[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #13243 [Tor]: Password hashing unit tests are too slow



#13243: Password hashing unit tests are too slow
--------------------------------------+------------------------------------
 Reporter:  nickm                     |          Owner:
     Type:  defect                    |         Status:  new
 Priority:  normal                    |      Milestone:  Tor: 0.2.6.x-final
Component:  Tor                       |        Version:
 Keywords:  tor-relay testing scrypt  |  Actual Points:
Parent ID:                            |         Points:
--------------------------------------+------------------------------------
 The scrypt and pbkdf2 and pwbox tests I added for #12981 seem to run a bit
 slow.  Running slow is kind of the point of a password hashing scheme, but
 slow unit tests are anathema.

 We could make these tests (or the slower versions of them) off-by-default
 using the TT_OFF_BY_DEFAULT flag, I guess.  But is that wise?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13243>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs