Harry Anderson

Results 10 comments of Harry Anderson

Hi @AndyQ , Thanks for you message, I made the change to log the hash type byte as you mention ```swift Log.error( "Error identifying Active Authentication RSA message digest hash...

@AndyQ Here you go: ``` 2024-02-14 20:17:49.1470 - Performing Active Authentication 2024-02-14 20:17:49.5510 - Active Authentication 2024-02-14 20:17:49.5510 - challange - E9EBB944E5E5C143 2024-02-14 20:17:49.5540 - signature - 8C694DE474D9598998B771D32EE0D043030423C8F900AB2DF2D0F12B513C3D7D3989712CE40648DF23F5242737C74EC98965C4D8DF76A8F16E81D8BC9B00F95B2D6DA27742391CCCF22D46D3BAB9F32023C3C7B393CDAF7F3CC013620EC3A131244F277C0CA81E577681043FCBE8340DF4B191CCD73018643BE3EE434DDBDE8ED47F2481F1029FC3F91CF001D9F8E98FDF62479982BC5E885FF6EFC9733748F77ABC2FA7425486C71A155312E8FDFEABA3F8B0C5AE8399704DA6C6D74FEEFA47CA99C3986FC7FFCBADB73FA1B2C5A57EC59A1271830A0834A7CA7542A7F595 2024-02-14 20:17:49.5550...

No worries, thanks for looking into it. I tried ReadID on iOS and it does seem to pass. Its a new passport from 2023 so maybe something has been introduced....

Ok I switch to the `main` branch, previously was on version `2.0.2` and using the SPM App example for testing. ``` git log commit 84e11ec67a5c0d5ff54f918182fd4658801cc7f2 (HEAD -> main, tag: 2.1.1,...

@rbrouwer Above I had not made the change. I changed this line as you mention: ``` let cmd : NFCISO7816APDU = NFCISO7816APDU(instructionClass: 00, instructionCode: 0x22, p1Parameter: 0x41, p2Parameter: 0xA6, data:...

@AndyQ all good, and sorry, I had indeed changed the wrong line. I fixed it now, changed `doInternalAuthentication` instead : ```swift func doInternalAuthentication( challenge: [UInt8] ) async throws -> ResponseAPDU...

Hi @tomgi and cc @AndyQ I tried out the changes mentioned by @tomgi and AA check now succeeds! 🥳 Changes: ```diff index 575185a..958b391 100644 --- a/Sources/NFCPassportReader/SecureMessaging.swift +++ b/Sources/NFCPassportReader/SecureMessaging.swift @@ -88,7...

@tomgi for completeness I also tried setting `apdu.expectedResponseLength > 231`. Which also works! ```diff --- a/Sources/NFCPassportReader/SecureMessaging.swift +++ b/Sources/NFCPassportReader/SecureMessaging.swift @@ -88,7 +88,7 @@ public class SecureMessaging { // otherwise its a...

I tested it out with the latest commit `ce3a9d436` on the main branch and AA check is still successful with my passport. Thanks again for your help @AndyQ 🙏 !!

You could also create a [new map](https://docs.rs/serde_json/latest/serde_json/struct.Map.html#method.new) and insert a key maybe? ```rust let fid = Value::String(String::from("123")); let mut m = JsonObject::new(); m.insert(String::from("fid"), fid); ```