Pavol Rusnak
445e859450
split hmac into init/update/final
2016-04-26 17:19:00 +02:00
Pavol Rusnak
ed6debf8c4
reorder parameters of hash_final methods
2016-04-26 11:50:04 +02:00
Pavol Rusnak
c01be339f5
add sha3 from rhash
2016-04-26 11:09:29 +02:00
Pavol Rusnak
76142522e9
mention Ed25519 in the readme
2016-04-26 02:15:43 +02:00
Pavol Rusnak
5c4e131ada
add speed benchmark (secp256k1 vs ed25519)
2016-04-26 02:15:07 +02:00
Pavol Rusnak
91c64858d0
Merge pull request #57 from jhoenicke/master
...
Added Unit test, fixed one corner case.
2016-04-26 01:03:46 +02:00
Pavol Rusnak
0054893b60
add test speed for nist256p1 curve as well
2016-04-26 00:17:45 +02:00
Jochen Hoenicke
7b07dff25c
Added Unit test, fixed one corner case.
2016-04-25 22:55:30 +02:00
Pavol Rusnak
2002c815ff
Merge pull request #56 from jhoenicke/master
...
New function ecdsa_verify_recover
2016-04-25 18:39:13 +02:00
Jochen Hoenicke
409783ba64
New function ecdsa_verify_recover
...
Moved the code from Trezor firmware to here for recovering the public key
when verifying a bitcoin message. Fixed the signing and verification for
the unlikely case the r value overflows.
2016-04-25 18:02:24 +02:00
Jochen Hoenicke
a90257c422
Updated mktable to new api
2016-04-25 17:51:10 +02:00
Pavol Rusnak
6f66162e93
fix tools and gui
2016-04-25 17:46:01 +02:00
Pavol Rusnak
0590192536
add testcase for ed25519
2016-04-25 17:46:01 +02:00
Pavol Rusnak
3998e7e883
Merge pull request #55 from jhoenicke/multicurve
...
Updated cmake configuration for ed25519
2016-04-25 17:45:51 +02:00
Jochen Hoenicke
490fbed289
Adapted python unit test to new API
2016-04-25 17:44:37 +02:00
Jochen Hoenicke
269b779ead
Updated cmake configuration for ed25519
2016-04-25 16:36:10 +02:00
Pavol Rusnak
cd24b2771c
Merge pull request #54 from jhoenicke/multicurve
...
Test vectors for ed25519 + BIP-0032 / SLIP-0010
2016-04-25 13:47:20 +02:00
Jochen Hoenicke
295a493846
Test vectors for ed25519 + BIP-0032 / SLIP-0010
2016-04-23 23:44:01 +02:00
Jochen Hoenicke
55edf71e27
ed25519 support
2016-04-22 18:21:58 +02:00
Jochen Hoenicke
698f40f385
BIP-32 without gaps, prepare non-ecdsa curves
...
* Split ecdsa_curve into curve_info and ecdsa_curve to support bip32 on
curves that don't have a ecdsa_curve.
* Don't fail in key derivation but retry with a new hash.
* Adapted test case accordingly
2016-04-22 17:43:15 +02:00
Pavol Rusnak
de30ffbf9a
Merge pull request #53 from jhoenicke/multicurve
...
Multicurve
2016-04-20 20:40:59 +02:00
Jochen Hoenicke
16ff4387ae
New test case for a bip32 hole in nist256
2016-04-20 20:35:22 +02:00
Jochen Hoenicke
f8ac99ebb7
Check for error from get_curve_by_name.
2016-04-20 19:54:18 +02:00
Pavol Rusnak
bf34b4269c
Merge pull request #52 from jhoenicke/multicurve
...
Multicurve
2016-04-20 16:52:47 +02:00
Jochen Hoenicke
d577410fc4
Unit tests for the NIST256P1 curve
2016-04-20 15:13:40 +02:00
Jochen Hoenicke
533c3beb63
Fixed uncompress_coords for NIST curve
...
The bn_sqrti was broken. It didn't handle primes where all bits are set
in the lowest limb.
