1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-27 01:48:17 +00:00
Commit Graph

511 Commits

Author SHA1 Message Date
Pavol Rusnak
9e5d03a1fc
fix alignment in sha functions 2016-05-12 16:16:01 +02:00
Pavol Rusnak
454bebc162
update readme 2016-05-11 21:15:48 +02:00
Pavol Rusnak
242a5de275
simplify pbkdf2 (support only klen == hashlen) and split it 2016-05-01 01:18:50 +02:00
Pavol Rusnak
b8ec5567ba
undef align for ed25519-donna 2016-04-29 17:50:20 +02:00
Pavol Rusnak
406022acb4
remove tools/Makefile 2016-04-28 14:36:04 +02:00
Pavol Rusnak
f7e8c9442d Merge pull request #58 from jhoenicke/master
Handle b58 address with shorter lengths
2016-04-27 23:40:45 +02:00
Pavol Rusnak
d9ec4344fc
use std=c99 2016-04-27 23:37:15 +02:00
Jochen Hoenicke
c6e7d376b7 Handle b58 address with shorter lengths 2016-04-27 23:15:53 +02:00
Pavol Rusnak
489f09a843
fix sizeof usage 2016-04-26 19:51:49 +02:00
Pavol Rusnak
08219ea77a
pbkdf2 now uses new hmac api 2016-04-26 17:43:13 +02:00
Pavol Rusnak
445e859450
split hmac into init/update/final 2016-04-26 17:19:00 +02:00
Pavol Rusnak
ed6debf8c4
reorder parameters of hash_final methods 2016-04-26 11:50:04 +02:00
Pavol Rusnak
c01be339f5
add sha3 from rhash 2016-04-26 11:09:29 +02:00
Pavol Rusnak
76142522e9
mention Ed25519 in the readme 2016-04-26 02:15:43 +02:00
Pavol Rusnak
5c4e131ada
add speed benchmark (secp256k1 vs ed25519) 2016-04-26 02:15:07 +02:00
Pavol Rusnak
91c64858d0 Merge pull request #57 from jhoenicke/master
Added Unit test, fixed one corner case.
2016-04-26 01:03:46 +02:00
Pavol Rusnak
0054893b60
add test speed for nist256p1 curve as well 2016-04-26 00:17:45 +02:00
Jochen Hoenicke
7b07dff25c
Added Unit test, fixed one corner case. 2016-04-25 22:55:30 +02:00
Pavol Rusnak
2002c815ff Merge pull request #56 from jhoenicke/master
New function ecdsa_verify_recover
2016-04-25 18:39:13 +02:00
Jochen Hoenicke
409783ba64
New function ecdsa_verify_recover
Moved the code from Trezor firmware to here for recovering the public key
when verifying a bitcoin message.  Fixed the signing and verification for
the unlikely case the r value overflows.
2016-04-25 18:02:24 +02:00
Jochen Hoenicke
a90257c422 Updated mktable to new api 2016-04-25 17:51:10 +02:00
Pavol Rusnak
6f66162e93
fix tools and gui 2016-04-25 17:46:01 +02:00
Pavol Rusnak
0590192536
add testcase for ed25519 2016-04-25 17:46:01 +02:00
Pavol Rusnak
3998e7e883 Merge pull request #55 from jhoenicke/multicurve
Updated cmake configuration for ed25519
2016-04-25 17:45:51 +02:00
Jochen Hoenicke
490fbed289 Adapted python unit test to new API 2016-04-25 17:44:37 +02:00
Jochen Hoenicke
269b779ead Updated cmake configuration for ed25519 2016-04-25 16:36:10 +02:00
Pavol Rusnak
cd24b2771c Merge pull request #54 from jhoenicke/multicurve
Test vectors for ed25519 + BIP-0032 / SLIP-0010
2016-04-25 13:47:20 +02:00
Jochen Hoenicke
295a493846
Test vectors for ed25519 + BIP-0032 / SLIP-0010 2016-04-23 23:44:01 +02:00
Jochen Hoenicke
55edf71e27
ed25519 support 2016-04-22 18:21:58 +02:00
Jochen Hoenicke
698f40f385
BIP-32 without gaps, prepare non-ecdsa curves
* Split ecdsa_curve into curve_info and ecdsa_curve to support bip32 on
  curves that don't have a ecdsa_curve.
* Don't fail in key derivation but retry with a new hash.
* Adapted test case accordingly
2016-04-22 17:43:15 +02:00
Pavol Rusnak
de30ffbf9a Merge pull request #53 from jhoenicke/multicurve
Multicurve
2016-04-20 20:40:59 +02:00
Jochen Hoenicke
16ff4387ae New test case for a bip32 hole in nist256 2016-04-20 20:35:22 +02:00
Jochen Hoenicke
f8ac99ebb7 Check for error from get_curve_by_name. 2016-04-20 19:54:18 +02:00
Pavol Rusnak
bf34b4269c Merge pull request #52 from jhoenicke/multicurve
Multicurve
2016-04-20 16:52:47 +02:00
Jochen Hoenicke
d577410fc4 Unit tests for the NIST256P1 curve 2016-04-20 15:13:40 +02:00
Jochen Hoenicke
533c3beb63 Fixed uncompress_coords for NIST curve
The bn_sqrti was broken.  It didn't handle primes where all bits are set
in the lowest limb.
2016-04-20 15:09:11 +02:00
Jochen Hoenicke
b34be66a9c Updated tests 2016-04-20 10:43:53 +02:00
Jochen Hoenicke
0bc1b70c4a Use different seed modifier for different curves 2016-04-20 10:38:11 +02:00
Jochen Hoenicke
c983afd72f Added curve type to HDNode
Every curve gets it's own hierarchy and the curve is remembered in
HD node.  Fixed the private/public key derivations to use the right
modulus.
2016-04-19 18:21:56 +02:00
Pavol Rusnak
f4dd151eb9
change ripemd160 function names to match sha2 functions 2016-04-14 17:28:46 +02:00
Pavol Rusnak
86d6a0b782
adopt ripemd160 from mbedtls 2016-04-14 10:58:26 +02:00
Pavol Rusnak
bb52cb4ac9
adjust format of LICENSE 2016-01-31 12:16:31 +01:00
Karel Bilek
b1a73ed984 Adding cmake to travis
Not 100% if it will work, let's see
2016-01-26 22:32:41 +01:00
Karel Bílek
2802d97d47 Merge pull request #51 from trezor/runn1ng-patch-1
Adding nist256p1 to CMakeLists
2016-01-26 20:08:07 +01:00
Karel Bilek
2b5859ca47 Adding nist256p1 to CMakeLists 2016-01-26 20:07:45 +01:00
Pavol Rusnak
fbc0df736a
call progress callback at the beginning of pbkdf2 calculation 2016-01-19 15:34:31 +01:00
Pavol Rusnak
9a8e982153
implement bip39 cache 2016-01-19 15:11:57 +01:00
Pavol Rusnak
3556c74740
fix build on _WIN32 2015-12-14 22:50:28 +01:00
Pavol Rusnak
6726547a88 Merge pull request #50 from 251io/trezor-crypto-bugfix
Fixes a bug in the test_pbkdf2_hmac_sha256 test.
2015-09-22 00:10:28 +02:00
251
1d7fb4e38f Fixes a bug in the test_pbkdf2_hmac_sha256 test.
This bug fix sets the length of the derived key in the last test_pbkdf2_hmac_sha256 test to 40 bytes to fix a buffer overflow, which is caused by the call to the pbkdf2_hmac_sha256 function, on the memory reserved by the local variable k.
2015-09-21 23:51:10 +02:00