mirror of https://github.com/GOSTSec/sgminer
Browse Source
Add talkcoin-mod (NIST5 algo) by Issue #268 + AMD drivers v14.6 for Windows compatibility fixdjm34
ystarnaud
11 years ago
7 changed files with 615 additions and 8 deletions
@ -0,0 +1,177 @@ |
|||||||
|
/*-
|
||||||
|
* Copyright 2014 phm |
||||||
|
* All rights reserved. |
||||||
|
* |
||||||
|
* Redistribution and use in source and binary forms, with or without |
||||||
|
* modification, are permitted provided that the following conditions |
||||||
|
* are met: |
||||||
|
* 1. Redistributions of source code must retain the above copyright |
||||||
|
* notice, this list of conditions and the following disclaimer. |
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright |
||||||
|
* notice, this list of conditions and the following disclaimer in the |
||||||
|
* documentation and/or other materials provided with the distribution. |
||||||
|
* |
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND |
||||||
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
||||||
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
||||||
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
||||||
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
||||||
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
||||||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
||||||
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
||||||
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
||||||
|
* SUCH DAMAGE. |
||||||
|
*/ |
||||||
|
|
||||||
|
#include "config.h" |
||||||
|
#include "miner.h" |
||||||
|
|
||||||
|
#include <stdlib.h> |
||||||
|
#include <stdint.h> |
||||||
|
#include <string.h> |
||||||
|
|
||||||
|
#include "sph/sph_blake.h" |
||||||
|
#include "sph/sph_groestl.h" |
||||||
|
#include "sph/sph_jh.h" |
||||||
|
#include "sph/sph_keccak.h" |
||||||
|
#include "sph/sph_skein.h" |
||||||
|
|
||||||
|
/* Move init out of loop, so init once externally, and then use one single memcpy with that bigger memory block */ |
||||||
|
typedef struct { |
||||||
|
sph_blake512_context blake1; |
||||||
|
sph_groestl512_context groestl1; |
||||||
|
sph_jh512_context jh1; |
||||||
|
sph_keccak512_context keccak1; |
||||||
|
sph_skein512_context skein1; |
||||||
|
} Xhash_context_holder; |
||||||
|
|
||||||
|
Xhash_context_holder base_contexts; |
||||||
|
|
||||||
|
|
||||||
|
void init_Nhash_contexts() |
||||||
|
{ |
||||||
|
sph_blake512_init(&base_contexts.blake1); |
||||||
|
sph_groestl512_init(&base_contexts.groestl1); |
||||||
|
sph_jh512_init(&base_contexts.jh1); |
||||||
|
sph_keccak512_init(&base_contexts.keccak1); |
||||||
|
sph_skein512_init(&base_contexts.skein1); |
||||||
|
} |
||||||
|
|
||||||
|
/*
|
||||||
|
* Encode a length len/4 vector of (uint32_t) into a length len vector of |
||||||
|
* (unsigned char) in big-endian form. Assumes len is a multiple of 4. |
||||||
|
*/ |
||||||
|
static inline void |
||||||
|
be32enc_vect(uint32_t *dst, const uint32_t *src, uint32_t len) |
||||||
|
{ |
||||||
|
uint32_t i; |
||||||
|
|
||||||
|
for (i = 0; i < len; i++) |
||||||
|
dst[i] = htobe32(src[i]); |
||||||
|
} |
||||||
|
|
||||||
|
|
||||||
|
inline void talkhash(void *state, const void *input) |
||||||
|
{ |
||||||
|
init_Nhash_contexts(); |
||||||
|
|
||||||
|
Xhash_context_holder ctx; |
||||||
|
|
||||||
|
uint32_t hashA[16], hashB[16]; |
||||||
|
//blake-bmw-groestl-sken-jh-meccak-luffa-cubehash-shivite-simd-echo
|
||||||
|
memcpy(&ctx, &base_contexts, sizeof(base_contexts)); |
||||||
|
|
||||||
|
sph_blake512 (&ctx.blake1, input, 80); |
||||||
|
sph_blake512_close (&ctx.blake1, hashA); |
||||||
|
|
||||||
|
sph_groestl512 (&ctx.groestl1, hashA, 64); |
||||||
|
sph_groestl512_close(&ctx.groestl1, hashB); |
||||||
|
|
||||||
|
sph_jh512 (&ctx.jh1, hashB, 64); |
||||||
|
sph_jh512_close(&ctx.jh1, hashA); |
||||||
|
|
||||||
|
sph_keccak512 (&ctx.keccak1, hashA, 64); |
||||||
|
sph_keccak512_close(&ctx.keccak1, hashB); |
||||||
|
|
||||||
|
sph_skein512 (&ctx.skein1, hashB, 64); |
||||||
|
sph_skein512_close(&ctx.skein1, hashA); |
||||||
|
|
||||||
|
memcpy(state, hashA, 32); |
||||||
|
} |
||||||
|
|
||||||
|
static const uint32_t diff1targ = 0x0000ffff; |
||||||
|
|
||||||
|
/* Used externally as confirmation of correct OCL code */ |
||||||
|
int talkcoin_test(unsigned char *pdata, const unsigned char *ptarget, uint32_t nonce) |
||||||
|
{ |
||||||
|
uint32_t tmp_hash7, Htarg = le32toh(((const uint32_t *)ptarget)[7]); |
||||||
|
uint32_t data[20], ohash[8]; |
||||||
|
|
||||||
|
be32enc_vect(data, (const uint32_t *)pdata, 19); |
||||||
|
data[19] = htobe32(nonce); |
||||||
|
talkhash(ohash, data); |
||||||
|
|
||||||
|
tmp_hash7 = be32toh(ohash[7]); |
||||||
|
|
||||||
|
applog(LOG_DEBUG, "htarget %08lx diff1 %08lx hash %08lx", |
||||||
|
(long unsigned int)Htarg, |
||||||
|
(long unsigned int)diff1targ, |
||||||
|
(long unsigned int)tmp_hash7); |
||||||
|
if (tmp_hash7 > diff1targ) |
||||||
|
return -1; |
||||||
|
if (tmp_hash7 > Htarg) |
||||||
|
return 0; |
||||||
|
return 1; |
||||||
|
} |
||||||
|
|
||||||
|
void talkcoin_regenhash(struct work *work) |
||||||
|
{ |
||||||
|
uint32_t data[20]; |
||||||
|
uint32_t *nonce = (uint32_t *)(work->data + 76); |
||||||
|
uint32_t *ohash = (uint32_t *)(work->hash); |
||||||
|
|
||||||
|
be32enc_vect(data, (const uint32_t *)work->data, 19); |
||||||
|
data[19] = htobe32(*nonce); |
||||||
|
talkhash(ohash, data); |
||||||
|
} |
||||||
|
|
||||||
|
bool scanhash_talkcoin(struct thr_info *thr, const unsigned char __maybe_unused *pmidstate, |
||||||
|
unsigned char *pdata, unsigned char __maybe_unused *phash1, |
||||||
|
unsigned char __maybe_unused *phash, const unsigned char *ptarget, |
||||||
|
uint32_t max_nonce, uint32_t *last_nonce, uint32_t n) |
||||||
|
{ |
||||||
|
uint32_t *nonce = (uint32_t *)(pdata + 76); |
||||||
|
uint32_t data[20]; |
||||||
|
uint32_t tmp_hash7; |
||||||
|
uint32_t Htarg = le32toh(((const uint32_t *)ptarget)[7]); |
||||||
|
bool ret = false; |
||||||
|
|
||||||
|
be32enc_vect(data, (const uint32_t *)pdata, 19); |
||||||
|
|
||||||
|
while(1) { |
||||||
|
uint32_t ostate[8]; |
||||||
|
|
||||||
|
*nonce = ++n; |
||||||
|
data[19] = (n); |
||||||
|
talkhash(ostate, data); |
||||||
|
tmp_hash7 = (ostate[7]); |
||||||
|
|
||||||
|
applog(LOG_INFO, "data7 %08lx", |
||||||
|
(long unsigned int)data[7]); |
||||||
|
|
||||||
|
if (unlikely(tmp_hash7 <= Htarg)) { |
||||||
|
((uint32_t *)pdata)[19] = htobe32(n); |
||||||
|
*last_nonce = n; |
||||||
|
ret = true; |
||||||
|
break; |
||||||
|
} |
||||||
|
|
||||||
|
if (unlikely((n >= max_nonce) || thr->work_restart)) { |
||||||
|
*last_nonce = n; |
||||||
|
break; |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
return ret; |
||||||
|
} |
@ -0,0 +1,10 @@ |
|||||||
|
#ifndef TALKCOIN_H |
||||||
|
#define TALKCOIN_H |
||||||
|
|
||||||
|
#include "miner.h" |
||||||
|
|
||||||
|
extern int talkcoin_test(unsigned char *pdata, const unsigned char *ptarget, |
||||||
|
uint32_t nonce); |
||||||
|
extern void talkcoin_regenhash(struct work *work); |
||||||
|
|
||||||
|
#endif /* TALKCOIN_H */ |
@ -0,0 +1,378 @@ |
|||||||
|
/* |
||||||
|
* TalkCoin kernel implementation. |
||||||
|
* |
||||||
|
* ==========================(LICENSE BEGIN)============================ |
||||||
|
* |
||||||
|
* Copyright (c) 2014 phm |
||||||
|
* |
||||||
|
* Permission is hereby granted, free of charge, to any person obtaining |
||||||
|
* a copy of this software and associated documentation files (the |
||||||
|
* "Software"), to deal in the Software without restriction, including |
||||||
|
* without limitation the rights to use, copy, modify, merge, publish, |
||||||
|
* distribute, sublicense, and/or sell copies of the Software, and to |
||||||
|
* permit persons to whom the Software is furnished to do so, subject to |
||||||
|
* the following conditions: |
||||||
|
* |
||||||
|
* The above copyright notice and this permission notice shall be |
||||||
|
* included in all copies or substantial portions of the Software. |
||||||
|
* |
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, |
||||||
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF |
||||||
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. |
||||||
|
* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY |
||||||
|
* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, |
||||||
|
* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE |
||||||
|
* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. |
||||||
|
* |
||||||
|
* ===========================(LICENSE END)============================= |
||||||
|
* |
||||||
|
* @author phm <phm@inbox.com> |
||||||
|
*/ |
||||||
|
|
||||||
|
#ifndef TALKCOIN_MOD_CL |
||||||
|
#define TALKCOIN_MOD_CL |
||||||
|
|
||||||
|
#if __ENDIAN_LITTLE__ |
||||||
|
#define SPH_LITTLE_ENDIAN 1 |
||||||
|
#else |
||||||
|
#define SPH_BIG_ENDIAN 1 |
||||||
|
#endif |
||||||
|
|
||||||
|
#define SPH_UPTR sph_u64 |
||||||
|
|
||||||
|
typedef unsigned int sph_u32; |
||||||
|
typedef int sph_s32; |
||||||
|
#ifndef __OPENCL_VERSION__ |
||||||
|
typedef unsigned long long sph_u64; |
||||||
|
typedef long long sph_s64; |
||||||
|
#else |
||||||
|
typedef unsigned long sph_u64; |
||||||
|
typedef long sph_s64; |
||||||
|
#endif |
||||||
|
|
||||||
|
#define SPH_64 1 |
||||||
|
#define SPH_64_TRUE 1 |
||||||
|
|
||||||
|
#define SPH_C32(x) ((sph_u32)(x ## U)) |
||||||
|
#define SPH_T32(x) (as_uint(x)) |
||||||
|
#define SPH_ROTL32(x, n) rotate(as_uint(x), as_uint(n)) |
||||||
|
#define SPH_ROTR32(x, n) SPH_ROTL32(x, (32 - (n))) |
||||||
|
|
||||||
|
#define SPH_C64(x) ((sph_u64)(x ## UL)) |
||||||
|
#define SPH_T64(x) (as_ulong(x)) |
||||||
|
#define SPH_ROTL64(x, n) rotate(as_ulong(x), (n) & 0xFFFFFFFFFFFFFFFFUL) |
||||||
|
#define SPH_ROTR64(x, n) SPH_ROTL64(x, (64 - (n))) |
||||||
|
|
||||||
|
#define SPH_COMPACT_BLAKE_64 0 |
||||||
|
#define SPH_GROESTL_BIG_ENDIAN 0 |
||||||
|
#define SPH_SMALL_FOOTPRINT_GROESTL 0 |
||||||
|
#define SPH_JH_64 1 |
||||||
|
#define SPH_KECCAK_64 1 |
||||||
|
#define SPH_KECCAK_NOCOPY 0 |
||||||
|
#define SPH_KECCAK_UNROLL 0 |
||||||
|
|
||||||
|
#include "blake.cl" |
||||||
|
#include "groestl.cl" |
||||||
|
#include "jh.cl" |
||||||
|
#include "keccak.cl" |
||||||
|
#include "skein.cl" |
||||||
|
|
||||||
|
#define SWAP4(x) as_uint(as_uchar4(x).wzyx) |
||||||
|
#define SWAP8(x) as_ulong(as_uchar8(x).s76543210) |
||||||
|
|
||||||
|
#if SPH_BIG_ENDIAN |
||||||
|
#define DEC64E(x) (x) |
||||||
|
#define DEC64BE(x) (*(const __global sph_u64 *) (x)); |
||||||
|
#else |
||||||
|
#define DEC64E(x) SWAP8(x) |
||||||
|
#define DEC64BE(x) SWAP8(*(const __global sph_u64 *) (x)); |
||||||
