parent
184529bbfc
commit
37e55bf5a6
@ -1,23 +0,0 @@
|
||||
#!/bin/bash
|
||||
set -e
|
||||
|
||||
IMAGETAG=trezor-mcu-build
|
||||
FIRMWARETAG=${1:-master}
|
||||
|
||||
docker build -t $IMAGETAG .
|
||||
docker run -t -v $(pwd)/output:/output $IMAGETAG /bin/sh -c "\
|
||||
git clone https://github.com/trezor/trezor-mcu && \
|
||||
cd trezor-mcu && \
|
||||
git checkout $FIRMWARETAG && \
|
||||
git submodule update --init && \
|
||||
CFLAGS='-std=c99' make -C vendor/libopencm3 && \
|
||||
make && \
|
||||
make -C bootloader align && \
|
||||
cp bootloader/bootloader.bin /output/bootloader-$FIRMWARETAG.bin"
|
||||
|
||||
echo "---------------------"
|
||||
echo "Bootloader fingerprint:"
|
||||
FILENAME=output/bootloader-$FIRMWARETAG.bin
|
||||
/usr/bin/env python -c "import hashlib ; print(hashlib.sha256(hashlib.sha256(open('$FILENAME', 'rb').read()).digest()).hexdigest())"
|
||||
FILESIZE=$(stat -c%s "$FILENAME")
|
||||
echo "Bootloader size: $FILESIZE bytes (out of 32768 maximum)"
|
@ -0,0 +1,30 @@
|
||||
#!/bin/bash
|
||||
set -e
|
||||
|
||||
IMAGE=trezor-mcu-build
|
||||
TAG=${1:-master}
|
||||
BINFILE=build/bootloader-$TAG.bin
|
||||
|
||||
docker build -t $IMAGE .
|
||||
docker run -t -v $(pwd)/build:/build $IMAGE /bin/sh -c "\
|
||||
git clone https://github.com/trezor/trezor-mcu && \
|
||||
cd trezor-mcu && \
|
||||
git checkout $TAG && \
|
||||
git submodule update --init && \
|
||||
CFLAGS='-std=c99' make -C vendor/libopencm3 && \
|
||||
make && \
|
||||
make -C bootloader && \
|
||||
make -C bootloader align && \
|
||||
cp bootloader/bootloader.bin /$BINFILE"
|
||||
|
||||
/usr/bin/env python -c "
|
||||
from __future__ import print_function
|
||||
import hashlib
|
||||
import sys
|
||||
fn = sys.argv[1]
|
||||
data = open(fn, 'rb').read()
|
||||
print('\n\n')
|
||||
print('Filename :', fn)
|
||||
print('Fingerprint :', hashlib.sha256(hashlib.sha256(data).digest()).hexdigest())
|
||||
print('Size : %d bytes (out of %d maximum)' % (len(data), 32768))
|
||||
" $BINFILE
|
@ -0,0 +1,30 @@
|
||||
#!/bin/bash
|
||||
set -e
|
||||
|
||||
IMAGE=trezor-mcu-build
|
||||
TAG=${1:-master}
|
||||
BINFILE=build/trezor-$TAG.bin
|
||||
|
||||
docker build -t $IMAGE .
|
||||
docker run -t -v $(pwd)/build:/build $IMAGE /bin/sh -c "\
|
||||
git clone https://github.com/trezor/trezor-mcu && \
|
||||
cd trezor-mcu && \
|
||||
git checkout $TAG && \
|
||||
git submodule update --init && \
|
||||
CFLAGS='-std=c99' make -C vendor/libopencm3 && \
|
||||
make && \
|
||||
make -C firmware && \
|
||||
make -C firmware sign && \
|
||||
cp firmware/trezor.bin /$BINFILE"
|
||||
|
||||
/usr/bin/env python -c "
|
||||
from __future__ import print_function
|
||||
import hashlib
|
||||
import sys
|
||||
fn = sys.argv[1]
|
||||
data = open(fn, 'rb').read()
|
||||
print('\n\n')
|
||||
print('Filename :', fn)
|
||||
print('Fingerprint :', hashlib.sha256(data[256:]).hexdigest())
|
||||
print('Size : %d bytes (out of %d maximum)' % (len(data), 491520))
|
||||
" $BINFILE
|
@ -1,24 +0,0 @@
|
||||
#!/bin/bash
|
||||
set -e
|
||||
|
||||
IMAGETAG=trezor-mcu-build
|
||||
FIRMWARETAG=${1:-master}
|
||||
|
||||
docker build -t $IMAGETAG .
|
||||
docker run -t -v $(pwd)/output:/output $IMAGETAG /bin/sh -c "\
|
||||
git clone https://github.com/trezor/trezor-mcu && \
|
||||
cd trezor-mcu && \
|
||||
git checkout $FIRMWARETAG && \
|
||||
git submodule update --init && \
|
||||
CFLAGS='-std=c99' make -C vendor/libopencm3 && \
|
||||
make && \
|
||||
make -C firmware && \
|
||||
make -C firmware sign && \
|
||||
cp firmware/trezor.bin /output/trezor-$FIRMWARETAG.bin"
|
||||
|
||||
echo "---------------------"
|
||||
echo "Firmware fingerprint:"
|
||||
FILENAME=output/trezor-$FIRMWARETAG.bin
|
||||
tail -c +257 "$FILENAME" | sha256sum
|
||||
FILESIZE=$(stat -c%s "$FILENAME")
|
||||
echo "Firmware size: $FILESIZE bytes (out of 491520 maximum)"
|
@ -1,18 +0,0 @@
|
||||
#!/bin/bash
|
||||
set -e
|
||||
|
||||
if [ -z "$1" ]; then
|
||||
echo "Please provide filename as argument"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
MAGIC=`head -c +4 $1`
|
||||
|
||||
if [ "x$MAGIC" != "xTRZR" ]; then
|
||||
echo "Missing magic characters 'TRZR', invalid firmware"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
echo "---------------------"
|
||||
echo "Firmware fingerprint:"
|
||||
tail -c +257 $1 | sha256sum
|
Loading…
Reference in new issue