1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-29 01:28:10 +00:00
Commit Graph

591 Commits

Author SHA1 Message Date
Jochen Hoenicke
a90257c422 Updated mktable to new api 2016-04-25 17:51:10 +02:00
Pavol Rusnak
6f66162e93
fix tools and gui 2016-04-25 17:46:01 +02:00
Pavol Rusnak
0590192536
add testcase for ed25519 2016-04-25 17:46:01 +02:00
Pavol Rusnak
3998e7e883 Merge pull request #55 from jhoenicke/multicurve
Updated cmake configuration for ed25519
2016-04-25 17:45:51 +02:00
Jochen Hoenicke
490fbed289 Adapted python unit test to new API 2016-04-25 17:44:37 +02:00
Jochen Hoenicke
269b779ead Updated cmake configuration for ed25519 2016-04-25 16:36:10 +02:00
Pavol Rusnak
cd24b2771c Merge pull request #54 from jhoenicke/multicurve
Test vectors for ed25519 + BIP-0032 / SLIP-0010
2016-04-25 13:47:20 +02:00
Jochen Hoenicke
295a493846
Test vectors for ed25519 + BIP-0032 / SLIP-0010 2016-04-23 23:44:01 +02:00
Jochen Hoenicke
55edf71e27
ed25519 support 2016-04-22 18:21:58 +02:00
Jochen Hoenicke
698f40f385
BIP-32 without gaps, prepare non-ecdsa curves
* Split ecdsa_curve into curve_info and ecdsa_curve to support bip32 on
  curves that don't have a ecdsa_curve.
* Don't fail in key derivation but retry with a new hash.
* Adapted test case accordingly
2016-04-22 17:43:15 +02:00
Pavol Rusnak
de30ffbf9a Merge pull request #53 from jhoenicke/multicurve
Multicurve
2016-04-20 20:40:59 +02:00
Jochen Hoenicke
16ff4387ae New test case for a bip32 hole in nist256 2016-04-20 20:35:22 +02:00
Jochen Hoenicke
f8ac99ebb7 Check for error from get_curve_by_name. 2016-04-20 19:54:18 +02:00
Pavol Rusnak
bf34b4269c Merge pull request #52 from jhoenicke/multicurve
Multicurve
2016-04-20 16:52:47 +02:00
Jochen Hoenicke
d577410fc4 Unit tests for the NIST256P1 curve 2016-04-20 15:13:40 +02:00
Jochen Hoenicke
533c3beb63 Fixed uncompress_coords for NIST curve
The bn_sqrti was broken.  It didn't handle primes where all bits are set
in the lowest limb.
2016-04-20 15:09:11 +02:00
Jochen Hoenicke
b34be66a9c Updated tests 2016-04-20 10:43:53 +02:00
Jochen Hoenicke
0bc1b70c4a Use different seed modifier for different curves 2016-04-20 10:38:11 +02:00
Jochen Hoenicke
c983afd72f Added curve type to HDNode
Every curve gets it's own hierarchy and the curve is remembered in
HD node.  Fixed the private/public key derivations to use the right
modulus.
2016-04-19 18:21:56 +02:00
Pavol Rusnak
f4dd151eb9
change ripemd160 function names to match sha2 functions 2016-04-14 17:28:46 +02:00
Pavol Rusnak
86d6a0b782
adopt ripemd160 from mbedtls 2016-04-14 10:58:26 +02:00
Pavol Rusnak
bb52cb4ac9
adjust format of LICENSE 2016-01-31 12:16:31 +01:00
Karel Bilek
b1a73ed984 Adding cmake to travis
Not 100% if it will work, let's see
2016-01-26 22:32:41 +01:00
Karel Bílek
2802d97d47 Merge pull request #51 from trezor/runn1ng-patch-1
Adding nist256p1 to CMakeLists
2016-01-26 20:08:07 +01:00
Karel Bilek
2b5859ca47 Adding nist256p1 to CMakeLists 2016-01-26 20:07:45 +01:00
Pavol Rusnak
fbc0df736a
call progress callback at the beginning of pbkdf2 calculation 2016-01-19 15:34:31 +01:00
Pavol Rusnak
9a8e982153
implement bip39 cache 2016-01-19 15:11:57 +01:00
Pavol Rusnak
3556c74740
fix build on _WIN32 2015-12-14 22:50:28 +01:00
Pavol Rusnak
6726547a88 Merge pull request #50 from 251io/trezor-crypto-bugfix
Fixes a bug in the test_pbkdf2_hmac_sha256 test.
2015-09-22 00:10:28 +02:00
251
1d7fb4e38f Fixes a bug in the test_pbkdf2_hmac_sha256 test.
This bug fix sets the length of the derived key in the last test_pbkdf2_hmac_sha256 test to 40 bytes to fix a buffer overflow, which is caused by the call to the pbkdf2_hmac_sha256 function, on the memory reserved by the local variable k.
2015-09-21 23:51:10 +02:00
Pavol Rusnak
57cee67855 Merge pull request #49 from romanz/master
bignum: constant time implementation for bn_mod()
2015-08-31 20:27:29 +02:00
Roman Zeyde
12c3b1ccf6 bignum: add specific tests for bn_mod() edge cases 2015-08-31 21:18:16 +03:00
Roman Zeyde
437f8b3856 bignum: constant time implementation for bn_mod() 2015-08-31 20:55:02 +03:00
Pavol Rusnak
e67018178b Merge pull request #48 from jhoenicke/bignumcleanup
Added more tests for specific points.
2015-08-19 21:52:33 +02:00
Jochen Hoenicke
472b90d8ed Added myself to copyright lines. 2015-08-19 21:45:21 +02:00
Jochen Hoenicke
50428bb37b Added more tests for specific points.
Some points designed to test for underflow of x^3-ax.
2015-08-19 21:26:05 +02:00
Pavol Rusnak
74eed547a3 Merge pull request #46 from jhoenicke/bignumcleanup
Fixed more unit tests.  Simplified jacobian_add
2015-08-08 01:56:27 +02:00
Jochen Hoenicke
774ac9cb22 Simplified test for doubling in point_jacobian_add 2015-08-07 11:26:00 +02:00
Jochen Hoenicke
11d14a3946 Fixed unit test for addmod added test for add.
- bn_addmod: now only guarantees result < 2*prime.
- bn_add: new test
- bn_mult_half: fixed normalization of prime -> 0.
2015-08-07 11:15:10 +02:00
Pavol Rusnak
c0a03d1429 Merge pull request #45 from jhoenicke/bignumcleanup
Extended comments, new function bn_add, a bug fix.
2015-08-06 19:50:36 +02:00
Jochen Hoenicke
f93b003cbc Extended comments, new function bn_add, a bug fix.
Describe normalized, partly reduced and reduced numbers.
Comment which function expects which kind of input.
Removed unused bn_bitlen.
Add bn_add that does not reduce.
Bug fix in ecdsa_validate_pubkey: bn_mod before bn_is_equal.
Bug fix in hdnode_private_ckd: bn_mod after bn_addmod.
2015-08-06 19:09:23 +02:00
Pavol Rusnak
57166295c4 Merge pull request #44 from jhoenicke/bignumcleanup
My bignum cleanup branch
2015-08-06 00:31:29 +02:00
Jochen Hoenicke
53fa580b81 Added more unit tests
- Added Romanz's validate_pubkey test.
- Added special test to check that jacobin_point_add can double.
2015-08-05 22:29:34 +02:00
Jochen Hoenicke
a1408fc5a0 Fix unit test for point_jacobian_add 2015-08-05 22:26:50 +02:00
Roman Zeyde
a9b98a3671 test_curves: generalize UT for bignum cleanup 2015-08-05 21:51:39 +02:00
Jochen Hoenicke
e1347fcdf8 New Unit Tests
- Added unit tests for the NIST curve.
- Fix some missing bn_mod in unit tests.
- New tests for tricky 2 (2j+1) 2^{4i} exponents.
2015-08-05 21:42:40 +02:00
Jochen Hoenicke
f2081d88d8 New jacobian_add that handles doubling.
Fix bug where jacobian_add is called with two identical points.
2015-08-05 21:23:04 +02:00
Jochen Hoenicke
60e36dac3b Fixed conditional_negate for larger numbers
Without the bn_mod the numbers get larger (but still < 2*prime), so
conditional_negate should handle this.
2015-08-05 19:36:30 +02:00
Jochen Hoenicke
6ba4d288b0 Cleaned up bignum code
1. Fixed bn_multiply_step to handle small primes.
2. Removed many calls to bn_mod to prevent side-channel leakage.
2015-08-05 19:36:30 +02:00
Pavol Rusnak
2e09a9ff35 add b to ecdsa_curve structure 2015-08-05 18:06:10 +02:00