scrypt.cpp 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170
  1. // ECOin - Copyright (c) - 2014/2022 - GPLv3 - epsylon@riseup.net (https://03c8.net)
  2. #include <stdlib.h>
  3. #include <stdint.h>
  4. #include "scrypt.h"
  5. #include "pbkdf2.h"
  6. #include "util.h"
  7. #include "net.h"
  8. #define SCRYPT_BUFFER_SIZE (131072 + 63)
  9. #if defined (OPTIMIZED_SALSA) && ( defined (__x86_64__) || defined (__i386__) || defined(__arm__) )
  10. extern "C" void scrypt_core(unsigned int *X, unsigned int *V);
  11. #else
  12. // Generic scrypt_core implementation
  13. static inline void xor_salsa8(unsigned int B[16], const unsigned int Bx[16])
  14. {
  15. unsigned int x00,x01,x02,x03,x04,x05,x06,x07,x08,x09,x10,x11,x12,x13,x14,x15;
  16. int i;
  17. x00 = (B[0] ^= Bx[0]);
  18. x01 = (B[1] ^= Bx[1]);
  19. x02 = (B[2] ^= Bx[2]);
  20. x03 = (B[3] ^= Bx[3]);
  21. x04 = (B[4] ^= Bx[4]);
  22. x05 = (B[5] ^= Bx[5]);
  23. x06 = (B[6] ^= Bx[6]);
  24. x07 = (B[7] ^= Bx[7]);
  25. x08 = (B[8] ^= Bx[8]);
  26. x09 = (B[9] ^= Bx[9]);
  27. x10 = (B[10] ^= Bx[10]);
  28. x11 = (B[11] ^= Bx[11]);
  29. x12 = (B[12] ^= Bx[12]);
  30. x13 = (B[13] ^= Bx[13]);
  31. x14 = (B[14] ^= Bx[14]);
  32. x15 = (B[15] ^= Bx[15]);
  33. for (i = 0; i < 8; i += 2) {
  34. #define R(a, b) (((a) << (b)) | ((a) >> (32 - (b))))
  35. /* Operate on columns. */
  36. x04 ^= R(x00+x12, 7); x09 ^= R(x05+x01, 7);
  37. x14 ^= R(x10+x06, 7); x03 ^= R(x15+x11, 7);
  38. x08 ^= R(x04+x00, 9); x13 ^= R(x09+x05, 9);
  39. x02 ^= R(x14+x10, 9); x07 ^= R(x03+x15, 9);
  40. x12 ^= R(x08+x04,13); x01 ^= R(x13+x09,13);
  41. x06 ^= R(x02+x14,13); x11 ^= R(x07+x03,13);
  42. x00 ^= R(x12+x08,18); x05 ^= R(x01+x13,18);
  43. x10 ^= R(x06+x02,18); x15 ^= R(x11+x07,18);
  44. /* Operate on rows. */
  45. x01 ^= R(x00+x03, 7); x06 ^= R(x05+x04, 7);
  46. x11 ^= R(x10+x09, 7); x12 ^= R(x15+x14, 7);
  47. x02 ^= R(x01+x00, 9); x07 ^= R(x06+x05, 9);
  48. x08 ^= R(x11+x10, 9); x13 ^= R(x12+x15, 9);
  49. x03 ^= R(x02+x01,13); x04 ^= R(x07+x06,13);
  50. x09 ^= R(x08+x11,13); x14 ^= R(x13+x12,13);
  51. x00 ^= R(x03+x02,18); x05 ^= R(x04+x07,18);
  52. x10 ^= R(x09+x08,18); x15 ^= R(x14+x13,18);
  53. #undef R
  54. }
  55. B[0] += x00;
  56. B[1] += x01;
  57. B[2] += x02;
  58. B[3] += x03;
  59. B[4] += x04;
  60. B[5] += x05;
  61. B[6] += x06;
  62. B[7] += x07;
  63. B[8] += x08;
  64. B[9] += x09;
  65. B[10] += x10;
  66. B[11] += x11;
  67. B[12] += x12;
  68. B[13] += x13;
  69. B[14] += x14;
  70. B[15] += x15;
  71. }
  72. static inline void scrypt_core(unsigned int *X, unsigned int *V)
  73. {
  74. unsigned int i, j, k;
  75. for (i = 0; i < 1024; i++) {
  76. memcpy(&V[i * 32], X, 128);
  77. xor_salsa8(&X[0], &X[16]);
  78. xor_salsa8(&X[16], &X[0]);
  79. }
  80. for (i = 0; i < 1024; i++) {
  81. j = 32 * (X[16] & 1023);
  82. for (k = 0; k < 32; k++)
  83. X[k] ^= V[j + k];
  84. xor_salsa8(&X[0], &X[16]);
  85. xor_salsa8(&X[16], &X[0]);
  86. }
  87. }
  88. #endif
  89. /* cpu and memory intensive function to transform a 80 byte buffer into a 32 byte output
  90. scratchpad size needs to be at least 63 + (128 * r * p) + (256 * r + 64) + (128 * r * N) bytes
  91. r = 1, p = 1, N = 1024
  92. */
  93. uint256 scrypt_nosalt(const void* input, size_t inputlen, void *scratchpad)
  94. {
  95. unsigned int *V;
  96. unsigned int X[32];
  97. uint256 result = 0;
  98. V = (unsigned int *)(((uintptr_t)(scratchpad) + 63) & ~ (uintptr_t)(63));
  99. PBKDF2_SHA256((const uint8_t*)input, inputlen, (const uint8_t*)input, inputlen, 1, (uint8_t *)X, 128);
  100. scrypt_core(X, V);
  101. PBKDF2_SHA256((const uint8_t*)input, inputlen, (uint8_t *)X, 128, 1, (uint8_t*)&result, 32);
  102. return result;
  103. }
  104. uint256 scrypt(const void* data, size_t datalen, const void* salt, size_t saltlen, void *scratchpad)
  105. {
  106. unsigned int *V;
  107. unsigned int X[32];
  108. uint256 result = 0;
  109. V = (unsigned int *)(((uintptr_t)(scratchpad) + 63) & ~ (uintptr_t)(63));
  110. PBKDF2_SHA256((const uint8_t*)data, datalen, (const uint8_t*)salt, saltlen, 1, (uint8_t *)X, 128);
  111. scrypt_core(X, V);
  112. PBKDF2_SHA256((const uint8_t*)data, datalen, (uint8_t *)X, 128, 1, (uint8_t*)&result, 32);
  113. return result;
  114. }
  115. uint256 scrypt_hash(const void* input, size_t inputlen)
  116. {
  117. unsigned char scratchpad[SCRYPT_BUFFER_SIZE];
  118. return scrypt_nosalt(input, inputlen, scratchpad);
  119. }
  120. uint256 scrypt_salted_hash(const void* input, size_t inputlen, const void* salt, size_t saltlen)
  121. {
  122. unsigned char scratchpad[SCRYPT_BUFFER_SIZE];
  123. return scrypt(input, inputlen, salt, saltlen, scratchpad);
  124. }
  125. uint256 scrypt_salted_multiround_hash(const void* input, size_t inputlen, const void* salt, size_t saltlen, const unsigned int nRounds)
  126. {
  127. uint256 resultHash = scrypt_salted_hash(input, inputlen, salt, saltlen);
  128. uint256 transitionalHash = resultHash;
  129. for(unsigned int i = 1; i < nRounds; i++)
  130. {
  131. resultHash = scrypt_salted_hash(input, inputlen, (const void*)&transitionalHash, 32);
  132. transitionalHash = resultHash;
  133. }
  134. return resultHash;
  135. }
  136. uint256 scrypt_blockhash(const void* input)
  137. {
  138. unsigned char scratchpad[SCRYPT_BUFFER_SIZE];
  139. return scrypt_nosalt(input, 80, scratchpad);
  140. }