XDAG_Miner客户端到底做了什么-创新互联

开篇之前先聊聊背景:本人本身是想打造一个Python版本节点的,但是坑在了两个函数

10年积累的成都做网站、成都网站制作经验,可以快速应对客户对网站的新想法和需求。提供各种问题对应的解决方案。让选择我们的客户得到更好、更有力的网络服务。我虽然不认识你,你也不认识我。但先网站设计后付款的网站建设流程,更有余江免费网站建设让你可以放心的选择与我们合作。

XDAG_Miner客户端到底做了什么

  • dfslib_crypt_set_sector0

  • dfslib_encrypt_sector

这两个函数在节点和挖矿程序中都出现了,主要是对用户密码进行加密解密的函数,我尝试用Python翻译了一遍,效率极低,甚至都影响调试就放弃了。

    再对Python开发者说几句,整个XDAG代码并不多,但是其中运用了大量宏,字节截取,二进制处理,内存偏移等。导致对于Python这个语言来说,增加了大量转换工作,许多源码中一行的简单调用,在Python都要经过多行函数级处理才得已实现。所以Python初中级的朋友慎入~整个挖矿流程我用Python版本跑了一遍,效率比原版差了百倍,所以Python版本仅供参考研究使用,暂时无法投放在生产环境,本人在下个版本可能会参与到Go语言版本的重构中。

    言归正传,咱们走一遍整个GpuMiner都做了什么,其中涉及几个函数如下:

XDAG_Miner客户端到底做了什么

1, 生成_crypt变量,该变量是

XDAG_Miner客户端到底做了什么

MINERS_PWD经过开篇提到的两个函数加密之后得到的

XDAG_Miner客户端到底做了什么

2, 链接矿池,获取任务,看上去是获得了两个xdag_field结构体的任务,但其实后面是要结合起来加工的

3, 两个结构体任务分别经过dfslib_uncrypt_array函数,sectorNo参数分别是0和1

4, 通过AddressToHash函数把地址转换成Hash

5, task_ctx_data其实就是第二个获得的任务通过dfslib_uncrypt_array加密转换,再加上地址转换的Hash

6, task_ctx_state就是第一个任务通过dfslib_uncrypt_array加密之后的值

7, 变量main_time为当前时间经过GetMainTime函数的转换

8, nonce为一个2**64次方的随机数

9, minhash_data由一个数组[18446744073709551615,18446744073709551615,18446744073709551615,9895604649983]序列化得到

10, 从而可以输出所有变量如图:

XDAG_Miner客户端到底做了什么

11, 拿到了所有所需数据,下一步就要计算哈希了SearchMinNonce,其实这里有个小问题,SearchMinNonce得到最终是share时会多计算0-254次哈希,我个人判断,由于得到share需要经过大量哈希运算,作者为了方便编写就每256次为一组计算最小哈希,在和minhash做对比。

12, 拿到最小哈希和nonce并没有完,还需要通过dfslib_encrypt_array函数转换后,把fieldsCopy传回给矿池,整个过程结束。

本文提及的所有函数随后提供Python版本的Demo(由于时间问题,有点乱,不是很完整,多见谅),欢迎大家多多交流~

import struct

import copy

import ctypes

import time

import random

import hashlib

import numpy as np

from regs import regs

class xdag_field:

  pass

class _crypt:

  pass

_c = _crypt()

_c.regs = regs

_c.pwd = [781665893, 3404732475, 2212684154, 3744338274]

_readDataSize = b'\x9c\x0f_%\x19\x8c!{\x02\xed\xa7\x87h\xc6\xc4\xca\x1c\xe7Ut\xa2\xd4\x13\x993|\x9d@\xa0\xc1\xa4\n\xf6d\xa51nn\xb9\x81\xa5\xec\x8b\xdc\xc0\x1dz\xa1\xcfi5\x89\xa0K ?\xf6\x93b\xa5\x87\x8czj'

a = struct.unpack('Q',_readDataSize[0:8])[0]

b = struct.unpack('Q',_readDataSize[8:16])[0]

c = struct.unpack('Q',_readDataSize[16:24])[0]

d = struct.unpack('Q',_readDataSize[24:32])[0]

xdag_field1 = xdag_field()

xdag_field1.transport_header = a

xdag_field1.type = b

xdag_field1.time = c

xdag_field1.hash = [a, b, c]

xdag_field1.amount = d

xdag_field1.end_time = d

xdag_field1.data = [a, b, c, d]

a = struct.unpack('Q',_readDataSize[32:40])[0]

b = struct.unpack('Q',_readDataSize[40:48])[0]

c = struct.unpack('Q',_readDataSize[48:56])[0]

d = struct.unpack('Q',_readDataSize[56:64])[0]

xdag_field2 = xdag_field()

xdag_field2.transport_header = a

xdag_field2.type = b

xdag_field2.time = c

xdag_field2.hash = [a, b, c]

xdag_field2.amount = d

xdag_field2.end_time = d

xdag_field2.data = [a, b, c, d]

def dfs_crypt0(dfsc, a,x,y,z,t):

  dfs64 = np.uint64(y[0])

  dfs16 = np.uint16(t[0])

  tmp = np.uint32(z[0] + dfsc.regs[x[0] >> 16])

  dfs32 = np.uint32(int(dfs64* tmp) >> 16)

  a[0] = dfs32 ^ dfsc.regs[dfs16]

  return a[0]

def dfs_crypt2(dfsc, a,b,c,d,x,y,z,t):

  dfs_crypt0(dfsc, a,x,y,z,t);dfs_crypt0(dfsc, b,y,z,t,x)

  dfs_crypt0(dfsc, c,z,t,x,y);dfs_crypt0(dfsc, d,t,x,y,z)

def dfs_crypt3(dfsc, a,b,c,d,x,y,z,t):

  dfs_crypt2(dfsc, a,b,c,d,x,y,z,t);dfs_crypt2(dfsc, x,y,z,t,a,b,c,d)

def dfs_crypt6(dfsc, a,b,c,d,x,y,z,t):

  dfs_crypt3(dfsc, a,b,c,d,x,y,z,t);dfs_crypt3(dfsc, a,b,c,d,x,y,z,t)

  dfs_crypt3(dfsc, a,b,c,d,x,y,z,t);dfs_crypt3(dfsc, a,b,c,d,x,y,z,t)

  dfs_crypt3(dfsc, a,b,c,d,x,y,z,t);dfs_crypt3(dfsc, a,b,c,d,x,y,z,t)

  dfs_crypt3(dfsc, a,b,c,d,x,y,z,t);dfs_crypt3(dfsc, a,b,c,d,x,y,z,t)

def dfs_uncrypt2(dfsc, a, b, c, d, x, y, z, t, data, num):

  dfs_crypt0(dfsc, c, z, t, x, y); data[num[0]]= np.uint32(data[num[0]]) + np.uint32(dfs_crypt0(dfsc, d, t, x, y, z))

  a[0] = dfs_crypt0(dfsc, a, x, y, z, t) ^ ~data[num[0]];num[0] +=1;dfs_crypt0(dfsc, b, y, z, t, x)

def dfs_uncrypt3(dfsc, a, b, c, d, x, y, z, t, data, num):

  dfs_uncrypt2(dfsc, a, b, c, d, x, y, z, t, data, num);dfs_uncrypt2(dfsc, x, y, z, t, a, b, c, d, data, num)

def dfs_prepare(dfsc, sectorNo, x, y, z, t):

  sectorNo = int(np.uint64(1229426917 << 32 | 3433359571) * np.uint64(sectorNo))

  x[0] = dfsc.pwd[0] ^ dfsc.regs[sectorNo%65479 + 31]

  y[0] = dfsc.pwd[1] ^ dfsc.regs[sectorNo%65497 + 11]

  z[0] = dfsc.pwd[2] ^ dfsc.regs[sectorNo%65519 + 5]

  t[0] = dfsc.pwd[3] ^ dfsc.regs[sectorNo%65521 + 3]

  a, b, c, d = [0], [0], [0], [0]

  dfs_crypt6(dfsc, a,b,c,d,x,y,z,t)

def dfs_unmix2(c, d, num):

  c[0] = np.uint32(c[0] * 43385317);

  num[0]-=1;

  d[num[0]] ^=c[0]; c[0] ^= d[num[0]]

def dfs_unmixArray(d, num):

  c = [1615037507]

  for i in range(8):

    dfs_unmix2(c, d, num)

def dfslib_uncrypt_array(dfsc, data, sectorNo):

  a, b, c, d, x, y, z, t = [0], [0], [0], [0], [0], [0], [0], [0]

  dfs_prepare(dfsc, sectorNo, x, y, z, t)

  num = [0]

  data_list = []

  for _d in data:

    tmp = struct.pack('L', _d)

    data_list.append(struct.unpack('I', tmp[:4])[0])

    data_list.append(struct.unpack('I', tmp[4:])[0])

  for i in range(4):

    dfs_uncrypt3(dfsc, a, b, c, d, x, y, z, t, data_list, num)

  dfs_unmixArray(data_list, num)

  return data_list, [struct.unpack('L',struct.pack('I', data_list[0]) + struct.pack('I', data_list[1]))[0],

      struct.unpack('L',struct.pack('I', data_list[2]) + struct.pack('I', data_list[3]))[0],

      struct.unpack('L',struct.pack('I', data_list[4]) + struct.pack('I', data_list[5]))[0],

      struct.unpack('L',struct.pack('I', data_list[6]) + struct.pack('I', data_list[7]))[0]]

def GetMainTime():

  timer = time.time()

  tv_sec = int(timer)

  tv_usec = int((timer-tv_sec)*1000000)

  get_timestamp = tv_sec<<10 | int((tv_usec<<10)/1000000)

  MAIN_TIME = get_timestamp>>16

  MAIN_TIME = hex(MAIN_TIME)+'ffff'

  return MAIN_TIME

def AddressToHash(address):

  fld = b''

  _mime2bits = _mime2bits_init()

  e=n=0

  address_index = 0

  for i in range(32):

    while True:

      c = address[address_index]

      address_index+=1

      d = _mime2bits[c]

      if d&0xC0 == False:

        break

    e <<= 6

    e = np.uint16(e| d)

    n += 6

    if n>=8:

      n-=8

      fld += struct.pack('Q',e >> n)[:1]

  for i in range(8):

    fld+=b'\x00'

  return fld

def _mime2bits_init():

  bits2mime = b"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"

  _mime2bits = [0xFF] * 256

  for i in range(64):

    _mime2bits[bits2mime[i]] = i

  return _mime2bits

def ReadBE32(x):

  return (((x & 0xff000000) >> 24) | ((x & 0x00ff0000) >> 8) | ((x & 0x0000ff00) << 8) | ((x & 0x000000ff) << 24))

def WriteBE64x32(x):

  return (((x & 0xff00000000000000) >> 24) | ((x & 0x00ff000000000000) >> 8) | ((x & 0x0000ff0000000000) << 8) | ((x & 0x000000ff00000000) << 24) | ((x & 0x00000000ff000000) >> 24) | ((x & 0x0000000000ff0000) >> 8) | ((x & 0x000000000000ff00) << 8) | ((x & 0x00000000000000ff) << 24))

def Ch(x, y, z):

  return z ^ (x & (y ^ z))

def Maj(x, y, z):

  return (x & y) | (z & (x | y))

def Sigma0(x):

  return (x >> 2 | x << 30) ^ (x >> 13 | x << 19) ^ (x >> 22 | x << 10)

def Sigma1(x):

  return (x >> 6 | x << 26) ^ (x >> 11 | x << 21) ^ (x >> 25 | x << 7)

def sigma0(x):

  return (x >> 7 | x << 25) ^ (x >> 18 | x << 14) ^ (x >> 3)

def sigma1(x):

  return (x >> 17 | x << 15) ^ (x >> 19 | x << 13) ^ (x >> 10)

def Round(a, b, c, d, e, f, g, h, k, w):

  t1 = h[0] + Sigma1(e[0]) + Ch(e[0], f[0], g[0]) + k[0] + w[0]

  t2 = Sigma0(a[0]) + Maj(a[0], b[0], c[0])

  d[0] = np.uint32(d[0] + t1)

  h[0] = np.uint32(t1 + t2)

def to_half(Buffer):

  return [struct.unpack('L',struct.pack('L',Buffer[i*2])[:4] + struct.pack('L',Buffer[i*2+1])[:4])[0] for i in range(len(Buffer)//2)]

def to_double(Buffer):

  new_Buffer = []

  for s in Buffer:

    tmp = struct.pack('L',s)

    new_Buffer.append(struct.unpack('I', tmp[:4])[0])

    new_Buffer.append(struct.unpack('I', tmp[4:])[0])

  return new_Buffer

def sha256_transform(s, chunk):

  s = to_half(s)

  s = to_double(s)

  a, b, c, d, e, f, g, h = [s[0]], [s[1]], [s[2]], [s[3]], [s[4]], [s[5]], [s[6]], [s[7]]

  w0 = [ReadBE32(chunk[0])]

  w1 = [ReadBE32(chunk[1])]

  w2 = [ReadBE32(chunk[2])]

  w3 = [ReadBE32(chunk[3])]

  w4 = [ReadBE32(chunk[4])]

  w5 = [ReadBE32(chunk[5])]

  w6 = [ReadBE32(chunk[6])]

  w7 = [ReadBE32(chunk[7])]

  w8 = [ReadBE32(chunk[8])]

  w9 = [ReadBE32(chunk[9])]

  w10 = [ReadBE32(chunk[10])]

  w11 = [ReadBE32(chunk[11])]

  w12 = [ReadBE32(chunk[12])]

  w13 = [ReadBE32(chunk[13])]

  w14 = [ReadBE32(chunk[14])]

  w15 = [ReadBE32(chunk[15])]

  Round(a, b, c, d, e, f, g, h, [0x428a2f98], w0)

  Round(h, a, b, c, d, e, f, g, [0x71374491], w1)

  Round(g, h, a, b, c, d, e, f, [0xb5c0fbcf], w2)

  Round(f, g, h, a, b, c, d, e, [0xe9b5dba5], w3)

  Round(e, f, g, h, a, b, c, d, [0x3956c25b], w4)

  Round(d, e, f, g, h, a, b, c, [0x59f111f1], w5)

  Round(c, d, e, f, g, h, a, b, [0x923f82a4], w6)

  Round(b, c, d, e, f, g, h, a, [0xab1c5ed5], w7)

  Round(a, b, c, d, e, f, g, h, [0xd807aa98], w8)

  Round(h, a, b, c, d, e, f, g, [0x12835b01], w9)

  Round(g, h, a, b, c, d, e, f, [0x243185be], w10)

  Round(f, g, h, a, b, c, d, e, [0x550c7dc3], w11)

  Round(e, f, g, h, a, b, c, d, [0x72be5d74], w12)

  Round(d, e, f, g, h, a, b, c, [0x80deb1fe], w13)

  Round(c, d, e, f, g, h, a, b, [0x9bdc06a7], w14)

  Round(b, c, d, e, f, g, h, a, [0xc19bf174], w15)

  K = [0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,

     0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,

     0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2]

  K_index = 0

  for i in range(3):

    w0[0] = np.uint32(w0[0] + sigma1(w14[0]) + w9[0] + sigma0(w1[0]))

    w1[0] = np.uint32(w1[0] + sigma1(w15[0]) + w10[0] + sigma0(w2[0]))

    w2[0] = np.uint32(w2[0] + sigma1(w0[0]) + w11[0] + sigma0(w3[0]))

    w3[0] = np.uint32(w3[0] + sigma1(w1[0]) + w12[0] + sigma0(w4[0]))

    w4[0] = np.uint32(w4[0] + sigma1(w2[0]) + w13[0] + sigma0(w5[0]))

    w5[0] = np.uint32(w5[0] + sigma1(w3[0]) + w14[0] + sigma0(w6[0]))

    w6[0] = np.uint32(w6[0] + sigma1(w4[0]) + w15[0] + sigma0(w7[0]))

    w7[0] = np.uint32(w7[0] + sigma1(w5[0]) + w0[0] + sigma0(w8[0]))

    w8[0] = np.uint32(w8[0] + sigma1(w6[0]) + w1[0] + sigma0(w9[0]))

    w9[0] = np.uint32(w9[0] + sigma1(w7[0]) + w2[0] + sigma0(w10[0]))

    w10[0] = np.uint32(w10[0] + sigma1(w8[0]) + w3[0] + sigma0(w11[0]))

    w11[0] = np.uint32(w11[0] + sigma1(w9[0]) + w4[0] + sigma0(w12[0]))

    w12[0] = np.uint32(w12[0] + sigma1(w10[0]) + w5[0] + sigma0(w13[0]))

    w13[0] = np.uint32(w13[0] + sigma1(w11[0]) + w6[0] + sigma0(w14[0]))

    w14[0] = np.uint32(w14[0] + sigma1(w12[0]) + w7[0] + sigma0(w15[0]))

    w15[0] = np.uint32(w15[0] + sigma1(w13[0]) + w8[0] + sigma0(w0[0]))

    Round(a, b, c, d, e, f, g, h, [K[K_index]], w0);K_index+=1

    Round(h, a, b, c, d, e, f, g, [K[K_index]], w1);K_index+=1

    Round(g, h, a, b, c, d, e, f, [K[K_index]], w2);K_index+=1

    Round(f, g, h, a, b, c, d, e, [K[K_index]], w3);K_index+=1

    Round(e, f, g, h, a, b, c, d, [K[K_index]], w4);K_index+=1

    Round(d, e, f, g, h, a, b, c, [K[K_index]], w5);K_index+=1

    Round(c, d, e, f, g, h, a, b, [K[K_index]], w6);K_index+=1

    Round(b, c, d, e, f, g, h, a, [K[K_index]], w7);K_index+=1

    Round(a, b, c, d, e, f, g, h, [K[K_index]], w8);K_index+=1

    Round(h, a, b, c, d, e, f, g, [K[K_index]], w9);K_index+=1

    Round(g, h, a, b, c, d, e, f, [K[K_index]], w10);K_index+=1

    Round(f, g, h, a, b, c, d, e, [K[K_index]], w11);K_index+=1

    Round(e, f, g, h, a, b, c, d, [K[K_index]], w12);K_index+=1

    Round(d, e, f, g, h, a, b, c, [K[K_index]], w13);K_index+=1

    Round(c, d, e, f, g, h, a, b, [K[K_index]], w14);K_index+=1

    Round(b, c, d, e, f, g, h, a, [K[K_index]], w15);K_index+=1

  s[0] += a[0];

  s[1] += b[0];

  s[2] += c[0];

  s[3] += d[0];

  s[4] += e[0];

  s[5] += f[0];

  s[6] += g[0];

  s[7] += h[0];

  return s

def shasha(state, data, nonce):

  stateBuffer = [struct.unpack('I',state[i*4:i*4+4])[0] for i in range(8)]

  data = data[:56] + struct.pack('L', nonce)

  dataBuffer = [struct.unpack('I',data[i*4:i*4+4])[0] for i in range(16)]

  stateBuffer = sha256_transform(stateBuffer, dataBuffer)

  dataBuffer[0] = 0x80

  dataBuffer[1] = 0

  dataBuffer[2] = 0

  dataBuffer[3] = 0

  dataBuffer[4] = 0

  dataBuffer[5] = 0

  dataBuffer[6] = 0

  dataBuffer[7] = 0

  dataBuffer[8] = 0

  dataBuffer[9] = 0

  dataBuffer[10] = 0

  dataBuffer[11] = 0

  dataBuffer[12] = 0

  dataBuffer[13] = 0

  dataBuffer[14] = 0

  dataBuffer[15] = 1048576

  stateBuffer = sha256_transform(stateBuffer, dataBuffer)

  stateBuffer = to_half(stateBuffer)

  dataBuffer = to_half(dataBuffer)

  for i in range(4):

    dataBuffer[i] = WriteBE64x32(stateBuffer[i])

  stateBuffer[0] = 0xbb67ae856a09e667

  stateBuffer[1] = 0xa54ff53a3c6ef372

  stateBuffer[2] = 0x9b05688c510e527f

  stateBuffer[3] = 0x5be0cd191f83d9ab

  dataBuffer[4] = 0x80

  dataBuffer[7] = 0x0001000000000000

  new_stateBuffer = to_double(stateBuffer)

  new_dataBuffer = to_double(dataBuffer)

  stateBuffer = sha256_transform(new_stateBuffer, new_dataBuffer)

  stateBuffer = to_half(stateBuffer)

  hash = [0,0,0,0]

  for i in range(4):

    hash[i] = WriteBE64x32(stateBuffer[i])

  return hash

def CompareHashes(l, r):

  for i in range(3,-1,-1):

    if l[i] < r[i]:

      return True

    elif l[i] > r[i]:

      return False

  return False

def SearchMinNonce(task_ctx_state, task_ctx_data, nonce):

  for i in range(256):

    currentHash = shasha(task_ctx_state, task_ctx_data, nonce[0])

    if i==0 or CompareHashes(currentHash,hash):

      hash = copy.deepcopy(currentHash)

      minNonce = nonce[0]

    nonce[0] = nonce[0] + 1

  return minNonce, hash

def HasNewShare(nonce):

  while True:

    last_amount, hash = SearchMinNonce(task_ctx_state, task_ctx_data, nonce)

    #last_amount, hash = SearchMinNonce(task_ctx_state, task_ctx_data, lastfield_amount)

    if CompareHashes(hash,minhash_data):

      print ('isShareFound')

      return last_amount, hash

    print (nonce)

state1, xdag_field_1 = dfslib_uncrypt_array(_c, xdag_field1.data,0)

state2, xdag_field_2 = dfslib_uncrypt_array(_c, xdag_field2.data,1)

state2_list = b''

for s in state2:

  tmp = struct.pack('I', s)

  state2_list+= tmp

addressHash = AddressToHash(b'gKNRtSL1pUaTpzMuPMznKw49ILtP6qX3')

task_ctx_data = state2_list + addressHash[:24]

task_ctx_state = b''

for s in state1:

  tmp = struct.pack('I', s)

  task_ctx_state+= tmp

main_time = GetMainTime()

print ('New task:\t',main_time[2:])

print ('State:')

print (task_ctx_state.hex())

print ('Data:')

print (task_ctx_data.hex())

lastfield_amount = random.randint(0, 2**64)

print ('Start nonce:\t', lastfield_amount)

print ('Start minhash:')

minhash_data = [18446744073709551615,18446744073709551615,18446744073709551615,9895604649983]

str_minhash_data = struct.pack('>Q',minhash_data[3])+struct.pack('>Q',minhash_data[2])+struct.pack('>Q',minhash_data[1])+struct.pack('>Q',minhash_data[0])

print (str_minhash_data.hex())

a = struct.unpack('L',addressHash[:8])[0]

b = struct.unpack('L',addressHash[8:16])[0]

c = struct.unpack('L',addressHash[16:24])[0]

d = lastfield_amount

lastfield = xdag_field()

lastfield.transport_header = a

lastfield.type = b

lastfield.time = c

lastfield.hash = [a, b, c]

lastfield.amount = d

lastfield.end_time = d

lastfield.data = [a, b, c, d]

last_amount, hash = HasNewShare([3980675776616400062])

lastfield.amount = last_amount

lastfield.end_time = last_amount

#lastfield.data[3] = last_amount

lastfield.data[3] = 11277376069999640039

def dfs_encrypt2(dfsc, a, b, c, d, x, y, z, t, data, num):

  a[0] = np.uint32(dfs_crypt0(dfsc, a, x, y, z, t)) ^ np.uint32(~data[num[0]]); dfs_crypt0(dfsc, b, y, z, t, x)

  dfs_crypt0(dfsc, c, z, t, x, y);

  data[num[0]] = np.uint32(data[num[0]]) - np.uint32(dfs_crypt0(dfsc, d, t, x, y, z));

  num[0] +=1

def dfs_encrypt3(dfsc, a, b, c, d, x, y, z, t, data, num):

  dfs_encrypt2(dfsc, a, b, c, d, x, y, z, t, data, num);dfs_encrypt2(dfsc, x, y, z, t, a, b, c, d, data, num)

def dfs_enmix2(c,d, num):

  num[0] -=1

  d[num[0]] = d[num[0]] ^np.uint32(c[0] * 43385317)

  c[0] = d[num[0]]

def dfs_enmixArray(d, num):

  c = [1615037507]

  for i in range(8):

    dfs_enmix2(c, d, num)

def dfslib_encrypt_array(dfsc, data):

  a, b, c, d, x, y, z, t = [0], [0], [0], [0], [0], [0], [0], [0]

  dfs_prepare(dfsc, 16, x, y, z, t)#sectorNo=16

  num = [8]

  data = to_double(data)

  dfs_enmixArray(data, num)

  num = [0]

  for i in range(4):

    dfs_encrypt3(dfsc, a, b, c, d, x, y, z, t, data, num)

  return to_half(data)

fieldsCopy = dfslib_encrypt_array(_c, lastfield.data)

Write = b''

for f in fieldsCopy:

  Write += struct.pack('L', f)

print (Write)

print (123)

另外有需要云服务器可以了解下创新互联scvps.cn,海内外云服务器15元起步,三天无理由+7*72小时售后在线,公司持有idc许可证,提供“云服务器、裸金属服务器、高防服务器、香港服务器、美国服务器、虚拟主机、免备案服务器”等云主机租用服务以及企业上云的综合解决方案,具有“安全稳定、简单易用、服务可用性高、性价比高”等特点与优势,专为企业上云打造定制,能够满足用户丰富、多元化的应用场景需求。

当前题目:XDAG_Miner客户端到底做了什么-创新互联
转载来源:https://www.cdcxhl.com/article6/ecdig.html

成都网站建设公司_创新互联,为您提供网站设计品牌网站设计品牌网站制作网站改版企业建站网站建设

广告

声明:本网站发布的内容(图片、视频和文字)以用户投稿、用户转载内容为主,如果涉及侵权请尽快告知,我们将会在第一时间删除。文章观点不代表本网站立场,如需处理请联系客服。电话:028-86922220;邮箱:631063699@qq.com。内容未经允许不得转载,或转载时需注明来源: 创新互联

外贸网站制作