Pavol Rusnak
aae96e8285
add mnemonic generation methods with indexes option
2016-05-13 19:46:12 +02:00
Pavol Rusnak
51c0bb09d8
make salt constant in pbkdf2
2016-05-12 20:57:55 +02:00
Pavol Rusnak
75f2396624
fix makefile for emscripten
2016-05-12 19:57:22 +02:00
Pavol Rusnak
110965f31d
further optimize emscripten
2016-05-12 19:29:24 +02:00
Pavol Rusnak
6dd9ed0756
add hdnode_public_ckd_address_optimized
2016-05-12 17:19:42 +02:00
Jan Pochyla
3c335be049
fix typo
2016-05-12 16:18:35 +02:00
Jan Pochyla
07200a30e6
upgrade bitcoinjs-lib, rename params
2016-05-12 16:18:35 +02:00
Jan Pochyla
3c0176a304
move interface fns to post.js, add web worker & browserify test
2016-05-12 16:18:34 +02:00
Jan Pochyla
da0a2f8662
add npm install to emscripten Makefile
2016-05-12 16:18:34 +02:00
Jan Pochyla
3f4e50ba22
add package.json for emscripten test
2016-05-12 16:18:34 +02:00
Jan Pochyla
778d1b2476
emcripten skeleton for address derivation
...
See [https://kripken.github.io/emscripten-site/index.html ] for a guide.
2016-05-12 16:18:34 +02:00
Pavol Rusnak
9e5d03a1fc
fix alignment in sha functions
2016-05-12 16:16:01 +02:00
Pavol Rusnak
454bebc162
update readme
2016-05-11 21:15:48 +02:00
Pavol Rusnak
242a5de275
simplify pbkdf2 (support only klen == hashlen) and split it
2016-05-01 01:18:50 +02:00
Pavol Rusnak
b8ec5567ba
undef align for ed25519-donna
2016-04-29 17:50:20 +02:00
Pavol Rusnak
406022acb4
remove tools/Makefile
2016-04-28 14:36:04 +02:00
Pavol Rusnak
f7e8c9442d
Merge pull request #58 from jhoenicke/master
...
Handle b58 address with shorter lengths
2016-04-27 23:40:45 +02:00
Pavol Rusnak
d9ec4344fc
use std=c99
2016-04-27 23:37:15 +02:00
Jochen Hoenicke
c6e7d376b7
Handle b58 address with shorter lengths
2016-04-27 23:15:53 +02:00
Pavol Rusnak
489f09a843
fix sizeof usage
2016-04-26 19:51:49 +02:00
Pavol Rusnak
08219ea77a
pbkdf2 now uses new hmac api
2016-04-26 17:43:13 +02:00
Pavol Rusnak
445e859450
split hmac into init/update/final
2016-04-26 17:19:00 +02:00
Pavol Rusnak
ed6debf8c4
reorder parameters of hash_final methods
2016-04-26 11:50:04 +02:00
Pavol Rusnak
c01be339f5
add sha3 from rhash
2016-04-26 11:09:29 +02:00
Pavol Rusnak
76142522e9
mention Ed25519 in the readme
2016-04-26 02:15:43 +02:00
Pavol Rusnak
5c4e131ada
add speed benchmark (secp256k1 vs ed25519)
2016-04-26 02:15:07 +02:00
Pavol Rusnak
91c64858d0
Merge pull request #57 from jhoenicke/master
...
Added Unit test, fixed one corner case.
2016-04-26 01:03:46 +02:00
Pavol Rusnak
0054893b60
add test speed for nist256p1 curve as well
2016-04-26 00:17:45 +02:00
Jochen Hoenicke
7b07dff25c
Added Unit test, fixed one corner case.
2016-04-25 22:55:30 +02:00
Pavol Rusnak
2002c815ff
Merge pull request #56 from jhoenicke/master
...
New function ecdsa_verify_recover
2016-04-25 18:39:13 +02:00
Jochen Hoenicke
409783ba64
New function ecdsa_verify_recover
...
Moved the code from Trezor firmware to here for recovering the public key
when verifying a bitcoin message. Fixed the signing and verification for
the unlikely case the r value overflows.
2016-04-25 18:02:24 +02:00
Jochen Hoenicke
a90257c422
Updated mktable to new api
2016-04-25 17:51:10 +02:00
Pavol Rusnak
6f66162e93
fix tools and gui
2016-04-25 17:46:01 +02:00
Pavol Rusnak
0590192536
add testcase for ed25519
2016-04-25 17:46:01 +02:00
Pavol Rusnak
3998e7e883
Merge pull request #55 from jhoenicke/multicurve
...
Updated cmake configuration for ed25519
2016-04-25 17:45:51 +02:00
Jochen Hoenicke
490fbed289
Adapted python unit test to new API
2016-04-25 17:44:37 +02:00
Jochen Hoenicke
269b779ead
Updated cmake configuration for ed25519
2016-04-25 16:36:10 +02:00
Pavol Rusnak
cd24b2771c
Merge pull request #54 from jhoenicke/multicurve
...
Test vectors for ed25519 + BIP-0032 / SLIP-0010
2016-04-25 13:47:20 +02:00
Jochen Hoenicke
295a493846
Test vectors for ed25519 + BIP-0032 / SLIP-0010
2016-04-23 23:44:01 +02:00
Jochen Hoenicke
55edf71e27
ed25519 support
2016-04-22 18:21:58 +02:00
Jochen Hoenicke
698f40f385
BIP-32 without gaps, prepare non-ecdsa curves
...
* Split ecdsa_curve into curve_info and ecdsa_curve to support bip32 on
curves that don't have a ecdsa_curve.
* Don't fail in key derivation but retry with a new hash.
* Adapted test case accordingly
2016-04-22 17:43:15 +02:00
Pavol Rusnak
de30ffbf9a
Merge pull request #53 from jhoenicke/multicurve
...
Multicurve
2016-04-20 20:40:59 +02:00
Jochen Hoenicke
16ff4387ae
New test case for a bip32 hole in nist256
2016-04-20 20:35:22 +02:00
Jochen Hoenicke
f8ac99ebb7
Check for error from get_curve_by_name.
2016-04-20 19:54:18 +02:00
Pavol Rusnak
bf34b4269c
Merge pull request #52 from jhoenicke/multicurve
...
Multicurve
2016-04-20 16:52:47 +02:00
Jochen Hoenicke
d577410fc4
Unit tests for the NIST256P1 curve
2016-04-20 15:13:40 +02:00
Jochen Hoenicke
533c3beb63
Fixed uncompress_coords for NIST curve
...
The bn_sqrti was broken. It didn't handle primes where all bits are set
in the lowest limb.
2016-04-20 15:09:11 +02:00
Jochen Hoenicke
b34be66a9c
Updated tests
2016-04-20 10:43:53 +02:00
Jochen Hoenicke
0bc1b70c4a
Use different seed modifier for different curves
2016-04-20 10:38:11 +02:00
Jochen Hoenicke
c983afd72f
Added curve type to HDNode
...
Every curve gets it's own hierarchy and the curve is remembered in
HD node. Fixed the private/public key derivations to use the right
modulus.
2016-04-19 18:21:56 +02:00