1<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
2<html>
3
4<head>
5<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
6<meta http-equiv="Content-Style-Type" content="text/css">
7<base target="main">
8<link rel="stylesheet" type="text/css" href="../CSS/revolution.css">
9<title>&lt;revolution/net.h&gt;</title>
10</head>
11
12<body>
13
14<h1>NET Library Function List</h1>
15<H2><STRONG>Functions</STRONG></A></H2>
16<H2><A name="Info">Getting States</A></H2>
17<table border="1">
18  <tr>
19<td><a href="NETGetWirelessMacAddress.html">NETGetWirelessMacAddress</a></td>
20<td>Gets the MAC address of the Wi-Fi module.</td>
21  </tr>
22</table>
23<H2><A name="ErrorCode">Error Codes</A></H2>
24<table border="1">
25  <tr>
26<td><a href="NETGetStartupErrorCode.html">NETGetStartupErrorCode</a></td>
27<td>The error value returned by the SOStartup function is converted into an error code to show to the user.</td>
28  </tr>
29</table>
30<H2><A name="Endian">Endianity</A></H2>
31<table border="1">
32  <tr>
33<td><a href="NETReadSwappedBytes.html">NETSwapBytes16</a><br> <a href="NETReadSwappedBytes.html">NETSwapBytes32</a></td>
34<td>Reverses byte order.</td>
35  </tr>
36  <tr>
37<td><a href="NETReadSwappedBytes.html">NETReadSwappedBytes16</a><br> <a href="NETReadSwappedBytes.html">NETReadSwappedBytes32</a></td>
38<td>Reverses byte order and reads.</td>
39  </tr>
40  <tr>
41<td><a href="NETWriteSwappedBytes.html">NETWriteSwappedBytes16</a><br> <a href="NETWriteSwappedBytes.html">NETWriteSwappedBytes32</a></td>
42<td>Reverses byte order and writes.</td>
43  </tr>
44  <tr>
45<td><a href="NETCalcCRC.html">NETCalcCRC16</a><br> <a href="NETCalcCRC.html">NETCalcCRC32</a></td>
46<td>Calculates the CRC value.</td>
47  </tr>
48</table>
49<H2><A name="Mem">Memory Operations</A></H2>
50<table border="1">
51  <tr>
52<td><a href="NETMemCpy.html">NETMemCpy</a></td>
53<td>Copies the memory.</td>
54  </tr>
55  <tr>
56<td><a href="NETMemSet.html">NETMemSet</a></td>
57<td>Embeds the value that specifies the memory region.</td>
58  </tr>
59</table>
60<H2><A name="Hash">Hash</A></H2>
61<table border="1">
62  <tr>
63<td><a href="NETMD5Init.html">NETMD5Init</a></td>
64<td>Initializes the MD5 context structure.</td>
65  </tr>
66  <tr>
67<td><a href="NETMD5Update.html">NETMD5Update</a></td>
68<td>Updates the MD5 context structure based on input data.</td>
69  </tr>
70  <tr>
71<td><a href="NETMD5GetDigest.html">NETMD5GetDigest</a></td>
72<td>Gets the digest value from the MD5 context structure.</td>
73  </tr>
74  <tr>
75<td><a href="NETCalcMD5.html">NETCalcMD5</a></td>
76<td>Executes initialization, calculation, and hash value acquisition of MD5 all together.</td>
77  </tr>
78  <tr>
79<td><a href="NETSHA1Init.html">NETSHA1Init</a></td>
80<td>Initializes the SHA-1 context structure.</td>
81  </tr>
82  <tr>
83<td><a href="NETSHA1Update.html">NETSHA1Update</a></td>
84<td>Updates the SHA-1 context structure based on input data.</td>
85  </tr>
86  <tr>
87<td><a href="NETSHA1GetDigest.html">NETSHA1GetDigest</a></td>
88<td>Gets the hash value from the SHA-1 context structure.</td>
89  </tr>
90  <tr>
91<td><a href="NETCalcSHA1.html">NETCalcSHA1</a></td>
92<td>Executes initialization, calculation, and hash value acquisition of SHA-1 all together.</td>
93  </tr>
94  <tr>
95<td><a href="NETSHA256Init.html">NETSHA256Init</a></td>
