[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #26945 [Core Tor/Tor]: Privcount blinding and encryption: Conditionally disable i128



#26945: Privcount blinding and encryption: Conditionally disable i128
-------------------------------------------------+-------------------------
 Reporter:  teor                                 |          Owner:  teor
     Type:  defect                               |         Status:
                                                 |  assigned
 Priority:  Medium                               |      Milestone:  Tor:
                                                 |  0.3.6.x-final
Component:  Core Tor/Tor                         |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  privcount, 035-roadmap-master, 035   |  Actual Points:
  -triaged-in-20180711, rust                     |
Parent ID:  #25669                               |         Points:
 Reviewer:                                       |        Sponsor:
                                                 |  SponsorV
-------------------------------------------------+-------------------------

Comment (by teor):

 nickm suggests that we just use i128, and wait to see if the unit tests
 fail.
 (In most cases, the compilation will fail, so it will be obvious.)

 If we want the fastest code, we should select 32-bit multiplications on
 some platforms, see:
 https://github.com/dalek-cryptography/curve25519-dalek/issues/126
 But that's not a high priority for us.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26945#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs