`pub unsafe fn sm3p0(rs1: u32) -> u32`

`riscv_ext_intrinsics`

#114544)**RISC-V RV32 and target feature**only.

`zksh`

## Expand description

Implements the P0 transformation function as used in the SM3 hash function [4, 30].

This instruction is supported for the RV32 and RV64 base architectures. It implements the P0 transform of the SM3 hash function [4, 30]. This instruction must always be implemented such that its execution latency does not depend on the data being operated on.

Source: RISC-V Cryptography Extensions Volume I: Scalar & Entropy Source Instructions

Version: v1.0.1

Section: 3.41

## §Safety

This function is safe to use if the `zksh`

target feature is present.

## §Details

`P0`

transformation function as is used in the SM3 hash algorithm

This function is included in `Zksh`

extension. It’s defined as:

```
P0(X) = X ⊕ (X ≪ 9) ⊕ (X ≪ 17)
```

where `⊕`

represents 32-bit xor, and `≪ k`

represents rotate left by `k`

bits.

In the SM3 algorithm, the `P0`

transformation is used as `E ← P0(TT2)`

when the
compression function `CF`

uses the intermediate value `TT2`

to calculate
the variable `E`

in one iteration for subsequent processes.