资讯

精准传达 • 有效沟通

从品牌网站建设到网络营销策划,从策略到执行的一站式服务

XDAG_Miner客户端到底做了什么-创新互联

开篇之前先聊聊背景:本人本身是想打造一个Python版本节点的,但是坑在了两个函数

10年积累的成都做网站、成都网站制作经验,可以快速应对客户对网站的新想法和需求。提供各种问题对应的解决方案。让选择我们的客户得到更好、更有力的网络服务。我虽然不认识你,你也不认识我。但先网站设计后付款的网站建设流程,更有余江免费网站建设让你可以放心的选择与我们合作。

XDAG_Miner客户端到底做了什么

  • dfslib_crypt_set_sector0

  • dfslib_encrypt_sector

这两个函数在节点和挖矿程序中都出现了,主要是对用户密码进行加密解密的函数,我尝试用Python翻译了一遍,效率极低,甚至都影响调试就放弃了。

    再对Python开发者说几句,整个XDAG代码并不多,但是其中运用了大量宏,字节截取,二进制处理,内存偏移等。导致对于Python这个语言来说,增加了大量转换工作,许多源码中一行的简单调用,在Python都要经过多行函数级处理才得已实现。所以Python初中级的朋友慎入~整个挖矿流程我用Python版本跑了一遍,效率比原版差了百倍,所以Python版本仅供参考研究使用,暂时无法投放在生产环境,本人在下个版本可能会参与到Go语言版本的重构中。

    言归正传,咱们走一遍整个GpuMiner都做了什么,其中涉及几个函数如下:

XDAG_Miner客户端到底做了什么

1, 生成_crypt变量,该变量是

XDAG_Miner客户端到底做了什么

MINERS_PWD经过开篇提到的两个函数加密之后得到的

XDAG_Miner客户端到底做了什么

2, 链接矿池,获取任务,看上去是获得了两个xdag_field结构体的任务,但其实后面是要结合起来加工的

3, 两个结构体任务分别经过dfslib_uncrypt_array函数,sectorNo参数分别是0和1

4, 通过AddressToHash函数把地址转换成Hash

5, task_ctx_data其实就是第二个获得的任务通过dfslib_uncrypt_array加密转换,再加上地址转换的Hash

6, task_ctx_state就是第一个任务通过dfslib_uncrypt_array加密之后的值

7, 变量main_time为当前时间经过GetMainTime函数的转换

8, nonce为一个2**64次方的随机数

9, minhash_data由一个数组[18446744073709551615,18446744073709551615,18446744073709551615,9895604649983]序列化得到

10, 从而可以输出所有变量如图:

XDAG_Miner客户端到底做了什么

11, 拿到了所有所需数据,下一步就要计算哈希了SearchMinNonce,其实这里有个小问题,SearchMinNonce得到最终是share时会多计算0-254次哈希,我个人判断,由于得到share需要经过大量哈希运算,作者为了方便编写就每256次为一组计算最小哈希,在和minhash做对比。

12, 拿到最小哈希和nonce并没有完,还需要通过dfslib_encrypt_array函数转换后,把fieldsCopy传回给矿池,整个过程结束。

本文提及的所有函数随后提供Python版本的Demo(由于时间问题,有点乱,不是很完整,多见谅),欢迎大家多多交流~

import struct

import copy

import ctypes

import time

import random

import hashlib

import numpy as np

from regs import regs

class xdag_field:

  pass

class _crypt:

  pass

_c = _crypt()

_c.regs = regs

_c.pwd = [781665893, 3404732475, 2212684154, 3744338274]

_readDataSize = b'\x9c\x0f_%\x19\x8c!{\x02\xed\xa7\x87h\xc6\xc4\xca\x1c\xe7Ut\xa2\xd4\x13\x993|\x9d@\xa0\xc1\xa4\n\xf6d\xa51nn\xb9\x81\xa5\xec\x8b\xdc\xc0\x1dz\xa1\xcfi5\x89\xa0K ?\xf6\x93b\xa5\x87\x8czj'

a = struct.unpack('Q',_readDataSize[0:8])[0]

b = struct.unpack('Q',_readDataSize[8:16])[0]

c = struct.unpack('Q',_readDataSize[16:24])[0]

d = struct.unpack('Q',_readDataSize[24:32])[0]

xdag_field1 = xdag_field()

xdag_field1.transport_header = a

xdag_field1.type = b

xdag_field1.time = c

xdag_field1.hash = [a, b, c]

