You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
trezor-firmware/core/embed/bootloader_ci
tychovrahe ebbd7f9d35
refactor(core): restructure trezorhal, prepare to support more platforms
1 year ago
..
.changelog.d feat(core/rust): bootloader implementation in rust 1 year ago
.towncrier.template.md
CHANGELOG.md
CHANGELOG.unreleased
README.md
bootloader_flash.jlink
bootui.c refactor(core): remove unused C display_icon and display_loader functions 1 year ago
bootui.h
header.S feat(core): prevent installing and running of incompatible firmware, prevent bootloader downgrade 2 years ago
icon_done.h
icon_fail.h
icon_install.h
icon_welcome.h feat(core): icon and images using new format 2 years ago
icon_wipe.h
main.c refactor(core): restructure trezorhal, prepare to support more platforms 1 year ago
memory.ld
messages.c chore: make fields on FirmwareRequest required (fixes #1941) 1 year ago
messages.h feat(core): prevent installing and running of incompatible firmware, prevent bootloader downgrade 2 years ago
protob
startup.s
towncrier.toml
version.h

README.md

Bootloader for CI device tests

This bootloader always runs into bootloader mode, waits for firmware to be uploaded, then runs the firmware.

Storage is not erased. If you wish to erase storage you can send WipeDevice message to the bootloader.

All user interaction is removed (no clicking or confirmations required) so that it can be used in an automated way for tests.

The bootloader will run any firmware that looks "sane" (good header, hashes), but does not check any trust flags.

Firmware must be compiled with PRODUCTION=0 because otherwise it would replace the bootloader and lock device.