]>
Commit | Line | Data |
---|---|---|
23d13405 BYTK |
1 | |
2 | This Notice.txt file contains certain notices of software components included | |
3 | with the software that Qualcomm Atheros, Inc. ("Qualcomm Atheros") is required | |
f859d9fd BG |
4 | to provide you. Except where prohibited by the open source license, the content |
5 | of this notices file is only provided to satisfy Qualcomm Atheros's attribution | |
6 | and notice requirement; your use of these software components together with the | |
7 | Qualcomm Atheros software (Qualcomm Atheros software hereinafter referred to | |
8 | as "Software") is subject to the terms of your agreement from Qualcomm Atheros. | |
9 | Compliance with all copyright laws and software license agreements included in | |
10 | the notice section of this file are the responsibility of the user. Except as | |
11 | may be granted by separate express written agreement, this file provides no | |
12 | license to any patents, trademarks, copyrights, or other intellectual property | |
13 | of Qualcomm Incorporated or any of its subsidiaries. | |
14 | ||
15 | Qualcomm is a trademark of Qualcomm Incorporated, registered in the United States | |
16 | and other countries. All Qualcomm Incorporated trademarks are used with permission. | |
17 | Other products and brand names may be trademarks or registered trademarks of their | |
18 | respective owners. | |
23d13405 BYTK |
19 | |
20 | NOTICES: | |
21 | ||
22 | =============================================================================== | |
23 | ||
24 | 1. | |
25 | ||
26 | /* | |
27 | * FILE: sha2.c | |
28 | * AUTHOR: Aaron D. Gifford <me@aarongifford.com> | |
29 | * | |
30 | * Copyright (c) 2000-2001, Aaron D. Gifford | |
31 | * All rights reserved. | |
32 | * | |
33 | * Redistribution and use in source and binary forms, with or without | |
34 | * modification, are permitted provided that the following conditions | |
35 | * are met: | |
36 | * 1. Redistributions of source code must retain the above copyright | |
37 | * notice, this list of conditions and the following disclaimer. | |
38 | * 2. Redistributions in binary form must reproduce the above copyright | |
39 | * notice, this list of conditions and the following disclaimer in the | |
40 | * documentation and/or other materials provided with the distribution. | |
41 | * 3. Neither the name of the copyright holder nor the names of contributors | |
42 | * may be used to endorse or promote products derived from this software | |
43 | * without specific prior written permission. | |
44 | * | |
45 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND | |
46 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
47 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
48 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE | |
49 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
50 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
51 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
52 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
53 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
54 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
55 | * SUCH DAMAGE. | |
56 | * | |
57 | * $Id: sha2.c,v 1.1 2001/11/08 00:01:51 adg Exp adg $ | |
58 | */ | |
59 | File: LLM_sp_sha2.c | |
60 | ||
61 | ||
62 | /* | |
63 | * FILE: sha2.h | |
64 | * AUTHOR: Aaron D. Gifford <me@aarongifford.com> | |
65 | * | |
66 | * Copyright (c) 2000-2001, Aaron D. Gifford | |
67 | * All rights reserved. | |
68 | * | |
69 | * Redistribution and use in source and binary forms, with or without | |
70 | * modification, are permitted provided that the following conditions | |
71 | * are met: | |
72 | * 1. Redistributions of source code must retain the above copyright | |
73 | * notice, this list of conditions and the following disclaimer. | |
74 | * 2. Redistributions in binary form must reproduce the above copyright | |
75 | * notice, this list of conditions and the following disclaimer in the | |
76 | * documentation and/or other materials provided with the distribution. | |
77 | * 3. Neither the name of the copyright holder nor the names of contributors | |
78 | * may be used to endorse or promote products derived from this software | |
79 | * without specific prior written permission. | |
80 | * | |
81 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND | |
82 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
83 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
84 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE | |
85 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
86 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
87 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
88 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
89 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
90 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
91 | * SUCH DAMAGE. | |
92 | * | |
93 | * $Id: sha2.h,v 1.1 2001/11/08 00:02:01 adg Exp adg $ | |
94 | */ | |
95 | File: LLM_sp_sha2.h | |
96 | ||
97 | =============================================================================== | |
98 | ||
99 | 2. | |
100 | ||
101 | /* utility to create the register check tables | |
102 | * this includes inlined list.h safe for userspace. | |
103 | * | |
104 | * Copyright 2009 Jerome Glisse | |
105 | * Copyright 2009 Red Hat Inc. | |
106 | * | |
107 | * Authors: | |
108 | * Jerome Glisse | |
109 | * Dave Airlie | |
110 | */ | |
111 | /*All rights reserved. | |
112 | Redistribution and use in source and binary forms, with or without modification | |
113 | are permitted provided that the following conditions are met: | |
114 | 1. Redistributions of source code must retain the above copyright notice, | |
115 | this list of conditions and the following disclaimer. | |
116 | 2. Redistributions in binary form must reproduce the above copyright notice, | |
117 | this list of conditions and the following disclaimer in the documentation | |
118 | and/or other materials provided with the distribution. | |
119 | 3. Neither the name of the <ORGANIZATION> nor the names of its contributors | |
120 | may be used to endorse or promote products derived from this software | |
121 | without specific prior written permission. | |
122 | ||
123 | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND | |
124 | ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED | |
125 | WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE | |
126 | DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE | |
127 | FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
128 | DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR | |
129 | SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER | |
130 | CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, | |
131 | OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | |
132 | OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
133 | */ | |
134 | File: comm_lib.h | |
135 | ||
136 | =============================================================================== | |
137 | ||
138 | 3. | |
139 | ||
140 | /* crypto/aes/aes.h -*- mode:C; c-file-style: "eay" -*- */ | |
141 | /* ==================================================================== | |
142 | * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | |
143 | * | |
144 | * Redistribution and use in source and binary forms, with or without | |
145 | * modification, are permitted provided that the following conditions | |
146 | * are met: | |
147 | * | |
148 | * 1. Redistributions of source code must retain the above copyright | |
149 | * notice, this list of conditions and the following disclaimer. | |
150 | * | |
151 | * 2. Redistributions in binary form must reproduce the above copyright | |
152 | * notice, this list of conditions and the following disclaimer in | |
153 | * the documentation and/or other materials provided with the | |
154 | * distribution. | |
155 | * | |
156 | * 3. All advertising materials mentioning features or use of this | |
157 | * software must display the following acknowledgment: | |
158 | * "This product includes software developed by the OpenSSL Project | |
159 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | |
160 | * | |
161 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | |
162 | * endorse or promote products derived from this software without | |
163 | * prior written permission. For written permission, please contact | |
164 | * openssl-core@openssl.org. | |
165 | * | |
166 | * 5. Products derived from this software may not be called "OpenSSL" | |
167 | * nor may "OpenSSL" appear in their names without prior written | |
168 | * permission of the OpenSSL Project. | |
169 | * | |
170 | * 6. Redistributions of any form whatsoever must retain the following | |
171 | * acknowledgment: | |
172 | * "This product includes software developed by the OpenSSL Project | |
173 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | |
174 | * | |
175 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | |
176 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
177 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | |
178 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | |
179 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | |
180 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | |
181 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | |
182 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
183 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | |
184 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | |
185 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | |
186 | * OF THE POSSIBILITY OF SUCH DAMAGE. | |
187 | * ==================================================================== | |
188 | * | |
189 | */ | |
190 | File Name list: aes.h, aes_locl.h | |
191 | ||
192 | =============================================================================== | |
193 | ||
194 | 4. | |
195 | ||
196 | /* crypto/aes/aes_core.c -*- mode:C; c-file-style: "eay" -*- */ | |
197 | /** | |
198 | * rijndael-alg-fst.c | |
199 | * | |
200 | * @version 3.0 (December 2000) | |
201 | * | |
202 | * Optimised ANSI C code for the Rijndael cipher (now AES) | |
203 | * | |
204 | * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be> | |
205 | * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be> | |
206 | * @author Paulo Barreto <paulo.barreto@terra.com.br> | |
207 | * | |
208 | * This code is hereby placed in the public domain. | |
209 | * | |
