|
||||
** This module is the Atheros specific ioctl/iwconfig/iwpriv interface
|
||||
** to the ATH object, normally instantiated as wifiX, where X is the
|
||||
** instance number (e.g. wifi0, wifi1).
|
||||
**
|
||||
** This provides a mechanism to configure the ATH object within the
|
||||
** Linux OS enviornment. This file is OS specific.
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* Copyright (c) 2012 Qualcomm Technologies, Inc.
|
||||
* 2012 Qualcomm Atheros, Inc.
|
||||
* All Rights Reserved.
|
||||
* Confidential and Proprietary - Qualcomm Technologies, Inc.
|
||||
*/
|
||||
|
||||
/*
|
||||
* For this file, which was received with alternative licensing options for
|
||||
* distribution, Qualcomm Atheros, Inc. has selected the BSD license.
|
||||
*/
|
||||
|
||||
//-
|
||||
// Copyright (c) 2002-2004 Sam Leffler, Errno Consulting
|
||||
// All rights reserved.
|
||||
// $ATH_LICENSE_NULL$
|
||||
//
|
||||
// Redistribution and use in source and binary forms, with or without
|
||||
// modification, are permitted provided that the following conditions
|
||||
// are met:
|
||||
// 1. Redistributions of source code must retain the above copyright
|
||||
// notice, this list of conditions and the following disclaimer,
|
||||
// without modification.
|
||||
// 2. Redistributions in binary form must reproduce at minimum a disclaimer
|
||||
// similar to the "NO WARRANTY" disclaimer below ("Disclaimer") and any
|
||||
// redistribution must be conditioned upon including a substantially
|
||||
// similar Disclaimer requirement for further binary redistribution.
|
||||
// 3. Neither the names of the above-listed copyright holders nor the names
|
||||
// of any contributors may be used to endorse or promote products derived
|
||||
// from this software without specific prior written permission.
|
||||
//
|
||||
// Alternatively, this software may be distributed under the terms of the
|
||||
// GNU General Public License ("GPL") version 2 as published by the Free
|
||||
// Software Foundation.
|
||||
//
|
||||
// NO WARRANTY
|
||||
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||||
// ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||||
// LIMITED TO, THE IMPLIED WARRANTIES OF NONINFRINGEMENT, MERCHANTIBILITY
|
||||
// AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
||||
// THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY,
|
||||
// OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||||
// SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||||
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
|
||||
// IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
// ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
|
||||
// THE POSSIBILITY OF SUCH DAMAGES.
|
||||
|
||||
--------------------
|
||||
|
||||
/*
|
||||
* AES SIV (RFC 5297)
|
||||
* Copyright (c) 2013 Cozybit, Inc.
|
||||
*
|
||||
* This software may be distributed under the terms of the BSD license.
|
||||
*/
|
||||
|
||||
--------------------
|
||||
|
||||
* Copyright 2018 The Android Open Source Project
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
|
||||
--------------------
|
||||
|
||||
/* ===== start - public domain SHA256 implementation ===== */
|
||||
|
||||
/* This is based on SHA256 implementation in LibTomCrypt that was released into
|
||||
* public domain by Tom St Denis. */
|
||||
|
||||
--------------------
|
||||
|
||||
// This code implements the MD5 message-digest algorithm.
|
||||
// The algorithm is due to Ron Rivest. This code was
|
||||
// written by Colin Plumb in 1993, no copyright is claimed.
|
||||
// This code is in the public domain; do with it what you wish.
|
||||
//
|
||||
// Equivalent code is available from RSA Data Security, Inc.
|
||||
// This code has been tested against that, and is equivalent,
|
||||
// except that you don't need to include two pages of legalese
|
||||
// with every copy.
|
||||
//
|
||||
|
||||
--------------------
|
||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
File diff suppressed because it is too large
Load Diff
1
feeds/wifi-ax/ath11k-firmware/files/IPQ6018/fw_version.txt
Executable file
1
feeds/wifi-ax/ath11k-firmware/files/IPQ6018/fw_version.txt
Executable file
@@ -0,0 +1 @@
|
||||
WLAN.HK.2.5.0.1-01100-QCAHKSWPL_SILICONZ-1 v1
|
||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -1 +1 @@
|
||||
WLAN.HK.2.6.0.1-00861-QCAHKSWPL_SILICONZ-1 v2
|
||||
WLAN.HK.2.5.0.1-01100-QCAHKSWPL_SILICONZ-1 v2
|
||||
|
||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
File diff suppressed because it is too large
Load Diff
Binary file not shown.
Binary file not shown.
Binary file not shown.
File diff suppressed because it is too large
Load Diff
Binary file not shown.
