~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/arch/s390/include/asm/cpacf.h

Version: ~ [ linux-6.11-rc3 ] ~ [ linux-6.10.4 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.45 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.104 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.164 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.223 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.281 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.319 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 /* SPDX-License-Identifier: GPL-2.0 */
  2 /*
  3  * CP Assist for Cryptographic Functions (CPACF)
  4  *
  5  * Copyright IBM Corp. 2003, 2023
  6  * Author(s): Thomas Spatzier
  7  *            Jan Glauber
  8  *            Harald Freudenberger (freude@de.ibm.com)
  9  *            Martin Schwidefsky <schwidefsky@de.ibm.com>
 10  */
 11 #ifndef _ASM_S390_CPACF_H
 12 #define _ASM_S390_CPACF_H
 13 
 14 #include <asm/facility.h>
 15 #include <linux/kmsan-checks.h>
 16 
 17 /*
 18  * Instruction opcodes for the CPACF instructions
 19  */
 20 #define CPACF_KMAC              0xb91e          /* MSA  */
 21 #define CPACF_KM                0xb92e          /* MSA  */
 22 #define CPACF_KMC               0xb92f          /* MSA  */
 23 #define CPACF_KIMD              0xb93e          /* MSA  */
 24 #define CPACF_KLMD              0xb93f          /* MSA  */
 25 #define CPACF_PCKMO             0xb928          /* MSA3 */
 26 #define CPACF_KMF               0xb92a          /* MSA4 */
 27 #define CPACF_KMO               0xb92b          /* MSA4 */
 28 #define CPACF_PCC               0xb92c          /* MSA4 */
 29 #define CPACF_KMCTR             0xb92d          /* MSA4 */
 30 #define CPACF_PRNO              0xb93c          /* MSA5 */
 31 #define CPACF_KMA               0xb929          /* MSA8 */
 32 #define CPACF_KDSA              0xb93a          /* MSA9 */
 33 
 34 /*
 35  * En/decryption modifier bits
 36  */
 37 #define CPACF_ENCRYPT           0x00
 38 #define CPACF_DECRYPT           0x80
 39 
 40 /*
 41  * Function codes for the KM (CIPHER MESSAGE) instruction
 42  */
 43 #define CPACF_KM_QUERY          0x00
 44 #define CPACF_KM_DEA            0x01
 45 #define CPACF_KM_TDEA_128       0x02
 46 #define CPACF_KM_TDEA_192       0x03
 47 #define CPACF_KM_AES_128        0x12
 48 #define CPACF_KM_AES_192        0x13
 49 #define CPACF_KM_AES_256        0x14
 50 #define CPACF_KM_PAES_128       0x1a
 51 #define CPACF_KM_PAES_192       0x1b
 52 #define CPACF_KM_PAES_256       0x1c
 53 #define CPACF_KM_XTS_128        0x32
 54 #define CPACF_KM_XTS_256        0x34
 55 #define CPACF_KM_PXTS_128       0x3a
 56 #define CPACF_KM_PXTS_256       0x3c
 57 
 58 /*
 59  * Function codes for the KMC (CIPHER MESSAGE WITH CHAINING)
 60  * instruction
 61  */
 62 #define CPACF_KMC_QUERY         0x00
 63 #define CPACF_KMC_DEA           0x01
 64 #define CPACF_KMC_TDEA_128      0x02
 65 #define CPACF_KMC_TDEA_192      0x03
 66 #define CPACF_KMC_AES_128       0x12
 67 #define CPACF_KMC_AES_192       0x13
 68 #define CPACF_KMC_AES_256       0x14
 69 #define CPACF_KMC_PAES_128      0x1a
 70 #define CPACF_KMC_PAES_192      0x1b
 71 #define CPACF_KMC_PAES_256      0x1c
 72 #define CPACF_KMC_PRNG          0x43
 73 
 74 /*
 75  * Function codes for the KMCTR (CIPHER MESSAGE WITH COUNTER)
 76  * instruction
 77  */
 78 #define CPACF_KMCTR_QUERY       0x00
 79 #define CPACF_KMCTR_DEA         0x01
 80 #define CPACF_KMCTR_TDEA_128    0x02
 81 #define CPACF_KMCTR_TDEA_192    0x03
 82 #define CPACF_KMCTR_AES_128     0x12
 83 #define CPACF_KMCTR_AES_192     0x13
 84 #define CPACF_KMCTR_AES_256     0x14
 85 #define CPACF_KMCTR_PAES_128    0x1a
 86 #define CPACF_KMCTR_PAES_192    0x1b
 87 #define CPACF_KMCTR_PAES_256    0x1c
 88 
 89 /*
 90  * Function codes for the KIMD (COMPUTE INTERMEDIATE MESSAGE DIGEST)
 91  * instruction
 92  */
 93 #define CPACF_KIMD_QUERY        0x00
 94 #define CPACF_KIMD_SHA_1        0x01
 95 #define CPACF_KIMD_SHA_256      0x02
 96 #define CPACF_KIMD_SHA_512      0x03
 97 #define CPACF_KIMD_SHA3_224     0x20
 98 #define CPACF_KIMD_SHA3_256     0x21
 99 #define CPACF_KIMD_SHA3_384     0x22
100 #define CPACF_KIMD_SHA3_512     0x23
101 #define CPACF_KIMD_GHASH        0x41
102 
103 /*
104  * Function codes for the KLMD (COMPUTE LAST MESSAGE DIGEST)
105  * instruction
106  */
107 #define CPACF_KLMD_QUERY        0x00
108 #define CPACF_KLMD_SHA_1        0x01
109 #define CPACF_KLMD_SHA_256      0x02
110 #define CPACF_KLMD_SHA_512      0x03
111 #define CPACF_KLMD_SHA3_224     0x20
112 #define CPACF_KLMD_SHA3_256     0x21
113 #define CPACF_KLMD_SHA3_384     0x22
114 #define CPACF_KLMD_SHA3_512     0x23
115 
116 /*
117  * function codes for the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE)
118  * instruction
119  */
120 #define CPACF_KMAC_QUERY        0x00
121 #define CPACF_KMAC_DEA          0x01
122 #define CPACF_KMAC_TDEA_128     0x02
123 #define CPACF_KMAC_TDEA_192     0x03
124 
125 /*
126  * Function codes for the PCKMO (PERFORM CRYPTOGRAPHIC KEY MANAGEMENT)
127  * instruction
128  */
129 #define CPACF_PCKMO_QUERY               0x00
130 #define CPACF_PCKMO_ENC_DES_KEY         0x01
131 #define CPACF_PCKMO_ENC_TDES_128_KEY    0x02
132 #define CPACF_PCKMO_ENC_TDES_192_KEY    0x03
133 #define CPACF_PCKMO_ENC_AES_128_KEY     0x12
134 #define CPACF_PCKMO_ENC_AES_192_KEY     0x13
135 #define CPACF_PCKMO_ENC_AES_256_KEY     0x14
136 #define CPACF_PCKMO_ENC_ECC_P256_KEY    0x20
137 #define CPACF_PCKMO_ENC_ECC_P384_KEY    0x21
138 #define CPACF_PCKMO_ENC_ECC_P521_KEY    0x22
139 #define CPACF_PCKMO_ENC_ECC_ED25519_KEY 0x28
140 #define CPACF_PCKMO_ENC_ECC_ED448_KEY   0x29
141 
142 /*
143  * Function codes for the PRNO (PERFORM RANDOM NUMBER OPERATION)
144  * instruction
145  */
146 #define CPACF_PRNO_QUERY                0x00
147 #define CPACF_PRNO_SHA512_DRNG_GEN      0x03
148 #define CPACF_PRNO_SHA512_DRNG_SEED     0x83
149 #define CPACF_PRNO_TRNG_Q_R2C_RATIO     0x70
150 #define CPACF_PRNO_TRNG                 0x72
151 
152 /*
153  * Function codes for the KMA (CIPHER MESSAGE WITH AUTHENTICATION)
154  * instruction
155  */
156 #define CPACF_KMA_QUERY         0x00
157 #define CPACF_KMA_GCM_AES_128   0x12
158 #define CPACF_KMA_GCM_AES_192   0x13
159 #define CPACF_KMA_GCM_AES_256   0x14
160 
161 /*
162  * Flags for the KMA (CIPHER MESSAGE WITH AUTHENTICATION) instruction
163  */
164 #define CPACF_KMA_LPC   0x100   /* Last-Plaintext/Ciphertext */
165 #define CPACF_KMA_LAAD  0x200   /* Last-AAD */
166 #define CPACF_KMA_HS    0x400   /* Hash-subkey Supplied */
167 
168 typedef struct { unsigned char bytes[16]; } cpacf_mask_t;
169 
170 /*
171  * Prototype for a not existing function to produce a link
172  * error if __cpacf_query() or __cpacf_check_opcode() is used
173  * with an invalid compile time const opcode.
174  */
175 void __cpacf_bad_opcode(void);
176 
177 static __always_inline void __cpacf_query_rre(u32 opc, u8 r1, u8 r2,
178                                               cpacf_mask_t *mask)
179 {
180         asm volatile(
181                 "       la      %%r1,%[mask]\n"
182                 "       xgr     %%r0,%%r0\n"
183                 "       .insn   rre,%[opc] << 16,%[r1],%[r2]\n"
184                 : [mask] "=R" (*mask)
185                 : [opc] "i" (opc),
186                   [r1] "i" (r1), [r2] "i" (r2)
187                 : "cc", "r0", "r1");
188 }
189 
190 static __always_inline void __cpacf_query_rrf(u32 opc,
191                                               u8 r1, u8 r2, u8 r3, u8 m4,
192                                               cpacf_mask_t *mask)
193 {
194         asm volatile(
195                 "       la      %%r1,%[mask]\n"
196                 "       xgr     %%r0,%%r0\n"
197                 "       .insn   rrf,%[opc] << 16,%[r1],%[r2],%[r3],%[m4]\n"
198                 : [mask] "=R" (*mask)
199                 : [opc] "i" (opc), [r1] "i" (r1), [r2] "i" (r2),
200                   [r3] "i" (r3), [m4] "i" (m4)
201                 : "cc", "r0", "r1");
202 }
203 
204 static __always_inline void __cpacf_query(unsigned int opcode,
205                                           cpacf_mask_t *mask)
206 {
207         switch (opcode) {
208         case CPACF_KDSA:
209                 __cpacf_query_rre(CPACF_KDSA, 0, 2, mask);
210                 break;
211         case CPACF_KIMD:
212                 __cpacf_query_rre(CPACF_KIMD, 0, 2, mask);
213                 break;
214         case CPACF_KLMD:
215                 __cpacf_query_rre(CPACF_KLMD, 0, 2, mask);
216                 break;
217         case CPACF_KM:
218                 __cpacf_query_rre(CPACF_KM, 2, 4, mask);
219                 break;
220         case CPACF_KMA:
221                 __cpacf_query_rrf(CPACF_KMA, 2, 4, 6, 0, mask);
222                 break;
223         case CPACF_KMAC:
224                 __cpacf_query_rre(CPACF_KMAC, 0, 2, mask);
225                 break;
226         case CPACF_KMC:
227                 __cpacf_query_rre(CPACF_KMC, 2, 4, mask);
228                 break;
229         case CPACF_KMCTR:
230                 __cpacf_query_rrf(CPACF_KMCTR, 2, 4, 6, 0, mask);
231                 break;
232         case CPACF_KMF:
233                 __cpacf_query_rre(CPACF_KMF, 2, 4, mask);
234                 break;
235         case CPACF_KMO:
236                 __cpacf_query_rre(CPACF_KMO, 2, 4, mask);
237                 break;
238         case CPACF_PCC:
239                 __cpacf_query_rre(CPACF_PCC, 0, 0, mask);
240                 break;
241         case CPACF_PCKMO:
242                 __cpacf_query_rre(CPACF_PCKMO, 0, 0, mask);
243                 break;
244         case CPACF_PRNO:
245                 __cpacf_query_rre(CPACF_PRNO, 2, 4, mask);
246                 break;
247         default:
248                 __cpacf_bad_opcode();
249         }
250 }
251 
252 static __always_inline int __cpacf_check_opcode(unsigned int opcode)
253 {
254         switch (opcode) {
255         case CPACF_KMAC:
256         case CPACF_KM:
257         case CPACF_KMC:
258         case CPACF_KIMD:
259         case CPACF_KLMD:
260                 return test_facility(17);       /* check for MSA */
261         case CPACF_PCKMO:
262                 return test_facility(76);       /* check for MSA3 */
263         case CPACF_KMF:
264         case CPACF_KMO:
265         case CPACF_PCC:
266         case CPACF_KMCTR:
267                 return test_facility(77);       /* check for MSA4 */
268         case CPACF_PRNO:
269                 return test_facility(57);       /* check for MSA5 */
270         case CPACF_KMA:
271                 return test_facility(146);      /* check for MSA8 */
272         default:
273                 __cpacf_bad_opcode();
274                 return 0;
275         }
276 }
277 
278 /**
279  * cpacf_query() - check if a specific CPACF function is available
280  * @opcode: the opcode of the crypto instruction
281  * @func: the function code to test for
282  *
283  * Executes the query function for the given crypto instruction @opcode
284  * and checks if @func is available
285  *
286  * Returns 1 if @func is available for @opcode, 0 otherwise
287  */
288 static __always_inline int cpacf_query(unsigned int opcode, cpacf_mask_t *mask)
289 {
290         if (__cpacf_check_opcode(opcode)) {
291                 __cpacf_query(opcode, mask);
292                 return 1;
293         }
294         memset(mask, 0, sizeof(*mask));
295         return 0;
296 }
297 
298 static inline int cpacf_test_func(cpacf_mask_t *mask, unsigned int func)
299 {
300         return (mask->bytes[func >> 3] & (0x80 >> (func & 7))) != 0;
301 }
302 
303 static __always_inline int cpacf_query_func(unsigned int opcode, unsigned int func)
304 {
305         cpacf_mask_t mask;
306 
307         if (cpacf_query(opcode, &mask))
308                 return cpacf_test_func(&mask, func);
309         return 0;
310 }
311 
312 /**
313  * cpacf_km() - executes the KM (CIPHER MESSAGE) instruction
314  * @func: the function code passed to KM; see CPACF_KM_xxx defines
315  * @param: address of parameter block; see POP for details on each func
316  * @dest: address of destination memory area
317  * @src: address of source memory area
318  * @src_len: length of src operand in bytes
319  *
320  * Returns 0 for the query func, number of processed bytes for
321  * encryption/decryption funcs
322  */
323 static inline int cpacf_km(unsigned long func, void *param,
324                            u8 *dest, const u8 *src, long src_len)
325 {
326         union register_pair d, s;
327 
328         d.even = (unsigned long)dest;
329         s.even = (unsigned long)src;
330         s.odd  = (unsigned long)src_len;
331         asm volatile(
332                 "       lgr     0,%[fc]\n"
333                 "       lgr     1,%[pba]\n"
334                 "0:     .insn   rre,%[opc] << 16,%[dst],%[src]\n"
335                 "       brc     1,0b\n" /* handle partial completion */
336                 : [src] "+&d" (s.pair), [dst] "+&d" (d.pair)
337                 : [fc] "d" (func), [pba] "d" ((unsigned long)param),
338                   [opc] "i" (CPACF_KM)
339                 : "cc", "memory", "", "1");
340 
341         return src_len - s.odd;
342 }
343 
344 /**
345  * cpacf_kmc() - executes the KMC (CIPHER MESSAGE WITH CHAINING) instruction
346  * @func: the function code passed to KM; see CPACF_KMC_xxx defines
347  * @param: address of parameter block; see POP for details on each func
348  * @dest: address of destination memory area
349  * @src: address of source memory area
350  * @src_len: length of src operand in bytes
351  *
352  * Returns 0 for the query func, number of processed bytes for
353  * encryption/decryption funcs
354  */
355 static inline int cpacf_kmc(unsigned long func, void *param,
356                             u8 *dest, const u8 *src, long src_len)
357 {
358         union register_pair d, s;
359 
360         d.even = (unsigned long)dest;
361         s.even = (unsigned long)src;
362         s.odd  = (unsigned long)src_len;
363         asm volatile(
364                 "       lgr     0,%[fc]\n"
365                 "       lgr     1,%[pba]\n"
366                 "0:     .insn   rre,%[opc] << 16,%[dst],%[src]\n"
