Pol Henarejos
001d076fdf
Better check for XKEK content.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2024-04-17 19:42:23 +02:00
Pol Henarejos
35d5d5e94e
Use search_file() method.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2024-04-17 19:19:45 +02:00
Pol Henarejos
b034303193
Use new methods search_file() and file_put_data().
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2024-04-17 16:36:34 +02:00
Pol Henarejos
fdc41e5856
Add support for PHY command to store and change VIDPID and LED no. dynamically on reboot.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2024-04-17 11:50:44 +02:00
Pol Henarejos
5d0dc210da
Use external unique ID.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2024-04-17 11:48:23 +02:00
Pol Henarejos
a674410826
Remove carriage return \r for better debug.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2024-04-17 11:46:34 +02:00
Pol Henarejos
c3b66773e8
Use new asn1 structs.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2024-03-13 18:11:28 +01:00
Pol Henarejos
9fad920c3b
Fix Windows emulation build.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2024-01-09 11:43:46 +01:00
Pol Henarejos
2034e436d1
Fix CVC outer signature length.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2024-01-08 10:59:34 +01:00
Pol Henarejos
2b92d89ab7
Fix size_t casting.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2024-01-02 19:56:38 +01:00
Pol Henarejos
a1d7733b95
Fix key exchange.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2024-01-02 02:44:59 +01:00
Pol Henarejos
4f4e6e09a2
Fix size var load.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2024-01-02 02:31:38 +01:00
Pol Henarejos
481cd5fd69
Some fixes for emulation.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2024-01-01 20:58:40 +01:00
Pol Henarejos
d9a8826a32
Stupid bug integer overflow.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2024-01-01 02:01:22 +01:00
Pol Henarejos
d82affa880
Added support for building emulation in Windows.
...
It has not been tested but it should not break any linux build.
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2024-01-01 01:55:49 +01:00
Pol Henarejos
74afa07512
Do not make a PRKD on key unwrap since it is already done when storing.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-11-13 15:33:52 +01:00
Pol Henarejos
e96e1d0097
When a key is generated and stored, it creates its PRKD.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-11-13 15:33:27 +01:00
Pol Henarejos
58692b2711
Fix PRKD cert on key unwrap.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-11-13 14:14:10 +01:00
Pol Henarejos
98e9b72b42
Upgrade version to 3.6.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-11-06 17:26:43 +01:00
Pol Henarejos
88ff27f354
Fix mbedTLS 3.5 build.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-11-06 17:01:27 +01:00
Pol Henarejos
ed2925cfb6
Use new Pico Keys SDK.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-11-06 14:25:42 +01:00
Pol Henarejos
6b1eeb4004
Fix DKEK import when no logged.
...
DKEK shall accept import even if it is not logged in. However, to store the DKEK, the PIN is used for MKEK, which is not available if it is nog logged in. I added a queueing system to store a pending DKEK after login.
Therefore, to import a DKEK, the user must import it AND call VERIFY command if it is not already logged in.
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-10-12 17:42:31 +02:00
Pol Henarejos
5d21e39aa6
Fix deleting key domain.
...
It only checks if contains keys and no other files.
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-10-12 17:40:20 +02:00
Pol Henarejos
eddb1baf7b
Use new applet selection format.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-10-11 21:03:17 +02:00
Pol Henarejos
11bb00e186
Default key domain is 0.
...
It allows to wrap keys not associated to any key domain.
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-10-11 21:03:09 +02:00
Pol Henarejos
e27c8d4ff6
Added flag for compile for CI or production.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-10-09 21:55:31 +02:00
Pol Henarejos
08e7d74a81
Fix sending binary when ne=0
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-09-24 10:30:09 +02:00
Pol Henarejos
173ca7678d
Accept arbitrary SO-PIN length on reset retry.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-09-05 19:56:11 +02:00
Pol Henarejos
1d3232df36
Fix loading and saving Montgomery keys.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-08-24 16:01:39 +02:00
Pol Henarejos
7376817724
Fix G export.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-08-24 16:00:59 +02:00
Pol Henarejos
a6072b4ce8
Curve25519 and Curve448 are encoded using ECDH template.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-08-23 16:38:51 +02:00
Pol Henarejos
f631e4a5f3
Code style.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-07-17 12:56:16 +02:00
Pol Henarejos
f880ee6c93
Added support for HD symmetric ciphering.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-07-17 12:55:14 +02:00
Pol Henarejos
fe315e7326
Fix AES derivation (HKDF).
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-05-27 19:00:04 +02:00
Pol Henarejos
ee3ee21e40
Added support for signatures based on HD BIP/SLIP.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-05-26 18:07:06 +02:00
Pol Henarejos
29544a3f17
Added support for SLIP-0021 node derivation.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-05-26 17:15:14 +02:00
Pol Henarejos
5135404083
Fix node derivation.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-05-25 15:17:39 +02:00
Pol Henarejos
55520ce184
Added support for master key generation for symmetric derivation.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-05-25 14:07:48 +02:00
Pol Henarejos
525b05b7ef
Small refactoring to avoid unnecessary casts from uint32 to byte strings.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-05-25 12:18:28 +02:00
Pol Henarejos
0eea0fb096
Fix deriving nodes with retries (invalid first key).
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-05-24 12:47:27 +02:00
Pol Henarejos
82c03ee6c4
Fix memory free on error.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-05-24 12:40:51 +02:00
Pol Henarejos
20dfbcaaed
Fix xpub for masters.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-05-24 11:25:36 +02:00
Pol Henarejos
46d85c029e
Added first commit with BIP and SLIP support for cryptowallets.
...
Needs more work.
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-05-23 20:40:16 +02:00
Pol Henarejos
6d3809a792
Allow signatures with device key.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-04-06 14:09:18 +02:00
Pol Henarejos
f22f58f983
Fix returning EOF when reading an element outside the size.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-04-06 14:08:43 +02:00
Pol Henarejos
405bf92e18
Added support for TokenInfo and StaticTokenInfo files.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-04-04 09:53:26 +02:00
Pol Henarejos
371ae93fcd
Added support for AES CCM.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-03-23 19:20:33 +01:00
Pol Henarejos
f5e875a6b7
Added support for AES CTR.
...
Note: the OID used by CTR does not exist.
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-03-23 18:47:32 +01:00
Pol Henarejos
4d647ba3c8
Add sanity check if wrong oid is provided.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-03-22 23:28:55 +01:00
Pol Henarejos
008db87fa7
Fix AES XTS call.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2023-03-22 23:28:22 +01:00