@@ -1,5 +1,5 @@
|
||||
#
|
||||
# Copyright (c) 2018-2021 Qualcomm Technologies, Inc.
|
||||
|
||||
# Copyright (c) 2018-2020 Qualcomm Technologies, Inc.
|
||||
# All Rights Reserved.
|
||||
# Confidential and Proprietary - Qualcomm Technologies, Inc.
|
||||
#
|
||||
@@ -15,25 +15,53 @@
|
||||
# 1. Duplicate entries for same board name should not be added. Please modify only the values and not add new lines for same board
|
||||
# 2. Do not add boardname search strings in comments. As the host script search patterns are for boardnames in the file and does not ignore comments
|
||||
#############################################################################################################
|
||||
#CYP+Pine RDP's
|
||||
#CYPRESS-RDPs
|
||||
ap-cp02-c1_enable_daemon_support=1
|
||||
ap-cp02-c1_enable_cold_boot_support=1
|
||||
ap-cp02-c1_enable_qdss_tracing=1
|
||||
|
||||
ap-cp03-c1_enable_daemon_support=1
|
||||
ap-cp03-c1_enable_cold_boot_support=1
|
||||
ap-cp03-c1_enable_qdss_tracing=1
|
||||
|
||||
#Cypress+Pine RDP, For Cypress internal radio
|
||||
ap-cp01-c3_enable_daemon_support=1
|
||||
ap-cp01-c3_enable_cold_boot_support=1
|
||||
ap-cp01-c3_enable_qdss_tracing=1
|
||||
|
||||
#Cypress+Pine RDP, For Pine PCIE radio
|
||||
ap-cp01-c3_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-cp01-c3_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-cp01-c3_qcn9000_pci0_enable_qdss_tracing=1
|
||||
|
||||
#Cypress+Pine+Pine(Scan) RDP, For Pine PCIE0
|
||||
ap-cp01-c5_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-cp01-c5_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-cp01-c5_qcn9000_pci0_enable_qdss_tracing=1
|
||||
|
||||
#Cypress+Pine+Pine(Scan) RDP, For Pine PCIE1(Scan)
|
||||
ap-cp01-c5_qcn9000_pci1_enable_daemon_support=1
|
||||
ap-cp01-c5_qcn9000_pci1_enable_cold_boot_support=1
|
||||
ap-cp01-c5_qcn9000_pci1_enable_qdss_tracing=1
|
||||
#For other Cypress boards enabled by default
|
||||
ap-cp_default_enable_daemon_support=1
|
||||
ap-cp_default_enable_cold_boot_support=1
|
||||
ap-cp_default_enable_qdss_tracing=1
|
||||
|
||||
#############################################################################################################
|
||||
#HAWKEYE-RDPs
|
||||
#Hawkeye has V1 and V2 chipsets. Differentiating them by v1/v2 naming
|
||||
ap-hk06_v2_enable_daemon_support=0
|
||||
ap-hk06_v2_enable_cold_boot_support=0
|
||||
ap-hk06_v2_enable_qdss_tracing=0
|
||||
|
||||
ap-hk_v1_default_enable_daemon_support=1
|
||||
ap-hk_v1_default_enable_cold_boot_support=1
|
||||
ap-hk_v1_default_enable_qdss_tracing=0
|
||||
|
||||
ap-hk_v2_default_enable_daemon_support=1
|
||||
ap-hk_v2_default_enable_cold_boot_support=1
|
||||
ap-hk_v2_default_enable_qdss_tracing=1
|
||||
|
||||
#############################################################################################################
|
||||
#HK+Pine -RDPs
|
||||
#HK10 - Pine RDPs
|
||||
|
||||
#For HK10-C1 board - HK2G internal radio
|
||||
ap-hk10-c1_enable_daemon_support=1
|
||||
ap-hk10-c1_enable_cold_boot_support=1
|
||||
ap-hk10-c1_enable_qdss_tracing=1
|
||||
|
||||
#For HK10-C1 board - Pine PCIE 0
|
||||
ap-hk10-c1_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-hk10-c1_qcn9000_pci0_enable_cold_boot_support=1
|
||||
@@ -44,6 +72,11 @@ ap-hk10-c1_qcn9000_pci1_enable_daemon_support=1
|
||||
ap-hk10-c1_qcn9000_pci1_enable_cold_boot_support=1
|
||||
ap-hk10-c1_qcn9000_pci1_enable_qdss_tracing=1
|
||||
|
||||
#For HK10-C2 board - HK2G internal radio is not present. So keep it disabled.
|
||||
ap-hk10-c2_enable_daemon_support=0
|
||||
ap-hk10-c2_enable_cold_boot_support=0
|
||||
ap-hk10-c2_enable_qdss_tracing=0
|
||||
|
||||
#For HK10-C2 board - Pine PCIE 0
|
||||
ap-hk10-c2_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-hk10-c2_qcn9000_pci0_enable_cold_boot_support=1
|
||||
@@ -55,39 +88,107 @@ ap-hk10-c2_qcn9000_pci1_enable_cold_boot_support=1
|
||||
ap-hk10-c2_qcn9000_pci1_enable_qdss_tracing=1
|
||||
|
||||
#HK14 - Pine RDPs : Pine6G + HK(2G+5G) in HK09 platform
|
||||
#For HK14 board - HK(2G+5G) internal radios (i.e, HK09 internal radios)
|
||||
ap-hk14_enable_daemon_support=1
|
||||
ap-hk14_enable_cold_boot_support=1
|
||||
ap-hk14_enable_qdss_tracing=1
|
||||
|
||||
#For HK14 board - Pine PCIE 0
|
||||
ap-hk14_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-hk14_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-hk14_qcn9000_pci0_enable_qdss_tracing=1
|
||||
ap-hk14_qcn9000_pci0_enable_qdss_tracing=0
|
||||
|
||||
#HK01-C6 - Pine RDPs : Pine6G + HK(2G+5G) in HK01 platform
|
||||
#For HK01-C6 board - HK(2G+5G) internal radios (i.e, HKv2 internal radios)
|
||||
ap-hk01-c6_enable_daemon_support=1
|
||||
ap-hk01-c6_enable_cold_boot_support=1
|
||||
ap-hk01-c6_enable_qdss_tracing=0
|
||||
|
||||
#For HK01-C6 board - Pine PCIE 0
|
||||
ap-hk01-c6_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-hk01-c6_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-hk01-c6_qcn9000_pci0_enable_qdss_tracing=1
|
||||
#No explicit defualt tags for HK10/HK14 board as of now. All Combinations of HK10/HK14 are explicitily addressed above.