367                 "       brc     1,0b\n" /* handle partial completion */
368                 : [src] "+&d" (s.pair), [dst] "+&d" (d.pair)
369                 : [fc] "d" (func), [pba] "d" ((unsigned long)param),
370                   [opc] "i" (CPACF_KMC)
371                 : "cc", "memory", "", "1");
372 
373         return src_len - s.odd;
374 }
375 
376 /**
377  * cpacf_kimd() - executes the KIMD (COMPUTE INTERMEDIATE MESSAGE DIGEST)
378  *                instruction
379  * @func: the function code passed to KM; see CPACF_KIMD_xxx defines
380  * @param: address of parameter block; see POP for details on each func
381  * @src: address of source memory area
382  * @src_len: length of src operand in bytes
383  */
384 static inline void cpacf_kimd(unsigned long func, void *param,
385                               const u8 *src, long src_len)
386 {
387         union register_pair s;
388 
389         s.even = (unsigned long)src;
390         s.odd  = (unsigned long)src_len;
391         asm volatile(
392                 "       lgr     0,%[fc]\n"
393                 "       lgr     1,%[pba]\n"
394                 "0:     .insn   rre,%[opc] << 16,0,%[src]\n"
395                 "       brc     1,0b\n" /* handle partial completion */
396                 : [src] "+&d" (s.pair)
397                 : [fc] "d" (func), [pba] "d" ((unsigned long)(param)),
398                   [opc] "i" (CPACF_KIMD)
399                 : "cc", "memory", "", "1");
400 }
401 
402 /**
403  * cpacf_klmd() - executes the KLMD (COMPUTE LAST MESSAGE DIGEST) instruction
404  * @func: the function code passed to KM; see CPACF_KLMD_xxx defines
405  * @param: address of parameter block; see POP for details on each func
406  * @src: address of source memory area
407  * @src_len: length of src operand in bytes
408  */
409 static inline void cpacf_klmd(unsigned long func, void *param,
410                               const u8 *src, long src_len)
411 {
412         union register_pair s;
413 
414         s.even = (unsigned long)src;
415         s.odd  = (unsigned long)src_len;
416         asm volatile(
417                 "       lgr     0,%[fc]\n"
418                 "       lgr     1,%[pba]\n"
419                 "0:     .insn   rre,%[opc] << 16,0,%[src]\n"
420                 "       brc     1,0b\n" /* handle partial completion */
421                 : [src] "+&d" (s.pair)
422                 : [fc] "d" (func), [pba] "d" ((unsigned long)param),
423                   [opc] "i" (CPACF_KLMD)
424                 : "cc", "memory", "", "1");
425 }
426 
427 /**
428  * cpacf_kmac() - executes the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE)
429  *                instruction
430  * @func: the function code passed to KM; see CPACF_KMAC_xxx defines
431  * @param: address of parameter block; see POP for details on each func
432  * @src: address of source memory area
433  * @src_len: length of src operand in bytes
434  *
435  * Returns 0 for the query func, number of processed bytes for digest funcs
436  */
437 static inline int cpacf_kmac(unsigned long func, void *param,
438                              const u8 *src, long src_len)
439 {
440         union register_pair s;
441 
442         s.even = (unsigned long)src;
443         s.odd  = (unsigned long)src_len;
444         asm volatile(
445                 "       lgr     0,%[fc]\n"
446                 "       lgr     1,%[pba]\n"
447                 "0:     .insn   rre,%[opc] << 16,0,%[src]\n"
448                 "       brc     1,0b\n" /* handle partial completion */
449                 : [src] "+&d" (s.pair)
450                 : [fc] "d" (func), [pba] "d" ((unsigned long)param),
451                   [opc] "i" (CPACF_KMAC)
452                 : "cc", "memory", "", "1");
453 
