dword curve = 1; // brainpool256r1
dword hashAlgorithm = 1; // SHA-256
dword signatureFormat = 1; // DER sequence
byte privateKey[138] = 0x30,0x81,0x87,0x02,0x01,0x00,0x30,0x13,0x06,0x07,0x2a,0x86,0x48,0xce,0x3d,0x02,0x01,0x06,0x08,0x2a,0x86,0x48,0xce,0x3d,0x03,0x01,0x07,0x04,0x6d,0x30,0x6b,0x02,0x01,0x01,0x04,0x20,0x86,0xd6,0x1d,0x9e,0x43,0xfa,0x81,0xf9,0x46,0xad,0xac,0xf2,0x1b,0x14,0x60,0xb9,0xc8,0xb4,0xe6,0x5e,0x99,0x77,0xc7,0x13,0x9d,0x20,0x6c,0x46,0xb3,0x09,0xc8,0xb3,0xa1,0x44,0x03,0x42,0x00,0x04,0xd5,0xc1,0x3a,0xba,0xff,0x54,0x6b,0x36,0xd6,0x61,0x14,0x18,0x42,0x6e,0x55,0xb1,0x8d,0x34,0x71,0xfb,0x58,0xc5,0x36,0x04,0x11,0x91,0xed,0xa7,0x5b,0x45,0xd1,0xfb,0x1d,0xd6,0xa0,0x42,0xae,0x91,0x6b,0x70,0x6d,0x8f,0x9e,0x13,0x7b,0x6e,0xdf,0x5b,0x42,0x3c,0x13,0x02,0x06,0x13,0xb7,0x62,0x0a,0xf6,0x8b,0x7f,0xc8,0x45,0x9f,0x33;
dword privateKeySize = elcount(privateKey);
byte data[3] = {0x11, 0x11, 0x11};
dword dataSize = elcount(data);
byte signature[1000];
dword signatureSize = elcount(signature);
long result;
result = SecurityLocalSignEcdsa(curve, hashAlgorithm, signatureFormat, privateKey, privateKeySize, data, dataSize, signature, signatureSize);