Files
Momentum-Firmware/applications/services/crypto
Hugo Grostabussiat be8387afb5 crypto: Erase key from RAM after storing into enclave
When storing a new unique secret key in the secure enclave, it is
temporarily stored in a stack buffer accessible by CPU1.
Since it is a secret key, it should not be kept in memory as it could
be leaked.

This commit calls the explicit_bzero() function from the libc to ensure
that the buffer containing the key is cleared. Unlike with bzero() and
memset(), the compiler won't optimize away calls to explicit_bzero().
2023-03-20 18:57:27 +00:00
..