1<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
2<html>
3
4<head>
5<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
6<meta http-equiv="Content-Style-Type" content="text/css">
7<base target="main">
8<link rel="stylesheet" type="text/css" href="../CSS/revolution.css">
9<title>&lt;revolution/net.h&gt;</title>
10</head>
11
12<body>
13
14<h1>NET Library Function List</h1>
15<H2><STRONG>Functions</STRONG></A></H2>
16<H2><A name="Info">Getting States</A></H2>
17<table border="1">
18  <tr>
19<td><a href="NETGetWirelessMacAddress.html">NETGetWirelessMacAddress</a></td>
20<td>Gets the MAC address of the Wi-Fi module.</td>
21  </tr>
22</table>
23<H2><A name="Network">Network</A></H2>
24<table border="1">
25  <tr>
26<td><a href="NETGetStartupErrorCode.html">NETGetStartupErrorCode</a></td>
27<td>The error value returned by the SOStartup function is converted into an error code to show to the user.</td>
28  </tr>
29</table>
30<H2><A name="Endian">Endian</A></H2>
31<table border="1">
32  <tr>
33<td><a href="NETReadSwappedBytes.html">NETSwapBytes16</a><br> <a href="NETReadSwappedBytes.html">NETSwapBytes32</a></td>
34<td>Reverses byte order.</td>
35  </tr>
36  <tr>
37<td><a href="NETReadSwappedBytes.html">NETReadSwappedBytes16</a><br> <a href="NETReadSwappedBytes.html">NETReadSwappedBytes32</a></td>
38<td>Reverses byte order and reads.</td>
39  </tr>
40  <tr>
41<td><a href="NETWriteSwappedBytes.html">NETWriteSwappedBytes16</a><br> <a href="NETWriteSwappedBytes.html">NETWriteSwappedBytes32</a></td>
42<td>Reverses byte order and writes.</td>
43  </tr>
44  <tr>
45<td><a href="NETCalcCRC.html">NETCalcCRC16</a><br> <a href="NETCalcCRC.html">NETCalcCRC32</a></td>
46<td>Calculates the CRC value.</td>
47  </tr>
48</table>
49<H2><A name="Hash">Hash</A></H2>
50<table border="1">
51  <tr>
52<td><a href="NETMD5Init.html">NETMD5Init</a></td>
53<td>Initializes the MD5 context structure.</td>
54  </tr>
55  <tr>
56<td><a href="NETMD5Update.html">NETMD5Update</a></td>
57<td>Updates the MD5 context structure based on input data.</td>
58  </tr>
59  <tr>
60<td><a href="NETMD5GetDigest.html">NETMD5GetDigest</a></td>
61<td>Gets the digest value from the MD5 context structure.</td>
62  </tr>
63  <tr>
64<td><a href="NETCalcMD5.html">NETCalcMD5</a></td>
65<td>Executes initialization, calculation, and hash value acquisition of MD5 all together.</td>
66  </tr>
67  <tr>
68<td><a href="NETSHA1Init.html">NETSHA1Init</a></td>
69<td>Initializes the SHA-1 context structure.</td>
70  </tr>
71  <tr>
72<td><a href="NETSHA1Update.html">NETSHA1Update</a></td>
73<td>Updates the SHA-1 context structure based on input data.</td>
74  </tr>
75  <tr>
76<td><a href="NETSHA1GetDigest.html">NETSHA1GetDigest</a></td>
77<td>Gets the hash value from the SHA-1 context structure.</td>
78  </tr>
79  <tr>
80<td><a href="NETCalcSHA1.html">NETCalcSHA1</a></td>
81<td>Executes initialization, calculation, and hash value acquisition of SHA-1 all together.</td>
82  </tr>
83  <tr>
84<td><a href="NETCalcHMAC.html">NETCalcHMACMD5</a><br> <a href="NETCalcHMAC.html">NETCalcHMACSHA1</a></td>
85<td>Gets the hash value based on HMAC calculation.</td>
86  </tr>
87</table>
88<H2><A name="Code">Encryption</A></H2>
89<table border="1">
90  <tr>
91<td><a href="NETLockCrypto.html">NETLockCrypto</a></td>
92<td>Starts the use of encryption processing.</td>
93  </tr>
94  <tr>
95<td><a href="NETUnlockCrypto.html">NETUnlockCrypto</a></td>
96<td>Ends the use of encryption processing.</td>
97  </tr>
98  <tr>
99<td><a href="NETAESCreate.html">NETAESCreate</a></td>
100<td>Generates an AES encryption context.</td>
101  </tr>
102  <tr>
103<td><a href="NETAESDelete.html">NETAESDelete</a></td>
104<td>Releases the AES encryption context.</td>
105  </tr>
106  <tr>
107<td><a href="NETAESEncrypt.html">NETAESEncrypt</a></td>
108<td>Executes the AES encryption process.</td>
109  </tr>
110  <tr>
111<td><a href="NETAESDecrypt.html">NETAESDecrypt</a></td>
112<td>Executes the AES decryption process.</td>
113  </tr>
114  <tr>
115<td><a href="NETECCCreate.html">NETECCCreate</a></td>
116<td>Generates an ECC signature context.</td>
117  </tr>
118  <tr>
119<td><a href="NETECCDelete.html">NETECCDelete</a></td>
120<td>Releases the ECC signature context.</td>
121  </tr>
122  <tr>
123<td><a href="NETECCUpdate.html">NETECCUpdate</a></td>
124<td>Inputs data to the ECC signature context.</td>
125  </tr>
126  <tr>
127<td><a href="NETECCGetSign.html">NETECCGetSign</a></td>
128<td>Gets the ECC signature.</td>
129  </tr>
130  <tr>
131<td><a href="NETECCVerifySign.html">NETECCVerifySign</a></td>
132<td>Verifies the ECC signature.</td>
133  </tr>
134</table>
135
136<H2><A name="Types"><STRONG>Types and Structures</STRONG></A></H2>
137<table border="1">
138  <tr>
139<td><a href="./NETMD5Context.html">NETMD5Context</a></td>
140<td>Context structure used by MD5 functions.</td>
141  </tr>
142  <tr>
143<td><a href="./NETSHA1Context.html">NETSHA1Context</a></td>
144<td>Context structure used by SHA-1 functions.</td>
145  </tr>
146  <tr>
147<td><a href="./NETAESContext.html">NETAESContext</a></td>
148<td>Context structure used by AES functions.</td>
149  </tr>
150  <tr>
151<td><a href="./NETECCContext.html">NETECCContext</a></td>
152<td>Context structure used by ECC functions.</td>
153  </tr>
154  <tr>
155<td><a href="./hash_overview.html">Hash algorithm</a></td>
156<td>This is a list of algorithms supported by the NET library.</td>
157  </tr>
158</table>
159<table border="0" height="100%"><tr><td style="background-color : white;"></td></tr></table>
160<hr><p>CONFIDENTIAL</p></body>
161</html>
162