xdag_field1.amount = d

xdag_field1.end_time = d

xdag_field1.data = [a, b, c, d]

a = struct.unpack('Q',_readDataSize[32:40])[0]

b = struct.unpack('Q',_readDataSize[40:48])[0]

c = struct.unpack('Q',_readDataSize[48:56])[0]

d = struct.unpack('Q',_readDataSize[56:64])[0]

xdag_field2 = xdag_field()

xdag_field2.transport_header = a

xdag_field2.type = b

xdag_field2.time = c

xdag_field2.hash = [a, b, c]

xdag_field2.amount = d

xdag_field2.end_time = d

xdag_field2.data = [a, b, c, d]

def dfs_crypt0(dfsc, a,x,y,z,t):

  dfs64 = np.uint64(y[0])

  dfs16 = np.uint16(t[0])

  tmp = np.uint32(z[0] + dfsc.regs[x[0] >> 16])

  dfs32 = np.uint32(int(dfs64* tmp) >> 16)

  a[0] = dfs32 ^ dfsc.regs[dfs16]

  return a[0]

def dfs_crypt2(dfsc, a,b,c,d,x,y,z,t):

  dfs_crypt0(dfsc, a,x,y,z,t);dfs_crypt0(dfsc, b,y,z,t,x)

  dfs_crypt0(dfsc, c,z,t,x,y);dfs_crypt0(dfsc, d,t,x,y,z)

def dfs_crypt3(dfsc, a,b,c,d,x,y,z,t):

  dfs_crypt2(dfsc, a,b,c,d,x,y,z,t);dfs_crypt2(dfsc, x,y,z,t,a,b,c,d)

def dfs_crypt6(dfsc, a,b,c,d,x,y,z,t):

  dfs_crypt3(dfsc, a,b,c,d,x,y,z,t);dfs_crypt3(dfsc, a,b,c,d,x,y,z,t)

  dfs_crypt3(dfsc, a,b,c,d,x,y,z,t);dfs_crypt3(dfsc, a,b,c,d,x,y,z,t)

  dfs_crypt3(dfsc, a,b,c,d,x,y,z,t);dfs_crypt3(dfsc, a,b,c,d,x,y,z,t)

  dfs_crypt3(dfsc, a,b,c,d,x,y,z,t);dfs_crypt3(dfsc, a,b,c,d,x,y,z,t)

def dfs_uncrypt2(dfsc, a, b, c, d, x, y, z, t, data, num):

  dfs_crypt0(dfsc, c, z, t, x, y); data[num[0]]= np.uint32(data[num[0]]) + np.uint32(dfs_crypt0(dfsc, d, t, x, y, z))

  a[0] = dfs_crypt0(dfsc, a, x, y, z, t) ^ ~data[num[0]];num[0] +=1;dfs_crypt0(dfsc, b, y, z, t, x)

def dfs_uncrypt3(dfsc, a, b, c, d, x, y, z, t, data, num):

  dfs_uncrypt2(dfsc, a, b, c, d, x, y, z, t, data, num);dfs_uncrypt2(dfsc, x, y, z, t, a, b, c, d, data, num)

def dfs_prepare(dfsc, sectorNo, x, y, z, t):

  sectorNo = int(np.uint64(1229426917 << 32 | 3433359571) * np.uint64(sectorNo))

  x[0] = dfsc.pwd[0] ^ dfsc.regs[sectorNo%65479 + 31]

  y[0] = dfsc.pwd[1] ^ dfsc.regs[sectorNo%65497 + 11]

  z[0] = dfsc.pwd[2] ^ dfsc.regs[sectorNo%65519 + 5]

  t[0] = dfsc.pwd[3] ^ dfsc.regs[sectorNo%65521 + 3]

  a, b, c, d = [0], [0], [0], [0]

  dfs_crypt6(dfsc, a,b,c,d,x,y,z,t)

def dfs_unmix2(c, d, num):

  c[0] = np.uint32(c[0] * 43385317);

  num[0]-=1;

  d[num[0]] ^=c[0]; c[0] ^= d[num[0]]

def dfs_unmixArray(d, num):

  c = [1615037507]

  for i in range(8):

    dfs_unmix2(c, d, num)

def dfslib_uncrypt_array(dfsc, data, sectorNo):

  a, b, c, d, x, y, z, t = [0], [0], [0], [0], [0], [0], [0], [0]

  dfs_prepare(dfsc, sectorNo, x, y, z, t)

  num = [0]

  data_list = []

  for _d in data:

