1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-02 20:48:30 +00:00
Commit Graph

13876 Commits

Author SHA1 Message Date
Jochen Hoenicke
5c13e78deb Added support for known appid. 2016-04-29 16:20:54 +02:00
Jochen Hoenicke
b3bfc64d2f Use hmac for checking key integrity 2016-04-29 16:20:54 +02:00
Jochen Hoenicke
01ddb3ff66 Reduced buffer sizes, moved static info to flash 2016-04-29 16:20:54 +02:00
Jochen Hoenicke
1b8bd1852e Adapted U2F to new hdnode API 2016-04-29 16:20:54 +02:00
Jochen Hoenicke
cf38291ca4 Updated branch u2f 2016-04-29 16:19:54 +02:00
Pavol Rusnak
1f3369788a
use __asm__ instead of asm 2016-04-29 16:10:41 +02:00
Pavol Rusnak
b3aabec565
add -std=c99 to Makefile 2016-04-28 14:37:05 +02:00
Pavol Rusnak
406022acb4
remove tools/Makefile 2016-04-28 14:36:04 +02:00
Pavol Rusnak
f7e8c9442d Merge pull request #58 from jhoenicke/master
Handle b58 address with shorter lengths
2016-04-27 23:40:45 +02:00
Pavol Rusnak
d9ec4344fc
use std=c99 2016-04-27 23:37:15 +02:00
Pavol Rusnak
8c6401bdef Merge pull request #10 from jhoenicke/master
new address types for segwit
2016-04-27 23:23:16 +02:00
Jochen Hoenicke
81132bb1d4 new address types for segwit 2016-04-27 23:17:56 +02:00
Jochen Hoenicke
c6e7d376b7 Handle b58 address with shorter lengths 2016-04-27 23:15:53 +02:00
Jochen Hoenicke
630e26dd20 use less stack memory in storage_commit 2016-04-27 19:23:02 +02:00
Jochen Hoenicke
da98a3a6fd Don't reflash storage after each PIN entry
Instead of reflashing the whole storage, we use a designated area
in the second storage block, where we mark each PIN failure by a
single zero bit. This is because one can set bits in flash to zero but
not to one.  If the PIN was entered successfully the whole word is
set to zero and the next word stores the new PIN failure counter.
2016-04-27 18:39:04 +02:00
Pavol Rusnak
d41e46f842 Merge pull request #81 from jhoenicke/master
Move public key recovery (verify) to trezor-crypto
2016-04-27 18:22:11 +02:00
Jochen Hoenicke
e0539f8f8b Move public key recovery (verify) to trezor-crypto 2016-04-27 18:10:21 +02:00
Pavol Rusnak
489f09a843
fix sizeof usage 2016-04-26 19:51:49 +02:00
Pavol Rusnak
08219ea77a
pbkdf2 now uses new hmac api 2016-04-26 17:43:13 +02:00
Pavol Rusnak
445e859450
split hmac into init/update/final 2016-04-26 17:19:00 +02:00
Pavol Rusnak
5e5138066a
adapt the reorder of hash_final functions 2016-04-26 11:53:58 +02:00
Pavol Rusnak
ed6debf8c4
reorder parameters of hash_final methods 2016-04-26 11:50:04 +02:00
Pavol Rusnak
c01be339f5
add sha3 from rhash 2016-04-26 11:09:29 +02:00
Pavol Rusnak
76142522e9
mention Ed25519 in the readme 2016-04-26 02:15:43 +02:00
Pavol Rusnak
5c4e131ada
add speed benchmark (secp256k1 vs ed25519) 2016-04-26 02:15:07 +02:00
Pavol Rusnak
91c64858d0 Merge pull request #57 from jhoenicke/master
Added Unit test, fixed one corner case.
2016-04-26 01:03:46 +02:00
Pavol Rusnak
0054893b60
add test speed for nist256p1 curve as well 2016-04-26 00:17:45 +02:00
Pavol Rusnak
b8539a6972
fix wording 2016-04-25 23:46:36 +02:00
Pavol Rusnak
035a6e754f
fix last commit 2016-04-25 23:40:24 +02:00
Pavol Rusnak
9e8c369f93
show address in verifymessage layout 2016-04-25 23:03:57 +02:00
Jochen Hoenicke
7b07dff25c
Added Unit test, fixed one corner case. 2016-04-25 22:55:30 +02:00
Pavol Rusnak
2002c815ff Merge pull request #56 from jhoenicke/master
New function ecdsa_verify_recover
2016-04-25 18:39:13 +02:00
Jochen Hoenicke
409783ba64
New function ecdsa_verify_recover
Moved the code from Trezor firmware to here for recovering the public key
when verifying a bitcoin message.  Fixed the signing and verification for
the unlikely case the r value overflows.
2016-04-25 18:02:24 +02:00
Jochen Hoenicke
a90257c422 Updated mktable to new api 2016-04-25 17:51:10 +02:00
Pavol Rusnak
6f66162e93
fix tools and gui 2016-04-25 17:46:01 +02:00
Pavol Rusnak
0590192536
add testcase for ed25519 2016-04-25 17:46:01 +02:00
Pavol Rusnak
3998e7e883 Merge pull request #55 from jhoenicke/multicurve
Updated cmake configuration for ed25519
2016-04-25 17:45:51 +02:00
Jochen Hoenicke
490fbed289 Adapted python unit test to new API 2016-04-25 17:44:37 +02:00
Jochen Hoenicke
269b779ead Updated cmake configuration for ed25519 2016-04-25 16:36:10 +02:00
Pavol Rusnak
cd24b2771c Merge pull request #54 from jhoenicke/multicurve
Test vectors for ed25519 + BIP-0032 / SLIP-0010
2016-04-25 13:47:20 +02:00
Pavol Rusnak
9c97812f1b Merge pull request #55 from EdwardBetts/master
Include tests in release source tarball
2016-04-25 12:02:00 +02:00
Edward Betts
0c0d7ef893 Include tests in release source tarball
It would be great to include the test suite in the pypi release tarball.
That way people who download and build the release can run the tests to
ensure the library is working.

