xref: /openbmc/linux/arch/s390/include/asm/cpacf.h (revision ba2929159000dc7015cc01cdf7bb72542e19952a)
1  /* SPDX-License-Identifier: GPL-2.0 */
2  /*
3   * CP Assist for Cryptographic Functions (CPACF)
4   *
5   * Copyright IBM Corp. 2003, 2023
6   * Author(s): Thomas Spatzier
7   *	      Jan Glauber
8   *	      Harald Freudenberger (freude@de.ibm.com)
9   *	      Martin Schwidefsky <schwidefsky@de.ibm.com>
10   */
11  #ifndef _ASM_S390_CPACF_H
12  #define _ASM_S390_CPACF_H
13  
14  #include <asm/facility.h>
15  
16  /*
17   * Instruction opcodes for the CPACF instructions
18   */
19  #define CPACF_KMAC		0xb91e		/* MSA	*/
20  #define CPACF_KM		0xb92e		/* MSA	*/
21  #define CPACF_KMC		0xb92f		/* MSA	*/
22  #define CPACF_KIMD		0xb93e		/* MSA	*/
23  #define CPACF_KLMD		0xb93f		/* MSA	*/
24  #define CPACF_PCKMO		0xb928		/* MSA3 */
25  #define CPACF_KMF		0xb92a		/* MSA4 */
26  #define CPACF_KMO		0xb92b		/* MSA4 */
27  #define CPACF_PCC		0xb92c		/* MSA4 */
28  #define CPACF_KMCTR		0xb92d		/* MSA4 */
29  #define CPACF_PRNO		0xb93c		/* MSA5 */
30  #define CPACF_KMA		0xb929		/* MSA8 */
31  #define CPACF_KDSA		0xb93a		/* MSA9 */
32  
33  /*
34   * En/decryption modifier bits
35   */
36  #define CPACF_ENCRYPT		0x00
37  #define CPACF_DECRYPT		0x80
38  
39  /*
40   * Function codes for the KM (CIPHER MESSAGE) instruction
41   */
42  #define CPACF_KM_QUERY		0x00
43  #define CPACF_KM_DEA		0x01
44  #define CPACF_KM_TDEA_128	0x02
45  #define CPACF_KM_TDEA_192	0x03
46  #define CPACF_KM_AES_128	0x12
47  #define CPACF_KM_AES_192	0x13
48  #define CPACF_KM_AES_256	0x14
49  #define CPACF_KM_PAES_128	0x1a
50  #define CPACF_KM_PAES_192	0x1b
51  #define CPACF_KM_PAES_256	0x1c
52  #define CPACF_KM_XTS_128	0x32
53  #define CPACF_KM_XTS_256	0x34
54  #define CPACF_KM_PXTS_128	0x3a
55  #define CPACF_KM_PXTS_256	0x3c
56  
57  /*
58   * Function codes for the KMC (CIPHER MESSAGE WITH CHAINING)
59   * instruction
60   */
61  #define CPACF_KMC_QUERY		0x00
62  #define CPACF_KMC_DEA		0x01
63  #define CPACF_KMC_TDEA_128	0x02
64  #define CPACF_KMC_TDEA_192	0x03
65  #define CPACF_KMC_AES_128	0x12
66  #define CPACF_KMC_AES_192	0x13
67  #define CPACF_KMC_AES_256	0x14
68  #define CPACF_KMC_PAES_128	0x1a
69  #define CPACF_KMC_PAES_192	0x1b
70  #define CPACF_KMC_PAES_256	0x1c
71  #define CPACF_KMC_PRNG		0x43
72  
73  /*
74   * Function codes for the KMCTR (CIPHER MESSAGE WITH COUNTER)
75   * instruction
76   */
77  #define CPACF_KMCTR_QUERY	0x00
78  #define CPACF_KMCTR_DEA		0x01
79  #define CPACF_KMCTR_TDEA_128	0x02
80  #define CPACF_KMCTR_TDEA_192	0x03
81  #define CPACF_KMCTR_AES_128	0x12
82  #define CPACF_KMCTR_AES_192	0x13
83  #define CPACF_KMCTR_AES_256	0x14
84  #define CPACF_KMCTR_PAES_128	0x1a
85  #define CPACF_KMCTR_PAES_192	0x1b
86  #define CPACF_KMCTR_PAES_256	0x1c
87  
88  /*
89   * Function codes for the KIMD (COMPUTE INTERMEDIATE MESSAGE DIGEST)
90   * instruction
91   */
92  #define CPACF_KIMD_QUERY	0x00
93  #define CPACF_KIMD_SHA_1	0x01
94  #define CPACF_KIMD_SHA_256	0x02
95  #define CPACF_KIMD_SHA_512	0x03
96  #define CPACF_KIMD_SHA3_224	0x20
97  #define CPACF_KIMD_SHA3_256	0x21
98  #define CPACF_KIMD_SHA3_384	0x22
99  #define CPACF_KIMD_SHA3_512	0x23
100  #define CPACF_KIMD_GHASH	0x41
101  
102  /*
103   * Function codes for the KLMD (COMPUTE LAST MESSAGE DIGEST)
104   * instruction
105   */
106  #define CPACF_KLMD_QUERY	0x00
107  #define CPACF_KLMD_SHA_1	0x01
108  #define CPACF_KLMD_SHA_256	0x02
109  #define CPACF_KLMD_SHA_512	0x03
110  #define CPACF_KLMD_SHA3_224	0x20
111  #define CPACF_KLMD_SHA3_256	0x21
112  #define CPACF_KLMD_SHA3_384	0x22
113  #define CPACF_KLMD_SHA3_512	0x23
114  
115  /*
116   * function codes for the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE)
117   * instruction
118   */
119  #define CPACF_KMAC_QUERY	0x00
120  #define CPACF_KMAC_DEA		0x01
121  #define CPACF_KMAC_TDEA_128	0x02
122  #define CPACF_KMAC_TDEA_192	0x03
123  
124  /*
125   * Function codes for the PCKMO (PERFORM CRYPTOGRAPHIC KEY MANAGEMENT)
126   * instruction
127   */
128  #define CPACF_PCKMO_QUERY		0x00
129  #define CPACF_PCKMO_ENC_DES_KEY		0x01
130  #define CPACF_PCKMO_ENC_TDES_128_KEY	0x02
131  #define CPACF_PCKMO_ENC_TDES_192_KEY	0x03
132  #define CPACF_PCKMO_ENC_AES_128_KEY	0x12
133  #define CPACF_PCKMO_ENC_AES_192_KEY	0x13
134  #define CPACF_PCKMO_ENC_AES_256_KEY	0x14
135  #define CPACF_PCKMO_ENC_ECC_P256_KEY	0x20
136  #define CPACF_PCKMO_ENC_ECC_P384_KEY	0x21
137  #define CPACF_PCKMO_ENC_ECC_P521_KEY	0x22
138  #define CPACF_PCKMO_ENC_ECC_ED25519_KEY	0x28
139  #define CPACF_PCKMO_ENC_ECC_ED448_KEY	0x29
140  
141  /*
142   * Function codes for the PRNO (PERFORM RANDOM NUMBER OPERATION)
143   * instruction
144   */
145  #define CPACF_PRNO_QUERY		0x00
146  #define CPACF_PRNO_SHA512_DRNG_GEN	0x03
147  #define CPACF_PRNO_SHA512_DRNG_SEED	0x83
148  #define CPACF_PRNO_TRNG_Q_R2C_RATIO	0x70
149  #define CPACF_PRNO_TRNG			0x72
150  
151  /*
152   * Function codes for the KMA (CIPHER MESSAGE WITH AUTHENTICATION)
153   * instruction
154   */
155  #define CPACF_KMA_QUERY		0x00
156  #define CPACF_KMA_GCM_AES_128	0x12
157  #define CPACF_KMA_GCM_AES_192	0x13
158  #define CPACF_KMA_GCM_AES_256	0x14
159  
160  /*
161   * Flags for the KMA (CIPHER MESSAGE WITH AUTHENTICATION) instruction
162   */
163  #define CPACF_KMA_LPC	0x100	/* Last-Plaintext/Ciphertext */
164  #define CPACF_KMA_LAAD	0x200	/* Last-AAD */
165  #define CPACF_KMA_HS	0x400	/* Hash-subkey Supplied */
166  
167  typedef struct { unsigned char bytes[16]; } cpacf_mask_t;
168  
169  /*
170   * Prototype for a not existing function to produce a link
171   * error if __cpacf_query() or __cpacf_check_opcode() is used
172   * with an invalid compile time const opcode.
173   */
174  void __cpacf_bad_opcode(void);
175  
__cpacf_query_rre(u32 opc,u8 r1,u8 r2,cpacf_mask_t * mask)176  static __always_inline void __cpacf_query_rre(u32 opc, u8 r1, u8 r2,
177  					      cpacf_mask_t *mask)
178  {
179  	asm volatile(
180  		"	la	%%r1,%[mask]\n"
181  		"	xgr	%%r0,%%r0\n"
182  		"	.insn	rre,%[opc] << 16,%[r1],%[r2]\n"
183  		: [mask] "=R" (*mask)
184  		: [opc] "i" (opc),
185  		  [r1] "i" (r1), [r2] "i" (r2)
186  		: "cc", "r0", "r1");
187  }
188  
__cpacf_query_rrf(u32 opc,u8 r1,u8 r2,u8 r3,u8 m4,cpacf_mask_t * mask)189  static __always_inline void __cpacf_query_rrf(u32 opc,
190  					      u8 r1, u8 r2, u8 r3, u8 m4,
191  					      cpacf_mask_t *mask)
192  {
193  	asm volatile(
194  		"	la	%%r1,%[mask]\n"
195  		"	xgr	%%r0,%%r0\n"
196  		"	.insn	rrf,%[opc] << 16,%[r1],%[r2],%[r3],%[m4]\n"
197  		: [mask] "=R" (*mask)
198  		: [opc] "i" (opc), [r1] "i" (r1), [r2] "i" (r2),
199  		  [r3] "i" (r3), [m4] "i" (m4)
200  		: "cc", "r0", "r1");
201  }
202  
__cpacf_query(unsigned int opcode,cpacf_mask_t * mask)203  static __always_inline void __cpacf_query(unsigned int opcode,
204  					  cpacf_mask_t *mask)
205  {
206  	switch (opcode) {
207  	case CPACF_KDSA:
208  		__cpacf_query_rre(CPACF_KDSA, 0, 2, mask);
209  		break;
210  	case CPACF_KIMD:
211  		__cpacf_query_rre(CPACF_KIMD, 0, 2, mask);
212  		break;
213  	case CPACF_KLMD:
214  		__cpacf_query_rre(CPACF_KLMD, 0, 2, mask);
215  		break;
216  	case CPACF_KM:
217  		__cpacf_query_rre(CPACF_KM, 2, 4, mask);
218  		break;
219  	case CPACF_KMA:
220  		__cpacf_query_rrf(CPACF_KMA, 2, 4, 6, 0, mask);
221  		break;
222  	case CPACF_KMAC:
223  		__cpacf_query_rre(CPACF_KMAC, 0, 2, mask);
224  		break;
225  	case CPACF_KMC:
226  		__cpacf_query_rre(CPACF_KMC, 2, 4, mask);
227  		break;
228  	case CPACF_KMCTR:
229  		__cpacf_query_rrf(CPACF_KMCTR, 2, 4, 6, 0, mask);
230  		break;
231  	case CPACF_KMF:
232  		__cpacf_query_rre(CPACF_KMF, 2, 4, mask);
233  		break;
234  	case CPACF_KMO:
235  		__cpacf_query_rre(CPACF_KMO, 2, 4, mask);
236  		break;
237  	case CPACF_PCC:
238  		__cpacf_query_rre(CPACF_PCC, 0, 0, mask);
239  		break;
240  	case CPACF_PCKMO:
241  		__cpacf_query_rre(CPACF_PCKMO, 0, 0, mask);
242  		break;
243  	case CPACF_PRNO:
244  		__cpacf_query_rre(CPACF_PRNO, 2, 4, mask);
245  		break;
246  	default:
247  		__cpacf_bad_opcode();
248  	}
249  }
250  
__cpacf_check_opcode(unsigned int opcode)251  static __always_inline int __cpacf_check_opcode(unsigned int opcode)
252  {
253  	switch (opcode) {
254  	case CPACF_KMAC:
255  	case CPACF_KM:
256  	case CPACF_KMC:
257  	case CPACF_KIMD:
258  	case CPACF_KLMD:
259  		return test_facility(17);	/* check for MSA */
260  	case CPACF_PCKMO:
261  		return test_facility(76);	/* check for MSA3 */
262  	case CPACF_KMF:
263  	case CPACF_KMO:
264  	case CPACF_PCC:
265  	case CPACF_KMCTR:
266  		return test_facility(77);	/* check for MSA4 */
267  	case CPACF_PRNO:
268  		return test_facility(57);	/* check for MSA5 */
269  	case CPACF_KMA:
270  		return test_facility(146);	/* check for MSA8 */
271  	default:
272  		__cpacf_bad_opcode();
273  		return 0;
274  	}
275  }
276  
277  /**
278   * cpacf_query() - check if a specific CPACF function is available
279   * @opcode: the opcode of the crypto instruction
