/** * Author......: See docs/credits.txt * License.....: MIT */ #ifdef KERNEL_STATIC #include M2S(INCLUDE_PATH/inc_vendor.h) #include M2S(INCLUDE_PATH/inc_types.h) #include M2S(INCLUDE_PATH/inc_platform.cl) #include M2S(INCLUDE_PATH/inc_common.cl) #include M2S(INCLUDE_PATH/inc_hash_sha256.cl) #include M2S(INCLUDE_PATH/inc_hash_scrypt.cl) #endif #define COMPARE_S M2S(INCLUDE_PATH/inc_comp_single.cl) #define COMPARE_M M2S(INCLUDE_PATH/inc_comp_multi.cl) typedef struct ethereum_scrypt { u32 salt_buf[16]; u32 ciphertext[8]; } ethereum_scrypt_t; #ifndef KECCAK_ROUNDS #define KECCAK_ROUNDS 24 #endif #define Theta1(s) (st[0 + s] ^ st[5 + s] ^ st[10 + s] ^ st[15 + s] ^ st[20 + s]) #define Theta2(s) \ { \ st[ 0 + s] ^= t; \ st[ 5 + s] ^= t; \ st[10 + s] ^= t; \ st[15 + s] ^= t; \ st[20 + s] ^= t; \ } #define Rho_Pi(s) \ { \ u32 j = keccakf_piln[s]; \ u32 k = keccakf_rotc[s]; \ bc0 = st[j]; \ st[j] = hc_rotl64_S (t, k); \ t = bc0; \ } #define Chi(s) \ { \ bc0 = st[0 + s]; \ bc1 = st[1 + s]; \ bc2 = st[2 + s]; \ bc3 = st[3 + s]; \ bc4 = st[4 + s]; \ st[0 + s] ^= ~bc1 & bc2; \ st[1 + s] ^= ~bc2 & bc3; \ st[2 + s] ^= ~bc3 & bc4; \ st[3 + s] ^= ~bc4 & bc0; \ st[4 + s] ^= ~bc0 & bc1; \ } CONSTANT_VK u64a keccakf_rndc[24] = { KECCAK_RNDC_00, KECCAK_RNDC_01, KECCAK_RNDC_02, KECCAK_RNDC_03, KECCAK_RNDC_04, KECCAK_RNDC_05, KECCAK_RNDC_06, KECCAK_RNDC_07, KECCAK_RNDC_08, KECCAK_RNDC_09, KECCAK_RNDC_10, KECCAK_RNDC_11, KECCAK_RNDC_12, KECCAK_RNDC_13, KECCAK_RNDC_14, KECCAK_RNDC_15, KECCAK_RNDC_16, KECCAK_RNDC_17, KECCAK_RNDC_18, KECCAK_RNDC_19, KECCAK_RNDC_20, KECCAK_RNDC_21, KECCAK_RNDC_22, KECCAK_RNDC_23 }; DECLSPEC void keccak_transform_S (PRIVATE_AS u64 *st) { const u8 keccakf_rotc[24] = { 1, 3, 6, 10, 15, 21, 28, 36, 45, 55, 2, 14, 27, 41, 56, 8, 25, 43, 62, 18, 39, 61, 20, 44 }; const u8 keccakf_piln[24] = { 10, 7, 11, 17, 18, 3, 5, 16, 8, 21, 24, 4, 15, 23, 19, 13, 12, 2, 20, 14, 22, 9, 6, 1 }; /** * Keccak */ int round; for (round = 0; round < KECCAK_ROUNDS; round++) { // Theta u64 bc0 = Theta1 (0); u64 bc1 = Theta1 (1); u64 bc2 = Theta1 (2); u64 bc3 = Theta1 (3); u64 bc4 = Theta1 (4); u64 t; t = bc4 ^ hc_rotl64_S (bc1, 1); Theta2 (0); t = bc0 ^ hc_rotl64_S (bc2, 1); Theta2 (1); t = bc1 ^ hc_rotl64_S (bc3, 1); Theta2 (2); t = bc2 ^ hc_rotl64_S (bc4, 1); Theta2 (3); t = bc3 ^ hc_rotl64_S (bc0, 1); Theta2 (4); // Rho Pi t = st[1]; Rho_Pi (0); Rho_Pi (1); Rho_Pi (2); Rho_Pi (3); Rho_Pi (4); Rho_Pi (5); Rho_Pi (6); Rho_Pi (7); Rho_Pi (8); Rho_Pi (9); Rho_Pi (10); Rho_Pi (11); Rho_Pi (12); Rho_Pi (13); Rho_Pi (14); Rho_Pi (15); Rho_Pi (16); Rho_Pi (17); Rho_Pi (18); Rho_Pi (19); Rho_Pi (20); Rho_Pi (21); Rho_Pi (22); Rho_Pi (23); // Chi Chi (0); Chi (5); Chi (10); Chi (15); Chi (20); // Iota st[0] ^= keccakf_rndc[round]; } } KERNEL_FQ KERNEL_FA void m15700_init (KERN_ATTR_TMPS_ESALT (scrypt_tmp_t, ethereum_scrypt_t)) { const u64 gid = get_global_id (0); if (gid >= GID_CNT) return; scrypt_pbkdf2_ggg (pws[gid].i, pws[gid].pw_len, salt_bufs[SALT_POS_HOST].salt_buf, salt_bufs[SALT_POS_HOST].salt_len, tmps[gid].in, SCRYPT_SZ); scrypt_blockmix_in (tmps[gid].in, tmps[gid].out, SCRYPT_SZ); } KERNEL_FQ KERNEL_FA void m15700_loop_prepare (KERN_ATTR_TMPS (scrypt_tmp_t)) { const u64 gid = get_global_id (0); const u64 lid = get_local_id (0); const u64 lsz = get_local_size (0); const u64 bid = get_group_id (0); if (gid >= GID_CNT) return; u32 X[STATE_CNT4]; GLOBAL_AS u32 *P = tmps[gid].out + (SALT_REPEAT * STATE_CNT4); scrypt_smix_init (P, X, d_extra0_buf, d_extra1_buf, d_extra2_buf, d_extra3_buf, gid, lid, lsz, bid); } KERNEL_FQ KERNEL_FA void m15700_loop (KERN_ATTR_TMPS (scrypt_tmp_t)) { const u64 gid = get_global_id (0); const u64 lid = get_local_id (0); const u64 lsz = get_local_size (0); const u64 bid = get_group_id (0); if (gid >= GID_CNT) return; u32 X[STATE_CNT4]; u32 T[STATE_CNT4]; GLOBAL_AS u32 *P = tmps[gid].out + (SALT_REPEAT * STATE_CNT4); scrypt_smix_loop (P, X, T, d_extra0_buf, d_extra1_buf, d_extra2_buf, d_extra3_buf, gid, lid, lsz, bid); } KERNEL_FQ KERNEL_FA void m15700_comp (KERN_ATTR_TMPS_ESALT (scrypt_tmp_t, ethereum_scrypt_t)) { const u64 gid = get_global_id (0); if (gid >= GID_CNT) return; scrypt_blockmix_out (tmps[gid].out, tmps[gid].in, SCRYPT_SZ); u32 out[8]; scrypt_pbkdf2_ggp (pws[gid].i, pws[gid].pw_len, tmps[gid].in, SCRYPT_SZ, out, 32); /** * keccak */ u32 ciphertext[8]; ciphertext[0] = esalt_bufs[DIGESTS_OFFSET_HOST].ciphertext[0]; ciphertext[1] = esalt_bufs[DIGESTS_OFFSET_HOST].ciphertext[1]; ciphertext[2] = esalt_bufs[DIGESTS_OFFSET_HOST].ciphertext[2]; ciphertext[3] = esalt_bufs[DIGESTS_OFFSET_HOST].ciphertext[3]; ciphertext[4] = esalt_bufs[DIGESTS_OFFSET_HOST].ciphertext[4]; ciphertext[5] = esalt_bufs[DIGESTS_OFFSET_HOST].ciphertext[5]; ciphertext[6] = esalt_bufs[DIGESTS_OFFSET_HOST].ciphertext[6]; ciphertext[7] = esalt_bufs[DIGESTS_OFFSET_HOST].ciphertext[7]; u32 key[4]; key[0] = out[4]; key[1] = out[5]; key[2] = out[6]; key[3] = out[7]; u64 st[25]; st[ 0] = hl32_to_64_S (key[1], key[0]); st[ 1] = hl32_to_64_S (key[3], key[2]); st[ 2] = hl32_to_64_S (ciphertext[1], ciphertext[0]); st[ 3] = hl32_to_64_S (ciphertext[3], ciphertext[2]); st[ 4] = hl32_to_64_S (ciphertext[5], ciphertext[4]); st[ 5] = hl32_to_64_S (ciphertext[7], ciphertext[6]); st[ 6] = 0x01; st[ 7] = 0; st[ 8] = 0; st[ 9] = 0; st[10] = 0; st[11] = 0; st[12] = 0; st[13] = 0; st[14] = 0; st[15] = 0; st[16] = 0; st[17] = 0; st[18] = 0; st[19] = 0; st[20] = 0; st[21] = 0; st[22] = 0; st[23] = 0; st[24] = 0; const u32 mdlen = 32; const u32 rsiz = 200 - (2 * mdlen); const u32 add80w = (rsiz - 1) / 8; st[add80w] |= 0x8000000000000000UL; keccak_transform_S (st); const u32 r0 = l32_from_64_S (st[0]); const u32 r1 = h32_from_64_S (st[0]); const u32 r2 = l32_from_64_S (st[1]); const u32 r3 = h32_from_64_S (st[1]); #define il_pos 0 #ifdef KERNEL_STATIC #include COMPARE_M #endif }