1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-22 15:38:11 +00:00
Go to file
Jochen Hoenicke 98e617d874
startup: use custom reset_handler
+ group confidential data in one place
+ zero all SRAM where needed
2017-08-16 13:52:01 +02:00
bootloader startup: use custom reset_handler 2017-08-16 13:52:01 +02:00
demo setup: move stack protector variable to setup.h 2017-07-30 21:56:30 +02:00
fastflash move -Os flag to Makefiles of bootloader and fastflash 2017-07-04 20:21:10 +02:00
firmware startup: use custom reset_handler 2017-08-16 13:52:01 +02:00
gen gen: add Makefile for strwidth 2017-07-17 12:25:07 +02:00
gitian add gitian build (work in progress) 2016-01-19 21:15:39 +01:00
vendor vendor: Update trezor-crypto 2017-08-14 16:45:11 +02:00
.gitignore build: rework docker build scripts, update readme 2017-07-24 21:45:01 +02:00
.gitmodules move submodules to vendor subdirectory 2015-12-15 23:01:54 +01:00
.travis.yml Travis CI: Test matrix of DEBUG_LINK and FASTFLASH 2017-08-14 16:44:44 +02:00
build-bootloader.sh docker: support build on SELinux enabled distros 2017-08-10 16:58:52 +02:00
build-firmware.sh docker: support build on SELinux enabled distros 2017-08-10 16:58:52 +02:00
buttons.c import v1.0.0 2014-04-29 14:38:32 +02:00
buttons.h cleanup oledDrawChar code 2015-11-18 23:35:28 +01:00
COPYING import v1.0.0 2014-04-29 14:38:32 +02:00
Dockerfile build: switch from ubuntu to debian in docker build 2017-07-31 10:06:42 +02:00
layout.c remove DialogIcon enum, use bitmap structure directly 2016-06-08 19:20:07 +02:00
layout.h remove DialogIcon enum, use bitmap structure directly 2016-06-08 19:20:07 +02:00
Makefile startup: use custom reset_handler 2017-08-16 13:52:01 +02:00
Makefile.include startup: use custom reset_handler 2017-08-16 13:52:01 +02:00
memory_app_0.0.0.ld import v1.0.0 2014-04-29 14:38:32 +02:00
memory_app_1.0.0.ld startup: use custom reset_handler 2017-08-16 13:52:01 +02:00
memory_app_fastflash.ld startup: use custom reset_handler 2017-08-16 13:52:01 +02:00
memory.c add ability for developers to easily avoid locking their flash memory sectors 2017-06-30 15:47:16 +02:00
memory.h import v1.0.0 2014-04-29 14:38:32 +02:00
memory.ld startup: use custom reset_handler 2017-08-16 13:52:01 +02:00
oled.c Clean-up of oled code. (#197) 2017-07-25 14:24:45 +02:00
oled.h Clean-up of oled code. (#197) 2017-07-25 14:24:45 +02:00
README.md build: rework docker build scripts, update readme 2017-07-24 21:45:01 +02:00
rng.c use C99 for loop where possible 2017-07-23 22:20:51 +02:00
rng.h use Knuth shuffles 2015-02-13 20:51:02 +01:00
serialno.c fix unaligned access in serialno; update trezor-crypto 2016-08-29 22:37:27 +02:00
serialno.h import v1.0.0 2014-04-29 14:38:32 +02:00
setup.c startup: use custom reset_handler 2017-08-16 13:52:01 +02:00
setup.h setup: move stack protector variable to setup.h 2017-07-30 21:56:30 +02:00
startup.s startup: use custom reset_handler 2017-08-16 13:52:01 +02:00
timer.c util: Add load_vector_table 2017-07-03 18:35:42 +02:00
timer.h util: Add load_vector_table 2017-07-03 18:35:42 +02:00
util.c use C99 for loop where possible 2017-07-23 22:20:51 +02:00
util.h startup: use custom reset_handler 2017-08-16 13:52:01 +02:00

TREZOR Firmware

Build Status gitter

https://trezor.io/

How to build TREZOR firmware?

  1. Install Docker
  2. git clone https://github.com/trezor/trezor-mcu.git
  3. cd trezor-mcu
  4. ./build-firmware.sh TAG (where TAG is v1.5.0 for example, if left blank the script builds latest commit in master branch)

This creates file build/trezor-TAG.bin and prints its fingerprint and size at the end of the build log.

How to build TREZOR bootloader?

  1. Install Docker
  2. git clone https://github.com/trezor/trezor-mcu.git
  3. cd trezor-mcu
  4. ./build-bootloader.sh TAG (where TAG is bl1.3.2 for example, if left blank the script builds latest commit in master branch)

This creates file build/bootloader-TAG.bin and prints its fingerprint and size at the end of the build log.

How to get fingerprint of firmware signed and distributed by SatoshiLabs?

  1. Pick version of firmware binary listed on https://wallet.trezor.io/data/firmware/releases.json
  2. Download it: wget -O trezor.signed.bin https://wallet.trezor.io/data/firmware/trezor-1.3.6.bin
  3. Compute fingerprint: tail -c +257 trezor.signed.bin | sha256sum

Step 3 should produce the same sha256 fingerprint like your local build (for the same version tag). Firmware has a special header (of length 256 bytes) holding signatures themselves, which must be avoided while calculating the fingerprint, that's why tail command has to be used.