|
||||
#HK10/HK14 defaults to HKv2 default macros
|
||||
|
||||
#############################################################################################################
|
||||
#Maple+Pine RDP's
|
||||
#ACORN-RDPs
|
||||
ap-ac_default_enable_daemon_support=1
|
||||
ap-ac_default_enable_cold_boot_support=1
|
||||
ap-ac_default_enable_qdss_tracing=1
|
||||
|
||||
#############################################################################################################
|
||||
#OAK-RDPs
|
||||
ap-oak_default_enable_daemon_support=1
|
||||
ap-oak_default_enable_cold_boot_support=1
|
||||
ap-oak_default_enable_qdss_tracing=1
|
||||
|
||||
#############################################################################################################
|
||||
#MAPLE-RDPS
|
||||
|
||||
|
||||
#Maple+Pine
|
||||
ap-mp03.1_enable_daemon_support=1
|
||||
ap-mp03.1_enable_cold_boot_support=1
|
||||
ap-mp03.1_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.1_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-mp03.1_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-mp03.1_qcn9000_pci0_enable_qdss_tracing=1
|
||||
ap-mp03.1_qcn9000_pci0_enable_qdss_tracing=0
|
||||
|
||||
#Maple+Pine emmc
|
||||
ap-mp03.1-c2_enable_daemon_support=1
|
||||
ap-mp03.1-c2_enable_cold_boot_support=1
|
||||
ap-mp03.1-c2_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.1-c2_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-mp03.1-c2_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-mp03.1-c2_qcn9000_pci0_enable_qdss_tracing=1
|
||||
ap-mp03.1-c2_qcn9000_pci0_enable_qdss_tracing=0
|
||||
|
||||
#Maple+Pine+Spruce
|
||||
ap-mp03.3_enable_daemon_support=1
|
||||
ap-mp03.3_enable_cold_boot_support=1
|
||||
ap-mp03.3_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.3_qcn6122_pci0_enable_daemon_support=1
|
||||
ap-mp03.3_qcn6122_pci0_enable_cold_boot_support=1
|
||||
ap-mp03.3_qcn6122_pci0_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.3_qcn9000_pci1_enable_daemon_support=1
|
||||
ap-mp03.3_qcn9000_pci1_enable_cold_boot_support=1
|
||||
ap-mp03.3_qcn9000_pci1_enable_qdss_tracing=1
|
||||
|
||||
#Maple+Pine+Spruce emmc
|
||||
ap-mp03.3-c2_enable_daemon_support=1
|
||||
ap-mp03.3-c2_enable_cold_boot_support=1
|
||||
ap-mp03.3-c2_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.3-c2_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-mp03.3-c2_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-mp03.3-c2_qcn9000_pci0_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.3-c2_qcn6122_pci1_enable_daemon_support=1
|
||||
ap-mp03.3-c2_qcn6122_pci1_enable_cold_boot_support=1
|
||||
ap-mp03.3-c2_qcn6122_pci1_enable_qdss_tracing=1
|
||||
|
||||
#Maple+Spruce+Spruce
|
||||
ap-mp02.1_enable_daemon_support=1
|
||||
ap-mp02.1_enable_cold_boot_support=0
|
||||
ap-mp02.1_enable_qdss_tracing=1
|
||||
|
||||
ap-mp02.1_qcn6122_pci0_enable_daemon_support=1
|
||||
ap-mp02.1_qcn6122_pci0_enable_cold_boot_support=0
|
||||
ap-mp02.1_qcn6122_pci0_enable_qdss_tracing=1
|
||||
|
||||
ap-mp02.1_qcn6122_pci1_enable_daemon_support=1
|
||||
ap-mp02.1_qcn6122_pci1_enable_cold_boot_support=0
|
||||
ap-mp02.1_qcn6122_pci1_enable_qdss_tracing=1
|
||||
|
||||
#Maple+Pine+Pine
|
||||
ap-mp03.4-c1_enable_daemon_support=1
|
||||
ap-mp03.4-c1_enable_cold_boot_support=0
|
||||
ap-mp03.4-c1_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.4-c1_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-mp03.4-c1_qcn9000_pci0_enable_cold_boot_support=0
|
||||
ap-mp03.4-c1_qcn9000_pci0_enable_qdss_tracing=1
|
||||
@@ -96,13 +197,25 @@ ap-mp03.4-c1_qcn9000_pci1_enable_daemon_support=1
|
||||
ap-mp03.4-c1_qcn9000_pci1_enable_cold_boot_support=0
|
||||
ap-mp03.4-c1_qcn9000_pci1_enable_qdss_tracing=1
|
||||
|
||||
#Alder Silicon RDPs
|
||||
ap-al02-c1_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-al02-c1_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-al02-c1_qcn9000_pci0_enable_qdss_tracing=1
|
||||
#Maple+Spruce+Spruce
|
||||
ap-mp03.5-c1_enable_daemon_support=1
|
||||
ap-mp03.5-c1_enable_cold_boot_support=1
|
||||
ap-mp03.5-c1_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.5-c1_qcn6122_pci0_enable_daemon_support=1
|
||||
ap-mp03.5-c1_qcn6122_pci0_enable_cold_boot_support=1
|
||||
ap-mp03.5-c1_qcn6122_pci0_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.5-c1_qcn6122_pci1_enable_daemon_support=1
|
||||
ap-mp03.5-c1_qcn6122_pci1_enable_cold_boot_support=1
|
||||
ap-mp03.5-c1_qcn6122_pci1_enable_qdss_tracing=1
|
||||
|
||||
ap-mp_default_enable_daemon_support=1
|
||||
ap-mp_default_enable_cold_boot_support=0
|
||||
ap-mp_default_enable_qdss_tracing=1
|
||||
|
||||
ap-al02-c1_qcn9000_pci1_enable_daemon_support=1
|
||||
ap-al02-c1_qcn9000_pci1_enable_cold_boot_support=1
|
||||
ap-al02-c1_qcn9000_pci1_enable_qdss_tracing=1
|
||||
#############################################################################################################
|
||||
|
||||
#TEST-BOARDS
|
||||
db_default_enable_daemon_support=0
|
||||
db_default_enable_cold_boot_support=0
|
||||
db_default_enable_qdss_tracing=0
|
||||
|
||||
@@ -15,23 +15,53 @@
|
||||
# 1. Duplicate entries for same board name should not be added. Please modify only the values and not add new lines for same board
|
||||
# 2. Do not add boardname search strings in comments. As the host script search patterns are for boardnames in the file and does not ignore comments
|
||||
#############################################################################################################
|
||||
#CYP+Pine -RDPs
|
||||
#CYPRESS-RDPs
|
||||
ap-cp02-c1_enable_daemon_support=1
|
||||
ap-cp02-c1_enable_cold_boot_support=1
|
||||
ap-cp02-c1_enable_qdss_tracing=1
|
||||
|
||||
ap-cp03-c1_enable_daemon_support=1
|
||||
ap-cp03-c1_enable_cold_boot_support=1
|
||||
ap-cp03-c1_enable_qdss_tracing=1
|
||||
|
||||
#Cypress+Pine RDP, For Cypress internal radio
|
||||
ap-cp01-c3_enable_daemon_support=1
|
||||
ap-cp01-c3_enable_cold_boot_support=1
|
||||
ap-cp01-c3_enable_qdss_tracing=1
|
||||
|
||||
#Cypress+Pine RDP, For Pine PCIE radio
|
||||
ap-cp01-c3_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-cp01-c3_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-cp01-c3_qcn9000_pci0_enable_qdss_tracing=1
|
||||
|
||||
#Cypress+Pine+Pine(Scan) RDP, For Pine PCIE0
|
||||
ap-cp01-c5_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-cp01-c5_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-cp01-c5_qcn9000_pci0_enable_qdss_tracing=1
|
||||
#For other Cypress boards enabled by default
|
||||
ap-cp_default_enable_daemon_support=1
|
||||
ap-cp_default_enable_cold_boot_support=1
|
||||
ap-cp_default_enable_qdss_tracing=1
|
||||
|
||||
#Cypress+Pine+Pine(Scan) RDP, For Pine PCIE1(Scan)
|
||||
ap-cp01-c5_qcn9000_pci1_enable_daemon_support=1
|
||||
ap-cp01-c5_qcn9000_pci1_enable_cold_boot_support=1
|
||||
ap-cp01-c5_qcn9000_pci1_enable_qdss_tracing=1
|
||||
#############################################################################################################
|
||||
#HAWKEYE + pine -RDPs
|
||||
#HAWKEYE-RDPs
|
||||
#Hawkeye has V1 and V2 chipsets. Differentiating them by v1/v2 naming
|
||||
ap-hk06_v2_enable_daemon_support=0
|
||||
ap-hk06_v2_enable_cold_boot_support=0
|
||||
ap-hk06_v2_enable_qdss_tracing=0
|
||||
|
||||
ap-hk_v1_default_enable_daemon_support=1
|
||||
ap-hk_v1_default_enable_cold_boot_support=1
|
||||
ap-hk_v1_default_enable_qdss_tracing=0
|
||||
|
||||
ap-hk_v2_default_enable_daemon_support=1
|
||||
ap-hk_v2_default_enable_cold_boot_support=1
|
||||
ap-hk_v2_default_enable_qdss_tracing=1
|
||||
|
||||
#############################################################################################################
|
||||
#HK10 - Pine RDPs
|
||||
|
||||
#For HK10-C1 board - HK2G internal radio
|
||||
ap-hk10-c1_enable_daemon_support=1
|
||||
ap-hk10-c1_enable_cold_boot_support=1
|
||||
ap-hk10-c1_enable_qdss_tracing=1
|
||||
|
||||
#For HK10-C1 board - Pine PCIE 0
|
||||
ap-hk10-c1_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-hk10-c1_qcn9000_pci0_enable_cold_boot_support=1
|
||||
@@ -42,6 +72,11 @@ ap-hk10-c1_qcn9000_pci1_enable_daemon_support=1
|
||||
ap-hk10-c1_qcn9000_pci1_enable_cold_boot_support=1
|
||||
ap-hk10-c1_qcn9000_pci1_enable_qdss_tracing=1
|
||||
|
||||
#For HK10-C2 board - HK2G internal radio is not present. So keep it disabled.
|
||||
ap-hk10-c2_enable_daemon_support=0
|
||||
ap-hk10-c2_enable_cold_boot_support=0
|
||||
ap-hk10-c2_enable_qdss_tracing=0
|
||||
|
||||
#For HK10-C2 board - Pine PCIE 0
|
||||
ap-hk10-c2_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-hk10-c2_qcn9000_pci0_enable_cold_boot_support=1
|
||||
@@ -53,40 +88,107 @@ ap-hk10-c2_qcn9000_pci1_enable_cold_boot_support=1
|
||||
ap-hk10-c2_qcn9000_pci1_enable_qdss_tracing=1
|
||||
|
||||
#HK14 - Pine RDPs : Pine6G + HK(2G+5G) in HK09 platform
|
||||
#For HK14 board - HK(2G+5G) internal radios (i.e, HK09 internal radios)
|
||||
ap-hk14_enable_daemon_support=1
|
||||
ap-hk14_enable_cold_boot_support=1
|
||||
ap-hk14_enable_qdss_tracing=0
|
||||
|
||||
#For HK14 board - Pine PCIE 0
|
||||
ap-hk14_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-hk14_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-hk14_qcn9000_pci0_enable_qdss_tracing=1
|
||||
ap-hk14_qcn9000_pci0_enable_qdss_tracing=0
|
||||
|
||||
#HK01-C6 - Pine RDPs : Pine6G + HK(2G+5G) in HK01 platform
|
||||
#For HK01-C6 board - HK(2G+5G) internal radios (i.e, HKv2 internal radios)
|
||||
ap-hk01-c6_enable_daemon_support=1
|
||||
ap-hk01-c6_enable_cold_boot_support=1
|
||||
ap-hk01-c6_enable_qdss_tracing=1
|
||||
|
||||
#For HK01-C6 board - Pine PCIE 0
|
||||
ap-hk01-c6_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-hk01-c6_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-hk01-c6_qcn9000_pci0_enable_qdss_tracing=1
|
||||
#No explicit defualt tags for HK10/HK14 board as of now. All Combinations of HK10/HK14 are explicitily addressed above.
|
||||
#HK10/HK14 defaults to HKv2 default macros
|
||||
|
||||
#############################################################################################################
|
||||
#MAPLE+Pine-RDPS
|
||||
#ACORN-RDPs
|
||||
ap-ac_default_enable_daemon_support=1
|
||||
ap-ac_default_enable_cold_boot_support=1
|
||||
ap-ac_default_enable_qdss_tracing=1
|
||||
|
||||
#############################################################################################################
|
||||
#OAK-RDPs
|
||||
ap-oak_default_enable_daemon_support=1
|
||||
ap-oak_default_enable_cold_boot_support=1
|
||||
ap-oak_default_enable_qdss_tracing=1
|
||||
|
||||
#############################################################################################################
|
||||
#MAPLE-RDPS
|
||||
|
||||
|
||||
#Maple+Pine
|
||||
ap-mp03.1_enable_daemon_support=1
|
||||
ap-mp03.1_enable_cold_boot_support=1
|
||||
ap-mp03.1_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.1_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-mp03.1_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-mp03.1_qcn9000_pci0_enable_qdss_tracing=1
|
||||
ap-mp03.1_qcn9000_pci0_enable_qdss_tracing=0
|
||||
|
||||
#Maple+Pine emmc
|
||||
ap-mp03.1-c2_enable_daemon_support=1
|
||||
ap-mp03.1-c2_enable_cold_boot_support=1
|
||||
ap-mp03.1-c2_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.1-c2_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-mp03.1-c2_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-mp03.1-c2_qcn9000_pci0_enable_qdss_tracing=1
|
||||
ap-mp03.1-c2_qcn9000_pci0_enable_qdss_tracing=0
|
||||
|
||||
#Maple+Pine+Spruce
|
||||
ap-mp03.3_enable_daemon_support=1
|
||||
ap-mp03.3_enable_cold_boot_support=1
|
||||
ap-mp03.3_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.3_qcn6122_pci0_enable_daemon_support=1
|
||||
ap-mp03.3_qcn6122_pci0_enable_cold_boot_support=1
|
||||
ap-mp03.3_qcn6122_pci0_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.3_qcn9000_pci1_enable_daemon_support=1
|
||||
ap-mp03.3_qcn9000_pci1_enable_cold_boot_support=1
|
||||
ap-mp03.3_qcn9000_pci1_enable_qdss_tracing=1
|
||||
|
||||
#Maple+Pine+Spruce emmc
|
||||
ap-mp03.3-c2_enable_daemon_support=1
|
||||
ap-mp03.3-c2_enable_cold_boot_support=1
|
||||
ap-mp03.3-c2_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.3-c2_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-mp03.3-c2_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-mp03.3-c2_qcn9000_pci0_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.3-c2_qcn6122_pci1_enable_daemon_support=1
