Go to file
Jochen Hoenicke 1cceec0ae2 Check that U2F key only uses hardened derivation (#139)
We generate only U2F keys with hardened derivation.  However, we
didn't check incoming keys if they used hardened derivation.
This patch fixes this.
2017-01-10 21:51:57 +01:00
bootloader mytrezor.com -> trezor.io/start 2017-01-10 15:08:08 +01:00
demo remove DialogIcon enum, use bitmap structure directly 2016-06-08 19:20:07 +02:00
firmware Check that U2F key only uses hardened derivation (#139) 2017-01-10 21:51:57 +01:00
gen New Matrix-based recovery 2016-11-23 13:21:18 +01:00
gitian add gitian build (work in progress) 2016-01-19 21:15:39 +01:00
vendor use new hdnode_private_ckd_cached API 2016-12-12 12:17:48 +01:00
.gitignore bootloader source code 2014-10-23 18:09:41 +02:00
.gitmodules move submodules to vendor subdirectory 2015-12-15 23:01:54 +01:00
.travis.yml add webhooks to travis 2016-11-23 11:50:14 +01:00
COPYING import v1.0.0 2014-04-29 14:38:32 +02:00
ChangeLog bump version, add changelog 2016-10-26 18:06:13 +02:00
Dockerfile add python-ecdsa dependency 2016-07-23 10:06:19 +02:00
Makefile timer: Use Cortex-M3 SysTick timers 2016-11-17 02:07:46 +01:00
Makefile.include cosmetic changes to matrix recovery 2017-01-10 14:58:28 +01:00
README.md update readme 2017-01-10 15:14:29 +01:00
bootloader-docker-build.sh add set -e to shell scripts 2016-07-03 13:54:32 +02:00
buttons.c import v1.0.0 2014-04-29 14:38:32 +02:00
buttons.h cleanup oledDrawChar code 2015-11-18 23:35:28 +01:00
firmware-docker-build.sh sign firmware inside docker container 2016-08-29 19:20:50 +02:00
firmware-fingerprint.sh add set -e to shell scripts 2016-07-03 13:54:32 +02:00
layout.c remove DialogIcon enum, use bitmap structure directly 2016-06-08 19:20:07 +02:00
layout.h remove DialogIcon enum, use bitmap structure directly 2016-06-08 19:20:07 +02:00
memory.c use hdnode_private_ckd_cached where appropriate 2015-01-26 20:24:07 +01:00
memory.h import v1.0.0 2014-04-29 14:38:32 +02:00
memory.ld import v1.0.0 2014-04-29 14:38:32 +02:00
memory_app_0.0.0.ld import v1.0.0 2014-04-29 14:38:32 +02:00
memory_app_1.0.0.ld import v1.0.0 2014-04-29 14:38:32 +02:00
oled.c Faster SPI communication 2016-08-26 18:43:16 +02:00
oled.h cleanup oledDrawChar code 2015-11-18 23:35:28 +01:00
rng.c use Knuth shuffles 2015-02-13 20:51:02 +01:00
rng.h use Knuth shuffles 2015-02-13 20:51:02 +01:00
serialno.c fix unaligned access in serialno; update trezor-crypto 2016-08-29 22:37:27 +02:00
serialno.h import v1.0.0 2014-04-29 14:38:32 +02:00
setup.c Faster SPI communication 2016-08-26 18:43:16 +02:00
setup.h move APPVER guards from includes to app code 2014-07-07 15:03:34 +02:00
timer.c timer: Fix non-critical integer overflow (#129) 2016-11-23 20:22:28 +01:00
timer.h timer: Fix non-critical integer overflow (#129) 2016-11-23 20:22:28 +01:00
util.c import v1.0.0 2014-04-29 14:38:32 +02:00
util.h fix usage of inline/static 2016-02-15 15:29:19 +01:00

README.md

TREZOR Firmware

Build Status gitter

https://trezor.io/

How to build TREZOR firmware?

  1. Install Docker
  2. git clone https://github.com/trezor/trezor-mcu.git
  3. cd trezor-mcu
  4. ./firmware-docker-build.sh TAG (where TAG is v1.3.2 for example, if left blank the script builds latest commit)

This creates file output/trezor-TAG.bin and prints its fingerprint at the last line of the build log.

How to build TREZOR bootloader?

  1. Install Docker
  2. git clone https://github.com/trezor/trezor-mcu.git
  3. cd trezor-mcu
  4. ./bootloader-docker-build.sh

This creates file output/bootloader.bin and prints its fingerprint and size at the last line of the build log.

How to get fingerprint of firmware signed and distributed by SatoshiLabs?

  1. Pick version of firmware binary listed on https://wallet.trezor.io/data/firmware/releases.json
  2. Download it: wget -O trezor.signed.bin https://wallet.trezor.io/data/firmware/trezor-1.3.6.bin
  3. ./firmware-fingerprint.sh trezor.signed.bin

Step 3 should produce the same sha256 fingerprint like your local build (for the same version tag).

The reasoning for firmware-fingerprint.sh script is that signed firmware has special header holding signatures themselves, which must be avoided while calculating the fingerprint.