1<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> 2<html> 3 4<head> 5<meta http-equiv="Content-Type" content="text/html; charset=windows-1252"> 6<meta http-equiv="Content-Style-Type" content="text/css"> 7<base target="main"> 8<link rel="stylesheet" type="text/css" href="../CSS/revolution.css"> 9<title><revolution/net.h></title> 10</head> 11 12<body> 13 14<h1>NET Library Function List</h1> 15<H2><STRONG>Functions</STRONG></A></H2> 16<H2><A name="Info">Getting States</A></H2> 17<table border="1"> 18 <tr> 19<td><a href="NETGetWirelessMacAddress.html">NETGetWirelessMacAddress</a></td> 20<td>Gets the MAC address of the Wi-Fi module.</td> 21 </tr> 22</table> 23<H2><A name="Network">Network</A></H2> 24<table border="1"> 25 <tr> 26<td><a href="NETGetStartupErrorCode.html">NETGetStartupErrorCode</a></td> 27<td>The error value returned by the SOStartup function is converted into an error code to show to the user.</td> 28 </tr> 29</table> 30<H2><A name="Endian">Endian</A></H2> 31<table border="1"> 32 <tr> 33<td><a href="NETReadSwappedBytes.html">NETSwapBytes16</a><br> <a href="NETReadSwappedBytes.html">NETSwapBytes32</a></td> 34<td>Reverses byte order.</td> 35 </tr> 36 <tr> 37<td><a href="NETReadSwappedBytes.html">NETReadSwappedBytes16</a><br> <a href="NETReadSwappedBytes.html">NETReadSwappedBytes32</a></td> 38<td>Reverses byte order and reads.</td> 39 </tr> 40 <tr> 41<td><a href="NETWriteSwappedBytes.html">NETWriteSwappedBytes16</a><br> <a href="NETWriteSwappedBytes.html">NETWriteSwappedBytes32</a></td> 42<td>Reverses byte order and writes.</td> 43 </tr> 44 <tr> 45<td><a href="NETCalcCRC.html">NETCalcCRC16</a><br> <a href="NETCalcCRC.html">NETCalcCRC32</a></td> 46<td>Calculates the CRC value.</td> 47 </tr> 48</table> 49<H2><A name="Hash">Hash</A></H2> 50<table border="1"> 51 <tr> 52<td><a href="NETMD5Init.html">NETMD5Init</a></td> 53<td>Initializes the MD5 context structure.</td> 54 </tr> 55 <tr> 56<td><a href="NETMD5Update.html">NETMD5Update</a></td> 57<td>Updates the MD5 context structure based on input data.</td> 58 </tr> 59 <tr> 60<td><a href="NETMD5GetDigest.html">NETMD5GetDigest</a></td> 61<td>Gets the digest value from the MD5 context structure.</td> 62 </tr> 63 <tr> 64<td><a href="NETCalcMD5.html">NETCalcMD5</a></td> 65<td>Executes initialization, calculation, and hash value acquisition of MD5 all together.</td> 66 </tr> 67 <tr> 68<td><a href="NETSHA1Init.html">NETSHA1Init</a></td> 69<td>Initializes the SHA-1 context structure.</td> 70 </tr> 71 <tr> 72<td><a href="NETSHA1Update.html">NETSHA1Update</a></td> 73<td>Updates the SHA-1 context structure based on input data.</td> 74 </tr> 75 <tr> 76<td><a href="NETSHA1GetDigest.html">NETSHA1GetDigest</a></td> 77<td>Gets the hash value from the SHA-1 context structure.</td> 78 </tr> 79 <tr> 80<td><a href="NETCalcSHA1.html">NETCalcSHA1</a></td> 81<td>Executes initialization, calculation, and hash value acquisition of SHA-1 all together.</td> 82 </tr> 83 <tr> 84<td><a href="NETCalcHMAC.html">NETCalcHMACMD5</a><br> <a href="NETCalcHMAC.html">NETCalcHMACSHA1</a></td> 85<td>Gets the hash value based on HMAC calculation.</td> 86 </tr> 87</table> 88<H2><A name="Code">Encryption</A></H2> 89<table border="1"> 90 <tr> 91<td><a href="NETLockCrypto.html">NETLockCrypto</a></td> 92<td>Starts the use of encryption processing.</td> 93 </tr> 94 <tr> 95<td><a href="NETUnlockCrypto.html">NETUnlockCrypto</a></td> 96<td>Ends the use of encryption processing.</td> 97 </tr> 98 <tr> 99<td><a href="NETAESCreate.html">NETAESCreate</a></td> 100<td>Generates an AES encryption context.</td> 101 </tr> 102 <tr> 103<td><a href="NETAESDelete.html">NETAESDelete</a></td> 104<td>Releases the AES encryption context.</td> 105 </tr> 106 <tr> 107<td><a href="NETAESEncrypt.html">NETAESEncrypt</a></td> 108<td>Executes the AES encryption process.</td> 109 </tr> 110 <tr> 111<td><a href="NETAESDecrypt.html">NETAESDecrypt</a></td> 112<td>Executes the AES decryption process.</td> 113 </tr> 114 <tr> 115<td><a href="NETECCCreate.html">NETECCCreate</a></td> 116<td>Generates an ECC signature context.</td> 117 </tr> 118 <tr> 119<td><a href="NETECCDelete.html">NETECCDelete</a></td> 120<td>Releases the ECC signature context.</td> 121 </tr> 122 <tr> 123<td><a href="NETECCUpdate.html">NETECCUpdate</a></td> 124<td>Inputs data to the ECC signature context.</td> 125 </tr> 126 <tr> 127<td><a href="NETECCGetSign.html">NETECCGetSign</a></td> 128<td>Gets the ECC signature.</td> 129 </tr> 130 <tr> 131<td><a href="NETECCVerifySign.html">NETECCVerifySign</a></td> 132<td>Verifies the ECC signature.</td> 133 </tr> 134</table> 135 136<H2><A name="Types"><STRONG>Types and Structures</STRONG></A></H2> 137<table border="1"> 138 <tr> 139<td><a href="./NETMD5Context.html">NETMD5Context</a></td> 140<td>Context structure used by MD5 functions.</td> 141 </tr> 142 <tr> 143<td><a href="./NETSHA1Context.html">NETSHA1Context</a></td> 144<td>Context structure used by SHA-1 functions.</td> 145 </tr> 146 <tr> 147<td><a href="./NETAESContext.html">NETAESContext</a></td> 148<td>Context structure used by AES functions.</td> 149 </tr> 150 <tr> 151<td><a href="./NETECCContext.html">NETECCContext</a></td> 152<td>Context structure used by ECC functions.</td> 153 </tr> 154 <tr> 155<td><a href="./hash_overview.html">Hash algorithm</a></td> 156<td>This is a list of algorithms supported by the NET library.</td> 157 </tr> 158</table> 159<table border="0" height="100%"><tr><td style="background-color : white;"></td></tr></table> 160<hr><p>CONFIDENTIAL</p></body> 161</html> 162