Files
trezor-firmware/crypto
Martin Milata 56491a0530 test(crypto): use newer OpenSSL API
[no changelog]
2023-04-19 13:05:03 +02:00
..
2020-12-17 00:09:47 +01:00
2023-04-19 13:05:03 +02:00
2019-04-15 19:14:52 +02:00
2019-09-12 11:52:12 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-05-26 22:20:14 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-06-11 11:41:40 +02:00
2019-10-09 17:05:33 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-04-15 19:14:52 +02:00
2019-04-18 15:11:54 +02:00

trezor-crypto

Build Status gitter

Heavily optimized cryptography algorithms for embedded devices.

These include:

  • AES/Rijndael encryption/decryption
  • Big Number (256 bit) Arithmetics
  • BIP32 Hierarchical Deterministic Wallets
  • BIP39 Mnemonic code
  • ECDSA signing/verifying (supports secp256k1 and nist256p1 curves, uses RFC6979 for deterministic signatures)
  • ECDSA public key derivation
  • BIP340 Schnorr signature signing/verifying
  • Base32 (RFC4648 and custom alphabets)
  • Base58 address representation
  • Ed25519 signing/verifying (also SHA3 and Keccak variants)
  • ECDH using secp256k1, nist256p1 and Curve25519
  • HMAC-SHA256 and HMAC-SHA512
  • PBKDF2
  • RIPEMD-160
  • SHA1
  • SHA2-256/SHA2-512
  • SHA3/Keccak
  • BLAKE2s/BLAKE2b
  • Chacha20-Poly1305
  • unit tests (using Check - check.sf.net; in test_check.c)
  • tests against OpenSSL (in test_openssl.c)
  • integrated Wycheproof tests

Distibuted under MIT License.

Some parts of the library come from external sources: