Hi,
For your first question: The eID viewers for Windows and macOS ship with the BRCA6, and they should be able to verify your eID card out of the box (the Linux one does not, currently, due to an oversight on our part; an update should be available soonishly).
It does not ship with the test root CA (which is not the same CA as the one for production cards), and even if you add it to the trust store (which is possible) the card may still fail verification because a few other properties of the certificate
do not match the ones of production cards (the OCSP and CRL URLs).
For your second question, you can look at the link which Machiel posted. For some more background, ECDSA signatures in ASN.1 format are variable length (in case of the P384 curve that is used for the eID card, they can be 102, 103, or 104 bytes long),
and as the address may be updated (if the card's holder ever changes address), the signature may need to be updated as well, which means that the address signature file is always made to be 104 bytes long, even if the
contents of the file is not.
Unfortunately, we also discovered that OpenSSL will bail out if the size of the signature that's passed to the library does not match the size of the signature that the ASN.1 encoding claims, so you need to use the correct size. If you want some inspiration,
you can look at how the Linux and macOS viewers do verification (we use OpenSSL for those implementations, too). The relevant part that checks the address signature file size is here:
Regards,
Chanthralekha Balakrishnan schreef op za 24-07-2021 om 15:02 [-0700]:
CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you recognize the sender and you expect to receive a link or attachment from them.