[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #13243 [Tor]: Password hashing unit tests are too slow
#13243: Password hashing unit tests are too slow
--------------------------------------+------------------------------------
Reporter: nickm | Owner:
Type: defect | Status: new
Priority: normal | Milestone: Tor: 0.2.6.x-final
Component: Tor | Version:
Keywords: tor-relay testing scrypt | Actual Points:
Parent ID: | Points:
--------------------------------------+------------------------------------
The scrypt and pbkdf2 and pwbox tests I added for #12981 seem to run a bit
slow. Running slow is kind of the point of a password hashing scheme, but
slow unit tests are anathema.
We could make these tests (or the slower versions of them) off-by-default
using the TT_OFF_BY_DEFAULT flag, I guess. But is that wise?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13243>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs