1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-12 01:18:14 +00:00
Commit Graph

7717 Commits

Author SHA1 Message Date
Pavol Rusnak
d9ec4344fc
use std=c99 2016-04-27 23:37:15 +02:00
Pavol Rusnak
8c6401bdef Merge pull request #10 from jhoenicke/master
new address types for segwit
2016-04-27 23:23:16 +02:00
Jochen Hoenicke
81132bb1d4 new address types for segwit 2016-04-27 23:17:56 +02:00
Jochen Hoenicke
c6e7d376b7 Handle b58 address with shorter lengths 2016-04-27 23:15:53 +02:00
Jochen Hoenicke
630e26dd20 use less stack memory in storage_commit 2016-04-27 19:23:02 +02:00
Jochen Hoenicke
da98a3a6fd Don't reflash storage after each PIN entry
Instead of reflashing the whole storage, we use a designated area
in the second storage block, where we mark each PIN failure by a
single zero bit. This is because one can set bits in flash to zero but
not to one.  If the PIN was entered successfully the whole word is
set to zero and the next word stores the new PIN failure counter.
2016-04-27 18:39:04 +02:00
Pavol Rusnak
d41e46f842 Merge pull request #81 from jhoenicke/master
Move public key recovery (verify) to trezor-crypto
2016-04-27 18:22:11 +02:00
Jochen Hoenicke
e0539f8f8b Move public key recovery (verify) to trezor-crypto 2016-04-27 18:10:21 +02:00
Pavol Rusnak
489f09a843
fix sizeof usage 2016-04-26 19:51:49 +02:00
Pavol Rusnak
08219ea77a
pbkdf2 now uses new hmac api 2016-04-26 17:43:13 +02:00
Pavol Rusnak
445e859450
split hmac into init/update/final 2016-04-26 17:19:00 +02:00
Pavol Rusnak
5e5138066a
adapt the reorder of hash_final functions 2016-04-26 11:53:58 +02:00
Pavol Rusnak
ed6debf8c4
reorder parameters of hash_final methods 2016-04-26 11:50:04 +02:00
Pavol Rusnak
c01be339f5
add sha3 from rhash 2016-04-26 11:09:29 +02:00
Pavol Rusnak
76142522e9
mention Ed25519 in the readme 2016-04-26 02:15:43 +02:00
Pavol Rusnak
5c4e131ada
add speed benchmark (secp256k1 vs ed25519) 2016-04-26 02:15:07 +02:00
Pavol Rusnak
91c64858d0 Merge pull request #57 from jhoenicke/master
Added Unit test, fixed one corner case.
2016-04-26 01:03:46 +02:00
Pavol Rusnak
0054893b60
add test speed for nist256p1 curve as well 2016-04-26 00:17:45 +02:00
Pavol Rusnak
b8539a6972
fix wording 2016-04-25 23:46:36 +02:00
Pavol Rusnak
035a6e754f
fix last commit 2016-04-25 23:40:24 +02:00
Pavol Rusnak
9e8c369f93
show address in verifymessage layout 2016-04-25 23:03:57 +02:00
Jochen Hoenicke
7b07dff25c
Added Unit test, fixed one corner case. 2016-04-25 22:55:30 +02:00
Pavol Rusnak
2002c815ff Merge pull request #56 from jhoenicke/master
New function ecdsa_verify_recover
2016-04-25 18:39:13 +02:00
Jochen Hoenicke
409783ba64
New function ecdsa_verify_recover
Moved the code from Trezor firmware to here for recovering the public key
when verifying a bitcoin message.  Fixed the signing and verification for
the unlikely case the r value overflows.
2016-04-25 18:02:24 +02:00
Jochen Hoenicke
a90257c422 Updated mktable to new api 2016-04-25 17:51:10 +02:00
Pavol Rusnak
6f66162e93
fix tools and gui 2016-04-25 17:46:01 +02:00
Pavol Rusnak
0590192536
add testcase for ed25519 2016-04-25 17:46:01 +02:00
Pavol Rusnak
3998e7e883 Merge pull request #55 from jhoenicke/multicurve
Updated cmake configuration for ed25519
2016-04-25 17:45:51 +02:00
Jochen Hoenicke
490fbed289 Adapted python unit test to new API 2016-04-25 17:44:37 +02:00
Jochen Hoenicke
269b779ead Updated cmake configuration for ed25519 2016-04-25 16:36:10 +02:00
Pavol Rusnak
cd24b2771c Merge pull request #54 from jhoenicke/multicurve
Test vectors for ed25519 + BIP-0032 / SLIP-0010
2016-04-25 13:47:20 +02:00
Pavol Rusnak
9c97812f1b Merge pull request #55 from EdwardBetts/master
Include tests in release source tarball
2016-04-25 12:02:00 +02:00
Edward Betts
0c0d7ef893 Include tests in release source tarball
It would be great to include the test suite in the pypi release tarball.
That way people who download and build the release can run the tests to
ensure the library is working.

Linux distributions, such as Debian, base their packages of Python
modules on the pypi release. This means the test suite can be run when
building a Debian package, it should catch mistakes in the packaging or
errors in dependencies.

I've written some more on this topic on the Debian Python mailing list.
https://lists.debian.org/debian-python/2016/04/msg00074.html
2016-04-25 07:23:59 +01:00
Jochen Hoenicke
295a493846
Test vectors for ed25519 + BIP-0032 / SLIP-0010 2016-04-23 23:44:01 +02:00
Jochen Hoenicke
51f02ff763
ed25519 support 2016-04-22 18:22:45 +02:00
Jochen Hoenicke
55edf71e27
ed25519 support 2016-04-22 18:21:58 +02:00
Jochen Hoenicke
698f40f385
BIP-32 without gaps, prepare non-ecdsa curves
* Split ecdsa_curve into curve_info and ecdsa_curve to support bip32 on
  curves that don't have a ecdsa_curve.
* Don't fail in key derivation but retry with a new hash.
* Adapted test case accordingly
2016-04-22 17:43:15 +02:00
Pavol Rusnak
e18bf6b3a8 Merge pull request #80 from jhoenicke/multicurve
Remove the public_key hack.
2016-04-21 14:30:05 +02:00
Jochen Hoenicke
6813ffb431
Remove the public_key hack.
It is no longer necessary to move the public key into a temporary buffer
since the node is specific for the curve and contains the right public
key.
2016-04-21 11:58:39 +02:00
Pavol Rusnak
4a3a0b83dd Merge pull request #79 from romanz/master
Add GPG v2.1 support by signing message digest
2016-04-21 00:13:10 +02:00
Pavol Rusnak
de30ffbf9a Merge pull request #53 from jhoenicke/multicurve
Multicurve
2016-04-20 20:40:59 +02:00
Jochen Hoenicke
16ff4387ae New test case for a bip32 hole in nist256 2016-04-20 20:35:22 +02:00
Roman Zeyde
2b2414cb91 Add GPG v2.1 support by signing message digest 2016-04-20 21:01:39 +03:00
Jochen Hoenicke
f8ac99ebb7 Check for error from get_curve_by_name. 2016-04-20 19:54:18 +02:00
Pavol Rusnak
0fa0e331f2
update trezor-crypto submodule 2016-04-20 16:54:04 +02:00
Pavol Rusnak
7191d3bba8 Merge pull request #78 from jhoenicke/multicurve
Multicurve
2016-04-20 16:53:07 +02:00
Pavol Rusnak
bf34b4269c Merge pull request #52 from jhoenicke/multicurve
Multicurve
2016-04-20 16:52:47 +02:00
Jochen Hoenicke
03c501d9e3 Do not use hardcoded string for secp256k1. 2016-04-20 15:39:15 +02:00
Jochen Hoenicke
d577410fc4 Unit tests for the NIST256P1 curve 2016-04-20 15:13:40 +02:00
Jochen Hoenicke
533c3beb63 Fixed uncompress_coords for NIST curve
The bn_sqrti was broken.  It didn't handle primes where all bits are set
in the lowest limb.
2016-04-20 15:09:11 +02:00