[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #26945 [Core Tor/Tor]: Privcount blinding and encryption: Conditionally disable i128
#26945: Privcount blinding and encryption: Conditionally disable i128
-------------------------------------------------+-------------------------
Reporter: teor | Owner: teor
Type: defect | Status:
| assigned
Priority: Medium | Milestone: Tor:
| 0.3.6.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: privcount, 035-roadmap-master, 035 | Actual Points:
-triaged-in-20180711, rust |
Parent ID: #25669 | Points:
Reviewer: | Sponsor:
| SponsorV
-------------------------------------------------+-------------------------
Comment (by teor):
nickm suggests that we just use i128, and wait to see if the unit tests
fail.
(In most cases, the compilation will fail, so it will be obvious.)
If we want the fastest code, we should select 32-bit multiplications on
some platforms, see:
https://github.com/dalek-cryptography/curve25519-dalek/issues/126
But that's not a high priority for us.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26945#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs