1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-15 19:08:07 +00:00
Go to file
2013-10-08 16:59:14 +02:00
.gitignore move speed tests to unit testing suite 2013-09-22 15:05:59 +02:00
AUTHORS import sources 2013-08-17 14:20:15 +02:00
bignum.c use canonical signatures (if S > Order/2: S = Order - S) 2013-10-08 14:06:48 +02:00
bignum.h use canonical signatures (if S > Order/2: S = Order - S) 2013-10-08 14:06:48 +02:00
bip32.c remove der encoding, introduce 33/65 bytes pubkeys, 64 bytes signature 2013-09-23 21:13:44 +02:00
bip32.h add function for computing addresses 2013-09-20 17:13:24 +02:00
blowfish.c fix blowfish. add unit tests for blowfish 2013-10-08 16:59:14 +02:00
blowfish.h fix blowfish. add unit tests for blowfish 2013-10-08 16:59:14 +02:00
ecdsa.c use canonical signatures (if S > Order/2: S = Order - S) 2013-10-08 14:06:48 +02:00
ecdsa.h add define for RFC6979 2013-10-03 18:19:30 +02:00
hmac.c add hmac-sha256/512 2013-09-10 21:47:06 +02:00
hmac.h add hmac-sha256/512 2013-09-10 21:47:06 +02:00
LICENSE import sources 2013-08-17 14:20:15 +02:00
Makefile add blowfish algo with tests 2013-10-07 21:48:32 +02:00
rand.c use /dev/urandom in example 2013-08-21 20:26:00 +02:00
rand.h use /dev/urandom in example 2013-08-21 20:26:00 +02:00
README renamed to trezor-crypto, modified readme 2013-10-08 14:18:35 +02:00
ripemd160.c use #if instead of #ifdef for conditional macros 2013-10-03 17:32:27 +02:00
ripemd160.h add ripemd160 2013-09-16 01:32:56 +02:00
secp256k1.c use canonical signatures (if S > Order/2: S = Order - S) 2013-10-08 14:06:48 +02:00
secp256k1.h use canonical signatures (if S > Order/2: S = Order - S) 2013-10-08 14:06:48 +02:00
sha2.c refactor code -> bignum.c/h 2013-09-12 03:18:35 +02:00
sha2.h use sha2 implementation by Aaron D. Gifford 2013-09-10 21:10:07 +02:00
test-openssl.c renamed to trezor-crypto, modified readme 2013-10-08 14:18:35 +02:00
tests.c fix blowfish. add unit tests for blowfish 2013-10-08 16:59:14 +02:00

trezor-crypto
=============

Heavily optimized cryptography algorithms for embedded devices.

These include:
- Big Number (256 bit) Arithmetics
- BIP32 Hierarchical Deterministic Wallets
- Blowfish encrypt/decrypt
- ECDSA signer/verifier (only secp256k1 curve)
- ECDSA public key derivation and Base58 address representation
- HMAC-SHA256 and HMAC-SHA512
- RIPEMD-160
- SHA256/SHA512
- unit tests (using Check - check.sf.net; in tests.c)
- tests against OpenSSL (in test-openssl.c)

Distibuted under MIT License.