280   * @func: the function code to test for
281   *
282   * Executes the query function for the given crypto instruction @opcode
283   * and checks if @func is available
284   *
285   * Returns 1 if @func is available for @opcode, 0 otherwise
286   */
cpacf_query(unsigned int opcode,cpacf_mask_t * mask)287  static __always_inline int cpacf_query(unsigned int opcode, cpacf_mask_t *mask)
288  {
289  	if (__cpacf_check_opcode(opcode)) {
290  		__cpacf_query(opcode, mask);
291  		return 1;
292  	}
293  	memset(mask, 0, sizeof(*mask));
294  	return 0;
295  }
296  
cpacf_test_func(cpacf_mask_t * mask,unsigned int func)297  static inline int cpacf_test_func(cpacf_mask_t *mask, unsigned int func)
298  {
299  	return (mask->bytes[func >> 3] & (0x80 >> (func & 7))) != 0;
300  }
301  
cpacf_query_func(unsigned int opcode,unsigned int func)302  static __always_inline int cpacf_query_func(unsigned int opcode, unsigned int func)
303  {
304  	cpacf_mask_t mask;
305  
306  	if (cpacf_query(opcode, &mask))
307  		return cpacf_test_func(&mask, func);
308  	return 0;
309  }
310  
311  /**
312   * cpacf_km() - executes the KM (CIPHER MESSAGE) instruction
313   * @func: the function code passed to KM; see CPACF_KM_xxx defines
314   * @param: address of parameter block; see POP for details on each func
315   * @dest: address of destination memory area
316   * @src: address of source memory area
317   * @src_len: length of src operand in bytes
318   *
319   * Returns 0 for the query func, number of processed bytes for
320   * encryption/decryption funcs
321   */
cpacf_km(unsigned long func,void * param,u8 * dest,const u8 * src,long src_len)322  static inline int cpacf_km(unsigned long func, void *param,
323  			   u8 *dest, const u8 *src, long src_len)
324  {
325  	union register_pair d, s;
326  
327  	d.even = (unsigned long)dest;
328  	s.even = (unsigned long)src;
329  	s.odd  = (unsigned long)src_len;
330  	asm volatile(
331  		"	lgr	0,%[fc]\n"
332  		"	lgr	1,%[pba]\n"
333  		"0:	.insn	rre,%[opc] << 16,%[dst],%[src]\n"
334  		"	brc	1,0b\n" /* handle partial completion */
335  		: [src] "+&d" (s.pair), [dst] "+&d" (d.pair)
336  		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
337  		  [opc] "i" (CPACF_KM)
338  		: "cc", "memory", "0", "1");
339  
340  	return src_len - s.odd;
341  }
342  
343  /**
344   * cpacf_kmc() - executes the KMC (CIPHER MESSAGE WITH CHAINING) instruction
345   * @func: the function code passed to KM; see CPACF_KMC_xxx defines
346   * @param: address of parameter block; see POP for details on each func
347   * @dest: address of destination memory area
348   * @src: address of source memory area
349   * @src_len: length of src operand in bytes
350   *
351   * Returns 0 for the query func, number of processed bytes for
352   * encryption/decryption funcs
353   */
cpacf_kmc(unsigned long func,void * param,u8 * dest,const u8 * src,long src_len)354  static inline int cpacf_kmc(unsigned long func, void *param,
355  			    u8 *dest, const u8 *src, long src_len)
356  {
357  	union register_pair d, s;
358  
359  	d.even = (unsigned long)dest;
360  	s.even = (unsigned long)src;
361  	s.odd  = (unsigned long)src_len;
362  	asm volatile(
363  		"	lgr	0,%[fc]\n"
364  		"	lgr	1,%[pba]\n"
365  		"0:	.insn	rre,%[opc] << 16,%[dst],%[src]\n"
