aboutsummaryrefslogtreecommitdiff
path: root/gosthash2012.c
diff options
context:
space:
mode:
authorVitaly Chikunov <vt@altlinux.org>2020-01-30 04:05:10 +0300
committerDmitry Belyavskiy <beldmit@users.noreply.github.com>2020-02-02 21:05:29 +0300
commitb2e96b3086cc3033ddc31cc981b601ff5b9b5f08 (patch)
treed9d7787e898db2378fd633e2603a638394a79249 /gosthash2012.c
parent11777554bd63b16bb13aa3b7358d8e7809f17523 (diff)
downloadgost-engine-b2e96b3086cc3033ddc31cc981b601ff5b9b5f08.zip
gost-engine-b2e96b3086cc3033ddc31cc981b601ff5b9b5f08.tar.gz
gost-engine-b2e96b3086cc3033ddc31cc981b601ff5b9b5f08.tar.bz2
gosthash2012: Simpler version of add512
Similar to my commit into adegtyarev/streebog@432d5de.
Diffstat (limited to 'gosthash2012.c')
-rw-r--r--gosthash2012.c46
1 files changed, 21 insertions, 25 deletions
diff --git a/gosthash2012.c b/gosthash2012.c
index 201fe31..3dacc35 100644
--- a/gosthash2012.c
+++ b/gosthash2012.c
@@ -57,34 +57,30 @@ static INLINE void add512(const union uint512_u *x,
const union uint512_u *y, union uint512_u *r)
{
#ifndef __GOST3411_BIG_ENDIAN__
- unsigned int CF, OF;
- unsigned long long tmp;
+ unsigned int CF;
unsigned int i;
CF = 0;
- for (i = 0; i < 8; i++)
- {
- /* Detecting integer overflow condition for three numbers
- * in a portable way is tricky a little. */
-
- /* Step 1: numbers cause overflow */
- tmp = x->QWORD[i] + y->QWORD[i];
-
- /* Compare with any of two summands, no need to check both */
- if (tmp < x->QWORD[i])
- OF = 1;
- else
- OF = 0;
-
- /* Step 2: carry bit causes overflow */
- tmp += CF;
-
- if (CF > 0 && tmp == 0)
- OF = 1;
-
- CF = OF;
-
- r->QWORD[i] = tmp;
+ for (i = 0; i < 8; i++) {
+ const unsigned long long left = x->QWORD[i];
+ unsigned long long sum;
+
+ sum = left + y->QWORD[i] + CF;
+ /*
+ * (sum == left): is noop, because it's possible only
+ * when `left' is added with `0 + 0' or with `ULLONG_MAX + 1',
+ * in that case `CF' (carry) retain previous value, which is correct,
+ * because when `left + 0 + 0' there was no overflow (thus no carry),
+ * and when `left + ULLONG_MAX + 1' value is wrapped back to
+ * itself with overflow, thus creating carry.
+ *
+ * (sum != left):
+ * if `sum' is not wrapped (sum > left) there should not be carry,
+ * if `sum' is wrapped (sum < left) there should be carry.
+ */
+ if (sum != left)
+ CF = (sum < left);
+ r->QWORD[i] = sum;
}
#else
const unsigned char *xp, *yp;