1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-18 05:28:40 +00:00
Commit Graph

8238 Commits

Author SHA1 Message Date
Pavol Rusnak
d8cdfea743
build: update protobuf dependency to 3.6.1 2019-10-02 13:07:48 +00:00
ciny
79fedfd389 tests: enable nobackup tests for T1 2019-10-02 14:31:21 +02:00
matejcik
45665bde23 tests: parametrize reset/backup tests 2019-10-02 14:31:21 +02:00
ciny
a8f2f7b1e3 tests: expand backup device tests 2019-10-02 14:31:21 +02:00
Pavol Rusnak
2217b680e3
core: update changelog 2019-10-02 10:00:10 +00:00
Tomas Susanka
086ec00862 mypy: add show_error_codes to setup.cfg 2019-10-02 11:12:34 +02:00
Tomas Susanka
603a05ce8c pipenv: update dependencies 2019-10-02 11:10:57 +02:00
Pavol Rusnak
2e877b5762
core: refactor fido2 stuff into webauthn/fido2 2019-10-01 14:02:28 +00:00
Tomas Susanka
6b8f63c624 docs: improve tests documentation 2019-10-01 15:14:36 +02:00
matejcik
3c62db2696 stellar: fix ManageDataOp value padding 2019-10-01 15:12:37 +02:00
matejcik
97a5fd14b6 tests: reformat stellar test 2019-10-01 15:12:37 +02:00
Andrew Kozlik
18998ff42f core/webauth: Remove "alg" parameter validation for key-agreement public keys to avoid compatibility issues. 2019-10-01 12:05:14 +02:00
Andrew Kozlik
4a81101c84 core/webauthn: Modify error handling to match fido2-tests. 2019-10-01 11:55:36 +02:00
Andrew Kozlik
9537bc40a5 core/webauthn: Use ECDH_ES_HKDF_256 instead of ES256 as the algorithm type for key-agreement keys.
ECDH_ES_HKDF_256 is the wrong type to use, since the key-agreement does not use HKDF, but ES256 is even more wrong, because it is an ECDSA type rather than an ECDH type. Currently there is no correct algorithm type defined. ES256 is used by libfido2, whereas ECDH_ES_HKDF_256 is used by Chrome, YubiKey and SoloKey, so it has the majority.
2019-09-30 19:37:46 +02:00
matejcik
d48c5c6450 legacy/stellar: fix timebounds display (#582) 2019-09-30 15:52:40 +02:00
Pavol Rusnak
69142e56e7
core/tests: don't use curl, use wget 2019-09-30 12:46:00 +00:00
Pavol Rusnak
8eee90fd9a
crypto: sync base58.c with upstream 2019-09-29 08:46:21 +00:00
Pavol Rusnak
8524ff9832
Merge pull request #576 from trezor/andrewkozlik/fido2-device-test
FIDO2 fixes for device tests and knownapps improvements
2019-09-27 14:21:45 +02:00
Andrew Kozlik
500401d81f core/webauthn: Place a 500 ms timeout on CTAP HID continuation packets. 2019-09-26 19:02:29 +02:00
Andrew Kozlik
0495d18b1e core/webauthn: Fix CTAP HID protocol to correctly handle invalid channel IDs and interleaving packets from different channels. 2019-09-26 19:02:29 +02:00
Andrew Kozlik
9ea8136545 u2f: Add keepersecurity.eu to knownapps. 2019-09-26 19:02:29 +02:00
Andrew Kozlik
e4c13b6357 u2f: Store hashes of U2F application parameters instead of pre-images. 2019-09-26 19:02:29 +02:00
Andrew Kozlik
6a33889706 common/webauthn: Add new URLs for gandi.net and Slush Pool. 2019-09-26 19:02:29 +02:00
Andrew Kozlik
839c6cdac5 common/webauthn: Allow multiple URLs per app. 2019-09-26 19:02:29 +02:00
Andrew Kozlik
528ee9ccf1 core/webauthn: Ensure user-presence option is not present in MakeCredential requests. 2019-09-26 19:02:29 +02:00
