1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-20 21:38:26 +00:00
trezor-firmware/firmware/crypto.h

62 lines
2.5 KiB
C
Raw Normal View History

/*
* This file is part of the TREZOR project.
*
* Copyright (C) 2014 Pavol Rusnak <stick@satoshilabs.com>
*
* This library is free software: you can redistribute it and/or modify
* it under the terms of the GNU Lesser General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with this library. If not, see <http://www.gnu.org/licenses/>.
*/
#ifndef __CRYPTO_H__
#define __CRYPTO_H__
#include <stdbool.h>
#include <stdint.h>
#include <stdlib.h>
#include <ecdsa.h>
2016-04-22 15:49:00 +00:00
#include <bip32.h>
2014-12-21 18:39:20 +00:00
#include <sha2.h>
#include <pb.h>
2014-12-10 17:04:51 +00:00
#include "types.pb.h"
uint32_t ser_length(uint32_t len, uint8_t *out);
2014-12-21 18:39:20 +00:00
uint32_t ser_length_hash(SHA256_CTX *ctx, uint32_t len);
2016-04-22 15:49:00 +00:00
int sshMessageSign(const HDNode *node, const uint8_t *message, size_t message_len, uint8_t *signature);
2016-04-22 15:49:00 +00:00
int gpgMessageSign(const HDNode *node, const uint8_t *message, size_t message_len, uint8_t *signature);
int cryptoGetECDHSessionKey(const HDNode *node, const uint8_t *peer_public_key, uint8_t *session_key);
int cryptoMessageSign(const CoinType *coin, const HDNode *node, const uint8_t *message, size_t message_len, uint8_t *signature);
int cryptoMessageVerify(const CoinType *coin, const uint8_t *message, size_t message_len, const uint8_t *address_raw, const uint8_t *signature);
2016-05-12 19:09:00 +00:00
/* ECIES disabled
int cryptoMessageEncrypt(curve_point *pubkey, const uint8_t *msg, size_t msg_size, bool display_only, uint8_t *nonce, size_t *nonce_len, uint8_t *payload, size_t *payload_len, uint8_t *hmac, size_t *hmac_len, const uint8_t *privkey, const uint8_t *address_raw);
int cryptoMessageDecrypt(curve_point *nonce, uint8_t *payload, size_t payload_len, const uint8_t *hmac, size_t hmac_len, const uint8_t *privkey, uint8_t *msg, size_t *msg_len, bool *display_only, bool *signing, uint8_t *address_raw);
2016-05-12 19:09:00 +00:00
*/
2014-12-13 19:33:49 +00:00
uint8_t *cryptoHDNodePathToPubkey(const HDNodePathType *hdnodepath);
int cryptoMultisigPubkeyIndex(const MultisigRedeemScriptType *multisig, const uint8_t *pubkey);
2014-12-16 17:56:44 +00:00
int cryptoMultisigFingerprint(const MultisigRedeemScriptType *multisig, uint8_t *hash);
2014-12-10 17:04:51 +00:00
2015-02-20 19:22:05 +00:00
int cryptoIdentityFingerprint(const IdentityType *identity, uint8_t *hash);
#endif