454         return src_len - s.odd;
455 }
456 
457 /**
458  * cpacf_kmctr() - executes the KMCTR (CIPHER MESSAGE WITH COUNTER) instruction
459  * @func: the function code passed to KMCTR; see CPACF_KMCTR_xxx defines
460  * @param: address of parameter block; see POP for details on each func
461  * @dest: address of destination memory area
462  * @src: address of source memory area
463  * @src_len: length of src operand in bytes
464  * @counter: address of counter value
465  *
466  * Returns 0 for the query func, number of processed bytes for
467  * encryption/decryption funcs
468  */
469 static inline int cpacf_kmctr(unsigned long func, void *param, u8 *dest,
470                               const u8 *src, long src_len, u8 *counter)
471 {
472         union register_pair d, s, c;
473 
474         d.even = (unsigned long)dest;
475         s.even = (unsigned long)src;
476         s.odd  = (unsigned long)src_len;
477         c.even = (unsigned long)counter;
478         asm volatile(
479                 "       lgr     0,%[fc]\n"
480                 "       lgr     1,%[pba]\n"
481                 "0:     .insn   rrf,%[opc] << 16,%[dst],%[src],%[ctr],0\n"
482                 "       brc     1,0b\n" /* handle partial completion */
483                 : [src] "+&d" (s.pair), [dst] "+&d" (d.pair),
484                   [ctr] "+&d" (c.pair)
485                 : [fc] "d" (func), [pba] "d" ((unsigned long)param),
486                   [opc] "i" (CPACF_KMCTR)
487                 : "cc", "memory", "", "1");
488 
489         return src_len - s.odd;
490 }
491 
492 /**
493  * cpacf_prno() - executes the PRNO (PERFORM RANDOM NUMBER OPERATION)
494  *                instruction
495  * @func: the function code passed to PRNO; see CPACF_PRNO_xxx defines
496  * @param: address of parameter block; see POP for details on each func
497  * @dest: address of destination memory area
498  * @dest_len: size of destination memory area in bytes
499  * @seed: address of seed data
500  * @seed_len: size of seed data in bytes
501  */
502 static inline void cpacf_prno(unsigned long func, void *param,
503                               u8 *dest, unsigned long dest_len,
504                               const u8 *seed, unsigned long seed_len)
505 {
506         union register_pair d, s;
507 
508         d.even = (unsigned long)dest;
509         d.odd  = (unsigned long)dest_len;
510         s.even = (unsigned long)seed;
511         s.odd  = (unsigned long)seed_len;
512         asm volatile (
513                 "       lgr     0,%[fc]\n"
514                 "       lgr     1,%[pba]\n"
515                 "0:     .insn   rre,%[opc] << 16,%[dst],%[seed]\n"
516                 "       brc     1,0b\n"   /* handle partial completion */
517                 : [dst] "+&d" (d.pair)
518                 : [fc] "d" (func), [pba] "d" ((unsigned long)param),
519                   [seed] "d" (s.pair), [opc] "i" (CPACF_PRNO)
520                 : "cc", "memory", "", "1");
521 }
522 
523 /**
524  * cpacf_trng() - executes the TRNG subfunction of the PRNO instruction
525  * @ucbuf: buffer for unconditioned data
526  * @ucbuf_len: amount of unconditioned data to fetch in bytes
527  * @cbuf: buffer for conditioned data
528  * @cbuf_len: amount of conditioned data to fetch in bytes
529  */
530 static inline void cpacf_trng(u8 *ucbuf, unsigned long ucbuf_len,
531                               u8 *cbuf, unsigned long cbuf_len)
532 {
533         union register_pair u, c;
534 
535         u.even = (unsigned long)ucbuf;
536         u.odd  = (unsigned long)ucbuf_len;
537         c.even = (unsigned long)cbuf;
538         c.odd  = (unsigned long)cbuf_len;
539         asm volatile (
540                 "       lghi    0,%[fc]\n"