|
#endif |
||||||
|
|
||||||
|
|
||||||
|
typedef union { |
||||||
|
unsigned char h1[64]; |
||||||
|
uint h4[16]; |
||||||
|
ulong h8[8]; |
||||||
|
} hash_t; |
||||||
|
|
||||||
|
// blake |
||||||
|
__attribute__((reqd_work_group_size(WORKSIZE, 1, 1))) |
||||||
|
__kernel void search(__global unsigned char* block, __global hash_t* hashes) |
||||||
|
{ |
||||||
|
uint gid = get_global_id(0); |
||||||
|
__global hash_t *hash = &(hashes[gid-get_global_offset(0)]); |
||||||
|
|
||||||
|
sph_u64 H0 = SPH_C64(0x6A09E667F3BCC908), H1 = SPH_C64(0xBB67AE8584CAA73B); |
||||||
|
sph_u64 H2 = SPH_C64(0x3C6EF372FE94F82B), H3 = SPH_C64(0xA54FF53A5F1D36F1); |
||||||
|
sph_u64 H4 = SPH_C64(0x510E527FADE682D1), H5 = SPH_C64(0x9B05688C2B3E6C1F); |
||||||
|
sph_u64 H6 = SPH_C64(0x1F83D9ABFB41BD6B), H7 = SPH_C64(0x5BE0CD19137E2179); |
||||||
|
sph_u64 S0 = 0, S1 = 0, S2 = 0, S3 = 0; |
||||||
|
sph_u64 T0 = SPH_C64(0xFFFFFFFFFFFFFC00) + (80 << 3), T1 = 0xFFFFFFFFFFFFFFFF;; |
||||||
|
|
||||||
|
if ((T0 = SPH_T64(T0 + 1024)) < 1024) |
||||||
|
{ |
||||||
|
T1 = SPH_T64(T1 + 1); |
||||||
|
} |
||||||
|
sph_u64 M0, M1, M2, M3, M4, M5, M6, M7; |
||||||
|
sph_u64 M8, M9, MA, MB, MC, MD, ME, MF; |
||||||
|
sph_u64 V0, V1, V2, V3, V4, V5, V6, V7; |
||||||
|
sph_u64 V8, V9, VA, VB, VC, VD, VE, VF; |
||||||
|
M0 = DEC64BE(block + 0); |
||||||
|
M1 = DEC64BE(block + 8); |
||||||
|
M2 = DEC64BE(block + 16); |
||||||
|
M3 = DEC64BE(block + 24); |
||||||
|
M4 = DEC64BE(block + 32); |
||||||
|
M5 = DEC64BE(block + 40); |
||||||
|
M6 = DEC64BE(block + 48); |
||||||
|
M7 = DEC64BE(block + 56); |
||||||
|
M8 = DEC64BE(block + 64); |
||||||
|
M9 = DEC64BE(block + 72); |
||||||
|
M9 &= 0xFFFFFFFF00000000; |
||||||
|
M9 ^= SWAP4(gid); |
||||||
|
MA = 0x8000000000000000; |
||||||
|
MB = 0; |
||||||
|
MC = 0; |
||||||
|
MD = 1; |
||||||
|
ME = 0; |
||||||
|
MF = 0x280; |
||||||
|
|
||||||
|
COMPRESS64; |
||||||
|
|
||||||
|
hash->h8[0] = H0; |
||||||
|
hash->h8[1] = H1; |
||||||
|
hash->h8[2] = H2; |
||||||
|
hash->h8[3] = H3; |
||||||
|
hash->h8[4] = H4; |
||||||
|
hash->h8[5] = H5; |
||||||
|
hash->h8[6] = H6; |
||||||
|
hash->h8[7] = H7; |
||||||
|
|
||||||
|
barrier(CLK_GLOBAL_MEM_FENCE); |
||||||
|
} |
||||||
|
|
||||||
|
// groestl |
||||||
|
__attribute__((reqd_work_group_size(WORKSIZE, 1, 1))) |
||||||
|
__kernel void search1(__global hash_t* hashes) |
||||||
|
{ |
||||||
|
uint gid = get_global_id(0); |
||||||
|
__global hash_t *hash = &(hashes[gid-get_global_offset(0)]); |
||||||
|
|
||||||
|
__local sph_u64 T0_L[256], T1_L[256], T2_L[256], T3_L[256], T4_L[256], T5_L[256], T6_L[256], T7_L[256]; |
||||||
|
|
||||||
|
int init = get_local_id(0); |
||||||
|
int step = get_local_size(0); |
||||||
|
|
||||||
|
for (int i = init; i < 256; i += step) |
||||||
|
{ |
||||||
|
T0_L[i] = T0[i]; |
||||||
|
T1_L[i] = T1[i]; |
||||||
|
T2_L[i] = T2[i]; |
||||||
|
T3_L[i] = T3[i]; |
||||||
|
T4_L[i] = T4[i]; |
||||||
|
T5_L[i] = T5[i]; |
||||||
|
T6_L[i] = T6[i]; |
||||||
|
T7_L[i] = T7[i]; |
||||||
|
} |
||||||
|
barrier(CLK_LOCAL_MEM_FENCE); |
||||||
|
|
||||||
|
#define T0 T0_L |
||||||
|
#define T1 T1_L |
||||||
|
#define T2 T2_L |
||||||
|
#define T3 T3_L |
||||||
|
#define T4 T4_L |
||||||
|
#define T5 T5_L |
||||||
|
#define T6 T6_L |
||||||
|
#define T7 T7_L |
||||||
|
|
||||||
|
sph_u64 H[16]; |
||||||
|
for (unsigned int u = 0; u < 15; u ++) |
||||||
|
H[u] = 0; |
||||||
|
#if USE_LE |
||||||
|
H[15] = ((sph_u64)(512 & 0xFF) << 56) | ((sph_u64)(512 & 0xFF00) << 40); |
||||||
|
#else |
||||||
|
H[15] = (sph_u64)512; |
||||||
|
#endif |
||||||
|
|
||||||
|
sph_u64 g[16], m[16]; |
||||||
|
m[0] = DEC64E(hash->h8[0]); |
||||||
|
m[1] = DEC64E(hash->h8[1]); |
||||||
|
m[2] = DEC64E(hash->h8[2]); |
||||||
|
m[3] = DEC64E(hash->h8[3]); |
||||||
|
m[4] = DEC64E(hash->h8[4]); |
||||||
|
m[5] = DEC64E(hash->h8[5]); |
||||||
|
m[6] = DEC64E(hash->h8[6]); |
||||||
|
m[7] = DEC64E(hash->h8[7]); |
||||||
|
for (unsigned int u = 0; u < 16; u ++) |
||||||
|
g[u] = m[u] ^ H[u]; |
||||||
|
m[8] = 0x80; g[8] = m[8] ^ H[8]; |
||||||
|
m[9] = 0; g[9] = m[9] ^ H[9]; |
||||||
|
m[10] = 0; g[10] = m[10] ^ H[10]; |
||||||
|
m[11] = 0; g[11] = m[11] ^ H[11]; |
||||||
|
m[12] = 0; g[12] = m[12] ^ H[12]; |
||||||
|
m[13] = 0; g[13] = m[13] ^ H[13]; |
||||||
|
m[14] = 0; g[14] = m[14] ^ H[14]; |
||||||
|
m[15] = 0x100000000000000; g[15] = m[15] ^ H[15]; |
||||||
|
PERM_BIG_P(g); |
||||||
|
PERM_BIG_Q(m); |
||||||
|
for (unsigned int u = 0; u < 16; u ++) |
||||||
|
H[u] ^= g[u] ^ m[u]; |
||||||
|
sph_u64 xH[16]; |
||||||
|
for (unsigned int u = 0; u < 16; u ++) |
||||||
|
xH[u] = H[u]; |
||||||
|
PERM_BIG_P(xH); |
||||||
|
for (unsigned int u = 0; u < 16; u ++) |
||||||
|
H[u] ^= xH[u]; |
||||||
|
for (unsigned int u = 0; u < 8; u ++) |
||||||
|
hash->h8[u] = DEC64E(H[u + 8]); |
||||||
|
|
||||||
|
barrier(CLK_GLOBAL_MEM_FENCE); |
||||||
|
} |
||||||
|
|
||||||
|
// jh |
||||||
|
__attribute__((reqd_work_group_size(WORKSIZE, 1, 1))) |
||||||
|
__kernel void search2(__global hash_t* hashes) |
||||||
|
{ |
||||||
|
uint gid = get_global_id(0); |
||||||
|
__global hash_t *hash = &(hashes[gid-get_global_offset(0)]); |
||||||
|
|
||||||
|
sph_u64 h0h = C64e(0x6fd14b963e00aa17), h0l = C64e(0x636a2e057a15d543), h1h = C64e(0x8a225e8d0c97ef0b), h1l = C64e(0xe9341259f2b3c361), h2h = C64e(0x891da0c1536f801e), h2l = C64e(0x2aa9056bea2b6d80), h3h = C64e(0x588eccdb2075baa6), h3l = C64e(0xa90f3a76baf83bf7); |
||||||
|
sph_u64 h4h = C64e(0x0169e60541e34a69), h4l = C64e(0x46b58a8e2e6fe65a), h5h = C64e(0x1047a7d0c1843c24), h5l = C64e(0x3b6e71b12d5ac199), h6h = C64e(0xcf57f6ec9db1f856), h6l = C64e(0xa706887c5716b156), h7h = C64e(0xe3c2fcdfe68517fb), h7l = C64e(0x545a4678cc8cdd4b); |
||||||
|
sph_u64 tmp; |
||||||
|
|
||||||
|
|
||||||
|
for(int i = 0; i < 2; i++) |
||||||
|
{ |
||||||
|
if (i == 0) { |
||||||
|
h0h ^= DEC64E(hash->h8[0]); |
||||||
|
h0l ^= DEC64E(hash->h8[1]); |
||||||
|
h1h ^= DEC64E(hash->h8[2]); |
||||||
|
h1l ^= DEC64E(hash->h8[3]); |
||||||
|
h2h ^= DEC64E(hash->h8[4]); |
||||||
|
h2l ^= DEC64E(hash->h8[5]); |
||||||
|
h3h ^= DEC64E(hash->h8[6]); |
||||||
|
h3l ^= DEC64E(hash->h8[7]); |
||||||
|
} else if(i == 1) { |
||||||
|
h4h ^= DEC64E(hash->h8[0]); |
||||||
|
h4l ^= DEC64E(hash->h8[1]); |
||||||
|
h5h ^= DEC64E(hash->h8[2]); |
||||||
|
h5l ^= DEC64E(hash->h8[3]); |
||||||
|
h6h ^= DEC64E(hash->h8[4]); |
||||||
|
h6l ^= DEC64E(hash->h8[5]); |
||||||
|
h7h ^= DEC64E(hash->h8[6]); |
||||||
|
h7l ^= DEC64E(hash->h8[7]); |
||||||
|
|
||||||
|
h0h ^= 0x80; |
||||||
|
h3l ^= 0x2000000000000; |
||||||
|
} |
||||||
|
E8; |
||||||
|
} |
||||||
|
h4h ^= 0x80; |
||||||
|
h7l ^= 0x2000000000000; |
||||||
|
|
||||||
|
hash->h8[0] = DEC64E(h4h); |
||||||
|
hash->h8[1] = DEC64E(h4l); |
||||||
|
hash->h8[2] = DEC64E(h5h); |
||||||
|
hash->h8[3] = DEC64E(h5l); |
||||||
|
hash->h8[4] = DEC64E(h6h); |
||||||
|
hash->h8[5] = DEC64E(h6l); |
||||||
|
hash->h8[6] = DEC64E(h7h); |
||||||
|
hash->h8[7] = DEC64E(h7l); |
||||||
|
|
||||||
|
barrier(CLK_GLOBAL_MEM_FENCE); |
||||||
|
} |
||||||
|
|
||||||
|
|
||||||
|
// keccak |
||||||
|
__attribute__((reqd_work_group_size(WORKSIZE, 1, 1))) |
||||||
|
__kernel void search3(__global hash_t* hashes) |
||||||
|
{ |
||||||
|
uint gid = get_global_id(0); |
||||||
|
__global hash_t *hash = &(hashes[gid-get_global_offset(0)]); |
||||||
|
|
||||||
|
// keccak |
||||||
|
|
||||||
|
sph_u64 a00 = 0, a01 = 0, a02 = 0, a03 = 0, a04 = 0; |
||||||
|
sph_u64 a10 = 0, a11 = 0, a12 = 0, a13 = 0, a14 = 0; |
||||||
|
sph_u64 a20 = 0, a21 = 0, a22 = 0, a23 = 0, a24 = 0; |
||||||
|
sph_u64 a30 = 0, a31 = 0, a32 = 0, a33 = 0, a34 = 0; |
||||||
|
sph_u64 a40 = 0, a41 = 0, a42 = 0, a43 = 0, a44 = 0; |
||||||
|
|
||||||
|
a10 = SPH_C64(0xFFFFFFFFFFFFFFFF); |
||||||
|
a20 = SPH_C64(0xFFFFFFFFFFFFFFFF); |
||||||
|
a31 = SPH_C64(0xFFFFFFFFFFFFFFFF); |
||||||
|
a22 = SPH_C64(0xFFFFFFFFFFFFFFFF); |
||||||
|
a23 = SPH_C64(0xFFFFFFFFFFFFFFFF); |
||||||
|
a04 = SPH_C64(0xFFFFFFFFFFFFFFFF); |
||||||
|
|
||||||
|
a00 ^= SWAP8(hash->h8[0]); |
||||||
|
a10 ^= SWAP8(hash->h8[1]); |
||||||
|
a20 ^= SWAP8(hash->h8[2]); |
||||||
|
a30 ^= SWAP8(hash->h8[3]); |
||||||
|
a40 ^= SWAP8(hash->h8[4]); |
||||||
|
a01 ^= SWAP8(hash->h8[5]); |
||||||
|
a11 ^= SWAP8(hash->h8[6]); |
||||||
|
a21 ^= SWAP8(hash->h8[7]); |
||||||
|
a31 ^= 0x8000000000000001; |
||||||
|
KECCAK_F_1600; |
||||||
|
// Finalize the "lane complement" |
||||||
|
a10 = ~a10; |
||||||
|
a20 = ~a20; |
||||||
|
|
||||||
|
hash->h8[0] = SWAP8(a00); |
||||||
|
hash->h8[1] = SWAP8(a10); |
||||||
|
hash->h8[2] = SWAP8(a20); |
||||||
|
hash->h8[3] = SWAP8(a30); |
||||||
|
hash->h8[4] = SWAP8(a40); |
||||||
|
hash->h8[5] = SWAP8(a01); |
||||||
|
hash->h8[6] = SWAP8(a11); |
||||||
|
hash->h8[7] = SWAP8(a21); |
||||||
|
|
||||||
|
barrier(CLK_GLOBAL_MEM_FENCE); |
||||||
|
} |
||||||
|
|
||||||
|
|
||||||
|
// skein |
||||||
|
__attribute__((reqd_work_group_size(WORKSIZE, 1, 1))) |
||||||
|
__kernel void search4(__global hash_t* hashes, __global uint* output, const ulong target) |
||||||
|
{ |
||||||
|
uint gid = get_global_id(0); |
||||||
|
uint offset = get_global_offset(0); |
||||||
|
hash_t hash; |
||||||
|
__global hash_t *hashp = &(hashes[gid-offset]); |
||||||
|
|
||||||
|
for (int i = 0; i < 8; i++) { |
||||||
|
hash.h8[i] = hashes[gid-offset].h8[i]; |
||||||
|
} |
||||||
|
|
||||||
|
sph_u64 h0 = SPH_C64(0x4903ADFF749C51CE), h1 = SPH_C64(0x0D95DE399746DF03), h2 = SPH_C64(0x8FD1934127C79BCE), h3 = SPH_C64(0x9A255629FF352CB1), h4 = SPH_C64(0x5DB62599DF6CA7B0), h5 = SPH_C64(0xEABE394CA9D5C3F4), h6 = SPH_C64(0x991112C71A75B523), h7 = SPH_C64(0xAE18A40B660FCC33); |
||||||
|
sph_u64 m0, m1, m2, m3, m4, m5, m6, m7; |
||||||
|
sph_u64 bcount = 0; |
||||||
|
|
||||||
|
m0 = SWAP8(hash.h8[0]); |
||||||
|
m1 = SWAP8(hash.h8[1]); |
||||||
|
m2 = SWAP8(hash.h8[2]); |
||||||
|
m3 = SWAP8(hash.h8[3]); |
||||||
|
m4 = SWAP8(hash.h8[4]); |
||||||
|
m5 = SWAP8(hash.h8[5]); |
||||||
|
m6 = SWAP8(hash.h8[6]); |
||||||
|
m7 = SWAP8(hash.h8[7]); |
||||||
|
UBI_BIG(480, 64); |
||||||
|
bcount = 0; |
||||||
|
m0 = m1 = m2 = m3 = m4 = m5 = m6 = m7 = 0; |
||||||
|
UBI_BIG(510, 8); |
||||||
|
hash.h8[0] = SWAP8(h0); |
||||||
|
hash.h8[1] = SWAP8(h1); |
||||||
|
hash.h8[2] = SWAP8(h2); |
||||||
|
hash.h8[3] = SWAP8(h3); |
||||||
|
hash.h8[4] = SWAP8(h4); |
||||||
|
hash.h8[5] = SWAP8(h5); |
||||||
|
hash.h8[6] = SWAP8(h6); |
||||||
|
hash.h8[7] = SWAP8(h7); |
||||||
|
|
||||||
|
bool result = (SWAP8(hash.h8[3]) <= target); |
||||||
|
if (result) |
||||||
|
output[atomic_inc(output+0xFF)] = SWAP4(gid); |
||||||
|
|
||||||
|
} |
||||||
|
|
||||||
|
#endif // TALKCOIN_MOD_CL |
Loading…
Reference in new issue