mirror of
https://github.com/xmrig/xmrig.git
synced 2024-12-23 20:19:23 +00:00
Backport crypto changes from Dead2 xmr-stak-cpu fork.
This commit is contained in:
parent
8f38462bbe
commit
30a7f9f7f5
4 changed files with 123 additions and 1403 deletions
|
@ -65,7 +65,7 @@ static inline void do_jh_hash(const void* input, size_t len, char* output) {
|
||||||
|
|
||||||
|
|
||||||
static inline void do_skein_hash(const void* input, size_t len, char* output) {
|
static inline void do_skein_hash(const void* input, size_t len, char* output) {
|
||||||
skein_hash(8 * 32, static_cast<const uint8_t*>(input), 8 * len, reinterpret_cast<uint8_t*>(output));
|
xmr_skein(static_cast<const uint8_t*>(input), reinterpret_cast<uint8_t*>(output));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -3,7 +3,7 @@
|
||||||
// A baseline Keccak (3rd round) implementation.
|
// A baseline Keccak (3rd round) implementation.
|
||||||
|
|
||||||
#include <stdint.h>
|
#include <stdint.h>
|
||||||
#include <string.h>
|
#include <memory.h>
|
||||||
|
|
||||||
#define HASH_DATA_AREA 136
|
#define HASH_DATA_AREA 136
|
||||||
#define KECCAK_ROUNDS 24
|
#define KECCAK_ROUNDS 24
|
||||||
|
@ -24,18 +24,6 @@ const uint64_t keccakf_rndc[24] =
|
||||||
0x8000000000008080, 0x0000000080000001, 0x8000000080008008
|
0x8000000000008080, 0x0000000080000001, 0x8000000080008008
|
||||||
};
|
};
|
||||||
|
|
||||||
const int keccakf_rotc[24] =
|
|
||||||
{
|
|
||||||
1, 3, 6, 10, 15, 21, 28, 36, 45, 55, 2, 14,
|
|
||||||
27, 41, 56, 8, 25, 43, 62, 18, 39, 61, 20, 44
|
|
||||||
};
|
|
||||||
|
|
||||||
const int keccakf_piln[24] =
|
|
||||||
{
|
|
||||||
10, 7, 11, 17, 18, 3, 5, 16, 8, 21, 24, 4,
|
|
||||||
15, 23, 19, 13, 12, 2, 20, 14, 22, 9, 6, 1
|
|
||||||
};
|
|
||||||
|
|
||||||
// update the state with given number of rounds
|
// update the state with given number of rounds
|
||||||
|
|
||||||
void keccakf(uint64_t st[25], int rounds)
|
void keccakf(uint64_t st[25], int rounds)
|
||||||
|
@ -63,25 +51,85 @@ void keccakf(uint64_t st[25], int rounds)
|
||||||
|
|
||||||
// Rho Pi
|
// Rho Pi
|
||||||
t = st[1];
|
t = st[1];
|
||||||
for (i = 0; i < 24; ++i) {
|
st[ 1] = ROTL64(st[ 6], 44);
|
||||||
bc[0] = st[keccakf_piln[i]];
|
st[ 6] = ROTL64(st[ 9], 20);
|
||||||
st[keccakf_piln[i]] = ROTL64(t, keccakf_rotc[i]);
|
st[ 9] = ROTL64(st[22], 61);
|
||||||
t = bc[0];
|
st[22] = ROTL64(st[14], 39);
|
||||||
}
|
st[14] = ROTL64(st[20], 18);
|
||||||
|
st[20] = ROTL64(st[ 2], 62);
|
||||||
|
st[ 2] = ROTL64(st[12], 43);
|
||||||
|
st[12] = ROTL64(st[13], 25);
|
||||||
|
st[13] = ROTL64(st[19], 8);
|
||||||
|
st[19] = ROTL64(st[23], 56);
|
||||||
|
st[23] = ROTL64(st[15], 41);
|
||||||
|
st[15] = ROTL64(st[ 4], 27);
|
||||||
|
st[ 4] = ROTL64(st[24], 14);
|
||||||
|
st[24] = ROTL64(st[21], 2);
|
||||||
|
st[21] = ROTL64(st[ 8], 55);
|
||||||
|
st[ 8] = ROTL64(st[16], 45);
|
||||||
|
st[16] = ROTL64(st[ 5], 36);
|
||||||
|
st[ 5] = ROTL64(st[ 3], 28);
|
||||||
|
st[ 3] = ROTL64(st[18], 21);
|
||||||
|
st[18] = ROTL64(st[17], 15);
|
||||||
|
st[17] = ROTL64(st[11], 10);
|
||||||
|
st[11] = ROTL64(st[ 7], 6);
|
||||||
|
st[ 7] = ROTL64(st[10], 3);
|
||||||
|
st[10] = ROTL64(t, 1);
|
||||||
|
|
||||||
// Chi
|
// Chi
|
