1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-22 07:28:10 +00:00
Go to file
2017-12-18 20:13:00 +01:00
bootloader bootloader: don't restore storage from unofficial firmware 2017-12-17 03:19:49 +01:00
demo add project website (trezor.io) to license header 2017-11-05 17:47:23 +01:00
emulator emulator: Show DEBUG_LINK indicator 2017-12-18 20:09:59 +01:00
fastflash add project website (trezor.io) to license header 2017-11-05 17:47:23 +01:00
firmware fsm: Include file and line in fsm_sendFailure for DEBUG_LINK 2017-12-18 20:13:00 +01:00
gen add project website (trezor.io) to license header 2017-11-05 17:47:23 +01:00
gitian add gitian build (work in progress) 2016-01-19 21:15:39 +01:00
script script: Do not start emulator if running 2017-12-18 20:09:59 +01:00
vendor script: Add Scripts To Rule Them All 2017-12-18 20:09:59 +01:00
.gitignore emulator: Initial commit 2017-12-18 20:09:59 +01:00
.gitmodules script: Add Scripts To Rule Them All 2017-12-18 20:09:59 +01:00
.travis.yml Travis CI: Fix InsecurePlatformWarning 2017-12-18 20:09:59 +01:00
build-bootloader.sh cleanup build, update libopencm3 (#215) 2017-08-28 13:47:15 +02:00
build-firmware.sh Generate the protobuf files at build time (#219) 2017-09-28 13:10:32 +02:00
buttons.c emulator: Initial commit 2017-12-18 20:09:59 +01:00
buttons.h emulator: Initial commit 2017-12-18 20:09:59 +01:00
COPYING import v1.0.0 2014-04-29 14:38:32 +02:00
Dockerfile build: use recent protobuf in docker 2017-10-29 21:50:38 +01:00
layout.c add project website (trezor.io) to license header 2017-11-05 17:47:23 +01:00
layout.h add project website (trezor.io) to license header 2017-11-05 17:47:23 +01:00
Makefile emulator: Initial commit 2017-12-18 20:09:59 +01:00
Makefile.include emulator: Initial commit 2017-12-18 20:09:59 +01:00
memory_app_0.0.0.ld import v1.0.0 2014-04-29 14:38:32 +02:00
memory_app_1.0.0.ld firmware: rework protectChangePin 2017-12-12 12:51:08 +01:00
memory_app_fastflash.ld firmware: rework protectChangePin 2017-12-12 12:51:08 +01:00
memory.c add project website (trezor.io) to license header 2017-11-05 17:47:23 +01:00
memory.h emulator: Initial commit 2017-12-18 20:09:59 +01:00
memory.ld firmware: rework protectChangePin 2017-12-12 12:51:08 +01:00
oled.c emulator: Show DEBUG_LINK indicator 2017-12-18 20:09:59 +01:00
oled.h emulator: Show DEBUG_LINK indicator 2017-12-18 20:09:59 +01:00
README.md README: Add development instructions 2017-12-18 20:09:59 +01:00
rng.c emulator: Initial commit 2017-12-18 20:09:59 +01:00
rng.h add project website (trezor.io) to license header 2017-11-05 17:47:23 +01:00
serialno.c add project website (trezor.io) to license header 2017-11-05 17:47:23 +01:00
serialno.h add project website (trezor.io) to license header 2017-11-05 17:47:23 +01:00
setup.c setup: avoid usb host mode 2017-12-12 12:51:08 +01:00
setup.h add project website (trezor.io) to license header 2017-11-05 17:47:23 +01:00
startup.s startup: use custom reset_handler 2017-08-16 13:52:01 +02:00
timer.c emulator: Initial commit 2017-12-18 20:09:59 +01:00
timer.h emulator: Initial commit 2017-12-18 20:09:59 +01:00
util.c emulator: Initial commit 2017-12-18 20:09:59 +01:00
util.h emulator: Initial commit 2017-12-18 20:09:59 +01:00

TREZOR Firmware

Build Status gitter

https://trezor.io/

How to build TREZOR firmware?

  1. Install Docker
  2. git clone https://github.com/trezor/trezor-mcu.git
  3. cd trezor-mcu
  4. ./build-firmware.sh TAG (where TAG is v1.5.0 for example, if left blank the script builds latest commit in master branch)

This creates file build/trezor-TAG.bin and prints its fingerprint and size at the end of the build log.

How to build TREZOR bootloader?

  1. Install Docker
  2. git clone https://github.com/trezor/trezor-mcu.git
  3. cd trezor-mcu
  4. ./build-bootloader.sh TAG (where TAG is bl1.3.2 for example, if left blank the script builds latest commit in master branch)

This creates file build/bootloader-TAG.bin and prints its fingerprint and size at the end of the build log.

How to get fingerprint of firmware signed and distributed by SatoshiLabs?

  1. Pick version of firmware binary listed on https://wallet.trezor.io/data/firmware/releases.json
  2. Download it: wget -O trezor.signed.bin https://wallet.trezor.io/data/firmware/trezor-1.3.6.bin
  3. Compute fingerprint: tail -c +257 trezor.signed.bin | sha256sum

Step 3 should produce the same sha256 fingerprint like your local build (for the same version tag). Firmware has a special header (of length 256 bytes) holding signatures themselves, which must be avoided while calculating the fingerprint, that's why tail command has to be used.

How to install custom built firmware?

WARNING: This will erase the recovery seed stored on the device! You should never do this on TREZOR that contains coins!

  1. Install python-trezor: pip install trezor (more info)
  2. trezorctl firmware_update -f build/trezor-TAG.bin

Building for development

If you want to build device firmware, make sure you have the GNU ARM Embedded toolchain installed.

  • If you want to build the emulator instead of the firmware, run export EMULATOR=1 TREZOR_TRANSPORT_V1=1
  • If you want to build with the debug link, run export DEBUG_LINK=1. Use this if you want to run the device tests.
  • When you change these variables, use script/setup to clean the repository
  1. To initialize the repository, run script/setup
  2. To build the firmware or emulator, run script/cibuild

If you are building device firmware, the firmware will be in firmware/trezor.bin.

You can launch the emulator using firmware/trezor.elf. To use trezorctl with the emulator, use trezorctl -t udp (for example, trezorctl -t udp get_features).

If trezorctl -t udp appears to hang, make sure you have run export TREZOR_TRANSPORT_V1=1.