mirror of https://github.com/nodejs/node.git
openssl: disable HT sidechannel attack mitigation
It used to be off before. It's extremely unlikely that such an attack would be a viable attack against node. And it makes AES much slower.pull/24504/head
parent
aeae22cbb2
commit
1d97db5acf
|
@ -2054,8 +2054,8 @@ my $mark=&DWP(76+240,"esp"); # copy of aes_key->rounds
|
||||||
&test ($s2,15);
|
&test ($s2,15);
|
||||||
&jnz (&label("slow_way"));
|
&jnz (&label("slow_way"));
|
||||||
if (!$x86only) {
|
if (!$x86only) {
|
||||||
&bt (&DWP(0,$s0),28); # check for hyper-threading bit
|
#&bt (&DWP(0,$s0),28); # check for hyper-threading bit
|
||||||
&jc (&label("slow_way"));
|
#&jc (&label("slow_way"));
|
||||||
}
|
}
|
||||||
# pre-allocate aligned stack frame...
|
# pre-allocate aligned stack frame...
|
||||||
&lea ($acc,&DWP(-80-244,"esp"));
|
&lea ($acc,&DWP(-80-244,"esp"));
|
||||||
|
|
|
@ -1683,8 +1683,8 @@ AES_cbc_encrypt:
|
||||||
jb .Lcbc_slow_prologue
|
jb .Lcbc_slow_prologue
|
||||||
test \$15,%rdx
|
test \$15,%rdx
|
||||||
jnz .Lcbc_slow_prologue
|
jnz .Lcbc_slow_prologue
|
||||||
bt \$28,%r10d
|
#bt \$28,%r10d
|
||||||
jc .Lcbc_slow_prologue
|
#jc .Lcbc_slow_prologue
|
||||||
|
|
||||||
# allocate aligned stack frame...
|
# allocate aligned stack frame...
|
||||||
lea -88-248(%rsp),$key
|
lea -88-248(%rsp),$key
|
||||||
|
|
Loading…
Reference in New Issue