qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: Alistair Francis <alistair23@gmail.com>
To: Weiwei Li <liweiwei@iscas.ac.cn>
Cc: "Wei Wu (吴伟)" <lazyparser@gmail.com>,
	"open list:RISC-V" <qemu-riscv@nongnu.org>,
	lustrew@foxmail.com, wangjunqiang <wangjunqiang@iscas.ac.cn>,
	"Bin Meng" <bin.meng@windriver.com>,
	"Richard Henderson" <richard.henderson@linaro.org>,
	"qemu-devel@nongnu.org Developers" <qemu-devel@nongnu.org>,
	"Palmer Dabbelt" <palmer@dabbelt.com>,
	luruibo2000@163.com,
	"Alistair Francis" <alistair.francis@wdc.com>
Subject: Re: [PATCH v8 07/14] target/riscv: rvk: add support for zkne/zknd extension in RV64
Date: Fri, 11 Mar 2022 12:26:13 +1000	[thread overview]
Message-ID: <CAKmqyKNgeE5-K3GbRLMcA2Xtw+vicsgFuco9A8bF1S0xKJe6hA@mail.gmail.com> (raw)
In-Reply-To: <20220301115828.355-8-liweiwei@iscas.ac.cn>

On Tue, Mar 1, 2022 at 10:03 PM Weiwei Li <liweiwei@iscas.ac.cn> wrote:
>
>  - add aes64dsm, aes64ds, aes64im, aes64es, aes64esm, aes64ks2, aes64ks1i instructions
>
> Co-authored-by: Ruibo Lu <luruibo2000@163.com>
> Co-authored-by: Zewen Ye <lustrew@foxmail.com>
> Signed-off-by: Weiwei Li <liweiwei@iscas.ac.cn>
> Signed-off-by: Junqiang Wang <wangjunqiang@iscas.ac.cn>
> Reviewed-by: Richard Henderson <richard.henderson@linaro.org>

Acked-by: Alistair Francis <alistair.francis@wdc.com>

Alistair

> ---
>  target/riscv/crypto_helper.c            | 169 ++++++++++++++++++++++++
>  target/riscv/helper.h                   |   8 ++
>  target/riscv/insn32.decode              |  12 ++
>  target/riscv/insn_trans/trans_rvk.c.inc |  47 +++++++
>  4 files changed, 236 insertions(+)
>
> diff --git a/target/riscv/crypto_helper.c b/target/riscv/crypto_helper.c
> index 220d51c742..cb4783a1e9 100644
> --- a/target/riscv/crypto_helper.c
> +++ b/target/riscv/crypto_helper.c
> @@ -102,4 +102,173 @@ target_ulong HELPER(aes32dsi)(target_ulong rs1, target_ulong rs2,
>  {
>      return aes32_operation(shamt, rs1, rs2, false, false);
>  }
> +
> +#define BY(X, I) ((X >> (8 * I)) & 0xFF)
> +
> +#define AES_SHIFROWS_LO(RS1, RS2) ( \
> +    (((RS1 >> 24) & 0xFF) << 56) | (((RS2 >> 48) & 0xFF) << 48) | \
> +    (((RS2 >> 8) & 0xFF) << 40) | (((RS1 >> 32) & 0xFF) << 32) | \
> +    (((RS2 >> 56) & 0xFF) << 24) | (((RS2 >> 16) & 0xFF) << 16) | \
> +    (((RS1 >> 40) & 0xFF) << 8) | (((RS1 >> 0) & 0xFF) << 0))
> +
> +#define AES_INVSHIFROWS_LO(RS1, RS2) ( \
> +    (((RS2 >> 24) & 0xFF) << 56) | (((RS2 >> 48) & 0xFF) << 48) | \
> +    (((RS1 >> 8) & 0xFF) << 40) | (((RS1 >> 32) & 0xFF) << 32) | \
> +    (((RS1 >> 56) & 0xFF) << 24) | (((RS2 >> 16) & 0xFF) << 16) | \
> +    (((RS2 >> 40) & 0xFF) << 8) | (((RS1 >> 0) & 0xFF) << 0))
> +
> +#define AES_MIXBYTE(COL, B0, B1, B2, B3) ( \
> +    BY(COL, B3) ^ BY(COL, B2) ^ AES_GFMUL(BY(COL, B1), 3) ^ \
> +    AES_GFMUL(BY(COL, B0), 2))
> +
> +#define AES_MIXCOLUMN(COL) ( \
> +    AES_MIXBYTE(COL, 3, 0, 1, 2) << 24 | \
> +    AES_MIXBYTE(COL, 2, 3, 0, 1) << 16 | \
> +    AES_MIXBYTE(COL, 1, 2, 3, 0) << 8 | AES_MIXBYTE(COL, 0, 1, 2, 3) << 0)
> +
> +#define AES_INVMIXBYTE(COL, B0, B1, B2, B3) ( \
> +    AES_GFMUL(BY(COL, B3), 0x9) ^ AES_GFMUL(BY(COL, B2), 0xd) ^ \
> +    AES_GFMUL(BY(COL, B1), 0xb) ^ AES_GFMUL(BY(COL, B0), 0xe))
> +
> +#define AES_INVMIXCOLUMN(COL) ( \
> +    AES_INVMIXBYTE(COL, 3, 0, 1, 2) << 24 | \
> +    AES_INVMIXBYTE(COL, 2, 3, 0, 1) << 16 | \
> +    AES_INVMIXBYTE(COL, 1, 2, 3, 0) << 8 | \
> +    AES_INVMIXBYTE(COL, 0, 1, 2, 3) << 0)
> +
> +static inline target_ulong aes64_operation(target_ulong rs1, target_ulong rs2,
> +                                           bool enc, bool mix)
> +{
> +    uint64_t RS1 = rs1;
> +    uint64_t RS2 = rs2;
> +    uint64_t result;
> +    uint64_t temp;
> +    uint32_t col_0;
> +    uint32_t col_1;
> +
> +    if (enc) {
> +        temp = AES_SHIFROWS_LO(RS1, RS2);
> +        temp = (((uint64_t)AES_sbox[(temp >> 0) & 0xFF] << 0) |
> +                ((uint64_t)AES_sbox[(temp >> 8) & 0xFF] << 8) |
> +                ((uint64_t)AES_sbox[(temp >> 16) & 0xFF] << 16) |
> +                ((uint64_t)AES_sbox[(temp >> 24) & 0xFF] << 24) |
> +                ((uint64_t)AES_sbox[(temp >> 32) & 0xFF] << 32) |
> +                ((uint64_t)AES_sbox[(temp >> 40) & 0xFF] << 40) |
> +                ((uint64_t)AES_sbox[(temp >> 48) & 0xFF] << 48) |
> +                ((uint64_t)AES_sbox[(temp >> 56) & 0xFF] << 56));
> +        if (mix) {
> +            col_0 = temp & 0xFFFFFFFF;
> +            col_1 = temp >> 32;
> +
> +            col_0 = AES_MIXCOLUMN(col_0);
> +            col_1 = AES_MIXCOLUMN(col_1);
> +
> +            result = ((uint64_t)col_1 << 32) | col_0;
> +        } else {
> +            result = temp;
> +        }
> +    } else {
> +        temp = AES_INVSHIFROWS_LO(RS1, RS2);
> +        temp = (((uint64_t)AES_isbox[(temp >> 0) & 0xFF] << 0) |
> +                ((uint64_t)AES_isbox[(temp >> 8) & 0xFF] << 8) |
> +                ((uint64_t)AES_isbox[(temp >> 16) & 0xFF] << 16) |
> +                ((uint64_t)AES_isbox[(temp >> 24) & 0xFF] << 24) |
> +                ((uint64_t)AES_isbox[(temp >> 32) & 0xFF] << 32) |
> +                ((uint64_t)AES_isbox[(temp >> 40) & 0xFF] << 40) |
> +                ((uint64_t)AES_isbox[(temp >> 48) & 0xFF] << 48) |
> +                ((uint64_t)AES_isbox[(temp >> 56) & 0xFF] << 56));
> +        if (mix) {
> +            col_0 = temp & 0xFFFFFFFF;
> +            col_1 = temp >> 32;
> +
> +            col_0 = AES_INVMIXCOLUMN(col_0);
> +            col_1 = AES_INVMIXCOLUMN(col_1);
> +
> +            result = ((uint64_t)col_1 << 32) | col_0;
> +        } else {
> +            result = temp;
> +        }
> +    }
> +
> +    return result;
> +}
> +
> +target_ulong HELPER(aes64esm)(target_ulong rs1, target_ulong rs2)
> +{
> +    return aes64_operation(rs1, rs2, true, true);
> +}
> +
> +target_ulong HELPER(aes64es)(target_ulong rs1, target_ulong rs2)
> +{