Linux distributions, such as Debian, base their packages of Python
modules on the pypi release. This means the test suite can be run when
building a Debian package, it should catch mistakes in the packaging or
errors in dependencies.

I've written some more on this topic on the Debian Python mailing list.
https://lists.debian.org/debian-python/2016/04/msg00074.html
2016-04-25 07:23:59 +01:00
Jochen Hoenicke
295a493846
Test vectors for ed25519 + BIP-0032 / SLIP-0010 2016-04-23 23:44:01 +02:00
Jochen Hoenicke
51f02ff763
ed25519 support 2016-04-22 18:22:45 +02:00
Jochen Hoenicke
55edf71e27
ed25519 support 2016-04-22 18:21:58 +02:00
Jochen Hoenicke
698f40f385
BIP-32 without gaps, prepare non-ecdsa curves
* Split ecdsa_curve into curve_info and ecdsa_curve to support bip32 on
  curves that don't have a ecdsa_curve.
* Don't fail in key derivation but retry with a new hash.
* Adapted test case accordingly
2016-04-22 17:43:15 +02:00
Pavol Rusnak
e18bf6b3a8 Merge pull request #80 from jhoenicke/multicurve
Remove the public_key hack.
2016-04-21 14:30:05 +02:00
Jochen Hoenicke
6813ffb431
Remove the public_key hack.
It is no longer necessary to move the public key into a temporary buffer
since the node is specific for the curve and contains the right public
key.
2016-04-21 11:58:39 +02:00
Pavol Rusnak
4a3a0b83dd Merge pull request #79 from romanz/master
Add GPG v2.1 support by signing message digest
2016-04-21 00:13:10 +02:00
Pavol Rusnak
de30ffbf9a Merge pull request #53 from jhoenicke/multicurve
Multicurve
2016-04-20 20:40:59 +02:00