Jochen Hoenicke
c1ff9e1ec7
Use more sensible hid descriptor.
2016-04-29 16:20:54 +02:00
Jochen Hoenicke
2abe5d477e
Clean-up. Better checks for buffer overflow.
2016-04-29 16:20:54 +02:00
Jochen Hoenicke
5c13e78deb
Added support for known appid.
2016-04-29 16:20:54 +02:00
Jochen Hoenicke
b3bfc64d2f
Use hmac for checking key integrity
2016-04-29 16:20:54 +02:00
Jochen Hoenicke
01ddb3ff66
Reduced buffer sizes, moved static info to flash
2016-04-29 16:20:54 +02:00
Jochen Hoenicke
1b8bd1852e
Adapted U2F to new hdnode API
2016-04-29 16:20:54 +02:00
Jochen Hoenicke
cf38291ca4
Updated branch u2f
2016-04-29 16:19:54 +02:00
Pavol Rusnak
1f3369788a
use __asm__ instead of asm
2016-04-29 16:10:41 +02:00
Pavol Rusnak
b3aabec565
add -std=c99 to Makefile
2016-04-28 14:37:05 +02:00
Pavol Rusnak
406022acb4
remove tools/Makefile
2016-04-28 14:36:04 +02:00
Pavol Rusnak
f7e8c9442d
Merge pull request #58 from jhoenicke/master
...
Handle b58 address with shorter lengths
2016-04-27 23:40:45 +02:00
Pavol Rusnak
d9ec4344fc
use std=c99
2016-04-27 23:37:15 +02:00
Pavol Rusnak
8c6401bdef
Merge pull request #10 from jhoenicke/master
...
new address types for segwit
2016-04-27 23:23:16 +02:00
Jochen Hoenicke
81132bb1d4
new address types for segwit
2016-04-27 23:17:56 +02:00
Jochen Hoenicke
c6e7d376b7
Handle b58 address with shorter lengths
2016-04-27 23:15:53 +02:00
Jochen Hoenicke
630e26dd20
use less stack memory in storage_commit
2016-04-27 19:23:02 +02:00
Jochen Hoenicke
da98a3a6fd
Don't reflash storage after each PIN entry
...
Instead of reflashing the whole storage, we use a designated area
in the second storage block, where we mark each PIN failure by a
single zero bit. This is because one can set bits in flash to zero but
not to one. If the PIN was entered successfully the whole word is
set to zero and the next word stores the new PIN failure counter.
2016-04-27 18:39:04 +02:00
Pavol Rusnak
d41e46f842
Merge pull request #81 from jhoenicke/master
...
Move public key recovery (verify) to trezor-crypto
2016-04-27 18:22:11 +02:00
Jochen Hoenicke
e0539f8f8b
Move public key recovery (verify) to trezor-crypto
2016-04-27 18:10:21 +02:00
Pavol Rusnak
489f09a843
fix sizeof usage
2016-04-26 19:51:49 +02:00
Pavol Rusnak
08219ea77a
pbkdf2 now uses new hmac api
2016-04-26 17:43:13 +02:00
Pavol Rusnak
445e859450
split hmac into init/update/final
2016-04-26 17:19:00 +02:00
Pavol Rusnak
5e5138066a
adapt the reorder of hash_final functions
2016-04-26 11:53:58 +02:00
Pavol Rusnak
ed6debf8c4
reorder parameters of hash_final methods
2016-04-26 11:50:04 +02:00
Pavol Rusnak
c01be339f5
add sha3 from rhash
2016-04-26 11:09:29 +02:00
Pavol Rusnak
76142522e9
mention Ed25519 in the readme
2016-04-26 02:15:43 +02:00
Pavol Rusnak
5c4e131ada
add speed benchmark (secp256k1 vs ed25519)
2016-04-26 02:15:07 +02:00
Pavol Rusnak
91c64858d0
Merge pull request #57 from jhoenicke/master
...
Added Unit test, fixed one corner case.
