Show Posts
|
Pages: « 1 2 3 4 [5]
|
Use @alek76 github link....It is exactly the same thing forked from Jean-Luc PONS. (I removed Printing and command line options from my binaries..) git clone https://github.com/alek76-2/VanitySearch.gitTO make it work add in Random.cpp #include <cstring> (should be changed there in source) You have in README.md how to compile exe in Windows. p.s. this is still in the testing phase It's not the same! You should look carefully at the GPUEngine.cu code. Which functions were prohibited for use, and which were fixed and allowed, and why this was done. The Y coordinate is calculated, so only the __device__ void ComputeKeys() function is used, and this is due to the prohibition of reuse of _GetHash160Comp() - to increase speed. It is better to calculate the Y coordinate once than to calculate hash160 twice (in which there are 2 functions sha256 + 1 time Ripemd160). So what will be faster??? You need to look at someone else’s code carefully before drawing such conclusions. Is this the same thing or not? Binary build using CUDA 10.2 Available for downloads https://github.com/alek76-2/VanitySearch/tree/main/binNO testing phase Well, if you ask why I removed the endomorphism? It is only effective for 256-bit keys, because... k1 and k2 are half the length of 256 bits (this is how they get the speedup). In this case, it is useless for solving the 32 BTC Puzzle. With endomorphism you will search in space for 128 bits for heating an apartment with a video card
|
|
|
this python script generates about 144M private keys with the X and Y keys, which takes a long time to generate, so I'd like to know if it would be possible to speed up the process by keeping the calculation method used in the script, even if it's just a matter of generating the private keys while keeping the calculation method?
144M private keys are a drop in the ocean of keys. What's the point of generating public keys from private keys (it takes a long time). You need to add and multiply and divide public keys (XY coordinates). The process can of course be speeded up if you use C++. Not a single Python script has yet found complex solutions to a puzzle. You have some unique creative designs from Jean Luc Pons, this is the highest level of programming skill and experience. Everything else can only be modified, new algorithms and new functions can be added to the C++ code. Look in the wrong direction... It's better to find the correct divisor for the unknown private key. Correct - this means the remainder of the division is zero!!! This is a good task, then there will be a result.
|
|
|
Coming soon.
Once upon a time, there existed a WanderingPhilospher who also was a brute force developer, he used to be my mentor, he taught a lot of useful stuff to me. Will you be my new mentor? Lol
Do you have anything useful and fast that could do public key calculations to solve for private key? I have some ideas which I need to test extensively to make sure it could be used to solve DLP, God willing after a successful test run, I might bother you to develop something new! Not funny at all! I already have a version with random divide of the public key. I talked to WanderingPhilospher a couple of years ago, I remember well when I remade the starting keys for Kangaroo. And probably everyone forgot that I was the first to post the GPU code for Kangaroo and this was before the release date of Kangaroo from Jean-Luc Pons. here is the link: https://bitcointalk.org/index.php?topic=5218972.msg54089243#msg54089243At that time, I pushed this topic very hard, and soon a version from Jean-Luc Pons appeared. Thank him very much. As promised, I published the fork code on Github https://github.com/alek76-2/VanitySearchEnjoy it, and if you find solution 66 with this version, don’t forget about me
|
|
|
I made a new version, while I’m checking how it works... It will be very difficult to find bit 66, even with the best GPUs. OpenSSL is screwed into the program, with the ability to switch the OpenSSL functions used. Can also check different dlls by dropping them into the directory with the program. I disabled everything unnecessary - SSE, endomorphism, symmetry. Changed the GPU code - removed endomorphism and removed double (quadruples) checks of Ripemd160 (Match GPU - the Y coordinate is calculated in the curve). I'm checking it out, maybe I'll post it soon...
Sounds interesting as long as the source code is available so one can compile the program. Is it available for download ? Today I checked the GPU code again, since I removed the unnecessary calculations of Ripemd160 (left 1 out of 6) and it works correctly. I needed to make sure again that everything was correct. In this code I also used functions from the Bitcoin client - to add a seed, the Rand_add() function. I'll post it on Github in the near future, because... With my computing resources it will not be possible to find a solution to bit 66. If they find it using my fork, then send me a tips . Coming soon. I managed to get this speed on Tesla T4: [ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ] [ ] [===========================================================] [ Changes by Alek76 modify 0.03 ] [===========================================================] [ Tips: 1NULY7DhzuNvSDtPkFzNo6oRTZQWBqXNE9 ] [===========================================================] [ Options added argv [-start] [-bits] and disable SSE ] [===========================================================] [ Used OpenSSL Random number generator ] [===========================================================] OpenSSL 3.0.2 15 Mar 2022 (Library: OpenSSL 3.0.2 15 Mar 2022) [===========================================================] [ OpenSSL add all algorithms ] [===========================================================] [ OpenSSL Used functions level 4 ] [ ] [ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ]
[i] RAND_add() Seed with CPU performance counter: 1695456415355946 Difficulty: 1461501637330902918203684832716283019655932542976 Search: 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so [Compressed] Start Sat Sep 23 08:06:55 2023 Base Key: Randomly changed every 100000 Mkeys Number of CPU thread: 0 GPU: GPU #0 Tesla T4 (40x64 cores) Grid(320x128)
[i] RAND_add() Seed with CPU performance counter: 1695456415480157 Bit 66 GPU Base Key 0: 2DAFFE6ACD76ABC1D Bit 66 GPU Base Key 1: 27AD93FD5D885B767 Bit 66 GPU Base Key 2: 2D67AE2D1731671C5 Bit 66 GPU Base Key 3: 3C77CC7B5C7587A86 Bit 66 GPU Base Key 4: 277448DA9C423D147 Bit 66 GPU Base Key 5: 2F7EDC7B5C2B09F0F Bit 66 GPU Base Key 6: 3DABCD2B602D43EA8 Bit 66 GPU Base Key 7: 238936C644C88AB7E Bit 66 GPU Base Key 8: 3A97B3F0171947B59 Bit 66 GPU Base Key 9: 31B6CDD325D6B3FB7 Bit 66 GPU Base Key 40951: 3211CC54F75B5CD00 Bit 66 GPU Base Key 40952: 2327D47C30738E157 Bit 66 GPU Base Key 40953: 2A66575CC34FA37C6 Bit 66 GPU Base Key 40954: 2981DD1BA18306814 Bit 66 GPU Base Key 40955: 3775C5C27150FEA12 Bit 66 GPU Base Key 40956: 37A37E2863197B3DB Bit 66 GPU Base Key 40957: 3D78C9919D6B6A072 Bit 66 GPU Base Key 40958: 22100282EE8370965 Bit 66 GPU Base Key 40959: 37E28F54F8EC9B7D2
[i] RAND_add() Seed with CPU performance counter: 1695456416086342 Bit 66 GPU Base Key 0: 33D16FF3A68C0BA73 Bit 66 GPU Base Key 1: 359F2BA0E89868D5E Bit 66 GPU Base Key 2: 3DDDCE27056C63AD9 Bit 66 GPU Base Key 3: 2EFF53109E165A31F Bit 66 GPU Base Key 4: 236DC50A204B42078 Bit 66 GPU Base Key 5: 2F128D7562A4DDC32 Bit 66 GPU Base Key 6: 2743F1524E422DF51 Bit 66 GPU Base Key 7: 284ECC8C4DC852018 Bit 66 GPU Base Key 8: 3932B5EC487EACE6A Bit 66 GPU Base Key 9: 398E4AEE55E284239 Bit 66 GPU Base Key 40951: 3225C10410AF00667 Bit 66 GPU Base Key 40952: 229E0588B78FCDF88 Bit 66 GPU Base Key 40953: 25DAC65EBE4EF6B6B Bit 66 GPU Base Key 40954: 2C5621F3B0D87CFB8 Bit 66 GPU Base Key 40955: 229EC31EBF4F800D2 Bit 66 GPU Base Key 40956: 31F29B5822AA4E982 Bit 66 GPU Base Key 40957: 27C891A611B7D7A20 Bit 66 GPU Base Key 40958: 2F1351CB9E5A7812F Bit 66 GPU Base Key 40959: 22D025D76B453D748 [615.93 Mkey/s][GPU 615.93 Mkey/s][Total 2^36.06][Prob 0.0%][50% in 5.21538e+31y][Found 0]
Coming soon... Already available https://github.com/alek76-2/VanitySearch
|
|
|
Please don't belive that you are the only one who think in that... Yes, I checked some SSL libs on linux. Most of them works ok, The useful thing is when you tested some buggy version of it. but you need to check the source code to see where the bug is and use it to generate "weak" keys. Yes, that's absolutely true. Here I spent a week digging through old versions of OpenSSL from their official source. Weak keys are possible if assembled incorrectly. For example, like in older versions of Bitcoin core bitcoin-0.2.0, where RandAddSeedPerfmon() for Linux does not work, not used function RAND_add(). Downloaded DLLs can be checked by saving them keys to file and checking for duplicates. But this is unlikely all, a very large range. In general, a good Random will not hurt to solve bit 66, since the versions and key generation programs for this puzzle are not known. Perhaps the purpose of its creation will help, but perhaps its purpose is also to test the strength of OpenSSL libraries. Although there are so many external events that it is not possible to re-generate duplicate keys, unless there are broken versions - removing some functions to generate a weak key. Perhaps someone decided to check old versions and created this puzzle.
|
|
|
Hello everyone, and especially those who still remember me) I made a new version, while I’m checking how it works... It will be very difficult to find bit 66, even with the best GPUs. OpenSSL is screwed into the program, with the ability to switch the OpenSSL functions used. Сan also check different dlls by dropping them into the directory with the program. I disabled everything unnecessary - SSE, endomorphism, symmetry. Changed the GPU code - removed endomorphism and removed double (quadruples) checks of Ripemd160 (Match GPU - the Y coordinate is calculated in the curve). I'm checking it out, maybe I'll post it soon... C:\VSearch-1.19 New Build check v0.03\win7 x64>VanitySearch.exe -stop -t 1 -bits 66 -r 5 -level 1 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so
[ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ] [ ] [===========================================================] [ Changes by Alek76 modify 0.03 ] [===========================================================] [ Tips: 1NULY7DhzuNvSDtPkFzNo6oRTZQWBqXNE9 ] [===========================================================] [ Options added argv [-start] [-bits] and disable SSE ] [===========================================================] [ Used OpenSSL Random number generator ] [===========================================================] [ OpenSSL add all algorithms ] [===========================================================] [ OpenSSL Used functions level 1 ] [ ] [ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ]
Difficulty: 1461501637330902918203684832716283019655932542976 Search: 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so [Compressed] Start Fri Sep 22 23:00:18 2023 Base Key: Randomly changed every 5 Mkeys Number of CPU thread: 1
Bit 60 Base Key thId 0: 9F79EEEC674E61F < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 66 CPU Base Key thId 0: 29D1A41009D12513A [0.89 Mkey/s][GPU 0.00 Mkey/s][Total 2^22.35][Prob 0.0%][50% in 3.60851e+34y][Found 0] Bit 64 Base Key thId 0: E3643540371FB847 < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 64 Base Key thId 0: 80A2CD8B9A3C23BC < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 66 CPU Base Key thId 0: 3A53B397C7C3998F9 [0.85 Mkey/s][GPU 0.00 Mkey/s][Total 2^23.51][Prob 0.0%][50% in 3.768e+34y][Found 0] Bit 66 CPU Base Key thId 0: 33A47F5D6B844E5CE [0.82 Mkey/s][GPU 0.00 Mkey/s][Total 2^24.14][Prob 0.0%][50% in 3.90297e+34y][Found 0] Bit 66 CPU Base Key thId 0: 23B25CA07BAC32C6F [0.82 Mkey/s][GPU 0.00 Mkey/s][Total 2^24.58][Prob 0.0%][50% in 3.9043e+34y][Found 0] Bit 65 Base Key thId 0: 12FF6314297C60ECB < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 66 CPU Base Key thId 0: 25B540E692C67500B [0.82 Mkey/s][GPU 0.00 Mkey/s][Total 2^24.92][Prob 0.0%][50% in 3.90599e+34y][Found 0] Bit 65 Base Key thId 0: 14F6F111D9ADFE665 < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 66 CPU Base Key thId 0: 28F5EB0F8DBAF6E80 [0.82 Mkey/s][GPU 0.00 Mkey/s][Total 2^25.19][Prob 0.0%][50% in 3.90512e+34y][Found 0] Bit 66 CPU Base Key thId 0: 33755278B8367C2C3 [0.82 Mkey/s][GPU 0.00 Mkey/s][Total 2^25.42][Prob 0.0%][50% in 3.89525e+34y][Found 0] Bit 64 Base Key thId 0: C63FFCFE4B85011C < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 66 CPU Base Key thId 0: 36CA7D64880F6EC8E [0.82 Mkey/s][GPU 0.00 Mkey/s][Total 2^25.59][Prob 0.0%][50% in 3.89824e+34y][Found 0] Bit 65 Base Key thId 0: 1602E2E612E2D1D5D < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 64 Base Key thId 0: 9CE5D3E01377163B < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 66 CPU Base Key thId 0: 22729A06418E0AA07 [0.82 Mkey/s][GPU 0.00 Mkey/s][Total 2^25.77][Prob 0.0%][50% in 3.90262e+34y][Found 0] Bit 65 Base Key thId 0: 1E4BA74256A46FFF2 < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 65 Base Key thId 0: 19A395587DDFF6849 < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 66 CPU Base Key thId 0: 201909FF60F39CB91 [0.82 Mkey/s][GPU 0.00 Mkey/s][Total 2^25.89][Prob 0.0%][50% in 3.90116e+34y][Found 0]
C:\VSearch-1.19 New Build check v0.03\win7 x64>VanitySearch.exe -stop -t 2 -bits 66 -r 5 -level 4 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so
[ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ] [ ] [===========================================================] [ Changes by Alek76 modify 0.03 ] [===========================================================] [ Tips: 1NULY7DhzuNvSDtPkFzNo6oRTZQWBqXNE9 ] [===========================================================] [ Options added argv [-start] [-bits] and disable SSE ] [===========================================================] [ Used OpenSSL Random number generator ] [===========================================================] [ OpenSSL add all algorithms ] [===========================================================] [ OpenSSL RAND_screen() OK ] [===========================================================] [ OpenSSL Used functions level 4 ] [ ] [ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ]
[i] RAND_add() Seed with CPU performance counter: 413322837980 Difficulty: 1461501637330902918203684832716283019655932542976 Search: 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so [Compressed] Start Fri Sep 22 23:25:51 2023 Base Key: Randomly changed every 5 Mkeys Number of CPU thread: 2
[i] RAND_add() Seed with CPU performance counter: 413323029166
Bit 64 Base Key thId 1: C3B95A81B85BFE25 < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 66 CPU Base Key thId 1: 20D9401B0A4FFDD06
[i] RAND_add() Seed with CPU performance counter: 413323029845
Bit 64 Base Key thId 0: A5BB18323A7CB6AB < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 66 CPU Base Key thId 0: 295244E678E41E12E [1.82 Mkey/s][GPU 0.00 Mkey/s][Total 2^22.85][Prob 0.0%][50% in 1.76408e+34y][Found 0] [i] RAND_add() Seed with CPU performance counter: 413333913173
Bit 66 CPU Base Key thId 0: 29EF09292123E8168
[i] RAND_add() Seed with CPU performance counter: 413333913233
Bit 65 Base Key thId 1: 1FC1E88D8E95BC854 < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 61 Base Key thId 1: 11B4BEA1EE95FF48 < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 66 CPU Base Key thId 1: 27D8A8F52B15BE829 [1.72 Mkey/s][GPU 0.00 Mkey/s][Total 2^23.76][Prob 0.0%][50% in 1.86995e+34y][Found 0] [i] RAND_add() Seed with CPU performance counter: 413343522509
Bit 66 CPU Base Key thId 0: 396121E3EFFA2A03C
[i] RAND_add() Seed with CPU performance counter: 413343523260
Bit 66 CPU Base Key thId 1: 2D60B4F910B675F54 [1.68 Mkey/s][GPU 0.00 Mkey/s][Total 2^24.31][Prob 0.0%][50% in 1.90682e+34y][Found 0] [i] RAND_add() Seed with CPU performance counter: 413353124168
[i] RAND_add() Seed with CPU performance counter: 413353124942
Bit 64 Base Key thId 1: B461B1FC1240503B < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 66 CPU Base Key thId 1: 2C1BC11A5C0C595BA
Bit 66 CPU Base Key thId 0: 32DFF58084D0F0B48 [1.67 Mkey/s][GPU 0.00 Mkey/s][Total 2^24.72][Prob 0.0%][50% in 1.92559e+34y][Found 0] [i] RAND_add() Seed with CPU performance counter: 413362823436
Bit 66 CPU Base Key thId 1: 2664445EC6A550E07
[i] RAND_add() Seed with CPU performance counter: 413362823661
Bit 66 CPU Base Key thId 0: 27E59959139581FB5 [1.62 Mkey/s][GPU 0.00 Mkey/s][Total 2^25.03][Prob 0.0%][50% in 1.98491e+34y][Found 0] [i] RAND_add() Seed with CPU performance counter: 413372570037
[i] RAND_add() Seed with CPU performance counter: 413372575962
Bit 66 CPU Base Key thId 1: 2DA47EF2D2A90A017
Bit 66 CPU Base Key thId 0: 33A1C28B16D799A69 [1.62 Mkey/s][GPU 0.00 Mkey/s][Total 2^25.29][Prob 0.0%][50% in 1.98281e+34y][Found 0] [i] RAND_add() Seed with CPU performance counter: 413382240693
[i] RAND_add() Seed with CPU performance counter: 413382241494
Bit 61 Base Key thId 1: 147BF7CC10BC669B < 20000000000000000 or > 3FFFFFFFFFFFFFFFF Rekey true
Bit 66 CPU Base Key thId 1: 2BC45552F10B6FAF2
Bit 66 CPU Base Key thId 0: 3BF647F72F5534012 [1.62 Mkey/s][GPU 0.00 Mkey/s][Total 2^25.40][Prob 0.0%][50% in 1.98292e+34y][Found 0]
C:\VSearch-1.19 New Build check v0.03\win7 x64>VanitySearch.exe -stop -t 2 -bits 28 -r 5 -level 1 12jbtzBb54r97TCwW3G1gCFoumpckRAPdY
[ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ] [ ] [===========================================================] [ Changes by Alek76 modify 0.03 ] [===========================================================] [ Tips: 1NULY7DhzuNvSDtPkFzNo6oRTZQWBqXNE9 ] [===========================================================] [ Options added argv [-start] [-bits] and disable SSE ] [===========================================================] [ Used OpenSSL Random number generator ] [===========================================================] [ OpenSSL add all algorithms ] [===========================================================] [ OpenSSL Used functions level 1 ] [ ] [ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ]
Difficulty: 1461501637330902918203684832716283019655932542976 Search: 12jbtzBb54r97TCwW3G1gCFoumpckRAPdY [Compressed] Start Fri Sep 22 23:32:33 2023 Base Key: Randomly changed every 5 Mkeys Number of CPU thread: 2
Bit 28 CPU Base Key thId 0: F3DDC63
Bit 28 CPU Base Key thId 1: CFD7541 [1.82 Mkey/s][GPU 0.00 Mkey/s][Total 2^22.86][Prob 0.0%][50% in 1.76379e+34y][Found 0] Bit 28 CPU Base Key thId 1: D299DE3
Bit 28 CPU Base Key thId 0: BAC1B81 [1.73 Mkey/s][GPU 0.00 Mkey/s][Total 2^23.78][Prob 0.0%][50% in 1.85735e+34y][Found 0] Bit 28 CPU Base Key thId 1: CC24254
Bit 26 Base Key thId 0: 2165974 < 8000000 or > FFFFFFF Rekey true
Bit 28 CPU Base Key thId 0: CC18276 [1.69 Mkey/s][GPU 0.00 Mkey/s][Total 2^24.33][Prob 0.0%][50% in 1.8972e+34y][Found 0] Bit 27 Base Key thId 1: 4B1D339 < 8000000 or > FFFFFFF Rekey true
Bit 28 CPU Base Key thId 1: D517B81
Bit 26 Base Key thId 0: 24181FC < 8000000 or > FFFFFFF Rekey true
Bit 26 Base Key thId 0: 2639DB4 < 8000000 or > FFFFFFF Rekey true
Bit 27 Base Key thId 0: 5992E85 < 8000000 or > FFFFFFF Rekey true
Bit 26 Base Key thId 0: 3AE84E6 < 8000000 or > FFFFFFF Rekey true
Bit 28 CPU Base Key thId 0: DF7A263 [1.68 Mkey/s][GPU 0.00 Mkey/s][Total 2^24.73][Prob 0.0%][50% in 1.91598e+34y][Found 0] Bit 27 Base Key thId 1: 596F852 < 8000000 or > FFFFFFF Rekey true
Bit 27 Base Key thId 1: 5005795 < 8000000 or > FFFFFFF Rekey true
Bit 28 CPU Base Key thId 1: C626164
Bit 28 CPU Base Key thId 0: D72E1A1 [1.63 Mkey/s][GPU 0.00 Mkey/s][Total 2^24.90][Prob 0.0%][50% in 1.97098e+34y][Found 0]
Addr :12jbtzBb54r97TCwW3G1gCFoumpckRAPdY Check:12jbtzBb54r97TCwW3G1gCFoumpckRAPdY
!!! Result.txt Found key: D916CE8 !!! Result.txt Found key: D916CE8 !!! Result.txt Found key: D916CE8 !!! Result.txt Found key: D916CE8 !!! Result.txt Found key: D916CE8
Has anyone used OpenSSL to generate keys? Probably not..
|
|
|
Hi,
cudaMemset(outputPrefix,0,4); reset the prefix counter which is a 32bits variable, there's no need to reset anything else.
This variable is used in: pos = atomicAdd(out, 1);
where out is a pointer (uint32_t *) to outputPrefix.
With the functions, everything is clear But, it does not work out logically ... this-> outputSize = (maxFound * ITEM_SIZE + 4); cudaMalloc ((void **) & outputPrefix, outputSize); cudaMemset (outputPrefix, 0,4); Respectively outputSize = (65536 * 28 + 4) = 1835012 outputSize = 65536 * (28 + 4) = 2097152 = 2 ^ 21 bytes = 2048 KB = 2 MB Conclusions: Allocate output memory 1835012 bytes Clear output memory 4 bytes This is probably a mistake !? Found values in the Launch function - prefixFound is passed to the ITEM array "prefixFound.push_back (it);" Next comes return callKernel (); Where the data in outputPrefix memory should be zeroed, but this does not happen in the program, or rather, only the lower 4 bytes are erased and cyclically "while (ok &&! flag_endOfSearch)" and "ok = g.Launch (found);" copied to the host. This is verified practically in VanitySearch :: FindKeyGPU by the printf function. Need to replace ? cudaMemset (outputPrefix, 0,4); on the cudaMemset (outputPrefix, 0, outputSize); // spinWait = true; and this-> outputSize = (maxFound * ITEM_SIZE + 4); on the this-> outputSize = (maxFound * (ITEM_SIZE + 4)); Because 1835012 is not a multiple of 8
|
|
|
Hi Jean_Luc. file GPUEngine.cu bool GPUEngine::callKernel() {
// Reset nbFound //cudaMemset(outputPrefix,0,4); <-- copy duplicates to host ??? cudaMemset(outputPrefix,0,outputSize);
whats copy duplicates to host
|
|
|
Hi ttdclient. How to view the btc registration address in account? Can add information?
|
|
|
Now RawTX_RSZ.py works
It turns out, that for decoding everyone new transaction needs to open and to edit a file RawTX_RSZ.py - to write down in him(it) new transaction .
Whether and it is possible to make, so that at start of a file RawTX_RSZ.py the field opened SCAN TX type tx: - here again it will be necessary to write transaction, which needs to be checked up
OR
So, that the file RawTX_RSZ.py read from a text file, for example RawTX_RSZ.txt in which previously is written down next transaction, and result it is possible to deduce(remove) in a window PYTHON or to save in a file (for example) RSZ_RES.txt
import urllib2
print "SCAN TX" strtx = raw_input("type tx: ") response = urllib2.urlopen("https://blockchain.info/tx/" + strtx + "?format=hex") tx = response.read() #tx = "01000000013c10dccdd96187ec065a2404a829be91ccb2a80ee7986d4cbbb31cd493f69e5d000000006c493046022100c9f051042467433b2199526db1ba327154d2bcd7c90c40070ba06869c5512194022100b1146f90fac7ed0db71d2f0c91f30c51d11310c508a64719dc424cdf710cb38b012102545d2c25b98ec8827f2d9bee22b7a9fb98091b2008bc45b3b806d44624dc038cffffffff0200c5015a020000001976a914f507b67f6af2dcc993f6958c05855f4861cefe8888acc427e9254f0600001976a914b3dd79fb3460c7b0d0bbb8d2ed93436b88b6d89c88ac00000000"
Your questions are off topic!
|
|
|
#64
9000000000000000 - 900008c8cdbfc000 fe38B13505B26867 - fe38b4e9a9e18000 fe08b4e9a9e18000 - fe38b28c4dcdf000 f908b4e9a9e18000 - f908b83fef996800 e908b4e9a9e18000 - e908b8e3fd70a800 f200000000000000 - f20007dc504d4000 a0dea1390507f800 - a0decf332bc7f800 f4430518eaddc000 - f44309cb5f5dc000 d39b97986985a000 - d39bf99dea45a000 c89526398b87e000 - c895840b4507e000 de1df04147b1b000 - de1df13e0f31b000 e3ef4e58aa31b000 - e3efc87af531b000 cde0b6b3a7640000 - cde0c690b6a40000
This ranges are already scanned.
what do you use ? and what is your speed? i try this and no luck yet VanitySearch-1.15.2_bitcrack -stop -t 2 -r 500 -s 000000000000000000000000000000000000000000000000cdf0d690b6af0000 16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN
VanitySearch-1.15.2_bitcrack uses non-sequential search, there are dips in the range Vanity.cpp line 1530. void VanitySearch::getGPUStartingKeys(int thId, int groupSize, int nbThread, Int *keys, Point *p, uint64_t *n_count) { //printf("\n[gpu-rekey][Th#%u][gsize#%u][nbT#%u][%u] \n", thId, groupSize, nbThread, *n_count); for (int i = 0; i < nbThread; i++) { if (rekey > 0) { //keys[i].Rand(256); keys[i].Set(&startKey); Int off((uint64_t)i); off.Mult((uint64_t)((rekey * 1000000) / nbThread)); off.Add((*n_count)*(rekey * 1000000));// <-- !!! The no Sequential search !!! keys[i].Add(&off); //printf("\n[rekey][i#%u][count#%u] 0x%064s \n", i, *n_count, keys[i].GetBase16().c_str());
I use the code and any rekey void VanitySearch::getGPUStartingKeys(int thId, int groupSize, int nbThread, Int *keys, Point *p, uint64_t *n_count) {
for (int i = 0; i <= nbThread; i++) { if (rekey > 0) { // Sequential search (no dips) rekey = nbThread; // ;) keys[i].Set(&startKey); Int off((uint64_t)i); off.ShiftL(20); //off.Mult((uint64_t)((rekey * 1000000) / nbThread)); //off.Add((*n_count)*(rekey * 1000000)); if (*n_count != 0) keys[i].Add(((*n_count)*(rekey * 1048576) + 1048576)); keys[i].Add(&off); // Check GPU Start Key if (i < 5) printf("\n GPU Start Key %d: %s nbThread %d ", i, keys[i].GetBase16().c_str(), nbThread); if (i == nbThread) printf("\n GPU Start Key %d: %s nbThread %d \n", i, keys[i].GetBase16().c_str(), nbThread); }
Result VSearch bit64 key range 0-100 percent v1.15 key from 0x8000000000000000 to 0xffffffffffffffff Difficulty: 1461501637330902918203684832716283019655932542976 Search: 16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN [Compressed] Start Sat Dec 14 10:22:44 2019 Starting at PrivKey: 0x D000034800200000 Number of CPU thread: 0 GPU: GPU #0 Tesla P100-PCIE-16GB (56x64 cores) Grid(448x512)
GPU Start Key 0: D000034800200000 nbThread 229376 GPU Start Key 1: D000034800300000 nbThread 229376 GPU Start Key 2: D000034800400000 nbThread 229376 GPU Start Key 3: D000034800500000 nbThread 229376 GPU Start Key 4: D000034800600000 nbThread 229376 GPU Start Key 229376: D000038000200000 nbThread 229376 [save] 0x D000034800200000 [616.45 Mkey/s][GPU 616.45 Mkey/s][Total 2^37.81][Prob 0.0%][50% in 5.211e+31y][Found 0] GPU Start Key 0: D000038000300000 nbThread 229376 GPU Start Key 1: D000038000400000 nbThread 229376 GPU Start Key 2: D000038000500000 nbThread 229376 GPU Start Key 3: D000038000600000 nbThread 229376 GPU Start Key 4: D000038000700000 nbThread 229376 GPU Start Key 229376: D00003B800300000 nbThread 229376 [save] 0x D000038000300000 [631.12 Mkey/s][GPU 631.12 Mkey/s][Total 2^38.29][Prob 0.0%][50% in 5.08984e+31y][Found 0]
|
|
|
Какая древняя тема всплыла. Вот почти с этих вот времён, как для себя настроил сборку биткоина под Windows, так до сих пор и пользуюсь. Эх, настольгия... Надо будет всё же попробовать это дело - http://qtlinux.narod.ru/make_for_win.htmСобрал bitcoin-0.17.0 64bit из под Windows 7 Инструкция в текстовом формате, для удобства И... нужно изменить файл configure.ac перед сборкой (с оригинальным он не собирается). Вот configure.ac https://yadi.sk/d/CALdNjWsbBpqDQЕсли где-то ошибся, сильно не пинайте === Building headless Bitcoin and Bitcoin-qt on Windows === 1. Prepare your build system. I strongly suggest setting up a clean windows virtual machine via Virtualbox or similar.
1.1 Install msys shell: http[Suspicious link removed]/download From MinGW installation manager -> All packages -> MSYS mark the following for installation:
msys-base-bin msys-autoconf-bin msys-automake-bin msys-libtool-bin
then click on Installation -> Apply changes
Make sure no mingw packages are checked for installation or present from a previous install. Only the above msys packages should be installed. Also make sure that msys-gcc and msys-w32api packages are not installed. === 1.2 Install MinGW-builds project toolchain: 64 bit binaries 64 bit binaries can be compiled by using the following toolchain: Download http://sourceforge.net/projects/mingw-w64/files/Toolchains%20targetting%20Win64/Personal%20Builds/mingw-builds/4.9.2/threads-posix/seh/x86_64-4.9.2-release-posix-seh-rt_v3-rev1.7z/download and unpack it to C:\ All dependencies must be rebuilt with the above toolchain. Openssl should be configured for: mingw64 === 1.3. Ensure that mingw-builds bin folder is set in your PATH environment variable. On Windows 7 your path should look something like: C:\mingw64\bin;%SystemRoot%\system32;%SystemRoot%;%SystemRoot%\System32\Wbem;%SYSTEMROOT%\System32\WindowsPowerShell\v1.0\ === 1.4 Additional checks: C:\MinGW\bin should contain nothing but mingw-get.exe. Your gcc -v output should be: $ gcc -v Using built-in specs. COLLECT_GCC=c:\mingw32\bin\gcc.exe COLLECT_LTO_WRAPPER=c:/mingw32/bin/../libexec/gcc/i686-w64-mingw32/4.9.2/lto-wrapper.exe Target: i686-w64-mingw32 Configured with: ../../../src/gcc-4.9.2/configure --host=i686-w64-mingw32 --build=i686-w64-mingw32 --target=i686-w64-mingw32 --prefix=/mingw32 --with-sysroot=/c/mingw492/i686-492-posix-dwarf-rt_v3-rev1/mingw32 --with-gxx-include-dir=/mingw32/i686-w64-mingw32/include/c++ --enable-shared --enable-static --disable-multilib --enable-languages=ada,c,c++,fortran,objc,obj-c++,lto --enable-libstdcxx-time=yes --enable-threads=posix --enable-libgomp --enable-libatomic --enable-lto --enable-graphite --enable-checking=release --enable-fully-dynamic-string --enable-version-specific-runtime-libs --disable-sjlj-exceptions --with-dwarf2 --disable-isl-version-check --disable-cloog-version-check --disable-libstdcxx-pch --disable-libstdcxx-debug --enable-bootstrap --disable-rpath --disable-win32-registry --disable-nls --disable-werror --disable-symvers --with-gnu-as --with-gnu-ld --with-arch=i686 --with-tune=generic --with-libiconv --with-system-zlib --with-gmp=/c/mingw492/prerequisites/i686-w64-mingw32-static --with-mpfr=/c/mingw492/prerequisites/i686-w64-mingw32-static --with-mpc=/c/mingw492/prerequisites/i686-w64-mingw32-static --with-isl=/c/mingw492/prerequisites/i686-w64-mingw32-static --with-cloog=/c/mingw492/prerequisites/i686-w64-mingw32-static --enable-cloog-backend=isl --with-pkgversion='i686-posix-dwarf-rev1, Built by MinGW-W64 project' --with-bugurl=http://sourceforge.net/projects/mingw-w64 CFLAGS='-O2 -pipe -I/c/mingw492/i686-492-posix-dwarf-rt_v3-rev1/mingw32/opt/include -I/c/mingw492/prerequisites/i686-zlib-static/include -I/c/mingw492/prerequisites/i686-w64-mingw32-static/include' CXXFLAGS='-O2 -pipe -I/c/mingw492/i686-492-posix-dwarf-rt_v3-rev1/mingw32/opt/include -I/c/mingw492/prerequisites/i686-zlib-static/include -I/c/mingw492/prerequisites/i686-w64-mingw32-static/include' CPPFLAGS= LDFLAGS='-pipe -L/c/mingw492/i686-492-posix-dwarf-rt_v3-rev1/mingw32/opt/lib -L/c/mingw492/prerequisites/i686-zlib-static/lib -L/c/mingw492/prerequisites/i686-w64-mingw32-static/lib -Wl,--large-address-aware' Thread model: posix gcc version 4.9.2 (i686-posix-dwarf-rev1, Built by MinGW-W64 project) ===== ===== 2. Download, unpack and build required dependencies. I'll save them in c:\deps folder. === 2.1 OpenSSL: http://www.openssl.org/source/openssl-1.0.1l.tar.gz From a MinGw shell (C:\MinGW\msys\1.0\msys.bat), unpack the source archive with tar (this will avoid symlink issues) then configure and make:
cd /c/deps/ tar xvfz openssl-1.0.1l.tar.gz cd openssl-1.0.1l ./Configure no-zlib no-shared no-dso no-krb5 no-camellia no-capieng no-cast no-cms no-dtls1 no-gost no-gmp no-heartbeats no-idea no-jpake no-md2 no-mdc2 no-rc5 no-rdrand no-rfc3779 no-rsax no-sctp no-seed no-sha0 no-static_engine no-whirlpool no-rc2 no-rc4 no-ssl2 no-ssl3 mingw64 make
=== 2.2 Berkeley DB: http://download.oracle.com/berkeley-db/db-4.8.30.NC.tar.gz We'll use version 4.8 to preserve binary wallet compatibility. From a MinGW shell unpack the source archive, configure and make:
cd /c/deps/ tar xvfz db-4.8.30.NC.tar.gz cd db-4.8.30.NC/build_unix ../dist/configure --enable-mingw --enable-cxx --disable-shared --disable-replication make
=== 2.3 Boost: http://sourceforge.net/projects/boost/files/boost/1.57.0/ Download either the zip or the 7z archive, unpack boost inside your C:\deps folder, then bootstrap and compile from a Windows command prompt: Code:
cd C:\ cd C:\deps\boost_1_57_0\ bootstrap.bat mingw b2 --build-type=complete --with-chrono --with-filesystem --with-program_options --with-system --with-thread toolset=gcc variant=release link=static threading=multi runtime-link=static stage
This will compile the required boost libraries and put them into the stage folder (C:\deps\boost_1_57_0\stage). Note: make sure you don't use tarballs, as unix EOL markers can break batch files. === 2.4 Miniupnpc: http://miniupnp.free.fr/files/download.php?file=miniupnpc-1.9.20150206.tar.gz Unpack Miniupnpc to C:\deps, rename containing folder from "miniupnpc-1.9.20150206" to "miniupnpc" then from a Windows command prompt: Code:
cd C:\deps\miniupnpc mingw32-make -f Makefile.mingw init upnpc-static
=== 2.5 protoc and libprotobuf: Download https://github.com/google/protobuf/releases/download/v2.6.1/protobuf-2.6.1.tar.gz Then from msys shell Code:
cd /c/deps/ tar xvfz protobuf-2.6.1.tar.gz cd /c/deps/protobuf-2.6.1 configure --disable-shared make
=== 2.6 qrencode: Download and unpack http://download.sourceforge.net/libpng/libpng-1.6.16.tar.gz inside your deps folder then configure and make: Code:
cd /c/deps/ tar xvfz libpng-1.6.16.tar.gz cd /c/deps/libpng-1.6.16 configure --disable-shared make cp .libs/libpng16.a .libs/libpng.a
--- Download and unpack http://fukuchi.org/works/qrencode/qrencode-3.4.4.tar.gz inside your deps folder then configure and make: Code: cd /c/deps/ tar xvfz qrencode-3.4.4.tar.gz cd /c/deps/qrencode-3.4.4
LIBS="../libpng-1.6.16/.libs/libpng.a ../../mingw64/x86_64-w64-mingw32/lib/libz.a" \ png_CFLAGS="-I../libpng-1.6.16" \ png_LIBS="-L../libpng-1.6.16/.libs" \ configure --enable-static --disable-shared --without-tools
make
=== 2.6.2 Libevent for Bitcoin-0.17.0
cd /c/deps/ tar xvfz libevent-2.0.21-stable.tar.gz cd /c/deps/libevent-2.0.21-stable configure make
=== 2.7 Qt 5 libraries: Qt must be configured with ssl and zlib support. Download and unpack Qt base and tools sources: http://download.qt-project.org/official_releases/qt/5.3/5.3.2/submodules/qtbase-opensource-src-5.3.2.7z http://download.qt-project.org/official_releases/qt/5.3/5.3.2/submodules/qttools-opensource-src-5.3.2.7z Then from a windows command prompt (note that the following assumes qtbase has been unpacked to C:\Qt\5.3.2 and qttools have been unpacked to C:\Qt\qttools-opensource-src-5.3.2): Code:
cd C:\
set INCLUDE=C:\deps\libpng-1.6.16;C:\deps\openssl-1.0.1l\include set LIB=C:\deps\libpng-1.6.16\.libs;C:\deps\openssl-1.0.1l
cd C:\Qt\5.3.2 configure.bat -release -opensource -confirm-license -static -make libs -no-sql-sqlite -no-opengl -system-zlib -qt-pcre -no-icu -no-gif -system-libpng -no-libjpeg -no-freetype -no-angle -no-vcproj -openssl -no-dbus -no-audio-backend -no-wmf-backend -no-qml-debug
mingw32-make
set PATH=%PATH%;C:\Qt\5.3.2\bin
cd C:\Qt\qttools-opensource-src-5.3.2 qmake qttools.pro mingw32-make
Note: consider using -j switch with mingw32-make to speed up compilation process. On a quad core -j4 or -j5 should give the best results. === 3. Download and unpack Bitcoin-0.17.0 from https://bitcoincore.org/bin/bitcoin-core-0.17.0/bitcoin-0.17.0.tar.gz From msys shell configure and make bitcoin: Code:
cd /c/bitcoin-0.17.0
./autogen.sh
CPPFLAGS="-I/c/deps/db-4.8.30.NC/build_unix \ -I/c/deps/openssl-1.0.1l/include \ -I/c/deps \ -I/c/deps/protobuf-2.6.1/src \ -I/c/deps/libpng-1.6.16 \ -I/c/deps/qrencode-3.4.4 \ -I/c/deps/gmp-6.0.0 \ -I/c/deps/libevent-2.0.21-stable/include" \ LDFLAGS="-L/c/deps/db-4.8.30.NC/build_unix \ -L/c/deps/openssl-1.0.1l \ -L/c/deps/miniupnpc \ -L/c/deps/protobuf-2.6.1/src/.libs \ -L/c/deps/libpng-1.6.16/.libs \ -L/c/deps/qrencode-3.4.4/.libs \ -L/c/deps/gmp-6.0.0/.libs \ -L/c/deps/libevent-2.0.21-stable/.libs" \ BOOST_ROOT=/c/deps/boost_1_57_0 \ ./configure \ --disable-upnp-default \ --disable-tests \ --with-qt-incdir=/c/Qt/5.3.2/include \ --with-qt-libdir=/c/Qt/5.3.2/lib \ --with-qt-plugindir=/c/Qt/5.3.2/plugins \ --with-qt-bindir=/c/Qt/5.3.2/bin \ --with-protoc-bindir=/c/deps/protobuf-2.6.1/src
make
strip src/bitcoin-tx.exe strip src/bitcoin-cli.exe strip src/bitcoind.exe cd /c/bitcoin-0.17.0/src/qt strip bitcoin-qt.exe cd /c/bitcoin-0.17.0/src/bench/ strip bench_bitcoin.exe
=== end
|
|
|
|