You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you've further comments or are keen to retain the old API, please comment in this issue. The 0.x series will be unsupported at the point when 1.0 is released.
The text was updated successfully, but these errors were encountered:
Not a breaking change: I'd like to finish the work on NIST curves scalar multiplication for the non-base case, to improve performance a bit more for key generation in particular (which won't be pre-computed)
Also, would 1.0 be the right time to discuss if we keep maintaining 32-bit support? Not to drop it for 1.0, but at least begin surveying potential users and announcing deprecation if we decide so
I think the 32 bit support is to discuss for a 1.0, but I'm unsure whether it is worth dropping (esp. nowadays that we have CI machines (arm32, x86_32), and not too much trouble with 32 bit (or is there lots of trouble?)
In respect to mirage-crypto-ec, since cl.exe/dkml seem to use the 32 bit code paths (since 128bit integers aren't available), I assume removing 32 bit support wouldn't clean that up!?
The next release will break the API, and be a 1.0. Notably:
encrypt_into
API to move the allocations to the call site (raising exceptions if too small buffers are passed in)mirage-crypto
#186), now that bytes/string are used avoid global buffers #219mirage-crypto
#186mirage-crypto
#186If you've further comments or are keen to retain the old API, please comment in this issue. The 0.x series will be unsupported at the point when 1.0 is released.
The text was updated successfully, but these errors were encountered: