1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-23 14:58:09 +00:00
Go to file
Jochen Hoenicke 32fb7e96cc Ethereum EIP-155 replay protection
Added chain_id field in sign transaction.
If chain_id is set use hashing as specified in EIP-155.
2017-01-22 19:09:07 +01:00
bootloader mytrezor.com -> trezor.io/start 2017-01-10 15:08:08 +01:00
demo remove DialogIcon enum, use bitmap structure directly 2016-06-08 19:20:07 +02:00
firmware Ethereum EIP-155 replay protection 2017-01-22 19:09:07 +01:00
gen New Matrix-based recovery 2016-11-23 13:21:18 +01:00
gitian add gitian build (work in progress) 2016-01-19 21:15:39 +01:00
vendor Updated trezor-common 2017-01-22 19:09:07 +01:00
.gitignore bootloader source code 2014-10-23 18:09:41 +02:00
.gitmodules move submodules to vendor subdirectory 2015-12-15 23:01:54 +01:00
.travis.yml add webhooks to travis 2016-11-23 11:50:14 +01:00
bootloader-docker-build.sh add set -e to shell scripts 2016-07-03 13:54:32 +02:00
buttons.c import v1.0.0 2014-04-29 14:38:32 +02:00
buttons.h cleanup oledDrawChar code 2015-11-18 23:35:28 +01:00
ChangeLog Correcting 1.3.3 changelog 2017-01-17 16:22:11 +01:00
COPYING import v1.0.0 2014-04-29 14:38:32 +02:00
Dockerfile add python-ecdsa dependency 2016-07-23 10:06:19 +02:00
firmware-docker-build.sh sign firmware inside docker container 2016-08-29 19:20:50 +02:00
firmware-fingerprint.sh add set -e to shell scripts 2016-07-03 13:54:32 +02:00
layout.c remove DialogIcon enum, use bitmap structure directly 2016-06-08 19:20:07 +02:00
layout.h remove DialogIcon enum, use bitmap structure directly 2016-06-08 19:20:07 +02:00
Makefile timer: Use Cortex-M3 SysTick timers 2016-11-17 02:07:46 +01:00
Makefile.include Makefile: Generate dependency files (#141) 2017-01-15 14:49:36 +01:00
memory_app_0.0.0.ld import v1.0.0 2014-04-29 14:38:32 +02:00
memory_app_1.0.0.ld import v1.0.0 2014-04-29 14:38:32 +02:00
memory.c use hdnode_private_ckd_cached where appropriate 2015-01-26 20:24:07 +01:00
memory.h import v1.0.0 2014-04-29 14:38:32 +02:00
memory.ld import v1.0.0 2014-04-29 14:38:32 +02:00
oled.c fix when oled triangle is shown 2017-01-19 16:16:57 +01:00
oled.h fix when oled triangle is shown 2017-01-19 16:16:57 +01:00
README.md update readme 2017-01-10 15:14:29 +01:00
rng.c use Knuth shuffles 2015-02-13 20:51:02 +01:00
rng.h use Knuth shuffles 2015-02-13 20:51:02 +01:00
serialno.c fix unaligned access in serialno; update trezor-crypto 2016-08-29 22:37:27 +02:00
serialno.h import v1.0.0 2014-04-29 14:38:32 +02:00
setup.c Faster SPI communication 2016-08-26 18:43:16 +02:00
setup.h move APPVER guards from includes to app code 2014-07-07 15:03:34 +02:00
timer.c timer: Fix non-critical integer overflow (#129) 2016-11-23 20:22:28 +01:00
timer.h timer: Fix non-critical integer overflow (#129) 2016-11-23 20:22:28 +01:00
util.c import v1.0.0 2014-04-29 14:38:32 +02:00
util.h fix usage of inline/static 2016-02-15 15:29:19 +01:00

TREZOR Firmware

Build Status gitter

https://trezor.io/

How to build TREZOR firmware?

  1. Install Docker
  2. git clone https://github.com/trezor/trezor-mcu.git
  3. cd trezor-mcu
  4. ./firmware-docker-build.sh TAG (where TAG is v1.3.2 for example, if left blank the script builds latest commit)

This creates file output/trezor-TAG.bin and prints its fingerprint at the last line of the build log.

How to build TREZOR bootloader?

  1. Install Docker
  2. git clone https://github.com/trezor/trezor-mcu.git
  3. cd trezor-mcu
  4. ./bootloader-docker-build.sh

This creates file output/bootloader.bin and prints its fingerprint and size at the last line of the build log.

How to get fingerprint of firmware signed and distributed by SatoshiLabs?

  1. Pick version of firmware binary listed on https://wallet.trezor.io/data/firmware/releases.json
  2. Download it: wget -O trezor.signed.bin https://wallet.trezor.io/data/firmware/trezor-1.3.6.bin
  3. ./firmware-fingerprint.sh trezor.signed.bin

Step 3 should produce the same sha256 fingerprint like your local build (for the same version tag).

The reasoning for firmware-fingerprint.sh script is that signed firmware has special header holding signatures themselves, which must be avoided while calculating the fingerprint.