-
Notifications
You must be signed in to change notification settings - Fork 27
chore: Remove old blsful lagrange impl
#725
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: unstable
Are you sure you want to change the base?
Conversation
|
Claude finished @dknopik's task —— View job Code Review CompletePR: Remove old I've completed a comprehensive review of this PR. The removal of the SummaryThis PR successfully removes the legacy Positive Aspects
Issues and Recommendations1. Vestigial Feature Flag (Minor)Location: The [features]
default = ["blst_single_thread"]
blst_single_thread = []Recommendation: Consider removing this feature flag entirely in a follow-up PR, or document why it's being kept for backwards compatibility. 2. Conditional Compilation Removed Without Documentation (Minor)Location: The Impact: Minimal - the function is already 3. Potential Test Coverage Gap (Info)The
Recommendation: Review the deleted 4. Migration Path (Documentation)Location: PR description The PR doesn't mention whether existing users need to take any action. Since the Questions:
Recommendation: Update the PR description or commit message to clarify the breaking change nature and migration requirements (likely none, since you mention it's been using Code Quality AssessmentSecurity ✅
Performance ✅
Testing
|
|
@claude |
|
Claude finished @dknopik's task —— View job Correction AcknowledgedThank you for the correction! You're absolutely right - I apologize for the error in my initial review. The
This is a meaningful behavioral difference for signature combination performance, particularly in multi-threaded vs single-threaded environments. Updated Review SummaryWith this correction, the PR is clean and well-executed: Positive Aspects:
No blocking issues - the PR successfully removes technical debt while maintaining the important Approval Recommendation: ✅ Approve |
|
@claude doesn't the text below go against "don't roll your own crypto"? Or is it a different context?
|
|
Claude finished @diegomrsantos's task —— View job Analyzing the "custom blst implementation" questionGreat question about the security implications! Let me investigate what "custom blst implementation" actually means in this context. Todo:
Answer: No, this does NOT violate "don't roll your own crypto"The phrase "custom blst implementation" is slightly misleading - this is not rolling custom cryptographic primitives. Here's what's actually happening: What This Implementation DoesThe code in
Key Security Points✅ Uses industry-standard crypto library:
✅ Implements well-known algorithms:
✅ What's "custom" is the glue code:
The Security Principle"Don't roll your own crypto" means:
This code does:
Why "Custom" Implementation?The "custom" refers to:
This is similar to how Lighthouse or Prysm might write their own validator logic using the Comparison to the Removed
|
|
I'll analyze this and get back to you. |

Proposed Changes
Remove the
blsfulfeature inbls_lagrangeand any associated dependencies and code.Additional Info
We have been using our custom
blstimplementation for a while now. Theblsfulvariant has several downsides:bls_lagrangeto depend on a legacyrandversion. (see Recommend using workspace rand version in bls_lagrange #461)Advantages might include keeping it around for future testing efforts.