mirror of
https://codeberg.org/anoncontributorxmr/monero.git
synced 2024-11-11 05:33:28 +01:00
Merge pull request #174
28dfb4b
capitalize Keccak everywhere (David G. Andersen)ce2ad65
typo fix - cryptonight, not cryptonote (David G. Andersen)
This commit is contained in:
commit
0790aea6c8
@ -105,7 +105,7 @@
|
|||||||
_a = _mm_load_si128(R128(a)); \
|
_a = _mm_load_si128(R128(a)); \
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* An SSE-optimized implementation of the second half of CryptoNote step 3.
|
* An SSE-optimized implementation of the second half of CryptoNight step 3.
|
||||||
* After using AES to mix a scratchpad value into _c (done by the caller),
|
* After using AES to mix a scratchpad value into _c (done by the caller),
|
||||||
* this macro xors it with _b and stores the result back to the same index (j) that it
|
* this macro xors it with _b and stores the result back to the same index (j) that it
|
||||||
* loaded the scratchpad value from. It then performs a second random memory
|
* loaded the scratchpad value from. It then performs a second random memory
|
||||||
@ -522,7 +522,7 @@ void cn_slow_hash(const void *data, size_t length, char *hash)
|
|||||||
hash_process(&state.hs, data, length);
|
hash_process(&state.hs, data, length);
|
||||||
memcpy(text, state.init, INIT_SIZE_BYTE);
|
memcpy(text, state.init, INIT_SIZE_BYTE);
|
||||||
|
|
||||||
/* CryptoNight Step 2: Iteratively encrypt the results from keccak to fill
|
/* CryptoNight Step 2: Iteratively encrypt the results from Keccak to fill
|
||||||
* the 2MB large random access buffer.
|
* the 2MB large random access buffer.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user