Rust nightly update - aes-t-tables

Ensure it compiles with the newer nightly.
This commit is contained in:
Guillume DIDIER 2021-06-10 11:16:09 +02:00
parent 4bc389272f
commit 3b85161eb2
2 changed files with 6 additions and 6 deletions

View File

@ -7,12 +7,12 @@ edition = "2018"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies]
openssl-sys = "0.9.58"
openssl = "0.10.30"
openssl-sys = "0.9.61"
openssl = "0.10.33"
cache_utils = { path = "../cache_utils" }
memmap2 = "0.1.0"
rand = "0.7.3"
nix = "0.18.0"
memmap2 = "0.2.1"
rand = "0.8.3"
nix = "0.20.0"
cache_side_channel = { path = "../cache_side_channel" }
flush_flush = { path = "../flush_flush" }
flush_reload = { path = "../flush_reload" }

View File

@ -59,7 +59,7 @@ pub unsafe fn attack_t_tables_poc<T: ChannelHandle>(
parameters: AESTTableParams,
name: &str,
) {
let old_affinity = set_affinity(&side_channel.main_core());
let old_affinity = set_affinity(&side_channel.main_core()).unwrap();
// Note : This function doesn't handle the case where the address space is not shared. (Additionally you have the issue of complicated eviction sets due to complex addressing)
// TODO