1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-15 10:58:09 +00:00
trezor-firmware/core/embed/projects/bootloader_ci
2024-12-11 14:45:16 +01:00
..
.changelog.d refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
.towncrier.template.md refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
bootloader_flash.jlink refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
bootui.c refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
bootui.h refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
CHANGELOG.md refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
CHANGELOG.unreleased refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
header.S refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
icon_done.h refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
icon_fail.h refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
icon_install.h refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
icon_welcome.h refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
icon_wipe.h refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
main.c refactor(core): introduce drivers init/deinit in boot/boardloader 2024-12-11 14:45:16 +01:00
messages.c refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
messages.h refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
protob refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
README.md refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
towncrier.toml refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
version_check.c refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
version_check.h refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00
version.h refactor(core): restructure embed folder 2024-11-18 09:41:02 +01:00

Bootloader for CI device tests

This bootloader always runs into bootloader mode, waits for firmware to be uploaded, then runs the firmware.

Storage is not erased. If you wish to erase storage you can send WipeDevice message to the bootloader.

All user interaction is removed (no clicking or confirmations required) so that it can be used in an automated way for tests.

The bootloader will run any firmware that looks "sane" (good header, hashes), but does not check any trust flags.

Firmware must be compiled with PRODUCTION=0 because otherwise it would replace the bootloader and lock device.