2016-04-26 01:03:46 +02:00
Pavol Rusnak
0054893b60
add test speed for nist256p1 curve as well
2016-04-26 00:17:45 +02:00
Pavol Rusnak
b8539a6972
fix wording
2016-04-25 23:46:36 +02:00
Pavol Rusnak
035a6e754f
fix last commit
2016-04-25 23:40:24 +02:00
Pavol Rusnak
9e8c369f93
show address in verifymessage layout
2016-04-25 23:03:57 +02:00
Jochen Hoenicke
7b07dff25c
Added Unit test, fixed one corner case.
2016-04-25 22:55:30 +02:00
Pavol Rusnak
2002c815ff
Merge pull request #56 from jhoenicke/master
...
New function ecdsa_verify_recover
2016-04-25 18:39:13 +02:00
Jochen Hoenicke
409783ba64
New function ecdsa_verify_recover
...
Moved the code from Trezor firmware to here for recovering the public key
when verifying a bitcoin message. Fixed the signing and verification for
the unlikely case the r value overflows.
2016-04-25 18:02:24 +02:00
Jochen Hoenicke
a90257c422
Updated mktable to new api
2016-04-25 17:51:10 +02:00
Pavol Rusnak
6f66162e93
fix tools and gui
2016-04-25 17:46:01 +02:00
Pavol Rusnak
0590192536
add testcase for ed25519
2016-04-25 17:46:01 +02:00
Pavol Rusnak
3998e7e883
Merge pull request #55 from jhoenicke/multicurve
...
Updated cmake configuration for ed25519
2016-04-25 17:45:51 +02:00
Jochen Hoenicke
490fbed289
Adapted python unit test to new API
2016-04-25 17:44:37 +02:00
Jochen Hoenicke
269b779ead
Updated cmake configuration for ed25519
2016-04-25 16:36:10 +02:00
Pavol Rusnak
cd24b2771c
Merge pull request #54 from jhoenicke/multicurve
...
Test vectors for ed25519 + BIP-0032 / SLIP-0010
2016-04-25 13:47:20 +02:00
Pavol Rusnak
9c97812f1b
Merge pull request #55 from EdwardBetts/master
...
Include tests in release source tarball
2016-04-25 12:02:00 +02:00
Edward Betts
0c0d7ef893
Include tests in release source tarball
...
It would be great to include the test suite in the pypi release tarball.
That way people who download and build the release can run the tests to
ensure the library is working.
Linux distributions, such as Debian, base their packages of Python
modules on the pypi release. This means the test suite can be run when
building a Debian package, it should catch mistakes in the packaging or
errors in dependencies.
I've written some more on this topic on the Debian Python mailing list.
https://lists.debian.org/debian-python/2016/04/msg00074.html
2016-04-25 07:23:59 +01:00
Jochen Hoenicke
295a493846
Test vectors for ed25519 + BIP-0032 / SLIP-0010
2016-04-23 23:44:01 +02:00
Jochen Hoenicke
51f02ff763
ed25519 support
2016-04-22 18:22:45 +02:00
Jochen Hoenicke
55edf71e27
ed25519 support
2016-04-22 18:21:58 +02:00
Jochen Hoenicke
698f40f385
BIP-32 without gaps, prepare non-ecdsa curves
...
* Split ecdsa_curve into curve_info and ecdsa_curve to support bip32 on
curves that don't have a ecdsa_curve.
* Don't fail in key derivation but retry with a new hash.
* Adapted test case accordingly
2016-04-22 17:43:15 +02:00
Pavol Rusnak
e18bf6b3a8
Merge pull request #80 from jhoenicke/multicurve
...
Remove the public_key hack.
2016-04-21 14:30:05 +02:00
Jochen Hoenicke
6813ffb431
Remove the public_key hack.
...
It is no longer necessary to move the public key into a temporary buffer
since the node is specific for the curve and contains the right public
key.
2016-04-21 11:58:39 +02:00