366  		"	brc	1,0b\n" /* handle partial completion */
367  		: [src] "+&d" (s.pair), [dst] "+&d" (d.pair)
368  		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
369  		  [opc] "i" (CPACF_KMC)
370  		: "cc", "memory", "0", "1");
371  
372  	return src_len - s.odd;
373  }
374  
375  /**
376   * cpacf_kimd() - executes the KIMD (COMPUTE INTERMEDIATE MESSAGE DIGEST)
377   *		  instruction
378   * @func: the function code passed to KM; see CPACF_KIMD_xxx defines
379   * @param: address of parameter block; see POP for details on each func
380   * @src: address of source memory area
381   * @src_len: length of src operand in bytes
382   */
cpacf_kimd(unsigned long func,void * param,const u8 * src,long src_len)383  static inline void cpacf_kimd(unsigned long func, void *param,
384  			      const u8 *src, long src_len)
385  {
386  	union register_pair s;
387  
388  	s.even = (unsigned long)src;
389  	s.odd  = (unsigned long)src_len;
390  	asm volatile(
391  		"	lgr	0,%[fc]\n"
392  		"	lgr	1,%[pba]\n"
393  		"0:	.insn	rre,%[opc] << 16,0,%[src]\n"
394  		"	brc	1,0b\n" /* handle partial completion */
395  		: [src] "+&d" (s.pair)
396  		: [fc] "d" (func), [pba] "d" ((unsigned long)(param)),
397  		  [opc] "i" (CPACF_KIMD)
398  		: "cc", "memory", "0", "1");
399  }
400  
401  /**
402   * cpacf_klmd() - executes the KLMD (COMPUTE LAST MESSAGE DIGEST) instruction
403   * @func: the function code passed to KM; see CPACF_KLMD_xxx defines
404   * @param: address of parameter block; see POP for details on each func
405   * @src: address of source memory area
406   * @src_len: length of src operand in bytes
407   */
cpacf_klmd(unsigned long func,void * param,const u8 * src,long src_len)408  static inline void cpacf_klmd(unsigned long func, void *param,
409  			      const u8 *src, long src_len)
410  {
411  	union register_pair s;
412  
413  	s.even = (unsigned long)src;
414  	s.odd  = (unsigned long)src_len;
415  	asm volatile(
416  		"	lgr	0,%[fc]\n"
417  		"	lgr	1,%[pba]\n"
418  		"0:	.insn	rre,%[opc] << 16,0,%[src]\n"
419  		"	brc	1,0b\n" /* handle partial completion */
420  		: [src] "+&d" (s.pair)
421  		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
422  		  [opc] "i" (CPACF_KLMD)
423  		: "cc", "memory", "0", "1");
424  }
425  
426  /**
427   * cpacf_kmac() - executes the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE)
428   *		  instruction
429   * @func: the function code passed to KM; see CPACF_KMAC_xxx defines
430   * @param: address of parameter block; see POP for details on each func
431   * @src: address of source memory area
432   * @src_len: length of src operand in bytes
433   *
434   * Returns 0 for the query func, number of processed bytes for digest funcs
435   */
cpacf_kmac(unsigned long func,void * param,const u8 * src,long src_len)436  static inline int cpacf_kmac(unsigned long func, void *param,
437  			     const u8 *src, long src_len)
438  {
439  	union register_pair s;
440  
441  	s.even = (unsigned long)src;
442  	s.odd  = (unsigned long)src_len;
443  	asm volatile(
444  		"	lgr	0,%[fc]\n"
445  		"	lgr	1,%[pba]\n"
446  		"0:	.insn	rre,%[opc] << 16,0,%[src]\n"
447  		"	brc	1,0b\n" /* handle partial completion */
448  		: [src] "+&d" (s.pair)
449  		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
450  		  [opc] "i" (CPACF_KMAC)
451  		: "cc", "memory", "0", "1");
452  
453  	return src_len - s.odd;
454  }
455  
456  /**
457   * cpacf_kmctr() - executes the KMCTR (CIPHER MESSAGE WITH COUNTER) instruction
458   * @func: the function code passed to KMCTR; see CPACF_KMCTR_xxx defines
459   * @param: address of parameter block; see POP for details on each func
460   * @dest: address of destination memory area
461   * @src: address of source memory area
462   * @src_len: length of src operand in bytes
463   * @counter: address of counter value
464   *
465   * Returns 0 for the query func, number of processed bytes for
466   * encryption/decryption funcs
467   */
cpacf_kmctr(unsigned long func,void * param,u8 * dest,const u8 * src,long src_len,u8 * counter)468  static inline int cpacf_kmctr(unsigned long func, void *param, u8 *dest,
469  			      const u8 *src, long src_len, u8 *counter)
470  {
471  	union register_pair d, s, c;
472  
473  	d.even = (unsigned long)dest;
474  	s.even = (unsigned long)src;
475  	s.odd  = (unsigned long)src_len;
476  	c.even = (unsigned long)counter;
477  	asm volatile(
478  		"	lgr	0,%[fc]\n"
479  		"	lgr	1,%[pba]\n"
480  		"0:	.insn	rrf,%[opc] << 16,%[dst],%[src],%[ctr],0\n"
481  		"	brc	1,0b\n" /* handle partial completion */
482  		: [src] "+&d" (s.pair), [dst] "+&d" (d.pair),
483  		  [ctr] "+&d" (c.pair)
484  		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
485  		  [opc] "i" (CPACF_KMCTR)
486  		: "cc", "memory", "0", "1");
487  
488  	return src_len - s.odd;
489  }
490  
491  /**
492   * cpacf_prno() - executes the PRNO (PERFORM RANDOM NUMBER OPERATION)
493   *		  instruction
494   * @func: the function code passed to PRNO; see CPACF_PRNO_xxx defines
495   * @param: address of parameter block; see POP for details on each func
496   * @dest: address of destination memory area
497   * @dest_len: size of destination memory area in bytes
498   * @seed: address of seed data
499   * @seed_len: size of seed data in bytes
500   */
cpacf_prno(unsigned long func,void * param,u8 * dest,unsigned long dest_len,const u8 * seed,unsigned long seed_len)501  static inline void cpacf_prno(unsigned long func, void *param,
502  			      u8 *dest, unsigned long dest_len,
503  			      const u8 *seed, unsigned long seed_len)
504  {
505  	union register_pair d, s;
506  
507  	d.even = (unsigned long)dest;
508  	d.odd  = (unsigned long)dest_len;
509  	s.even = (unsigned long)seed;
510  	s.odd  = (unsigned long)seed_len;
511  	asm volatile (
512  		"	lgr	0,%[fc]\n"
513  		"	lgr	1,%[pba]\n"
514  		"0:	.insn	rre,%[opc] << 16,%[dst],%[seed]\n"
515  		"	brc	1,0b\n"	  /* handle partial completion */
516  		: [dst] "+&d" (d.pair)
517  		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
518  		  [seed] "d" (s.pair), [opc] "i" (CPACF_PRNO)
519  		: "cc", "memory", "0", "1");
520  }
521  
522  /**
523   * cpacf_trng() - executes the TRNG subfunction of the PRNO instruction
524   * @ucbuf: buffer for unconditioned data
525   * @ucbuf_len: amount of unconditioned data to fetch in bytes
526   * @cbuf: buffer for conditioned data
527   * @cbuf_len: amount of conditioned data to fetch in bytes
528   */
cpacf_trng(u8 * ucbuf,unsigned long ucbuf_len,u8 * cbuf,unsigned long cbuf_len)529  static inline void cpacf_trng(u8 *ucbuf, unsigned long ucbuf_len,
