Pol Henarejos
842919a26b
Use external unique ID.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-04-15 23:45:30 +02:00
Pol Henarejos
d8c7fb0856
Remove carriage return \r for better debug.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-04-10 18:16:38 +02:00
Pol Henarejos
d6456b4dde
First attempt to add support to ESP32.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-04-08 19:41:39 +02:00
Pol Henarejos
c3b66773e8
Use new asn1 structs.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-03-13 18:11:28 +01:00
Pol Henarejos
9fad920c3b
Fix Windows emulation build.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-01-09 11:43:46 +01:00
Pol Henarejos
2034e436d1
Fix CVC outer signature length.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-01-08 10:59:34 +01:00
Pol Henarejos
2b92d89ab7
Fix size_t casting.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-01-02 19:56:38 +01:00
Pol Henarejos
a1d7733b95
Fix key exchange.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-01-02 02:44:59 +01:00
Pol Henarejos
4f4e6e09a2
Fix size var load.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-01-02 02:31:38 +01:00
Pol Henarejos
481cd5fd69
Some fixes for emulation.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-01-01 20:58:40 +01:00
Pol Henarejos
d9a8826a32
Stupid bug integer overflow.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-01-01 02:01:22 +01:00
Pol Henarejos
d82affa880
Added support for building emulation in Windows.
...
It has not been tested but it should not break any linux build.
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-01-01 01:55:49 +01:00
Pol Henarejos
74afa07512
Do not make a PRKD on key unwrap since it is already done when storing.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-11-13 15:33:52 +01:00
Pol Henarejos
e96e1d0097
When a key is generated and stored, it creates its PRKD.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-11-13 15:33:27 +01:00
Pol Henarejos
58692b2711
Fix PRKD cert on key unwrap.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-11-13 14:14:10 +01:00
Pol Henarejos
fb5be153ed
Fix merge.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-11-06 23:51:15 +01:00
Pol Henarejos
ba562da00e
Merge branch 'development' into development-eddsa
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-11-06 23:11:08 +01:00
Pol Henarejos
98e9b72b42
Upgrade version to 3.6.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-11-06 17:26:43 +01:00
Pol Henarejos
88ff27f354
Fix mbedTLS 3.5 build.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-11-06 17:01:27 +01:00
Pol Henarejos
ed2925cfb6
Use new Pico Keys SDK.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-11-06 14:25:42 +01:00
Pol Henarejos
6b1eeb4004
Fix DKEK import when no logged.
...
DKEK shall accept import even if it is not logged in. However, to store the DKEK, the PIN is used for MKEK, which is not available if it is nog logged in. I added a queueing system to store a pending DKEK after login.
Therefore, to import a DKEK, the user must import it AND call VERIFY command if it is not already logged in.
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-10-12 17:42:31 +02:00
Pol Henarejos
5d21e39aa6
Fix deleting key domain.
...
It only checks if contains keys and no other files.
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-10-12 17:40:20 +02:00
Pol Henarejos
eddb1baf7b
Use new applet selection format.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-10-11 21:03:17 +02:00
Pol Henarejos
11bb00e186
Default key domain is 0.
...
It allows to wrap keys not associated to any key domain.
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-10-11 21:03:09 +02:00
Pol Henarejos
e27c8d4ff6
Added flag for compile for CI or production.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-10-09 21:55:31 +02:00
Pol Henarejos
08e7d74a81
Fix sending binary when ne=0
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-09-24 10:30:09 +02:00
Pol Henarejos
173ca7678d
Accept arbitrary SO-PIN length on reset retry.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-09-05 19:56:11 +02:00
Pol Henarejos
4f9f7f14fe
Add support for Edwards cvc.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-08-24 16:08:39 +02:00
Pol Henarejos
10a47f9177
Uniform ec key loading.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-08-24 16:05:34 +02:00
Pol Henarejos
9f49a144ac
Add support for Edwards key import.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-08-24 16:05:11 +02:00
Pol Henarejos
e67a7091ff
Add support for Edwards key generation.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-08-24 16:04:45 +02:00
Pol Henarejos
1d3232df36
Fix loading and saving Montgomery keys.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-08-24 16:01:39 +02:00
Pol Henarejos
7376817724
Fix G export.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-08-24 16:00:59 +02:00
Pol Henarejos
5e801fbae7
Merge branch 'development' into development-eddsa
2023-08-24 10:35:51 +02:00
Pol Henarejos
a6072b4ce8
Curve25519 and Curve448 are encoded using ECDH template.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-08-23 16:38:51 +02:00
Pol Henarejos
5bdba8e1e8
Move to ecp_keypair instead of ecdsa.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-08-22 17:20:56 +02:00
Pol Henarejos
faef2dc278
Added support for EdDSA signature.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-08-22 17:10:03 +02:00
Pol Henarejos
f631e4a5f3
Code style.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-07-17 12:56:16 +02:00
Pol Henarejos
f880ee6c93
Added support for HD symmetric ciphering.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-07-17 12:55:14 +02:00
Pol Henarejos
fe315e7326
Fix AES derivation (HKDF).
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-05-27 19:00:04 +02:00
Pol Henarejos
ee3ee21e40
Added support for signatures based on HD BIP/SLIP.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-05-26 18:07:06 +02:00
Pol Henarejos
29544a3f17
Added support for SLIP-0021 node derivation.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-05-26 17:15:14 +02:00
Pol Henarejos
5135404083
Fix node derivation.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-05-25 15:17:39 +02:00
Pol Henarejos
55520ce184
Added support for master key generation for symmetric derivation.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-05-25 14:07:48 +02:00
Pol Henarejos
525b05b7ef
Small refactoring to avoid unnecessary casts from uint32 to byte strings.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-05-25 12:18:28 +02:00
Pol Henarejos
0eea0fb096
Fix deriving nodes with retries (invalid first key).
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-05-24 12:47:27 +02:00
Pol Henarejos
82c03ee6c4
Fix memory free on error.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-05-24 12:40:51 +02:00
Pol Henarejos
20dfbcaaed
Fix xpub for masters.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-05-24 11:25:36 +02:00
Pol Henarejos
46d85c029e
Added first commit with BIP and SLIP support for cryptowallets.
...
Needs more work.
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-05-23 20:40:16 +02:00
Pol Henarejos
6d3809a792
Allow signatures with device key.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-04-06 14:09:18 +02:00