From 97dea10b2b2da03eeaaa4358aa7a8b3f02e38017 Mon Sep 17 00:00:00 2001 From: Duke Leto Date: Wed, 29 Jun 2022 22:18:05 -0400 Subject: [PATCH] more randomx debug --- src/miner.cpp | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/src/miner.cpp b/src/miner.cpp index 10f2ed944..9b5ad0392 100644 --- a/src/miner.cpp +++ b/src/miner.cpp @@ -1119,7 +1119,7 @@ void static RandomXMiner() } } IncrementExtraNonce(pblock, pindexPrev, nExtraNonce); - //fprintf(stderr,"Running HushMiner.%s with %u transactions in block\n",solver.c_str(),(int32_t)pblock->vtx.size()); + fprintf(stderr,"Running HushRandomXMiner with %u transactions in block\n",(int32_t)pblock->vtx.size()); LogPrintf("Running HushRandomXMiner with %u transactions in block (%u bytes)\n",pblock->vtx.size(),::GetSerializeSize(*pblock,SER_NETWORK,PROTOCOL_VERSION)); // Search @@ -1143,9 +1143,11 @@ void static RandomXMiner() hashTarget = HASHTarget; char randomxHash[RANDOMX_HASH_SIZE]; + fprintf(stderr,"RandomXMiner: created randomxHash of size %d\n", RANDOMX_HASH_SIZE); // Initial randomx key is chain magic || ac_name which is >= 2^40 bits of entropy assuming strlen(ac_name) >= 1 // For ac_name=DRAGONX we have 4 + 7 = 11 bytes or 2^88 bits of entropy char randomxKey[4 + strlen(SMART_CHAIN_SYMBOL)]; + fprintf(stderr,"RandomXMiner: creating randomxKey of size %d\n", 4 + strlen(SMART_CHAIN_SYMBOL)); randomxKey[0] = ASSETCHAINS_MAGIC & 0xff; randomxKey[1] = (ASSETCHAINS_MAGIC >> 8) & 0xff; randomxKey[2] = (ASSETCHAINS_MAGIC >> 16) & 0xff; @@ -1154,6 +1156,7 @@ void static RandomXMiner() for(int i=0; i++; i