1<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> 2<html> 3 4<head> 5<META http-equiv="Content-Type" content="text/html; charset=windows-1252"> 6<META http-equiv="Content-Style-Type" content="text/css"> 7<title>NETECCGetSign</title> 8<LINK rel="stylesheet" type="text/css" href="../CSS/revolution.css"> 9</head> 10 11<body> 12 13<h1 align="left">NETECCGetSign</h1> 14<h2>C Specification</h2> 15 16<dl> 17 <dd> 18<PRE><CODE>#include <revolution/net.h> 19 20BOOL NETECCGetSign( <A href="NETECCContext.html">NETECCContext</A> *context, NETECCSignInfo *sign ); 21</CODE></PRE> 22 </dd> 23</dl><h2>Arguments</h2> 24 25<table border="1" width="100%"> 26 <TR> 27<TD width="176"><em><strong><font face="Courier New">context</font></strong></em></TD> 28<TD width="670">Pointer to the ECC signature context structure.</TD> 29 </TR> 30 <TR> 31<TD width="176"><em><strong><font face="Courier New">digest</font></strong></em></TD> 32<TD width="670">Pointer to the memory location that stores the signature.</TD> 33 </TR> 34 </table> 35<h2>Return Values</h2> 36<p>Returns TRUE if the file ID is retrieved normally. Otherwise, returns FALSE.</p> 37<H2>Description</H2> 38<P>This function issues the signature for the data entered in the ECC signature context.<br>Since a signature includes the information represented by the input data itself and information for verifying the Wii console that originally issued the signature, it is possible to verify whether data has been falsified by comparing it to the original data generated with the <CODE><A href="NETECCVerifySign.html">NETECCVerifySign</A></CODE> function. 39</p> 40<h2>See Also</h2> 41<P> 42<CODE><A href="NETECCCreate.html">NETECCCreate</A></CODE>, <CODE><A href="NETECCUpdate.html">NETECCUpdate</A></CODE>, <CODE><A href="NETECCVerifySign.html">NETECCVerifySign</A></CODE>, <CODE><A href="NETECCDelete.html">NETECCDelete</A></CODE> 43</P> 44<H2>Revision History</H2> 45<P> 462006/10/12 Initial version.<BR> 47</P> 48<hr><p>CONFIDENTIAL</p></body> 49</html> 50