|
||||
ap-mp03.3-c2_qcn6122_pci1_enable_cold_boot_support=1
|
||||
ap-mp03.3-c2_qcn6122_pci1_enable_qdss_tracing=1
|
||||
|
||||
#Maple+Spruce+Spruce
|
||||
ap-mp02.1_enable_daemon_support=1
|
||||
ap-mp02.1_enable_cold_boot_support=0
|
||||
ap-mp02.1_enable_qdss_tracing=1
|
||||
|
||||
ap-mp02.1_qcn6122_pci0_enable_daemon_support=1
|
||||
ap-mp02.1_qcn6122_pci0_enable_cold_boot_support=0
|
||||
ap-mp02.1_qcn6122_pci0_enable_qdss_tracing=1
|
||||
|
||||
ap-mp02.1_qcn6122_pci1_enable_daemon_support=1
|
||||
ap-mp02.1_qcn6122_pci1_enable_cold_boot_support=0
|
||||
ap-mp02.1_qcn6122_pci1_enable_qdss_tracing=1
|
||||
|
||||
#Maple+Pine+Pine
|
||||
ap-mp03.4-c1_enable_daemon_support=1
|
||||
ap-mp03.4-c1_enable_cold_boot_support=0
|
||||
ap-mp03.4-c1_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.4-c1_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-mp03.4-c1_qcn9000_pci0_enable_cold_boot_support=0
|
||||
ap-mp03.4-c1_qcn9000_pci0_enable_qdss_tracing=1
|
||||
@@ -95,14 +197,25 @@ ap-mp03.4-c1_qcn9000_pci1_enable_daemon_support=1
|
||||
ap-mp03.4-c1_qcn9000_pci1_enable_cold_boot_support=0
|
||||
ap-mp03.4-c1_qcn9000_pci1_enable_qdss_tracing=1
|
||||
|
||||
#Alder Silicon RDPs
|
||||
ap-al02-c1_qcn9000_pci0_enable_daemon_support=1
|
||||
ap-al02-c1_qcn9000_pci0_enable_cold_boot_support=1
|
||||
ap-al02-c1_qcn9000_pci0_enable_qdss_tracing=1
|
||||
#Maple+Spruce+Spruce
|
||||
ap-mp03.5-c1_enable_daemon_support=1
|
||||
ap-mp03.5-c1_enable_cold_boot_support=1
|
||||
ap-mp03.5-c1_enable_qdss_tracing=1
|
||||
|
||||
ap-al02-c1_qcn9000_pci1_enable_daemon_support=1
|
||||
ap-al02-c1_qcn9000_pci1_enable_cold_boot_support=1
|
||||
ap-al02-c1_qcn9000_pci1_enable_qdss_tracing=1
|
||||
ap-mp03.5-c1_qcn6122_pci0_enable_daemon_support=1
|
||||
ap-mp03.5-c1_qcn6122_pci0_enable_cold_boot_support=1
|
||||
ap-mp03.5-c1_qcn6122_pci0_enable_qdss_tracing=1
|
||||
|
||||
ap-mp03.5-c1_qcn6122_pci1_enable_daemon_support=1
|
||||
ap-mp03.5-c1_qcn6122_pci1_enable_cold_boot_support=1
|
||||
ap-mp03.5-c1_qcn6122_pci1_enable_qdss_tracing=1
|
||||
|
||||
ap-mp_default_enable_daemon_support=1
|
||||
ap-mp_default_enable_cold_boot_support=0
|
||||
ap-mp_default_enable_qdss_tracing=1
|
||||
|
||||
#############################################################################################################
|
||||
|
||||
#TEST-BOARDS
|
||||
db_default_enable_daemon_support=0
|
||||
db_default_enable_cold_boot_support=0
|
||||
db_default_enable_qdss_tracing=0
|
||||
|
||||
@@ -1 +1 @@
|
||||
WLAN.HK.2.6.0.1-00861-QCAHKSWPL_SILICONZ-1 v1
|
||||
WLAN.HK.2.5.0.1-01100-QCAHKSWPL_SILICONZ-1 v1
|
||||
|
||||
Binary file not shown.
@@ -14,14 +14,13 @@ sink:etr_ddr;
|
||||
subsys_cfg_start:mac0;
|
||||
swevt:0x0, 0xFFFFFFFF,0xFFFFFFFF,0x0,0x0;
|
||||
hwsch:0x1, 0x6FFFF3, 0x60000, 0x00000000, 0x00000000;
|
||||
rxdma:0x2, 0x3F37FE7F, 0x00017F04, 0x00000000, 0x00000000;
|
||||
rxdma:0x2, 0x3F37FE47, 0x0001E004, 0x00000000, 0x00000000;
|
||||
crypto:0x3, 0xF7DB3770, 0x00000000, 0x00000000, 0x00000000;
|
||||
txpcu:0x4, 0xD6C7F4E7, 0x200801D2, 0x00000000, 0x00000000;
|
||||
txpcu:0x4, 0xD6C7F4E7, 0x200001D2, 0x00000000, 0x00000000;
|
||||
rxole:0x5, 0x00000000, 0xFFC00000, 0x00000000, 0x00000000;
|
||||
txole:0x6, 0x641F0FF4, 0x6FF0F000, 0x00000000, 0x00000000;
|
||||
txole:0x6, 0x7C0FFE26, 0x00000000, 0x00000000, 0x00000000;
|
||||
mxi:0x7, 0x00122234, 0x00000000, 0x00000000, 0x00000000;
|
||||
txdma:0x8, 0x39800064, 0x00000084, 0x00000000, 0x00000000;
|
||||
sfm:0x9, 0xC03C0F03, 0xE, 0x00000000, 0x00000000;
|
||||
subsys_cfg_end:mac0;
|
||||
//subsys_cfg_start:mac1;
|
||||
//swevt:0x0, 0xFFFFFFFF,0xFFFFFFFF,0x0,0x0;
|
||||
|
||||
@@ -1,196 +0,0 @@
|
||||
include $(TOPDIR)/rules.mk
|
||||
include $(INCLUDE_DIR)/version.mk
|
||||
|
||||
PKG_NAME:=ath11k-wifi
|
||||
PKG_RELEASE:=1
|
||||
PKG_FLAGS:=nonshared
|
||||
|
||||
include $(INCLUDE_DIR)/package.mk
|
||||
|
||||
define Build/Prepare
|
||||
mkdir -p $(PKG_BUILD_DIR)
