1<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> 2<html> 3 4<head> 5<meta http-equiv="Content-Type" content="text/html; charset=windows-1252"> 6<meta http-equiv="Content-Style-Type" content="text/css"> 7<base target="main"> 8<link rel="stylesheet" type="text/css" href="../CSS/revolution.css"> 9<title><revolution/net.h></title> 10</head> 11 12<body> 13 14<h1>NET Library Function List</h1> 15<H2><STRONG>Functions</STRONG></A></H2> 16<H2><A name="Info">Getting States</A></H2> 17<table border="1"> 18 <tr> 19<td><a href="NETGetWirelessMacAddress.html">NETGetWirelessMacAddress</a></td> 20<td>Gets the MAC address of the Wi-Fi module.</td> 21 </tr> 22</table> 23<H2><A name="ErrorCode">Error Codes</A></H2> 24<table border="1"> 25 <tr> 26<td><a href="NETGetStartupErrorCode.html">NETGetStartupErrorCode</a></td> 27<td>The error value returned by the SOStartup function is converted into an error code to show to the user.</td> 28 </tr> 29</table> 30<H2><A name="Endian">Endianity</A></H2> 31<table border="1"> 32 <tr> 33<td><a href="NETReadSwappedBytes.html">NETSwapBytes16</a><br> <a href="NETReadSwappedBytes.html">NETSwapBytes32</a></td> 34<td>Reverses byte order.</td> 35 </tr> 36 <tr> 37<td><a href="NETReadSwappedBytes.html">NETReadSwappedBytes16</a><br> <a href="NETReadSwappedBytes.html">NETReadSwappedBytes32</a></td> 38<td>Reverses byte order and reads.</td> 39 </tr> 40 <tr> 41<td><a href="NETWriteSwappedBytes.html">NETWriteSwappedBytes16</a><br> <a href="NETWriteSwappedBytes.html">NETWriteSwappedBytes32</a></td> 42<td>Reverses byte order and writes.</td> 43 </tr> 44 <tr> 45<td><a href="NETCalcCRC.html">NETCalcCRC16</a><br> <a href="NETCalcCRC.html">NETCalcCRC32</a></td> 46<td>Calculates the CRC value.</td> 47 </tr> 48</table> 49<H2><A name="Mem">Memory Operations</A></H2> 50<table border="1"> 51 <tr> 52<td><a href="NETMemCpy.html">NETMemCpy</a></td> 53<td>Copies the memory.</td> 54 </tr> 55 <tr> 56<td><a href="NETMemSet.html">NETMemSet</a></td> 57<td>Embeds the value that specifies the memory region.</td> 58 </tr> 59</table> 60<H2><A name="Hash">Hash</A></H2> 61<table border="1"> 62 <tr> 63<td><a href="NETMD5Init.html">NETMD5Init</a></td> 64<td>Initializes the MD5 context structure.</td> 65 </tr> 66 <tr> 67<td><a href="NETMD5Update.html">NETMD5Update</a></td> 68<td>Updates the MD5 context structure based on input data.</td> 69 </tr> 70 <tr> 71<td><a href="NETMD5GetDigest.html">NETMD5GetDigest</a></td> 72<td>Gets the digest value from the MD5 context structure.</td> 73 </tr> 74 <tr> 75<td><a href="NETCalcMD5.html">NETCalcMD5</a></td> 76<td>Executes initialization, calculation, and hash value acquisition of MD5 all together.</td> 77 </tr> 78 <tr> 79<td><a href="NETSHA1Init.html">NETSHA1Init</a></td> 80<td>Initializes the SHA-1 context structure.</td> 81 </tr> 82 <tr> 83<td><a href="NETSHA1Update.html">NETSHA1Update</a></td> 84<td>Updates the SHA-1 context structure based on input data.</td> 85 </tr> 86 <tr> 87<td><a href="NETSHA1GetDigest.html">NETSHA1GetDigest</a></td> 88<td>Gets the hash value from the SHA-1 context structure.</td> 89 </tr> 90 <tr> 91<td><a href="NETCalcSHA1.html">NETCalcSHA1</a></td> 92<td>Executes initialization, calculation, and hash value acquisition of SHA-1 all together.