1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-16 03:18:09 +00:00
Go to file
2019-02-25 13:54:44 +01:00
bootloader bootloader: fix typo 2019-02-24 17:42:01 +01:00
demo demo: fix crypto call 2018-09-12 09:40:56 +02:00
emulator introduce new memory layout 2019-02-21 15:08:27 +01:00
firmware config: Set usbTiny whenever there is a possibility that protectPinUiCallback() may be called. 2019-02-25 13:54:44 +01:00
gen gen: update trezor logo 2018-04-28 14:01:33 +01:00
gitian add gitian build (work in progress) 2016-01-19 21:15:39 +01:00
script build: don't try to sign emulator build 2019-02-23 19:02:40 +01:00
vendor config: Auto-unlock storage if no PIN is set. Update trezor-storage with improved ui_callback() reporting. 2019-02-23 17:55:49 +01:00
.dockerignore add .dockerignore 2018-10-23 11:10:34 +02:00
.gitignore add vscode to .gitignore 2018-02-13 15:17:33 +01:00
.gitmodules vendor: add ignore=untracked to QR code generator submodule 2019-02-17 19:16:35 +01:00
.travis.yml update Dockerfile and .travis.yml to be more similar to trezor-core 2019-01-24 00:54:15 +01:00
build.sh docker: update build scripts and instructions to fix Docker emulator (#419) 2018-10-11 14:58:22 +02:00
buttons.c bootloader: require only left button to start the bootloader 2019-02-22 15:47:34 +01:00
buttons.h emulator: Initial commit 2017-12-18 20:09:59 +01:00
common.c use shutdown from startup.s 2019-02-20 08:52:42 +01:00
common.h firmware: use OTP block 3 for storing randomness 2019-02-18 17:57:19 +01:00
CONTRIBUTING.md docs: contributing file 2019-01-16 13:46:13 +01:00
COPYING import v1.0.0 2014-04-29 14:38:32 +02:00
Dockerfile update Dockerfile and .travis.yml to be more similar to trezor-core 2019-01-24 00:54:15 +01:00
flash.c Fix spaces/tabs so that a single convention is used in each file. 2019-02-15 15:13:06 +01:00
flash.h Fix emulator memory access. 2019-02-15 15:13:04 +01:00
layout.c bootloader: small changes to ui, replace vendor string 2019-01-27 15:06:05 +01:00
layout.h Remove duplicated code 2018-02-20 18:22:47 +01:00
Makefile bootloader: enable MPU, introduce delays to USB stack 2019-02-21 09:06:55 +01:00
Makefile.include introduce new memory layout 2019-02-21 15:08:27 +01:00
memory_app_0.0.0.ld firmware: use full 1M flash 2018-06-27 18:21:36 +02:00
memory_app_1.0.0.ld adjust message sizes 2018-10-24 13:58:24 +02:00
memory_app_1.8.0.ld setup: change mpu definition for bootloader, fix typo 2019-02-23 20:47:49 +01:00
memory_app_fastflash.ld adjust message sizes 2018-10-24 13:58:24 +02:00
memory.c introduce new memory layout 2019-02-21 15:08:27 +01:00
memory.h introduce new memory layout 2019-02-21 15:08:27 +01:00
memory.ld adjust message sizes 2018-10-24 13:58:24 +02:00
norcow_config.h firmware: set NORCOW_HEADER_LEN to 0 2019-02-21 20:40:16 +01:00
oled.c bootloader: small changes to ui, replace vendor string 2019-01-27 15:06:05 +01:00
oled.h bootloader: small changes to ui, replace vendor string 2019-01-27 15:06:05 +01:00
Pipfile travis: move everything into pipenv, update to python 3.6 2018-09-06 18:44:42 +02:00
Pipfile.lock travis: move everything into pipenv, update to python 3.6 2018-09-06 18:44:42 +02:00
README.md readme: update Python instructions (fixes #426) 2018-11-06 16:44:32 +01:00
rng.c update trezor-crypto, adapt firmware to to changes 2018-01-13 15:20:10 +01:00
rng.h update trezor-crypto, adapt firmware to to changes 2018-01-13 15:20:10 +01:00
secbool.h firmware: integrate trezor-storage 2019-02-15 15:12:53 +01:00
setup.c setup: change mpu definition for bootloader, fix typo 2019-02-23 20:47:49 +01:00
setup.h bootloader: enable MPU, introduce delays to USB stack 2019-02-21 09:06:55 +01:00
shell.nix nix: use python3, not python36 2019-01-29 02:10:53 +01:00
startup.s bootloader: compatibility with old bootloaders 2019-02-24 14:01:33 +01:00
supervise.c introduce new memory layout 2019-02-21 15:08:27 +01:00
supervise.h Fixes for emulator 2018-03-29 01:30:40 +02:00
timer.c Put persistent variables at end of stack 2018-03-29 01:30:40 +02:00
timer.h Supervisor Calls 2018-03-29 01:30:40 +02:00
usb21_standard.c bootloader: enable MPU, introduce delays to USB stack 2019-02-21 09:06:55 +01:00
usb21_standard.h re-enable WebUSB 2018-09-04 15:14:33 +02:00
usb_private.h bootloader: enable MPU, introduce delays to USB stack 2019-02-21 09:06:55 +01:00
usb_standard.c bootloader: enable MPU, introduce delays to USB stack 2019-02-21 09:06:55 +01:00
util.c bootloader: enable MPU, introduce delays to USB stack 2019-02-21 09:06:55 +01:00
util.h bootloader: move timer_init to jump_to_firmware 2019-02-24 12:24:40 +01:00
webusb_defs.h re-enable WebUSB 2018-09-04 15:14:33 +02:00
webusb.c bootloader: enable MPU, introduce delays to USB stack 2019-02-21 09:06:55 +01:00
webusb.h firmware: don't use WebUSB landing page for firmware, it's annoying 2018-09-04 15:14:33 +02:00
winusb_defs.h re-enable WebUSB 2018-09-04 15:14:33 +02:00
winusb.c bootloader: enable MPU, introduce delays to USB stack 2019-02-21 09:06:55 +01:00
winusb.h re-enable WebUSB 2018-09-04 15:14:33 +02:00

