1,132 bytes added
, 21:39, 27 December 2021
=Request=
{| class="wikitable" border="1"
|-
! Index Word
! Description
|-
| 0
| Header code [0x00390146]
|-
| 1
|0x3C (Signature output size)
|-
| 2
|0x180 (Certificate output size)
|-
| 3-4
| u64, Title id
|-
| 5
|Data input size
|-
| 6
| (Input size << 8) <nowiki>|</nowiki> 0x6
|-
| 7
|Data input pointer
|-
| 8
| (0x3C << 8) <nowiki>|</nowiki> 0x14
|-
| 9
|Signature output pointer
|-
| 10
| (0x180 << 8) <nowiki>|</nowiki> 0x24
|-
| 11
|Certificate output pointer
|}
=Response=
{| class="wikitable" border="1"
|-
! Index Word
! Description
|-
| 0
| Header code
|-
| 1
| Result code
|-
| 2
|AM internal error value (? Treated like an error value by NIM)
|}
=Description=
Signs given data with ECC, returning generated signature and [[Certificates|certificate]].
Certificate is signed with ECDSA with SHA256 and holds an ECC public key.
Signed with the [[AMNet:GetDeviceCert|device certificate]].
ECC public key on certificate appears to be randomly generated on call(?).
Used by NIM to sign a message that's not sent over SOAP, however the device certificate, output signature and output certificate of the message are.