</td> 93 </tr> 94 <tr> 95<td><a href="NETSHA256Init.html">NETSHA256Init</a></td> 96<td>Initializes the SHA-256 context structure.</td> 97 </tr> 98 <tr> 99<td><a href="NETSHA256Update.html">NETSHA256Update</a></td> 100<td>Updates the SHA-256 context structure based on input data.</td> 101 </tr> 102 <tr> 103<td><a href="NETSHA256GetDigest.html">NETSHA256GetDigest</a></td> 104<td>Gets the hash value from the SHA-256 context structure.</td> 105 </tr> 106 <tr> 107<td><a href="NETCalcSHA256.html">NETCalcSHA256</a></td> 108<td>Executes initialization, calculation, and hash value acquisition of SHA-256 all together.</td> 109 </tr> 110 <tr> 111<td><a href="NETCalcHMAC.html">NETCalcHMACMD5</a><br> <a href="NETCalcHMAC.html">NETCalcHMACSHA1</a><br> <a href="NETCalcHMAC.html">NETCalcHMACSHA256</a></td> 112<td>Gets the hash value based on HMAC calculation.</td> 113 </tr> 114</table> 115<H2><A name="Code">Encryption</A></H2> 116<table border="1"> 117 <tr> 118<td><a href="NETLockCrypto.html">NETLockCrypto</a></td> 119<td>Starts the use of encryption processing.</td> 120 </tr> 121 <tr> 122<td><a href="NETUnlockCrypto.html">NETUnlockCrypto</a></td> 123<td>Ends the use of encryption processing.</td> 124 </tr> 125 <tr> 126<td><a href="NETAESCreate.html">NETAESCreate</a></td> 127<td>Generates an AES encryption context.</td> 128 </tr> 129 <tr> 130<td><a href="NETAESDelete.html">NETAESDelete</a></td> 131<td>Releases the AES encryption context.</td> 132 </tr> 133 <tr> 134<td><a href="NETAESEncrypt.html">NETAESEncrypt</a></td> 135<td>Executes the AES encryption process.</td> 136 </tr> 137 <tr> 138<td><a href="NETAESDecrypt.html">NETAESDecrypt</a></td> 139<td>Executes the AES decryption process.</td> 140 </tr> 141 <tr> 142<td><a href="NETECCCreate.html">NETECCCreate</a></td> 143<td>Generates an ECC signature context.</td> 144 </tr> 145 <tr> 146<td><a href="NETECCDelete.html">NETECCDelete</a></td> 147<td>Releases the ECC signature context.</td> 148 </tr> 149 <tr> 150<td><a href="NETECCUpdate.html">NETECCUpdate</a></td> 151<td>Inputs data to the ECC signature context.</td> 152 </tr> 153 <tr> 154<td><a href="NETECCGetSign.html">NETECCGetSign</a></td> 155<td>Gets the ECC signature.</td> 156 </tr> 157 <tr> 158<td><a href="NETECCVerifySign.html">NETECCVerifySign</a></td> 159<td>Verifies the ECC signature.</td> 160 </tr> 161</table> 162 163<H2><A name="Types"><STRONG>Types and Structures</STRONG></A></H2> 164<table border="1"> 165 <tr> 166<td><a href="./NETMD5Context.html">NETMD5Context</a></td> 167<td>Context structure used by MD5 functions.</td> 168 </tr> 169 <tr> 170<td><a href="./NETSHA1Context.html">NETSHA1Context</a></td> 171<td>Context structure used by SHA-1 functions.</td> 172 </tr> 173 <tr> 174<td><a href="./NETSHA256Context.html">NETSHA256Context</a></td> 175<td>Context structure used by SHA-256 functions.</td> 176 </tr> 177 <tr> 178<td><a href="./NETAESContext.html">NETAESContext</a></td> 179<td>Context structure used by AES functions.</td> 180 </tr> 181 <tr> 182<td><a href="./NETECCContext.html">NETECCContext</a></td> 183<td>Context structure used by ECC functions.</td> 184 </tr> 185 <tr> 186<td><a href="./hash_overview.html">Hash algorithm</a></td> 187<td>This is a list of algorithms supported by the NET library.</td> 188 </tr> 189</table> 190<hr><p>CONFIDENTIAL</p></body> 191</html> 192