When storing a new unique secret key in the secure enclave, it is
temporarily stored in a stack buffer accessible by CPU1.
Since it is a secret key, it should not be kept in memory as it could
be leaked.
This commit calls the explicit_bzero() function from the libc to ensure
that the buffer containing the key is cleared. Unlike with bzero() and
memset(), the compiler won't optimize away calls to explicit_bzero().
* Power info command, validator fixes
* strdup in validator, fix memory leak
* furi_hal_crypto fixed again
* FuriHal: limit ARR and CC in speaker hal
* FuriHal: LL_TIM_DisableAllOutputs in speaker stop
* Rpc: fix memory leak in screen streaming
* Get rid of crypto_enable/crypto_disable
Co-authored-by: Aleksandr Kutuzov <alleteam@gmail.com>
* gpio, hsem, crypto: switch from HAL to LL/registers
* Moved GPIO initialization to furi_hal
* More HAL removed
* All HAL modules disabled
* HAL is finally removed
* hal_gpio -> furi_hal_gpio, main.h removed
* Bootloader build fix
* RTOS config moved to freertos-glue
* delay -> furi_hal_delay
Co-authored-by: あく <alleteam@gmail.com>
* Makefile, Scripts: new linter
* About: remove ID from IC
* Firmware: remove double define for DIVC/DIVR
* Scripts: check folder names too. Docker: replace syntax check with make lint.
* Reformat Sources and Migrate to new file naming convention
* Docker: symlink clang-format-12 to clang-format
* Add coding style guide