541                 "0:     .insn   rre,%[opc] << 16,%[ucbuf],%[cbuf]\n"
542                 "       brc     1,0b\n"   /* handle partial completion */
543                 : [ucbuf] "+&d" (u.pair), [cbuf] "+&d" (c.pair)
544                 : [fc] "K" (CPACF_PRNO_TRNG), [opc] "i" (CPACF_PRNO)
545                 : "cc", "memory", "");
546         kmsan_unpoison_memory(ucbuf, ucbuf_len);
547         kmsan_unpoison_memory(cbuf, cbuf_len);
548 }
549 
550 /**
551  * cpacf_pcc() - executes the PCC (PERFORM CRYPTOGRAPHIC COMPUTATION)
552  *               instruction
553  * @func: the function code passed to PCC; see CPACF_KM_xxx defines
554  * @param: address of parameter block; see POP for details on each func
555  */
556 static inline void cpacf_pcc(unsigned long func, void *param)
557 {
558         asm volatile(
559                 "       lgr     0,%[fc]\n"
560                 "       lgr     1,%[pba]\n"
561                 "0:     .insn   rre,%[opc] << 16,0,0\n" /* PCC opcode */
562                 "       brc     1,0b\n" /* handle partial completion */
563                 :
564                 : [fc] "d" (func), [pba] "d" ((unsigned long)param),
565                   [opc] "i" (CPACF_PCC)
566                 : "cc", "memory", "", "1");
567 }
568 
569 /**
570  * cpacf_pckmo() - executes the PCKMO (PERFORM CRYPTOGRAPHIC KEY
571  *                MANAGEMENT) instruction
572  * @func: the function code passed to PCKMO; see CPACF_PCKMO_xxx defines
573  * @param: address of parameter block; see POP for details on each func
574  *
575  * Returns 0.
576  */
577 static inline void cpacf_pckmo(long func, void *param)
578 {
579         asm volatile(
580                 "       lgr     0,%[fc]\n"
581                 "       lgr     1,%[pba]\n"
582                 "       .insn   rre,%[opc] << 16,0,0\n" /* PCKMO opcode */
583                 :
584                 : [fc] "d" (func), [pba] "d" ((unsigned long)param),
585                   [opc] "i" (CPACF_PCKMO)
586                 : "cc", "memory", "", "1");
587 }
588 
589 /**
590  * cpacf_kma() - executes the KMA (CIPHER MESSAGE WITH AUTHENTICATION)
591  *               instruction
592  * @func: the function code passed to KMA; see CPACF_KMA_xxx defines
593  * @param: address of parameter block; see POP for details on each func
594  * @dest: address of destination memory area
595  * @src: address of source memory area
596  * @src_len: length of src operand in bytes
597  * @aad: address of additional authenticated data memory area
598  * @aad_len: length of aad operand in bytes
599  */
600 static inline void cpacf_kma(unsigned long func, void *param, u8 *dest,
601                              const u8 *src, unsigned long src_len,
602                              const u8 *aad, unsigned long aad_len)
603 {
604         union register_pair d, s, a;
605 
606         d.even = (unsigned long)dest;
607         s.even = (unsigned long)src;
608         s.odd  = (unsigned long)src_len;
609         a.even = (unsigned long)aad;
610         a.odd  = (unsigned long)aad_len;
611         asm volatile(
612                 "       lgr     0,%[fc]\n"
613                 "       lgr     1,%[pba]\n"
614                 "0:     .insn   rrf,%[opc] << 16,%[dst],%[src],%[aad],0\n"
615                 "       brc     1,0b\n" /* handle partial completion */
616                 : [dst] "+&d" (d.pair), [src] "+&d" (s.pair),
617                   [aad] "+&d" (a.pair)
618                 : [fc] "d" (func), [pba] "d" ((unsigned long)param),
619                   [opc] "i" (CPACF_KMA)
620                 : "cc", "memory", "", "1");
621 }
622 
623 #endif  /* _ASM_S390_CPACF_H */
624 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php