96<td>Initializes the SHA-256 context structure.</td>
97  </tr>
98  <tr>
99<td><a href="NETSHA256Update.html">NETSHA256Update</a></td>
100<td>Updates the SHA-256 context structure based on input data.</td>
101  </tr>
102  <tr>
103<td><a href="NETSHA256GetDigest.html">NETSHA256GetDigest</a></td>
104<td>Gets the hash value from the SHA-256 context structure.</td>
105  </tr>
106  <tr>
107<td><a href="NETCalcSHA256.html">NETCalcSHA256</a></td>
108<td>Executes initialization, calculation, and hash value acquisition of SHA-256 all together.</td>
109  </tr>
110  <tr>
111<td><a href="NETCalcHMAC.html">NETCalcHMACMD5</a><br> <a href="NETCalcHMAC.html">NETCalcHMACSHA1</a><br> <a href="NETCalcHMAC.html">NETCalcHMACSHA256</a></td>
112<td>Gets the hash value based on HMAC calculation.</td>
113  </tr>
114</table>
115<H2><A name="Code">Encryption</A></H2>
116<table border="1">
117  <tr>
118<td><a href="NETLockCrypto.html">NETLockCrypto</a></td>
119<td>Starts the use of encryption processing.</td>
120  </tr>
121  <tr>
122<td><a href="NETUnlockCrypto.html">NETUnlockCrypto</a></td>
123<td>Ends the use of encryption processing.</td>
124  </tr>
125  <tr>
126<td><a href="NETAESCreate.html">NETAESCreate</a></td>
127<td>Generates an AES encryption context.</td>
128  </tr>
129  <tr>
130<td><a href="NETAESDelete.html">NETAESDelete</a></td>
131<td>Releases the AES encryption context.</td>
132  </tr>
133  <tr>
134<td><a href="NETAESEncrypt.html">NETAESEncrypt</a></td>
135<td>Executes the AES encryption process.</td>
136  </tr>
137  <tr>
138<td><a href="NETAESDecrypt.html">NETAESDecrypt</a></td>
139<td>Executes the AES decryption process.</td>
140  </tr>
141  <tr>
142<td><a href="NETECCCreate.html">NETECCCreate</a></td>
143<td>Generates an ECC signature context.</td>
144  </tr>
145  <tr>
146<td><a href="NETECCDelete.html">NETECCDelete</a></td>
147<td>Releases the ECC signature context.</td>
148  </tr>
149  <tr>
150<td><a href="NETECCUpdate.html">NETECCUpdate</a></td>
151<td>Inputs data to the ECC signature context.</td>
152  </tr>
153  <tr>
154<td><a href="NETECCGetSign.html">NETECCGetSign</a></td>
155<td>Gets the ECC signature.</td>
156  </tr>
157  <tr>
158<td><a href="NETECCVerifySign.html">NETECCVerifySign</a></td>
159<td>Verifies the ECC signature.</td>
160  </tr>
161</table>
162
163<H2><A name="Types"><STRONG>Types and Structures</STRONG></A></H2>
164<table border="1">
165  <tr>
166<td><a href="./NETMD5Context.html">NETMD5Context</a></td>
167<td>Context structure used by MD5 functions.</td>
168  </tr>
169  <tr>
170<td><a href="./NETSHA1Context.html">NETSHA1Context</a></td>
171<td>Context structure used by SHA-1 functions.</td>
172  </tr>
173  <tr>
174<td><a href="./NETSHA256Context.html">NETSHA256Context</a></td>
175<td>Context structure used by SHA-256 functions.</td>
176  </tr>
177  <tr>
178<td><a href="./NETAESContext.html">NETAESContext</a></td>
179<td>Context structure used by AES functions.</td>
180  </tr>
181  <tr>
182<td><a href="./NETECCContext.html">NETECCContext</a></td>
183<td>Context structure used by ECC functions.</td>
184  </tr>
185  <tr>
186<td><a href="./hash_overview.html">Hash algorithm</a></td>
187<td>This is a list of algorithms supported by the NET library.</td>
188  </tr>
189</table>
190<hr><p>CONFIDENTIAL</p></body>
191</html>
192