Tomas Susanka
d5fb2a477a
eth/verify: path is not validated; improve invalid signature handling
...
Ethereum's verify_function takes an actual address as an argument not a
derivation path. So any path validation does not make any sense.
Also, if the verify_recover function raises an exception, it gets
propogated as a DataError (additional fix for #422 ).
2018-11-30 13:32:13 +01:00
Tomas Susanka
47790634ae
Merge pull request #426 from ph4r05/pr/xmr-payment-id-fix
...
xmr: payment ID computation fix
2018-11-28 09:37:47 +01:00
Dusan Klinec
f810230e71
xmr: payment ID computation fix
...
- typo in tail differentiating tag caused invalid short payment id encryption. was 0x8B, should have been 0x8D
- 69b646494b/src/device/device_default.cpp (L39)
- 69b646494b/src/device/device_default.cpp (L287)
2018-11-27 22:21:40 +01:00
Jan Pochyla
dd5eba8da9
ui: reduce flicker in buttons, text, and pin dialog
2018-11-27 14:49:59 +01:00
Jan Pochyla
faa665a80b
unix: fix SDL issues in MacOS Mojave
2018-11-27 14:49:59 +01:00
Tibor Arpas
ea4610afd2
Fixing make test_emu in some environments.
2018-11-27 14:42:49 +01:00
Tomas Susanka
8213fee15b
eth: replace fw error with data error in verify function
...
closes #422
2018-11-26 16:28:40 +01:00
matejcik
c3112fd83d
embed/trezorhal: only poll CTPM when touch is detected
...
Because CTPM dislikes being polled when no touches are seen, keeps
resetting, and maybe freezes once in a while. This is very likely a fix
for #334 .
Before, we would simply read the touch registers on every loop. Now we
first check whether the interrupt line is down, which indicates that the
CTPM has data to tell us.
Tracking the `touching` flag is necessary, as sometimes we don't poll
frequently enough to catch the TOUCH_END event before interrupt line
goes up again.
The `last_packet` handling miiight not be necessary - AFAICT, the CTPM
has some sort of buffer and always returns TOUCH_START at first and
TOUCH_END at last. Still, better safe than sorry.
2018-11-26 14:47:06 +01:00
Tomas Susanka
72bc784f7f
Revert "TEMPORARY: run tests against tsusanka/paths python-trezor branch"
...
This reverts commit 2acf0d10bd
.
2018-11-21 17:21:28 +01:00
Jan Pochyla
1782b0273c
Merge pull request #341 from trezor/tsusanka/paths
...
Bip 44 path checks
2018-11-19 15:54:11 +01:00
Pavol Rusnak
b1566e9d57
src/apps/wallet/get_public_key: return xpub for multisig
2018-11-15 13:41:19 +01:00
Tibor Arpas
be58549fd9
src/apps/wallet/sign_tx: handle timestamp field
2018-11-14 17:33:03 +01:00
Pavol Rusnak
1d43322d21
src/trezor/messages: regenerate
2018-11-14 17:31:17 +01:00
Pavol Rusnak
b3e668db8b
embed/extmod/modtrezorconfig: small refactor to storage
2018-11-14 16:25:36 +01:00
Pavol Rusnak
113a557f17
embed/trezorhal+unix: small refactor to flash.c
2018-11-14 15:12:19 +01:00
Pavol Rusnak
d2f1a4db11
changelog: update
2018-11-13 16:52:34 +01:00
Pavol Rusnak
10a284f6ee
src/apps/wallet/sign_tx: make check for OMNI more strict
2018-11-13 16:33:14 +01:00
Pavol Rusnak
4693c071b4
src/apps/wallet/sign_tx: implement OMNI parsing in OP_RETURN layout
2018-11-13 14:29:40 +01:00
Pavol Rusnak
342c3646e1
vendor: update trezor-common
2018-11-12 14:14:25 +01:00
Tomas Susanka
d83ef07d57
paths: typo, style
2018-11-12 12:21:40 +01:00
Tomas Susanka
2acf0d10bd
TEMPORARY: run tests against tsusanka/paths python-trezor branch
2018-11-12 12:10:32 +01:00
Tomas Susanka
8cf1ee5e62
paths: temporarily disable GetPublicKey paths checks
...
Until trezor/trezor.js#73 is fixed
2018-11-12 12:10:32 +01:00
Tomas Susanka
31f987e988
coins: validate derivation paths
...
Based on SLIP-44 ids and other checks. See docs/coins/README for info.
2018-11-12 12:10:32 +01:00
Vladimir Volek
ab25381646
Update build.md ( #408 )
2018-11-12 12:04:56 +01:00
Jan Pochyla
ce362103ae
apps: msg.address_n is always a list
2018-11-09 13:59:10 +01:00
Jan Pochyla
c7651b3c94
tezos: remove import *
2018-11-09 13:49:04 +01:00
Pavol Rusnak
0ff7034e37
embed/extmod/modtrezorconfig: refactor PIN UI wait callback ( #398 )
...
This commit accomplishes several goals:
1) it removes any upy dependencies from storage.c/storage.h
2) ui wait callback is set during config_init and storage_init,
which allows to simplify the code dramatically
2018-11-08 15:55:47 +01:00
Pavol Rusnak
b4894c3431
unix: add raspi target
2018-11-07 00:31:44 +01:00
Pavol Rusnak
6ce1794248
docker: add PRODUCTION env variable to build script
2018-11-05 21:41:03 +01:00
Pavol Rusnak
fc0a44176f
firmware: bump to 2.0.10
2018-11-05 16:03:16 +01:00
Pavol Rusnak
675b1a81ad
nix: add Pyro4 to shell.nix
2018-11-05 16:03:15 +01:00
Pavol Rusnak
1f2f4d1b41
update changelog
2018-11-05 16:03:15 +01:00
Tomas Susanka
43852501f5
style fix
2018-11-05 14:49:59 +01:00
Tomas Susanka
8db7a65030
templates: regen
2018-11-05 14:38:03 +01:00
Pavol Rusnak
7c2e9ed5a5
vendor: update trezor-common
2018-11-05 13:56:15 +01:00
Pavol Rusnak
085f9491a2
src/apps/homescreen: NO BACKUP => SEEDLESS
2018-11-05 13:43:14 +01:00
Jan Pochyla
5c409ceeac
protobuf: simplify the list of bytes optimization
2018-11-02 16:44:13 +01:00
Tomas Susanka
76dbef99bf
Merge pull request #395 from ph4r05/xmr-ki-progress
...
xmr: key image sync progress info
2018-11-02 15:47:43 +01:00
Dusan Klinec
3020b5d4a9
xmr: key image sync progress
2018-11-02 15:30:39 +01:00
Tomas Susanka
d919e99255
Merge pull request #394 from ph4r05/xmr-mg
...
xmr: MLSAG computation optimized
2018-11-02 15:26:48 +01:00
Dusan Klinec
22add1d515
xmr: full mlsag simplified
2018-11-02 14:17:53 +01:00
Dusan Klinec
3d66ba1535
xmr: mgsig generated in chunks
2018-11-02 08:19:30 +01:00
Dusan Klinec
0414a8e74b
protobuf: enable dumping large byte arrays in chunks
2018-11-02 08:19:29 +01:00
Dusan Klinec
cdf9d51ee2
xmr: step_09_sign - unimport after heavy ops
2018-11-02 07:31:28 +01:00
Dusan Klinec
ddcb836ff7
xmr: mlsag - generating serialized signature directly
2018-11-02 07:31:28 +01:00
Dusan Klinec
a462ea35ce
xmr: step_09_sign - manual MgSig serialization
2018-11-02 07:31:27 +01:00
Dusan Klinec
90fd0bb67a
xmr: mlsag memory optimizations, in-place computation
...
- pub key matrix is not ge25519 as it consumes high amount of memory
- in-place computation used to reduce fragmentation overhead
2018-11-02 07:31:27 +01:00
Tomas Susanka
a2b32115b2
Merge pull request #391 from ph4r05/xmr-sort-extra
...
xmr: sort extra fields
2018-11-01 11:17:23 +01:00
Dusan Klinec
121459dd57
xmr: sort extra fields
2018-11-01 10:30:19 +01:00
Jan Pochyla
5a8388fbc1
wallet: fix segwit checksum computation
2018-10-31 12:44:18 +01:00