2016-04-20 15:09:11 +02:00
Jochen Hoenicke
b34be66a9c
Updated tests
2016-04-20 10:43:53 +02:00
Jochen Hoenicke
0bc1b70c4a
Use different seed modifier for different curves
2016-04-20 10:38:11 +02:00
Jochen Hoenicke
c983afd72f
Added curve type to HDNode
...
Every curve gets it's own hierarchy and the curve is remembered in
HD node. Fixed the private/public key derivations to use the right
modulus.
2016-04-19 18:21:56 +02:00
Pavol Rusnak
f4dd151eb9
change ripemd160 function names to match sha2 functions
2016-04-14 17:28:46 +02:00
Pavol Rusnak
86d6a0b782
adopt ripemd160 from mbedtls
2016-04-14 10:58:26 +02:00
Pavol Rusnak
bb52cb4ac9
adjust format of LICENSE
2016-01-31 12:16:31 +01:00
Karel Bilek
b1a73ed984
Adding cmake to travis
...
Not 100% if it will work, let's see
2016-01-26 22:32:41 +01:00
Karel Bílek
2802d97d47
Merge pull request #51 from trezor/runn1ng-patch-1
...
Adding nist256p1 to CMakeLists
2016-01-26 20:08:07 +01:00
Karel Bilek
2b5859ca47
Adding nist256p1 to CMakeLists
2016-01-26 20:07:45 +01:00
Pavol Rusnak
fbc0df736a
call progress callback at the beginning of pbkdf2 calculation
2016-01-19 15:34:31 +01:00
Pavol Rusnak
9a8e982153
implement bip39 cache
2016-01-19 15:11:57 +01:00
Pavol Rusnak
3556c74740
fix build on _WIN32
2015-12-14 22:50:28 +01:00
Pavol Rusnak
6726547a88
Merge pull request #50 from 251io/trezor-crypto-bugfix
...
Fixes a bug in the test_pbkdf2_hmac_sha256 test.
2015-09-22 00:10:28 +02:00
251
1d7fb4e38f
Fixes a bug in the test_pbkdf2_hmac_sha256 test.
...
This bug fix sets the length of the derived key in the last test_pbkdf2_hmac_sha256 test to 40 bytes to fix a buffer overflow, which is caused by the call to the pbkdf2_hmac_sha256 function, on the memory reserved by the local variable k.
2015-09-21 23:51:10 +02:00
Pavol Rusnak
57cee67855
Merge pull request #49 from romanz/master
...
bignum: constant time implementation for bn_mod()
2015-08-31 20:27:29 +02:00
Roman Zeyde
12c3b1ccf6
bignum: add specific tests for bn_mod() edge cases
2015-08-31 21:18:16 +03:00
Roman Zeyde
437f8b3856
bignum: constant time implementation for bn_mod()
2015-08-31 20:55:02 +03:00
Pavol Rusnak
e67018178b
Merge pull request #48 from jhoenicke/bignumcleanup
...
Added more tests for specific points.
2015-08-19 21:52:33 +02:00
Jochen Hoenicke
472b90d8ed
Added myself to copyright lines.
2015-08-19 21:45:21 +02:00
Jochen Hoenicke
50428bb37b
Added more tests for specific points.
...
Some points designed to test for underflow of x^3-ax.
2015-08-19 21:26:05 +02:00
Pavol Rusnak
74eed547a3
Merge pull request #46 from jhoenicke/bignumcleanup
...
Fixed more unit tests. Simplified jacobian_add
2015-08-08 01:56:27 +02:00
Jochen Hoenicke
774ac9cb22
Simplified test for doubling in point_jacobian_add
2015-08-07 11:26:00 +02:00
Jochen Hoenicke
11d14a3946
Fixed unit test for addmod added test for add.
...
- bn_addmod: now only guarantees result < 2*prime.
- bn_add: new test
- bn_mult_half: fixed normalization of prime -> 0.
2015-08-07 11:15:10 +02:00
Pavol Rusnak
c0a03d1429
Merge pull request #45 from jhoenicke/bignumcleanup
...
Extended comments, new function bn_add, a bug fix.
2015-08-06 19:50:36 +02:00