1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-17 21:22:10 +00:00
Go to file
2017-06-29 14:14:20 +02:00
bootloader bootloader: Allow building as an app 2017-06-25 18:19:07 +02:00
demo fix usage of RNG before setup (#150/#151) 2017-02-17 13:19:05 +01:00
fastflash fastflash: Link bootloader that runs from RAM 2017-06-25 18:19:07 +02:00
firmware reset: add Features.needs_backup 2017-06-29 14:14:20 +02:00
gen adapt python scripts to Python3 2017-02-01 18:07:47 +01:00
gitian add gitian build (work in progress) 2016-01-19 21:15:39 +01:00
vendor drop EstimateTxSize (and TxSize) 2017-06-28 18:49:44 +02:00
.gitignore add _attic to gitignore 2017-01-24 15:19:15 +01:00
.gitmodules move submodules to vendor subdirectory 2015-12-15 23:01:54 +01:00
.travis.yml Travis CI: Build FASTFLASH=1 2017-06-25 18:19:07 +02:00
bootloader-docker-build.sh fix Docker build of libopencm3 2017-05-09 01:42:23 +02:00
buttons.c import v1.0.0 2014-04-29 14:38:32 +02:00
buttons.h cleanup oledDrawChar code 2015-11-18 23:35:28 +01:00
COPYING import v1.0.0 2014-04-29 14:38:32 +02:00
Dockerfile add python-ecdsa dependency 2016-07-23 10:06:19 +02:00
firmware-docker-build.sh fix Docker build of libopencm3 2017-05-09 01:42:23 +02:00
firmware-fingerprint.sh add set -e to shell scripts 2016-07-03 13:54:32 +02:00
layout.c remove DialogIcon enum, use bitmap structure directly 2016-06-08 19:20:07 +02:00
layout.h remove DialogIcon enum, use bitmap structure directly 2016-06-08 19:20:07 +02:00
Makefile timer: Use Cortex-M3 SysTick timers 2016-11-17 02:07:46 +01:00
Makefile.include Set -mcpu=cortex-m3 linker flag. 2017-06-23 00:11:20 +02:00
memory_app_0.0.0.ld import v1.0.0 2014-04-29 14:38:32 +02:00
memory_app_1.0.0.ld import v1.0.0 2014-04-29 14:38:32 +02:00
memory_app_2.0.0.ld fastflash: Compatible with GCC 4.9.3 2017-06-25 18:19:07 +02:00
memory_app_fastflash.ld fastflash: Compatible with GCC 4.9.3 2017-06-25 18:19:07 +02:00
memory.c memory protection: do not write reserved bits (#138) 2017-01-26 16:07:45 +01:00
memory.h import v1.0.0 2014-04-29 14:38:32 +02:00
memory.ld import v1.0.0 2014-04-29 14:38:32 +02:00
oled.c fix when oled triangle is shown 2017-01-19 16:16:57 +01:00
oled.h fix when oled triangle is shown 2017-01-19 16:16:57 +01:00
README.md update readme 2017-01-10 15:14:29 +01:00
rng.c use Knuth shuffles 2015-02-13 20:51:02 +01:00
rng.h use Knuth shuffles 2015-02-13 20:51:02 +01:00
serialno.c fix unaligned access in serialno; update trezor-crypto 2016-08-29 22:37:27 +02:00
serialno.h import v1.0.0 2014-04-29 14:38:32 +02:00
setup.c fix usage of RNG before setup (#150/#151) 2017-02-17 13:19:05 +01:00
setup.h move APPVER guards from includes to app code 2014-07-07 15:03:34 +02:00
timer.c timer: Fix non-critical integer overflow (#129) 2016-11-23 20:22:28 +01:00
timer.h timer: Fix non-critical integer overflow (#129) 2016-11-23 20:22:28 +01:00
util.c import v1.0.0 2014-04-29 14:38:32 +02:00
util.h fix usage of inline/static 2016-02-15 15:29:19 +01:00

TREZOR Firmware

Build Status gitter

https://trezor.io/

How to build TREZOR firmware?

  1. Install Docker
  2. git clone https://github.com/trezor/trezor-mcu.git
  3. cd trezor-mcu
  4. ./firmware-docker-build.sh TAG (where TAG is v1.3.2 for example, if left blank the script builds latest commit)

This creates file output/trezor-TAG.bin and prints its fingerprint at the last line of the build log.

How to build TREZOR bootloader?

  1. Install Docker
  2. git clone https://github.com/trezor/trezor-mcu.git
  3. cd trezor-mcu
  4. ./bootloader-docker-build.sh

This creates file output/bootloader.bin and prints its fingerprint and size at the last line of the build log.

How to get fingerprint of firmware signed and distributed by SatoshiLabs?

  1. Pick version of firmware binary listed on https://wallet.trezor.io/data/firmware/releases.json
  2. Download it: wget -O trezor.signed.bin https://wallet.trezor.io/data/firmware/trezor-1.3.6.bin
  3. ./firmware-fingerprint.sh trezor.signed.bin

Step 3 should produce the same sha256 fingerprint like your local build (for the same version tag).

The reasoning for firmware-fingerprint.sh script is that signed firmware has special header holding signatures themselves, which must be avoided while calculating the fingerprint.