210 | * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS | |
211 | * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED | |
212 | * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
213 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE | |
214 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR | |
215 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF | |
216 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR | |
217 | * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, | |
218 | * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE | |
219 | * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, | |
220 | * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
221 | */ | |
222 | File: aes_core.c | |
223 | ||
224 | =============================================================================== | |
225 | ||
226 | 5. | |
227 | ||
228 | /*=========================================================================== | |
229 | ||
230 | EDIT HISTORY FOR FILE | |
231 | ||
232 | $Header: //depot/asic/msmshared/sec/sec/MSM_SEC.03.03.08.xx/aes.h#1 $ | |
233 | $DateTime: 2006/12/11 00:43:21 $ $Author: davidf $ | |
234 | ||
235 | when who what, where, why | |
236 | -------- --- ---------------------------------------------------------- | |
237 | 11/12/04 rv changes to correct LINT errors | |
238 | 02/02/04 rwh Small mods to open source. | |
239 | ||
240 | ===========================================================================*/ | |
241 | ||
242 | /* | |
243 | I retain copyright in this code but I encourage its free use provided | |
244 | that I don't carry any responsibility for the results. I am especially | |
245 | happy to see it used in free and open source software. If you do use | |
246 | it I would appreciate an acknowledgement of its origin in the code or | |
247 | the product that results and I would also appreciate knowing a liitle | |
248 | about the use to which it is being put. | |
249 | ||
250 | Dr B. R. Gladman <brg@gladman.uk.net> 1st June 2001. | |
251 | ||
23d13405 BYTK |
252 | */ |
253 | File: aes.h | |
254 | ||
255 | /*=========================================================================== | |
256 | ||
257 | EDIT HISTORY FOR FILE | |
258 | ||
259 | $Header: //depot/asic/msmshared/sec/sec/MSM_SEC.03.03.08.xx/aes_tab.h#1 $ | |
260 | $DateTime: 2006/12/11 00:43:21 $ $Author: davidf $ | |
261 | ||
262 | when who what, where, why | |
263 | -------- --- ---------------------------------------------------------- | |
264 | 11/12/04 rv changes to correct LINT errors | |
265 | 02/02/04 rwh Small mods to open source. | |
266 | ||
267 | ===========================================================================*/ | |
268 | /*lint -e146 -e303 */ | |
269 | /* 146: Assuming a binary constant */ | |
270 | /* 303: String too long (try +macros) */ | |
271 | ||
272 | ||
273 | /* | |
274 | I retain copyright in this code but I encourage its free use provided | |
275 | that I don't carry any responsibility for the results. I am especially | |
276 | happy to see it used in free and open source software. If you do use | |
277 | it I would appreciate an acknowledgement of its origin in the code or | |
278 | the product that results and I would also appreciate knowing a liitle | |
279 | about the use to which it is being put. | |
280 | ||
281 | Dr B. R. Gladman <brg@gladman.uk.net> 1st June 2001. | |
282 | */ | |
283 | File: aes_tab.h | |
284 | ||
285 | =============================================================================== | |
286 | 6. | |
287 | =============================================================================== | |
288 | #FILE:Conftest.py | |
289 | # Copyright (c) 2003 Stichting NLnet Labs | |
290 | # Copyright (c) 2001, 2002, 2003 Steven Knight | |
291 | # | |
292 | # Permission is hereby granted, free of charge, to any person obtaining | |
293 | # a copy of this software and associated documentation files (the | |
294 | # "Software"), to deal in the Software without restriction, including | |
295 | # without limitation the rights to use, copy, modify, merge, publish, | |
296 | # distribute, sublicense, and/or sell copies of the Software, and to | |
297 | # permit persons to whom the Software is furnished to do so, subject to | |
298 | # the following conditions: | |
299 | # | |
300 | # The above copyright notice and this permission notice shall be included | |
301 | # in all copies or substantial portions of the Software. | |
302 | # | |
303 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY | |
304 | # KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE | |
305 | # WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND | |
306 | # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE | |
307 | # LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION | |
308 | # OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION | |
309 | # WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. | |
310 | # | |
23d13405 | 311 | # |
23d13405 | 312 | # |
f859d9fd BG |
313 | =============================================================================== |
314 | File: Conftest.py | |
315 | ||
316 | =============================================================================== | |
317 | 7. | |
