Browse Source

openssl: disable HT sidechannel attack mitigation

It used to be off before. It's extremely unlikely that such an attack
would be a viable attack against node. And it makes AES much slower.
v0.9.11-release
Bert Belder 12 years ago
committed by Fedor Indutny
parent
commit
eb29c4b2e6
  1. 4
      deps/openssl/openssl/crypto/aes/asm/aes-586.pl
  2. 4
      deps/openssl/openssl/crypto/aes/asm/aes-x86_64.pl

4
deps/openssl/openssl/crypto/aes/asm/aes-586.pl

@ -2054,8 +2054,8 @@ my $mark=&DWP(76+240,"esp"); # copy of aes_key->rounds
&test ($s2,15);
&jnz (&label("slow_way"));
if (!$x86only) {
&bt (&DWP(0,$s0),28); # check for hyper-threading bit
&jc (&label("slow_way"));
#&bt (&DWP(0,$s0),28); # check for hyper-threading bit
#&jc (&label("slow_way"));
}
# pre-allocate aligned stack frame...
&lea ($acc,&DWP(-80-244,"esp"));

4
deps/openssl/openssl/crypto/aes/asm/aes-x86_64.pl

@ -1684,8 +1684,8 @@ AES_cbc_encrypt:
jb .Lcbc_slow_prologue
test \$15,%rdx
jnz .Lcbc_slow_prologue
bt \$28,%r10d
jc .Lcbc_slow_prologue
#bt \$28,%r10d
#jc .Lcbc_slow_prologue
# allocate aligned stack frame...
lea -88-248(%rsp),$key

Loading…
Cancel
Save