||||||
for (j = 0; j < 25; j += 5) {
|
// unrolled loop, where only last iteration is different
|
||||||
|
j = 0;
|
||||||
|
bc[0] = st[j ];
|
||||||
|
bc[1] = st[j + 1];
|
||||||
|
|
||||||
|
st[j ] ^= (~st[j + 1]) & st[j + 2];
|
||||||
|
st[j + 1] ^= (~st[j + 2]) & st[j + 3];
|
||||||
|
st[j + 2] ^= (~st[j + 3]) & st[j + 4];
|
||||||
|
st[j + 3] ^= (~st[j + 4]) & bc[0];
|
||||||
|
st[j + 4] ^= (~bc[0]) & bc[1];
|
||||||
|
|
||||||
|
j = 5;
|
||||||
|
bc[0] = st[j ];
|
||||||
|
bc[1] = st[j + 1];
|
||||||
|
|
||||||
|
st[j ] ^= (~st[j + 1]) & st[j + 2];
|
||||||
|
st[j + 1] ^= (~st[j + 2]) & st[j + 3];
|
||||||
|
st[j + 2] ^= (~st[j + 3]) & st[j + 4];
|
||||||
|
st[j + 3] ^= (~st[j + 4]) & bc[0];
|
||||||
|
st[j + 4] ^= (~bc[0]) & bc[1];
|
||||||
|
|
||||||
|
j = 10;
|
||||||
|
bc[0] = st[j ];
|
||||||
|
bc[1] = st[j + 1];
|
||||||
|
|
||||||
|
st[j ] ^= (~st[j + 1]) & st[j + 2];
|
||||||
|
st[j + 1] ^= (~st[j + 2]) & st[j + 3];
|
||||||
|
st[j + 2] ^= (~st[j + 3]) & st[j + 4];
|
||||||
|
st[j + 3] ^= (~st[j + 4]) & bc[0];
|
||||||
|
st[j + 4] ^= (~bc[0]) & bc[1];
|
||||||
|
|
||||||
|
j = 15;
|
||||||
|
bc[0] = st[j ];
|
||||||
|
bc[1] = st[j + 1];
|
||||||
|
|
||||||
|
st[j ] ^= (~st[j + 1]) & st[j + 2];
|
||||||
|
st[j + 1] ^= (~st[j + 2]) & st[j + 3];
|
||||||
|
st[j + 2] ^= (~st[j + 3]) & st[j + 4];
|
||||||
|
st[j + 3] ^= (~st[j + 4]) & bc[0];
|
||||||
|
st[j + 4] ^= (~bc[0]) & bc[1];
|
||||||
|
|
||||||
|
j = 20;
|
||||||
bc[0] = st[j ];
|
bc[0] = st[j ];
|
||||||
bc[1] = st[j + 1];
|
bc[1] = st[j + 1];
|
||||||
bc[2] = st[j + 2];
|
bc[2] = st[j + 2];
|
||||||
bc[3] = st[j + 3];
|
bc[3] = st[j + 3];
|
||||||
bc[4] = st[j + 4];
|
bc[4] = st[j + 4];
|
||||||
|
|
||||||
st[j ] ^= (~bc[1]) & bc[2];
|
st[j ] ^= (~bc[1]) & bc[2];
|
||||||
st[j + 1] ^= (~bc[2]) & bc[3];
|
st[j + 1] ^= (~bc[2]) & bc[3];
|
||||||
st[j + 2] ^= (~bc[3]) & bc[4];
|
st[j + 2] ^= (~bc[3]) & bc[4];
|
||||||
st[j + 3] ^= (~bc[4]) & bc[0];
|
st[j + 3] ^= (~bc[4]) & bc[0];
|
||||||
st[j + 4] ^= (~bc[0]) & bc[1];
|
st[j + 4] ^= (~bc[0]) & bc[1];
|
||||||
}
|
|
||||||
|
|
||||||
// Iota
|
// Iota
|
||||||
st[0] ^= keccakf_rndc[round];
|
st[0] ^= keccakf_rndc[round];
|
||||||
|
@ -121,3 +169,8 @@ void keccak(const uint8_t *in, int inlen, uint8_t *md, int mdlen)
|
||||||
|
|
||||||
memcpy(md, st, mdlen);
|
memcpy(md, st, mdlen);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void keccak1600(const uint8_t *in, int inlen, uint8_t *md)
|
||||||
|
{
|
||||||
|
keccak(in, inlen, md, sizeof(state_t));
|
||||||
|
}
|
||||||
|
|
1407
src/crypto/c_skein.c
1407
src/crypto/c_skein.c
File diff suppressed because it is too large
Load diff
|
@ -44,4 +44,6 @@ typedef u08b_t SkeinBitSequence; /* bit stream type */
|
||||||
SkeinHashReturn skein_hash(int hashbitlen, const SkeinBitSequence *data,
|
SkeinHashReturn skein_hash(int hashbitlen, const SkeinBitSequence *data,
|
||||||
SkeinDataLength databitlen, SkeinBitSequence *hashval);
|
SkeinDataLength databitlen, SkeinBitSequence *hashval);
|
||||||
|
|
||||||
|
void xmr_skein(const SkeinBitSequence *data, SkeinBitSequence *hashval);
|
||||||
|
|
||||||
#endif /* ifndef _SKEIN_H_ */
|
#endif /* ifndef _SKEIN_H_ */
|
||||||
|
|
Loading…
Reference in a new issue