> +    return aes64_operation(rs1, rs2, true, false);
> +}
> +
> +target_ulong HELPER(aes64ds)(target_ulong rs1, target_ulong rs2)
> +{
> +    return aes64_operation(rs1, rs2, false, false);
> +}
> +
> +target_ulong HELPER(aes64dsm)(target_ulong rs1, target_ulong rs2)
> +{
> +    return aes64_operation(rs1, rs2, false, true);
> +}
> +
> +target_ulong HELPER(aes64ks2)(target_ulong rs1, target_ulong rs2)
> +{
> +    uint64_t RS1 = rs1;
> +    uint64_t RS2 = rs2;
> +    uint32_t rs1_hi = RS1 >> 32;
> +    uint32_t rs2_lo = RS2;
> +    uint32_t rs2_hi = RS2 >> 32;
> +
> +    uint32_t r_lo = (rs1_hi ^ rs2_lo);
> +    uint32_t r_hi = (rs1_hi ^ rs2_lo ^ rs2_hi);
> +    target_ulong result = ((uint64_t)r_hi << 32) | r_lo;
> +
> +    return result;
> +}
> +
> +target_ulong HELPER(aes64ks1i)(target_ulong rs1, target_ulong rnum)
> +{
> +    uint64_t RS1 = rs1;
> +    static const uint8_t round_consts[10] = {
> +        0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36
> +    };
> +
> +    uint8_t enc_rnum = rnum;
> +    uint32_t temp = (RS1 >> 32) & 0xFFFFFFFF;
> +    uint8_t rcon_ = 0;
> +    target_ulong result;
> +
> +    if (enc_rnum != 0xA) {
> +        temp = ror32(temp, 8); /* Rotate right by 8 */
> +        rcon_ = round_consts[enc_rnum];
> +    }
> +
> +    temp = ((uint32_t)AES_sbox[(temp >> 24) & 0xFF] << 24) |
> +           ((uint32_t)AES_sbox[(temp >> 16) & 0xFF] << 16) |
> +           ((uint32_t)AES_sbox[(temp >> 8) & 0xFF] << 8) |
> +           ((uint32_t)AES_sbox[(temp >> 0) & 0xFF] << 0);
> +
> +    temp ^= rcon_;
> +
> +    result = ((uint64_t)temp << 32) | temp;
> +
> +    return result;
> +}
> +
> +target_ulong HELPER(aes64im)(target_ulong rs1)
> +{
> +    uint64_t RS1 = rs1;
> +    uint32_t col_0 = RS1 & 0xFFFFFFFF;
> +    uint32_t col_1 = RS1 >> 32;
> +    target_ulong result;
> +
> +    col_0 = AES_INVMIXCOLUMN(col_0);
> +    col_1 = AES_INVMIXCOLUMN(col_1);
> +
> +    result = ((uint64_t)col_1 << 32) | col_0;
> +
> +    return result;
> +}
>  #undef sext32_xlen
> diff --git a/target/riscv/helper.h b/target/riscv/helper.h
> index d31bfadb3e..0df0a05b11 100644
> --- a/target/riscv/helper.h
> +++ b/target/riscv/helper.h
> @@ -1121,3 +1121,11 @@ DEF_HELPER_FLAGS_3(aes32esmi, TCG_CALL_NO_RWG_SE, tl, tl, tl, tl)
>  DEF_HELPER_FLAGS_3(aes32esi, TCG_CALL_NO_RWG_SE, tl, tl, tl, tl)
>  DEF_HELPER_FLAGS_3(aes32dsmi, TCG_CALL_NO_RWG_SE, tl, tl, tl, tl)
>  DEF_HELPER_FLAGS_3(aes32dsi, TCG_CALL_NO_RWG_SE, tl, tl, tl, tl)
> +
> +DEF_HELPER_FLAGS_2(aes64esm, TCG_CALL_NO_RWG_SE, tl, tl, tl)
> +DEF_HELPER_FLAGS_2(aes64es, TCG_CALL_NO_RWG_SE, tl, tl, tl)
> +DEF_HELPER_FLAGS_2(aes64ds, TCG_CALL_NO_RWG_SE, tl, tl, tl)
> +DEF_HELPER_FLAGS_2(aes64dsm, TCG_CALL_NO_RWG_SE, tl, tl, tl)
> +DEF_HELPER_FLAGS_2(aes64ks2, TCG_CALL_NO_RWG_SE, tl, tl, tl)
> +DEF_HELPER_FLAGS_2(aes64ks1i, TCG_CALL_NO_RWG_SE, tl, tl, tl)
> +DEF_HELPER_FLAGS_1(aes64im, TCG_CALL_NO_RWG_SE, tl, tl)
> diff --git a/target/riscv/insn32.decode b/target/riscv/insn32.decode
> index 0f2e661583..0b800b4093 100644
> --- a/target/riscv/insn32.decode
> +++ b/target/riscv/insn32.decode
> @@ -36,6 +36,7 @@
>  %imm_j    31:s1 12:8 20:1 21:10  !function=ex_shift_1
>  %imm_u    12:s20                 !function=ex_shift_12
>  %imm_bs   30:2                   !function=ex_shift_3
> +%imm_rnum 20:4
>
>  # Argument sets:
>  &empty
> @@ -92,6 +93,7 @@
>  @sfence_vm  ....... ..... .....   ... ..... ....... %rs1
>
>  @k_aes   .. ..... ..... .....  ... ..... ....... &k_aes  shamt=%imm_bs   %rs2 %rs1 %rd
> +@i_aes   .. ..... ..... .....  ... ..... ....... &i      imm=%imm_rnum        %rs1 %rd
>
>  # Formats 64:
>  @sh5     .......  ..... .....  ... ..... ....... &shift  shamt=%sh5      %rs1 %rd
> @@ -842,6 +844,16 @@ hinval_gvma       0110011 ..... ..... 000 00000 1110011 @hfence_gvma
>  # *** RV32 Zknd Standard Extension ***
>  aes32dsmi   .. 10111 ..... ..... 000 ..... 0110011 @k_aes
>  aes32dsi    .. 10101 ..... ..... 000 ..... 0110011 @k_aes
> +# *** RV64 Zknd Standard Extension ***
> +aes64dsm    00 11111 ..... ..... 000 ..... 0110011 @r
> +aes64ds     00 11101 ..... ..... 000 ..... 0110011 @r
> +aes64im     00 11000 00000 ..... 001 ..... 0010011 @r2
>  # *** RV32 Zkne Standard Extension ***
>  aes32esmi   .. 10011 ..... ..... 000 ..... 0110011 @k_aes
>  aes32esi    .. 10001 ..... ..... 000 ..... 0110011 @k_aes
> +# *** RV64 Zkne Standard Extension ***
> +aes64es     00 11001 ..... ..... 000 ..... 0110011 @r
> +aes64esm    00 11011 ..... ..... 000 ..... 0110011 @r
> +# *** RV64 Zkne/zknd Standard Extension ***
> +aes64ks2    01 11111 ..... ..... 000 ..... 0110011 @r
> +aes64ks1i   00 11000 1.... ..... 001 ..... 0010011 @i_aes
> diff --git a/target/riscv/insn_trans/trans_rvk.c.inc b/target/riscv/insn_trans/trans_rvk.c.inc
> index 74f9f826b9..b86f931b13 100644
> --- a/target/riscv/insn_trans/trans_rvk.c.inc
> +++ b/target/riscv/insn_trans/trans_rvk.c.inc
> @@ -65,3 +65,50 @@ static bool trans_aes32dsi(DisasContext *ctx, arg_aes32dsi *a)
>      REQUIRE_ZKND(ctx);
>      return gen_aes32_sm4(ctx, a, gen_helper_aes32dsi);
>  }
> +
> +static bool trans_aes64es(DisasContext *ctx, arg_aes64es *a)
> +{
> +    REQUIRE_ZKNE(ctx);
> +    return gen_arith(ctx, a, EXT_NONE, gen_helper_aes64es, NULL);
> +}
> +
> +static bool trans_aes64esm(DisasContext *ctx, arg_aes64esm *a)
> +{
> +    REQUIRE_ZKNE(ctx);
> +    return gen_arith(ctx, a, EXT_NONE, gen_helper_aes64esm, NULL);
> +}
> +
> +static bool trans_aes64ds(DisasContext *ctx, arg_aes64ds *a)
> +{
> +    REQUIRE_ZKND(ctx);
> +    return gen_arith(ctx, a, EXT_NONE, gen_helper_aes64ds, NULL);
> +}
> +
> +static bool trans_aes64dsm(DisasContext *ctx, arg_aes64dsm *a)
> +{
> +    REQUIRE_ZKND(ctx);
> +    return gen_arith(ctx, a, EXT_NONE, gen_helper_aes64dsm, NULL);
> +}
> +
> +static bool trans_aes64ks2(DisasContext *ctx, arg_aes64ks2 *a)
> +{
> +    REQUIRE_EITHER_EXT(ctx, zknd, zkne);
> +    return gen_arith(ctx, a, EXT_NONE, gen_helper_aes64ks2, NULL);
> +}
> +
> +static bool trans_aes64ks1i(DisasContext *ctx, arg_aes64ks1i *a)
> +{
> +    REQUIRE_EITHER_EXT(ctx, zknd, zkne);
> +
> +    if (a->imm > 0xA) {
> +        return false;
> +    }
> +
> +    return gen_arith_imm_tl(ctx, a, EXT_NONE, gen_helper_aes64ks1i, NULL);
> +}
> +
> +static bool trans_aes64im(DisasContext *ctx, arg_aes64im *a)
> +{
> +    REQUIRE_ZKND(ctx);
> +    return gen_unary(ctx, a, EXT_NONE, gen_helper_aes64im);
> +}
> --
> 2.17.1
>
>


  reply	other threads:[~2022-03-11  2:29 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-03-01 11:58 [PATCH v8 00/14] support subsets of scalar crypto extension Weiwei Li
2022-03-01 11:58 ` [PATCH v8 01/14] target/riscv: rvk: add cfg properties for zbk* and zk* Weiwei Li
2022-03-01 11:58 ` [PATCH v8 02/14] target/riscv: rvk: add support for zbkb extension Weiwei Li
2022-03-01 11:58 ` [PATCH v8 03/14] target/riscv: rvk: add support for zbkc extension Weiwei Li
2022-03-01 11:58 ` [PATCH v8 04/14] target/riscv: rvk: add support for zbkx extension Weiwei Li
2022-03-11  3:09   ` Alistair Francis
2022-03-01 11:58 ` [PATCH v8 05/14] crypto: move sm4_sbox from target/arm Weiwei Li
2022-03-01 11:58 ` [PATCH v8 06/14] target/riscv: rvk: add support for zknd/zkne extension in RV32 Weiwei Li
2022-03-11  2:21   ` Alistair Francis
2022-03-01 11:58 ` [PATCH v8 07/14] target/riscv: rvk: add support for zkne/zknd extension in RV64 Weiwei Li
2022-03-11  2:26   ` Alistair Francis [this message]
2022-03-01 11:58 ` [PATCH v8 08/14] target/riscv: rvk: add support for sha256 related instructions in zknh extension Weiwei Li
2022-03-11  7:08   ` Alistair Francis
2022-03-01 11:58 ` [PATCH v8 09/14] target/riscv: rvk: add support for sha512 related instructions for RV32 " Weiwei Li
2022-03-01 18:24   ` Richard Henderson
2022-03-11  7:14   ` Alistair Francis
2022-03-01 11:58 ` [PATCH v8 10/14] target/riscv: rvk: add support for sha512 related instructions for RV64 " Weiwei Li
2022-03-01 11:58 ` [PATCH v8 11/14] target/riscv: rvk: add support for zksed/zksh extension Weiwei Li
2022-03-01 11:58 ` [PATCH v8 12/14] target/riscv: rvk: add CSR support for Zkr Weiwei Li
2022-03-01 11:58 ` [PATCH v8 13/14] disas/riscv.c: rvk: add disas support for Zbk* and Zk* instructions Weiwei Li
2022-03-01 11:58 ` [PATCH v8 14/14] target/riscv: rvk: expose zbk* and zk* properties Weiwei Li

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAKmqyKNgeE5-K3GbRLMcA2Xtw+vicsgFuco9A8bF1S0xKJe6hA@mail.gmail.com \
    --to=alistair23@gmail.com \
    --cc=alistair.francis@wdc.com \
    --cc=bin.meng@windriver.com \
    --cc=lazyparser@gmail.com \
    --cc=liweiwei@iscas.ac.cn \
    --cc=luruibo2000@163.com \
    --cc=lustrew@foxmail.com \
    --cc=palmer@dabbelt.com \
    --cc=qemu-devel@nongnu.org \
    --cc=qemu-riscv@nongnu.org \
    --cc=richard.henderson@linaro.org \
    --cc=wangjunqiang@iscas.ac.cn \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).