Jochen Hoenicke
73e7d82e3f
Allow initialize() to abort PIN wait
2016-05-28 16:24:14 +02:00
Pavol Rusnak
11072320a9
use ff01 usage page for debuglink
2016-05-27 15:27:41 +02:00
Pavol Rusnak
e119656c29
use descriptor that matches fido one (except usage_page)
2016-05-26 13:33:10 +02:00
Jochen Hoenicke
87bfd5a829
Bugfix: restore storage.
...
Storage restore was broken due to my previous patch.
2016-05-25 01:14:32 +02:00
Jochen Hoenicke
a1ba431d94
Use more sensible HID descriptor
2016-05-23 19:20:21 +02:00
Jochen Hoenicke
bc92fb95a5
Clear pinarea on storage_init if upgrade fails
...
This also cleans up the code a bit and resets storage_uuid if upgrade fails.
2016-05-20 20:13:43 +02:00
Pavol Rusnak
46119bd007
clear pin failures on wipe and when in debug mode
2016-05-20 17:00:10 +02:00
Pavol Rusnak
d20671b517
handle various signed_message_headers correctly
2016-05-17 18:13:08 +02:00
Pavol Rusnak
e1fa896d6c
disable ECIES
2016-05-12 21:09:34 +02:00
Pavol Rusnak
def4a9a02c
fix pbkdf2 usage in storage.c
2016-05-12 21:05:17 +02:00
Pavol Rusnak
008da6c089
Merge pull request #82 from jhoenicke/pinarea
...
Don't reflash storage after each PIN entry
2016-05-12 15:40:09 +02:00
Jochen Hoenicke
8be6956ce9
fix compilation
...
updated coins datastructure to include the new fields
2016-04-29 22:36:43 +02:00
Pavol Rusnak
a5feab0175
update submodules
2016-04-29 17:52:16 +02:00
Pavol Rusnak
f5ea14a85f
fix bugs in debug
2016-04-29 17:06:21 +02:00
Jochen Hoenicke
630e26dd20
use less stack memory in storage_commit
2016-04-27 19:23:02 +02:00
Jochen Hoenicke
da98a3a6fd
Don't reflash storage after each PIN entry
...
Instead of reflashing the whole storage, we use a designated area
in the second storage block, where we mark each PIN failure by a
single zero bit. This is because one can set bits in flash to zero but
not to one. If the PIN was entered successfully the whole word is
set to zero and the next word stores the new PIN failure counter.
2016-04-27 18:39:04 +02:00
Jochen Hoenicke
e0539f8f8b
Move public key recovery (verify) to trezor-crypto
2016-04-27 18:10:21 +02:00
Pavol Rusnak
5e5138066a
adapt the reorder of hash_final functions
2016-04-26 11:53:58 +02:00
Pavol Rusnak
b8539a6972
fix wording
2016-04-25 23:46:36 +02:00
Pavol Rusnak
035a6e754f
fix last commit
2016-04-25 23:40:24 +02:00
Pavol Rusnak
9e8c369f93
show address in verifymessage layout
2016-04-25 23:03:57 +02:00
Jochen Hoenicke
51f02ff763
ed25519 support
2016-04-22 18:22:45 +02:00
Jochen Hoenicke
6813ffb431
Remove the public_key hack.
...
It is no longer necessary to move the public key into a temporary buffer
since the node is specific for the curve and contains the right public
key.
2016-04-21 11:58:39 +02:00
Roman Zeyde
2b2414cb91
Add GPG v2.1 support by signing message digest
2016-04-20 21:01:39 +03:00
Jochen Hoenicke
03c501d9e3
Do not use hardcoded string for secp256k1.
2016-04-20 15:39:15 +02:00
Jochen Hoenicke
56238e63fc
Added curve type to HD node.
...
Create a different root node for every curve type to separate the key
space.
2016-04-19 18:23:12 +02:00
Pavol Rusnak
d8aeb63854
pass version/lock_time parameters from SignTx message to signing_init function
2016-04-16 04:47:09 +02:00
Pavol Rusnak
7675a0aa5f
fix usage of inline/static
2016-02-15 15:29:19 +01:00
Pavol Rusnak
4c9149818a
bump version (to 1.3.5)
2016-02-12 18:29:06 +01:00
Pavol Rusnak
1d3c7ee3f2
cleanup Waking up screen usage
2016-01-19 15:36:43 +01:00
Pavol Rusnak
6e3aec0c1b
move submodules to vendor subdirectory
2015-12-15 23:01:54 +01:00
Pavol Rusnak
ed76d030ef
check for sessionPassphraseCached
2015-12-14 22:53:14 +01:00
Pavol Rusnak
f557e6149d
implement GetPublicKey.show_display option
2015-11-19 11:48:26 +01:00
Pavol Rusnak
27183323a4
fail sooner when the device is not initialized
2015-11-19 11:03:16 +01:00
Pavol Rusnak
50c8811af9
double sized font for reset device
2015-11-18 19:52:16 +01:00
Roman Zeyde
c08ff09f0f
storage: add compile-time assert for sizeof(Storage) validation
2015-09-06 21:14:23 +03:00
Pavol Rusnak
8372504238
show home screen on Initialize
2015-08-25 19:50:31 +02:00
Roman Zeyde
755b0388f0
firmware: exclude debug functionality from release build
2015-08-24 15:51:20 +03:00
Roman Zeyde
1bb00adc37
fsm: add compile-time assert for response size validation
...
ttps://gcc.gnu.org/gcc-4.6/changes.html
2015-08-24 13:55:44 +03:00
Pavol Rusnak
8b1f8a4595
show "Web sign in to" when HTTPS is detected
2015-08-21 17:04:38 +02:00
Pavol Rusnak
0c6b3e26e2
prepare 1.3.4 release
2015-08-03 21:59:06 +02:00
Pavol Rusnak
b678ba8811
update protob
2015-08-03 21:27:56 +02:00
Pavol Rusnak
e876aa5094
changed coin max fees
2015-07-29 15:38:00 +02:00
Pavol Rusnak
e8b47901ce
show "Go to myTREZOR.com" instead of label when device is not initialized
2015-07-09 23:02:13 +02:00
Pavol Rusnak
9ae7d6bf65
simplify layout Dialog in SignIdentity
2015-07-04 23:45:57 +02:00
Pavol Rusnak
e4d86a49ab
rework SignIdentity signing
2015-07-04 23:40:55 +02:00
Pavol Rusnak
eaf209d999
implement CipherKeyValue.iv field
2015-06-29 16:36:50 +02:00
Pavol Rusnak
d488366e36
Merge branch 'master' of git://github.com/romanz/trezor-mcu into romanz-master
...
Conflicts:
firmware/crypto.c
2015-06-28 21:26:15 +02:00
Roman Zeyde
381f90b38a
cryptoMessageSign() should check the return value of ecdsa_sign_digest()
2015-06-27 10:20:19 +03:00
Roman Zeyde
0ac032917b
enable Trezor to perform SSH public key authentication
...
support both NIST256P1 and SECP256K1 ECDSA curves.
2015-06-26 10:43:39 +03:00