318 | =============================================================================== | |
319 | / *** | |
320 | * | |
321 | * Fowler/Noll/Vo- hash | |
322 | * | |
323 | * The basis of this hash algorithm was taken from an idea sent | |
324 | * as reviewer comments to the IEEE POSIX P1003.2 committee by: | |
325 | * | |
326 | * Phong Vo (http://www.research.att.com/info/kpv/) | |
327 | * Glenn Fowler (http://www.research.att.com/~gsf/) | |
328 | * | |
329 | * In a subsequent ballot round: | |
330 | * | |
331 | * Landon Curt Noll (http://www.isthe.com/chongo/) | |
332 | * | |
333 | * improved on their algorithm. Some people tried this hash | |
334 | * and found that it worked rather well. In an EMail message | |
335 | * to Landon, they named it the ``Fowler/Noll/Vo'' or FNV hash. | |
336 | * | |
337 | * FNV hashes are designed to be fast while maintaining a low | |
338 | * collision rate. The FNV speed allows one to quickly hash lots | |
339 | * of data while maintaining a reasonable collision rate. See: | |
340 | * | |
341 | * http://www.isthe.com/chongo/tech/comp/fnv/index.html | |
342 | * | |
343 | * for more details as well as other forms of the FNV hash. | |
344 | * | |
345 | * | |
346 | * Please do not copyright this code. This code is in the public domain. | |
347 | * | |
348 | * LANDON CURT NOLL DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, | |
349 | * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO | |
350 | * EVENT SHALL LANDON CURT NOLL BE LIABLE FOR ANY SPECIAL, INDIRECT OR | |
351 | * CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF | |
352 | * USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR | |
353 | * OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR | |
354 | * PERFORMANCE OF THIS SOFTWARE. | |
355 | * | |
356 | * By: | |
357 | * chongo <Landon Curt Noll> /\oo/\ | |
358 | * http://www.isthe.com/chongo/ | |
359 | * | |
360 | * Share and Enjoy! :-) | |
361 | */ | |
362 | File: fm_fnv_hash.h, fm_fnv_hash.c | |
23d13405 | 363 | |
23d13405 | 364 | =============================================================================== |
f859d9fd BG |
365 | 8. |
366 | =============================================================================== | |
367 | ||
368 | /* | |
369 | * $Header: //source/qcom/qct/core/api/kernel/main/latest/libstd/stringl/stringl.h#13 $ | |
370 | * $DateTime: 2013/07/24 11:35:54 $ | |
371 | */ | |
372 | ||
373 | /* $OpenBSD: string.h,v 1.17 2006/01/06 18:53:04 millert Exp $ */ | |
374 | /* $NetBSD: string.h,v 1.6 1994/10/26 00:56:30 cgd Exp $ */ | |
375 | ||
376 | /*- | |
377 | * Copyright (c) 1990 The Regents of the University of California. | |
378 | * All rights reserved. | |
379 | * | |
380 | * Redistribution and use in source and binary forms, with or without | |
381 | * modification, are permitted provided that the following conditions | |
382 | * are met: | |
383 | * 1. Redistributions of source code must retain the above copyright | |
384 | * notice, this list of conditions and the following disclaimer. | |
385 | * 2. Redistributions in binary form must reproduce the above copyright | |
386 | * notice, this list of conditions and the following disclaimer in the | |
387 | * documentation and/or other materials provided with the distribution. | |
388 | * 3. Neither the name of the University nor the names of its contributors | |
389 | * may be used to endorse or promote products derived from this software | |
390 | * without specific prior written permission. | |
391 | * | |
392 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND | |
393 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
394 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
395 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE | |
396 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
397 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
398 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
399 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
400 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
401 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
402 | * SUCH DAMAGE. | |
403 | * | |
404 | * @(#)string.h 5.10 (Berkeley) 3/9/91 | |
405 | */ | |
406 | File: stringl.h | |
407 | ||
408 | =============================================================================== | |
409 | 9. | |
410 | =============================================================================== | |
411 | /* | |
412 | * Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com> | |
413 | * | |
414 | * Permission to use, copy, modify, and distribute this software for any | |
415 | * purpose with or without fee is hereby granted, provided that the above | |
416 | * copyright notice and this permission notice appear in all copies. | |
417 | * | |
418 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | |
419 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | |
420 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | |
421 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | |
422 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | |
423 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | |
424 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | |
425 | */ | |
426 | File: wcslcpy.c, wcslcat.c, wstrlcpy.c, strlcat.c, strlcpy.c, wstrlcat.c |