|
||||
endef
|
||||
|
||||
define Build/Compile
|
||||
endef
|
||||
|
||||
#
|
||||
# This is intended to be used on an interim basis until device-specific
|
||||
# board data for new devices is available through the upstream compilation
|
||||
#
|
||||
# Please send a mail with your device-specific board files upstream.
|
||||
# You can find instructions and examples on the linux-wireless wiki:
|
||||
# <https://wireless.wiki.kernel.org/en/users/drivers/ath10k/boardfiles>
|
||||
#
|
||||
|
||||
ALLWIFIBOARDS:= \
|
||||
cig-wf188 \
|
||||
cig-wf188n \
|
||||
cig-wf194c \
|
||||
cig-wf194c4 \
|
||||
cig-wf196 \
|
||||
cybertan-eww622-a1 \
|
||||
edgecore-eap101 \
|
||||
gl-ax1800 \
|
||||
sercomm-wallaby \
|
||||
edgecore-eap102 \
|
||||
edgecore-eap104 \
|
||||
wallys-dr6018 \
|
||||
wallys-dr6018-v4 \
|
||||
tplink-ex227 \
|
||||
tplink-ex447
|
||||
|
||||
ALLWIFIPACKAGES:=$(foreach BOARD,$(ALLWIFIBOARDS),ath11k-wifi-$(BOARD))
|
||||
|
||||
define Package/ath11k-wifi-default
|
||||
SUBMENU:=ath11k Board-Specific Overrides
|
||||
SECTION:=firmware
|
||||
CATEGORY:=Firmware
|
||||
DEPENDS:=@TARGET_ipq807x
|
||||
TITLE:=Custom Board
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-qcom-ipq8074
|
||||
$(call Package/ath11k-wifi-default)
|
||||
TITLE:=board-2.bin for QCOM IPQ807x eval kits
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-qcom-ipq6018
|
||||
$(call Package/ath11k-wifi-default)
|
||||
TITLE:=board-2.bin for QCOM IPQ60xx eval kits
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-qcom-ipq5018
|
||||
$(call Package/ath11k-wifi-default)
|
||||
TITLE:=board-2.bin for QCOM IPQ50xx eval kits
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-qcom-qcn9000
|
||||
$(call Package/ath11k-wifi-default)
|
||||
TITLE:=board-2.bin for QCOM QCN9000 eval kits
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-qcom-ipq6122
|
||||
$(call Package/ath11k-wifi-default)
|
||||
TITLE:=board-2.bin for QCOM IPQ6122 eval kits
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-cig-wf196_6g
|
||||
$(call Package/ath11k-wifi-default)
|
||||
TITLE:=cig-wf196 6G bdf
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-gl-ax1800
|
||||
$(call Package/ath11k-wifi-default)
|
||||
TITLE:=gl-ax1800 bdf
|
||||
endef
|
||||
|
||||
define ath11k-wifi-install-one-to
|
||||
$(INSTALL_DIR) $(2)/lib/firmware/$(3)/
|
||||
$(INSTALL_DATA) $(1) $(2)/lib/firmware/$(3)/board.bin
|
||||
endef
|
||||
|
||||
define ath11k-wifi-install-one
|
||||
$(if $(filter $(suffix $(1)),.IPQ5018),\
|
||||
$(call ath11k-wifi-install-one-to,$(1),$(2),ath11k/IPQ5018/hw1.0/),\
|
||||
)
|
||||
$(if $(filter $(suffix $(1)),.IPQ6018),\
|
||||
$(call ath11k-wifi-install-one-to,$(1),$(2),ath11k/IPQ6018/hw1.0/),\
|
||||
)
|
||||
$(if $(filter $(suffix $(1)),.IPQ8074),\
|
||||
$(call ath11k-wifi-install-one-to,$(1),$(2),ath11k/IPQ8074/hw2.0/),\
|
||||
)
|
||||
$(if $(filter $(suffix $(1)),.QCN9074),\
|
||||
$(call ath11k-wifi-install-one-to,$(1),$(2),ath11k/QCN9074/hw1.0/),\
|
||||
)
|
||||
$(if $(filter $(suffix $(1)),.QCN6122),\
|
||||
$(call ath11k-wifi-install-one-to,$(1),$(2),ath11k/qcn6122/hw1.0/),\
|
||||
)
|
||||
|
||||
endef
|
||||
# Blank line required at end of above define due to foreach context
|
||||
|
||||
define generate-ath11k-wifi-package
|
||||
define Package/ath11k-wifi-$(1)
|
||||
$(call Package/ath11k-wifi-default)
|
||||
TITLE:=bdwlan.bin Overrides for $(2)
|
||||
CONFLICTS:=$(PREV_BOARD)
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-$(1)/description
|
||||
The $(2) requires board-specific, reference ("cal") data
|
||||
that is not yet present in the upstream wireless firmware distribution.
|
||||
|
||||
This package supplies bdwlan.bin file(s) that, in the interim,
|
||||
overwrite those supplied by the ath11k-firmware-* packages.
|
||||
|
||||
This is package is only necessary for the $(2).
|
||||
|
||||
Do not install it for any other device!