    tmp = struct.pack('L', _d)

    data_list.append(struct.unpack('I', tmp[:4])[0])

    data_list.append(struct.unpack('I', tmp[4:])[0])

  for i in range(4):

    dfs_uncrypt3(dfsc, a, b, c, d, x, y, z, t, data_list, num)

  dfs_unmixArray(data_list, num)

  return data_list, [struct.unpack('L',struct.pack('I', data_list[0]) + struct.pack('I', data_list[1]))[0],

      struct.unpack('L',struct.pack('I', data_list[2]) + struct.pack('I', data_list[3]))[0],

      struct.unpack('L',struct.pack('I', data_list[4]) + struct.pack('I', data_list[5]))[0],

      struct.unpack('L',struct.pack('I', data_list[6]) + struct.pack('I', data_list[7]))[0]]

def GetMainTime():

  timer = time.time()

  tv_sec = int(timer)

  tv_usec = int((timer-tv_sec)*1000000)

  get_timestamp = tv_sec<<10 | int((tv_usec<<10)/1000000)

  MAIN_TIME = get_timestamp>>16

  MAIN_TIME = hex(MAIN_TIME)+'ffff'

  return MAIN_TIME

def AddressToHash(address):

  fld = b''

  _mime2bits = _mime2bits_init()

  e=n=0

  address_index = 0

  for i in range(32):

    while True:

      c = address[address_index]

      address_index+=1

      d = _mime2bits[c]

      if d&0xC0 == False:

        break

    e <<= 6

    e = np.uint16(e| d)

    n += 6

    if n>=8:

      n-=8

      fld += struct.pack('Q',e >> n)[:1]

  for i in range(8):

    fld+=b'\x00'

  return fld

def _mime2bits_init():

  bits2mime = b"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"

  _mime2bits = [0xFF] * 256

  for i in range(64):

    _mime2bits[bits2mime[i]] = i

  return _mime2bits

def ReadBE32(x):

  return (((x & 0xff000000) >> 24) | ((x & 0x00ff0000) >> 8) | ((x & 0x0000ff00) << 8) | ((x & 0x000000ff) << 24))

def WriteBE64x32(x):

  return (((x & 0xff00000000000000) >> 24) | ((x & 0x00ff000000000000) >> 8) | ((x & 0x0000ff0000000000) << 8) | ((x & 0x000000ff00000000) << 24) | ((x & 0x00000000ff000000) >> 24) | ((x & 0x0000000000ff0000) >> 8) | ((x & 0x000000000000ff00) << 8) | ((x & 0x00000000000000ff) << 24))

def Ch(x, y, z):

  return z ^ (x & (y ^ z))

def Maj(x, y, z):

  return (x & y) | (z & (x | y))

def Sigma0(x):

  return (x >> 2 | x << 30) ^ (x >> 13 | x << 19) ^ (x >> 22 | x << 10)

def Sigma1(x):

  return (x >> 6 | x << 26) ^ (x >> 11 | x << 21) ^ (x >> 25 | x << 7)

def sigma0(x):

  return (x >> 7 | x << 25) ^ (x >> 18 | x << 14) ^ (x >> 3)

def sigma1(x):

  return (x >> 17 | x << 15) ^ (x >> 19 | x << 13) ^ (x >> 10)

def Round(a, b, c, d, e, f, g, h, k, w):

  t1 = h[0] + Sigma1(e[0]) + Ch(e[0], f[0], g[0]) + k[0] + w[0]

  t2 = Sigma0(a[0]) + Maj(a[0], b[0], c[0])

  d[0] = np.uint32(d[0] + t1)

  h[0] = np.uint32(t1 + t2)

def to_half(Buffer):

  return [struct.unpack('L',struct.pack('L',Buffer[i*2])[:4] + struct.pack('L',Buffer[i*2+1])[:4])[0] for i in range(len(Buffer)//2)]

def to_double(Buffer):

  new_Buffer = []

  for s in Buffer:

    tmp = struct.pack('L',s)

    new_Buffer.append(struct.unpack('I', tmp[:4])[0])

    new_Buffer.append(struct.unpack('I', tmp[4:])[0])

  return new_Buffer

def sha256_transform(s, chunk):

  s = to_half(s)

  s = to_double(s)

  a, b, c, d, e, f, g, h = [s[0]], [s[1]], [s[2]], [s[3]], [s[4]], [s[5]], [s[6]], [s[7]]

  w0 = [ReadBE32(chunk[0])]

  w1 = [ReadBE32(chunk[1])]

  w2 = [ReadBE32(chunk[2])]

  w3 = [ReadBE32(chunk[3])]

  w4 = [ReadBE32(chunk[4])]

  w5 = [ReadBE32(chunk[5])]

  w6 = [ReadBE32(chunk[6])]

  w7 = [ReadBE32(chunk[7])]

  w8 = [ReadBE32(chunk[8])]

  w9 = [ReadBE32(chunk[9])]

  w10 = [ReadBE32(chunk[10])]

  w11 = [ReadBE32(chunk[11])]

  w12 = [ReadBE32(chunk[12])]

  w13 = [ReadBE32(chunk[13])]

  w14 = [ReadBE32(chunk[14])]

  w15 = [ReadBE32(chunk[15])]

  Round(a, b, c, d, e, f, g, h, [0x428a2f98], w0)

  Round(h, a, b, c, d, e, f, g, [0x71374491], w1)

  Round(g, h, a, b, c, d, e, f, [0xb5c0fbcf], w2)

  Round(f, g, h, a, b, c, d, e, [0xe9b5dba5], w3)

  Round(e, f, g, h, a, b, c, d, [0x3956c25b], w4)

  Round(d, e, f, g, h, a, b, c, [0x59f111f1], w5)

  Round(c, d, e, f, g, h, a, b, [0x923f82a4], w6)

  Round(b, c, d, e, f, g, h, a, [0xab1c5ed5], w7)

  Round(a, b, c, d, e, f, g, h, [0xd807aa98], w8)

  Round(h, a, b, c, d, e, f, g, [0x12835b01], w9)

  Round(g, h, a, b, c, d, e, f, [0x243185be], w10)

  Round(f, g, h, a, b, c, d, e, [0x550c7dc3], w11)

  Round(e, f, g, h, a, b, c, d, [0x72be5d74], w12)

  Round(d, e, f, g, h, a, b, c, [0x80deb1fe], w13)

  Round(c, d, e, f, g, h, a, b, [0x9bdc06a7], w14)

  Round(b, c, d, e, f, g, h, a, [0xc19bf174], w15)

  K = [0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,

     0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,

     0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2]

  K_index = 0

  for i in range(3):

    w0[0] = np.uint32(w0[0] + sigma1(w14[0]) + w9[0] + sigma0(w1[0]))

    w1[0] = np.uint32(w1[0] + sigma1(w15[0]) + w10[0] + sigma0(w2[0]))

    w2[0] = np.uint32(w2[0] + sigma1(w0[0]) + w11[0] + sigma0(w3[0]))

    w3[0] = np.uint32(w3[0] + sigma1(w1[0]) + w12[0] + sigma0(w4[0]))

    w4[0] = np.uint32(w4[0] + sigma1(w2[0]) + w13[0] + sigma0(w5[0]))

    w5[0] = np.uint32(w5[0] + sigma1(w3[0]) + w14[0] + sigma0(w6[0]))

    w6[0] = np.uint32(w6[0] + sigma1(w4[0]) + w15[0] + sigma0(w7[0]))

    w7[0] = np.uint32(w7[0] + sigma1(w5[0]) + w0[0] + sigma0(w8[0]))

    w8[0] = np.uint32(w8[0] + sigma1(w6[0]) + w1[0] + sigma0(w9[0]))

    w9[0] = np.uint32(w9[0] + sigma1(w7[0]) + w2[0] + sigma0(w10[0]))

    w10[0] = np.uint32(w10[0] + sigma1(w8[0]) + w3[0] + sigma0(w11[0]))

    w11[0] = np.uint32(w11[0] + sigma1(w9[0]) + w4[0] + sigma0(w12[0]))

    w12[0] = np.uint32(w12[0] + sigma1(w10[0]) + w5[0] + sigma0(w13[0]))

    w13[0] = np.uint32(w13[0] + sigma1(w11[0]) + w6[0] + sigma0(w14[0]))

    w14[0] = np.uint32(w14[0] + sigma1(w12[0]) + w7[0] + sigma0(w15[0]))

    w15[0] = np.uint32(w15[0] + sigma1(w13[0]) + w8[0] + sigma0(w0[0]))

    Round(a, b, c, d, e, f, g, h, [K[K_index]], w0);K_index+=1

    Round(h, a, b, c, d, e, f, g, [K[K_index]], w1);K_index+=1

    Round(g, h, a, b, c, d, e, f, [K[K_index]], w2);K_index+=1

    Round(f, g, h, a, b, c, d, e, [K[K_index]], w3);K_index+=1

    Round(e, f, g, h, a, b, c, d, [K[K_index]], w4);K_index+=1

    Round(d, e, f, g, h, a, b, c, [K[K_index]], w5);K_index+=1

    Round(c, d, e, f, g, h, a, b, [K[K_index]], w6);K_index+=1

    Round(b, c, d, e, f, g, h, a, [K[K_index]], w7);K_index+=1

    Round(a, b, c, d, e, f, g, h, [K[K_index]], w8);K_index+=1

    Round(h, a, b, c, d, e, f, g, [K[K_index]], w9);K_index+=1

    Round(g, h, a, b, c, d, e, f, [K[K_index]], w10);K_index+=1

    Round(f, g, h, a, b, c, d, e, [K[K_index]], w11);K_index+=1

    Round(e, f, g, h, a, b, c, d, [K[K_index]], w12);K_index+=1

    Round(d, e, f, g, h, a, b, c, [K[K_index]], w13);K_index+=1

    Round(c, d, e, f, g, h, a, b, [K[K_index]], w14);K_index+=1

    Round(b, c, d, e, f, g, h, a, [K[K_index]], w15);K_index+=1

  s[0] += a[0];

  s[1] += b[0];

  s[2] += c[0];

  s[3] += d[0];

  s[4] += e[0];

  s[5] += f[0];

  s[6] += g[0];

  s[7] += h[0];

  return s

def shasha(state, data, nonce):

  stateBuffer = [struct.unpack('I',state[i*4:i*4+4])[0] for i in range(8)]

  data = data[:56] + struct.pack('L', nonce)

  dataBuffer = [struct.unpack('I',data[i*4:i*4+4])[0] for i in range(16)]

  stateBuffer = sha256_transform(stateBuffer, dataBuffer)

  dataBuffer[0] = 0x80

  dataBuffer[1] = 0

  dataBuffer[2] = 0

  dataBuffer[3] = 0

  dataBuffer[4] = 0

  dataBuffer[5] = 0

  dataBuffer[6] = 0

  dataBuffer[7] = 0

  dataBuffer[8] = 0

  dataBuffer[9] = 0

  dataBuffer[10] = 0

  dataBuffer[11] = 0

  dataBuffer[12] = 0

  dataBuffer[13] = 0

  dataBuffer[14] = 0

  dataBuffer[15] = 1048576

  stateBuffer = sha256_transform(stateBuffer, dataBuffer)

  stateBuffer = to_half(stateBuffer)

  dataBuffer = to_half(dataBuffer)

  for i in range(4):

    dataBuffer[i] = WriteBE64x32(stateBuffer[i])

  stateBuffer[0] = 0xbb67ae856a09e667

  stateBuffer[1] = 0xa54ff53a3c6ef372

  stateBuffer[2] = 0x9b05688c510e527f

  stateBuffer[3] = 0x5be0cd191f83d9ab

  dataBuffer[4] = 0x80

  dataBuffer[7] = 0x0001000000000000

  new_stateBuffer = to_double(stateBuffer)

  new_dataBuffer = to_double(dataBuffer)

  stateBuffer = sha256_transform(new_stateBuffer, new_dataBuffer)

  stateBuffer = to_half(stateBuffer)

  hash = [0,0,0,0]

  for i in range(4):

    hash[i] = WriteBE64x32(stateBuffer[i])

  return hash

def CompareHashes(l, r):

  for i in range(3,-1,-1):

    if l[i] < r[i]:

      return True

    elif l[i] > r[i]:

      return False

  return False

def SearchMinNonce(task_ctx_state, task_ctx_data, nonce):

  for i in range(256):

    currentHash = shasha(task_ctx_state, task_ctx_data, nonce[0])

    if i==0 or CompareHashes(currentHash,hash):

      hash = copy.deepcopy(currentHash)

      minNonce = nonce[0]

    nonce[0] = nonce[0] + 1

  return minNonce, hash

def HasNewShare(nonce):

  while True:

    last_amount, hash = SearchMinNonce(task_ctx_state, task_ctx_data, nonce)

    #last_amount, hash = SearchMinNonce(task_ctx_state, task_ctx_data, lastfield_amount)

    if CompareHashes(hash,minhash_data):

      print ('isShareFound')

      return last_amount, hash

    print (nonce)

state1, xdag_field_1 = dfslib_uncrypt_array(_c, xdag_field1.data,0)

state2, xdag_field_2 = dfslib_uncrypt_array(_c, xdag_field2.data,1)

state2_list = b''

for s in state2:

  tmp = struct.pack('I', s)

  state2_list+= tmp

addressHash = AddressToHash(b'gKNRtSL1pUaTpzMuPMznKw49ILtP6qX3')

task_ctx_data = state2_list + addressHash[:24]

task_ctx_state = b''

for s in state1:

  tmp = struct.pack('I', s)

  task_ctx_state+= tmp

main_time = GetMainTime()

print ('New task:\t',main_time[2:])

print ('State:')

print (task_ctx_state.hex())

print ('Data:')

print (task_ctx_data.hex())

lastfield_amount = random.randint(0, 2**64)

print ('Start nonce:\t', lastfield_amount)

print ('Start minhash:')

minhash_data = [18446744073709551615,18446744073709551615,18446744073709551615,9895604649983]

str_minhash_data = struct.pack('>Q',minhash_data[3])+struct.pack('>Q',minhash_data[2])+struct.pack('>Q',minhash_data[1])+struct.pack('>Q',minhash_data[0])

print (str_minhash_data.hex())

a = struct.unpack('L',addressHash[:8])[0]

b = struct.unpack('L',addressHash[8:16])[0]

c = struct.unpack('L',addressHash[16:24])[0]

d = lastfield_amount

lastfield = xdag_field()

lastfield.transport_header = a

lastfield.type = b

lastfield.time = c

lastfield.hash = [a, b, c]

lastfield.amount = d

lastfield.end_time = d

lastfield.data = [a, b, c, d]

last_amount, hash = HasNewShare([3980675776616400062])

lastfield.amount = last_amount

lastfield.end_time = last_amount

#lastfield.data[3] = last_amount

lastfield.data[3] = 11277376069999640039

def dfs_encrypt2(dfsc, a, b, c, d, x, y, z, t, data, num):

  a[0] = np.uint32(dfs_crypt0(dfsc, a, x, y, z, t)) ^ np.uint32(~data[num[0]]); dfs_crypt0(dfsc, b, y, z, t, x)

  dfs_crypt0(dfsc, c, z, t, x, y);

  data[num[0]] = np.uint32(data[num[0]]) - np.uint32(dfs_crypt0(dfsc, d, t, x, y, z));

  num[0] +=1

def dfs_encrypt3(dfsc, a, b, c, d, x, y, z, t, data, num):

  dfs_encrypt2(dfsc, a, b, c, d, x, y, z, t, data, num);dfs_encrypt2(dfsc, x, y, z, t, a, b, c, d, data, num)

def dfs_enmix2(c,d, num):

  num[0] -=1

  d[num[0]] = d[num[0]] ^np.uint32(c[0] * 43385317)

  c[0] = d[num[0]]

def dfs_enmixArray(d, num):

  c = [1615037507]

  for i in range(8):

    dfs_enmix2(c, d, num)

def dfslib_encrypt_array(dfsc, data):

  a, b, c, d, x, y, z, t = [0], [0], [0], [0], [0], [0], [0], [0]

  dfs_prepare(dfsc, 16, x, y, z, t)#sectorNo=16

  num = [8]

  data = to_double(data)

  dfs_enmixArray(data, num)

  num = [0]

  for i in range(4):

    dfs_encrypt3(dfsc, a, b, c, d, x, y, z, t, data, num)

  return to_half(data)

fieldsCopy = dfslib_encrypt_array(_c, lastfield.data)

Write = b''

for f in fieldsCopy:

  Write += struct.pack('L', f)

print (Write)

print (123)

另外有需要云服务器可以了解下创新互联scvps.cn,海内外云服务器15元起步,三天无理由+7*72小时售后在线,公司持有idc许可证,提供“云服务器、裸金属服务器、高防服务器、香港服务器、美国服务器、虚拟主机、免备案服务器”等云主机租用服务以及企业上云的综合解决方案,具有“安全稳定、简单易用、服务可用性高、性价比高”等特点与优势,专为企业上云打造定制,能够满足用户丰富、多元化的应用场景需求。


文章题目:XDAG_Miner客户端到底做了什么-创新互联
文章URL:http://cdkjz.cn/article/ecdig.html
多年建站经验

多一份参考,总有益处

联系快上网,免费获得专属《策划方案》及报价

咨询相关问题或预约面谈,可以通过以下方式与我们联系

大客户专线   成都:13518219792   座机:028-86922220