TREZOR One Bootloader and Firmware

Build Status gitter

https://trezor.io/

How to build the TREZOR bootloader, firmware and emulator

Ensure that you have Docker installed. You can follow Docker's installation instructions.

Clone this repository:

git clone https://github.com/trezor/trezor-mcu.git`
cd trezor-mcu

Use the build.sh command to build the images.

  • to build bootloader 1.6.0 and firmware 1.7.0:
    ./build.sh bl1.6.0 v1.7.0
    
  • to build latest firmware from master:
    ./build.sh
    
  • to build the emulator from master:
    ./build.sh EMU
    
  • to build the emulator for version 1.7.0:
    ./build.sh EMU v1.7.0
    

Build results are stored in the build/ directory. File bootloader-<tag>.bin represents the bootloader, trezor-<tag>.bin is the firmware image, and trezor-emulator-<tag>.elf is the emulator executable.

You can use TREZOR_OLED_SCALE environment variable to make emulator screen bigger.

How to get fingerprint of firmware signed and distributed by SatoshiLabs?

  1. Pick version of firmware binary listed on https://wallet.trezor.io/data/firmware/1/releases.json
  2. Download it: wget -O trezor.signed.bin https://wallet.trezor.io/data/firmware/1/trezor-1.6.1.bin
  3. Compute fingerprint: tail -c +257 trezor.signed.bin | sha256sum

Step 3 should produce the same sha256 fingerprint like your local build (for the same version tag). Firmware has a special header (of length 256 bytes) holding signatures themselves, which must be avoided while calculating the fingerprint, that's why tail command has to be used.

How to install custom built firmware?

WARNING: This will erase the recovery seed stored on the device! You should never do this on TREZOR that contains coins!

  1. Install python-trezor: pip install trezor (more info)
  2. trezorctl firmware_update -f build/trezor-TAG.bin

Building for development

If you want to build device firmware, make sure you have the GNU ARM Embedded toolchain installed. You will also need Python 3.5 or later and pipenv.

  • If you want to build the emulator instead of the firmware, run export EMULATOR=1 TREZOR_TRANSPORT_V1=1
  • If you want to build with the debug link, run export DEBUG_LINK=1. Use this if you want to run the device tests.
  • When you change these variables, use script/setup to clean the repository
  1. To initialize the repository, run script/setup
  2. To initialize a Python environment, run pipenv install
  3. To build the firmware or emulator, run pipenv run script/cibuild

If you are building device firmware, the firmware will be in firmware/trezor.bin.

You can launch the emulator using firmware/trezor.elf. To use trezorctl with the emulator, use trezorctl -p udp (for example, trezorctl -p udp get_features).