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-$(1)/install-overlay
|
||||
$$$$(foreach ATH11K_WIFI_BOARD_FILE,$$$$(wildcard board-$(1).*),\
|
||||
$$$$(call ath11k-wifi-install-one,$$$$(ATH11K_WIFI_BOARD_FILE),$$(1)))
|
||||
endef
|
||||
|
||||
PREV_BOARD+=ath11k-wifi-$(1)
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-qcom-ipq8074/install
|
||||
$(INSTALL_DIR) $(1)/lib/firmware/ath11k/IPQ8074/hw2.0/
|
||||
$(INSTALL_DATA) ./board-2.bin.IPQ8074 $(1)/lib/firmware/ath11k/IPQ8074/hw2.0/board-2.bin
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-qcom-ipq6018/install
|
||||
$(INSTALL_DIR) $(1)/lib/firmware/ath11k/IPQ6018/hw1.0/
|
||||
$(INSTALL_DATA) ./board-2.bin.IPQ6018 $(1)/lib/firmware/ath11k/IPQ6018/hw1.0/board-2.bin
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-qcom-ipq5018/install
|
||||
$(INSTALL_DIR) $(1)/lib/firmware/ath11k/IPQ5018/hw1.0/
|
||||
$(INSTALL_DATA) ./board-2.bin.IPQ5018 $(1)/lib/firmware/ath11k/IPQ5018/hw1.0/board-2.bin
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-qcom-ipq6122/install
|
||||
$(INSTALL_DIR) $(1)/lib/firmware/ath11k/IPQ6122/hw1.0/
|
||||
$(INSTALL_DATA) ./board-2.bin.IPQ6122 $(1)/lib/firmware/ath11k/IPQ6122/hw1.0/board-2.bin
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-qcom-qcn9000/install
|
||||
$(INSTALL_DIR) $(1)/lib/firmware/ath11k/QCN9074/hw1.0/
|
||||
$(INSTALL_DATA) ./board-2.bin.QCN9000 $(1)/lib/firmware/ath11k/QCN9074/hw1.0/board-2.bin
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-cig-wf196_6g/install
|
||||
$(INSTALL_DIR) $(1)/lib/firmware/ath11k/QCN9074/hw1.0/
|
||||
$(INSTALL_DATA) ./board-cig-wf196_6g.bin.QCN9074 $(1)/lib/firmware/ath11k/QCN9074/hw1.0/board.bin
|
||||
endef
|
||||
|
||||
define Package/ath11k-wifi-gl-ax1800/install
|
||||
$(INSTALL_DIR) $(1)/lib/firmware/ath11k/IPQ6018/hw1.0/
|
||||
$(INSTALL_DATA) ./board-gl-ax1800.bin.IPQ6018 $(1)/lib/firmware/ath11k/IPQ6018/hw1.0/board-2.bin
|
||||
endef
|
||||
|
||||
$(eval $(call generate-ath11k-wifi-package,cig-wf188,Cigtech WF188))
|
||||
$(eval $(call generate-ath11k-wifi-package,cig-wf188n,Cigtech WF188n))
|
||||
$(eval $(call generate-ath11k-wifi-package,cig-wf194c,Cigtech WF194c))
|
||||
$(eval $(call generate-ath11k-wifi-package,cig-wf194c4,Cigtech WF194c4))
|
||||
$(eval $(call generate-ath11k-wifi-package,cig-wf196,Cigtech WF196))
|
||||
$(eval $(call generate-ath11k-wifi-package,cybertan-eww622-a1,CyberTan EWW622 A1))
|
||||
$(eval $(call generate-ath11k-wifi-package,sercomm-wallaby,Sercomm Kiwi))
|
||||
$(eval $(call generate-ath11k-wifi-package,wallys-dr6018,Wallys DR6018))
|
||||
$(eval $(call generate-ath11k-wifi-package,wallys-dr6018-v4,Wallys DR6018 V4))
|
||||
$(eval $(call generate-ath11k-wifi-package,edgecore-eap101,EdgeCore EAP101))
|
||||
$(eval $(call generate-ath11k-wifi-package,edgecore-eap102,Edgecore EAP102))
|
||||
$(eval $(call generate-ath11k-wifi-package,edgecore-eap104,Edgecore EAP104))
|
||||
$(eval $(call generate-ath11k-wifi-package,tplink-ex227,TP-Link EX227))
|
||||
$(eval $(call generate-ath11k-wifi-package,tplink-ex447,TP-Link EX447))
|
||||
|
||||
$(foreach PACKAGE,$(ALLWIFIPACKAGES),$(eval $(call BuildPackage,$(PACKAGE))))
|
||||
$(eval $(call BuildPackage,ath11k-wifi-qcom-ipq5018))
|
||||
$(eval $(call BuildPackage,ath11k-wifi-qcom-ipq6122))
|
||||
$(eval $(call BuildPackage,ath11k-wifi-qcom-ipq8074))
|
||||
$(eval $(call BuildPackage,ath11k-wifi-qcom-ipq6018))
|
||||
$(eval $(call BuildPackage,ath11k-wifi-qcom-qcn9000))
|
||||
$(eval $(call BuildPackage,ath11k-wifi-cig-wf196_6g))
|
||||
@@ -1,18 +0,0 @@
|
||||
--- feeds/wifi-ax/ath11k-wifi/Makefile
|
||||
+++ feeds/wifi-ax/ath11k-wifi/Makefile
|
||||
@@ -28,6 +28,7 @@ ALLWIFIBOARDS:= \
|
||||
cig-wf188n \
|
||||
cig-wf194c \
|
||||
sercomm-wallaby \
|
||||
+ yuncore-ax840 \
|
||||
yuncore-ax860
|
||||
|
||||
ALLWIFIPACKAGES:=$(foreach BOARD,$(ALLWIFIBOARDS),ath11k-wifi-$(BOARD))
|
||||
@@ -107,6 +108,7 @@ $(eval $(call generate-ath11k-wifi-package,cig-wf188,Cigtech WF188))
|
||||
$(eval $(call generate-ath11k-wifi-package,cig-wf188n,Cigtech WF188n))
|
||||
$(eval $(call generate-ath11k-wifi-package,cig-wf194c,Cigtech WF194c))
|
||||
$(eval $(call generate-ath11k-wifi-package,sercomm-wallaby,Sercomm Kiwi))
|
||||
+$(eval $(call generate-ath11k-wifi-package,yuncore-ax840,YunCore AX840))
|
||||
$(eval $(call generate-ath11k-wifi-package,yuncore-ax860,YunCore AX860))
|
||||
|
||||
$(foreach PACKAGE,$(ALLWIFIPACKAGES),$(eval $(call BuildPackage,$(PACKAGE))))
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user