Commit Graph

91 Commits (2002c815ff101a40c841ff257ae353e195297e95)

Author SHA1 Message Date
Jochen Hoenicke 409783ba64
New function ecdsa_verify_recover
9 years ago
Jochen Hoenicke 698f40f385
BIP-32 without gaps, prepare non-ecdsa curves
9 years ago
Jochen Hoenicke 533c3beb63 Fixed uncompress_coords for NIST curve
9 years ago
Jochen Hoenicke 0bc1b70c4a Use different seed modifier for different curves
9 years ago
Jochen Hoenicke 472b90d8ed Added myself to copyright lines.
9 years ago
Jochen Hoenicke 774ac9cb22 Simplified test for doubling in point_jacobian_add
9 years ago
Jochen Hoenicke f93b003cbc Extended comments, new function bn_add, a bug fix.
9 years ago
Jochen Hoenicke f2081d88d8 New jacobian_add that handles doubling.
9 years ago
Jochen Hoenicke 60e36dac3b Fixed conditional_negate for larger numbers
9 years ago
Jochen Hoenicke 6ba4d288b0 Cleaned up bignum code
9 years ago
Pavol Rusnak d659fd49a5 return back normalization of signatures
9 years ago
Pavol Rusnak 71c24673ce Merge branch 'ssh-agent' of git://github.com/romanz/trezor-crypto into romanz-ssh-agent
9 years ago
Pavol Rusnak 36caf5b33a Merge pull request #35 from romanz/master
9 years ago
Roman Zeyde 36847ac0d7 ecdsa: generate_k_rfc6979() should cleanup its stack before exit
9 years ago
Roman Zeyde 7c58fc11a4 Add support for NIST256P1 elliptic curve
9 years ago
John Dvorak 85cebfe968 Change return value of ecdsa_sign_digest
9 years ago
Pavol Rusnak 21d0bb437a cleanup coding style
10 years ago
netanelkl 3fd32df8ed More of the same.
10 years ago
Pavol Rusnak a757693fe3 Merge pull request #26 from jhoenicke/bignum_improvements
10 years ago
Oleg Andreev a5a4333a8e typo fix (no, this was not a bug)
10 years ago
Jochen Hoenicke 56f5777b68 Refactored code for point doubling.
10 years ago
Jochen Hoenicke edf0fc4902 New fast variant of point_multiply.
10 years ago
Jochen Hoenicke 1700caf2ad scalar_mult based on Jacobian representation
10 years ago
Jochen Hoenicke 2c38929d03 Make scalar_multiply timing attack safe.
10 years ago
Jochen Hoenicke ec057a5102 "More" constant time point multiplication
10 years ago
Jochen Hoenicke eb6e74f361 Improve speed of scalar_multiply.
10 years ago
Jochen Hoenicke d4788bddfd Added modulus to bn_subtractmod
10 years ago
Pavol Rusnak e37ba822e6 bn_substract -> bn_subtractmod, bn_substract_noprime -> bn_subtract
10 years ago
Jochen Hoenicke e2dd0b8e8d Always check for validity in ecdsa_read_pubkey.
10 years ago
Jochen Hoenicke ed9d8c1ebb Fix RFC6979 generation of k.
10 years ago
Pavol Rusnak 795579cbac invert pby when normalizing S during signing
10 years ago
Pavol Rusnak 89a7d7797b replace base58 implementation
10 years ago
Pavol Rusnak b4cdba8489 export pby from ecdsa_sign functions
10 years ago
Pavol Rusnak 9469a64a0a use bn_is_zero and bn_is_equal where possible
10 years ago
Pavol Rusnak df3606dd5e introduce ecdsa_get_address_raw
10 years ago
Pavol Rusnak 0fe1857513 normalize y^2 in pubkey validation
10 years ago
Pavol Rusnak b9d5896174 make pubkey validation optional, extract options to separate header
10 years ago
Ondrej Mikle b34516bc49 Removed unnessary point copy.
10 years ago
Ondrej Mikle 03fee34550 Validating of public key curve point.
10 years ago
Ondrej Mikle 7fd81a1e0c Removed superfluous bn_mod, it's done now in point_add and point_double.
10 years ago
Ondrej Mikle 323da2d434 Keep results after point_add() and point_double() inside the finite field. Simplified point_is_negative_of().
10 years ago
Ondrej Mikle d827b2c862 Account for case when point.y == 0 when doubling.
10 years ago
Ondrej Mikle 6d61cefdb3 Removed test for point equality in ecdsa_verify_digest, point_add() already handles that.
10 years ago
Ondrej Mikle da6a09880d Handling of special cases in EC arithmetic.
10 years ago
Pavol Rusnak 82ed3f31db fix comparison of points
10 years ago
Pavol Rusnak eec5f7df15 fix bug in unoptimized branch of code
10 years ago
Pavol Rusnak 019d779a94 Revert "Revert "add more precomputation to ecdsa signing""
10 years ago
Pavol Rusnak 3747ba4323 Revert "add more precomputation to ecdsa signing"
10 years ago
Ondrej Mikle 0ad302ea4e Hashing of secp256k1 pubkey recognizes point at infinity.
10 years ago
Pavol Rusnak 5e9cd15527 use new base58 code for address functions, add function for obtaining wif
10 years ago