Andrew Kozlik
e341f133a3 core/webauthn: Add length checks in CTAPHID protocol. 2019-09-26 19:02:29 +02:00
Andrew Kozlik
ae70741e48 core/webauthn: Add more type checking for CBOR command parameters and return CTAP2_ERR_CBOR_UNEXPECTED_TYPE. 2019-09-26 19:02:29 +02:00
Andrew Kozlik
5ca4ed2347 core/webauth: Add _AUTOCONFIRM option for testing. 2019-09-26 19:02:29 +02:00
Andrew Kozlik
7ad1467dbf core/webauthn: Process debuglink signals in Fido2ConfirmGetAssertion. 2019-09-26 19:02:29 +02:00
Andrew Kozlik
3d91cb5c5b core/webauthn: Return ERR_MISSING_PARAMETER instead of generic error. 2019-09-26 19:02:29 +02:00
Andrew Kozlik
eaf63fff45 core/webauthn: In GetAssertion do not return user ID for server resident credentials. 2019-09-26 19:02:29 +02:00
matejcik
4ec7e203d5 python: make style 2019-09-26 16:48:16 +02:00
matejcik
2e5bdca891 python: update changelog, mark for release 2019-09-26 16:44:20 +02:00
matejcik
afe41d5fcf python: clear state with clear_session (fixes #525) 2019-09-26 15:50:41 +02:00
matejcik
4338e17757 python/trezorctl: dump raw protobuf bytes with -vv (fixes #117) 2019-09-26 15:41:42 +02:00
Andrew Kozlik
f54c968039 core/webauthn: Validate U2F key handle length. 2019-09-25 21:06:36 +02:00
Andrew Kozlik
638a861137 core/webauthn: Add U2F_V2 to authenticatorGetInfo supported versions. 2019-09-25 20:00:11 +02:00
Andrew Kozlik
cf6949332f core/webauthn: Claim that PIN is set even when it's not, because login.live.com shows an error, but doesn't instruct the user to set a PIN. 2019-09-25 20:00:11 +02:00
Andrew Kozlik
5e99058832 common/webauthn: Add webauthn RP ID for google.com. 2019-09-25 19:59:59 +02:00
Pavol Rusnak
40c66e6d85
core: handle removal of non-existing PIN in require_confirm_change_pin 2019-09-25 17:35:37 +00:00
Pavol Rusnak
adcaf83eb2
ci: changes to *.pyi should also trigger gen_check 2019-09-25 10:30:48 +00:00
Pavol Rusnak
ad76b5fb9f
core: regenerate mocks 2019-09-25 10:27:04 +00:00
Pavol Rusnak
dcff4ade01
core: use set_clr_card_detect to disable SD card pull-up resistor 2019-09-25 12:13:53 +02:00
Pavol Rusnak
6c14ee7ec0
core: initialize fatfs only after we know the SD card is powered 2019-09-25 12:13:52 +02:00
Pavol Rusnak
7394ecfa77
core: add exist_ok parameter to fatfs.mkdir 2019-09-25 12:13:52 +02:00
Pavol Rusnak
d393fc6e85
Revert "core: replace BITCOIN_ONLY with a constant only in src/trezor/utils.py"
This reverts commit b9e7e93bcf.

Unfortunately this does not work, compiler cannot see it is a literal constant,
so it won't get optimized out, even when we use const(0). Also const(False)
is not supported at all.
2019-09-25 12:05:13 +02:00
Pavol Rusnak
6a9d986e20
legacy: correctly handle set/clear flags 2019-09-24 14:32:37 +00:00
Tomas Susanka
31494dad6c
Merge pull request #567 from trezor/tsusanka/566-info-btn2
Fix info button when shares reach its threshold
2019-09-24 16:30:00 +02:00
Tomas Susanka
f53694c3fe core/recovery: rename variable and add a comment in Info button 2019-09-24 16:12:19 +02:00
Tomas Susanka
6c6bd44ee8 core/recovery: fix Info button when the threshold was reached (#566) 2019-09-24 16:10:09 +02:00