530  			      u8 *cbuf, unsigned long cbuf_len)
531  {
532  	union register_pair u, c;
533  
534  	u.even = (unsigned long)ucbuf;
535  	u.odd  = (unsigned long)ucbuf_len;
536  	c.even = (unsigned long)cbuf;
537  	c.odd  = (unsigned long)cbuf_len;
538  	asm volatile (
539  		"	lghi	0,%[fc]\n"
540  		"0:	.insn	rre,%[opc] << 16,%[ucbuf],%[cbuf]\n"
541  		"	brc	1,0b\n"	  /* handle partial completion */
542  		: [ucbuf] "+&d" (u.pair), [cbuf] "+&d" (c.pair)
543  		: [fc] "K" (CPACF_PRNO_TRNG), [opc] "i" (CPACF_PRNO)
544  		: "cc", "memory", "0");
545  }
546  
547  /**
548   * cpacf_pcc() - executes the PCC (PERFORM CRYPTOGRAPHIC COMPUTATION)
549   *		 instruction
550   * @func: the function code passed to PCC; see CPACF_KM_xxx defines
551   * @param: address of parameter block; see POP for details on each func
552   */
cpacf_pcc(unsigned long func,void * param)553  static inline void cpacf_pcc(unsigned long func, void *param)
554  {
555  	asm volatile(
556  		"	lgr	0,%[fc]\n"
557  		"	lgr	1,%[pba]\n"
558  		"0:	.insn	rre,%[opc] << 16,0,0\n" /* PCC opcode */
559  		"	brc	1,0b\n" /* handle partial completion */
560  		:
561  		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
562  		  [opc] "i" (CPACF_PCC)
563  		: "cc", "memory", "0", "1");
564  }
565  
566  /**
567   * cpacf_pckmo() - executes the PCKMO (PERFORM CRYPTOGRAPHIC KEY
568   *		  MANAGEMENT) instruction
569   * @func: the function code passed to PCKMO; see CPACF_PCKMO_xxx defines
570   * @param: address of parameter block; see POP for details on each func
571   *
572   * Returns 0.
573   */
cpacf_pckmo(long func,void * param)574  static inline void cpacf_pckmo(long func, void *param)
575  {
576  	asm volatile(
577  		"	lgr	0,%[fc]\n"
578  		"	lgr	1,%[pba]\n"
579  		"       .insn   rre,%[opc] << 16,0,0\n" /* PCKMO opcode */
580  		:
581  		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
582  		  [opc] "i" (CPACF_PCKMO)
583  		: "cc", "memory", "0", "1");
584  }
585  
586  /**
587   * cpacf_kma() - executes the KMA (CIPHER MESSAGE WITH AUTHENTICATION)
588   *		 instruction
589   * @func: the function code passed to KMA; see CPACF_KMA_xxx defines
590   * @param: address of parameter block; see POP for details on each func
591   * @dest: address of destination memory area
592   * @src: address of source memory area
593   * @src_len: length of src operand in bytes
594   * @aad: address of additional authenticated data memory area
595   * @aad_len: length of aad operand in bytes
596   */
cpacf_kma(unsigned long func,void * param,u8 * dest,const u8 * src,unsigned long src_len,const u8 * aad,unsigned long aad_len)597  static inline void cpacf_kma(unsigned long func, void *param, u8 *dest,
598  			     const u8 *src, unsigned long src_len,
599  			     const u8 *aad, unsigned long aad_len)
600  {
601  	union register_pair d, s, a;
602  
603  	d.even = (unsigned long)dest;
604  	s.even = (unsigned long)src;
605  	s.odd  = (unsigned long)src_len;
606  	a.even = (unsigned long)aad;
607  	a.odd  = (unsigned long)aad_len;
608  	asm volatile(
609  		"	lgr	0,%[fc]\n"
610  		"	lgr	1,%[pba]\n"
611  		"0:	.insn	rrf,%[opc] << 16,%[dst],%[src],%[aad],0\n"
612  		"	brc	1,0b\n"	/* handle partial completion */
613  		: [dst] "+&d" (d.pair), [src] "+&d" (s.pair),
614  		  [aad] "+&d" (a.pair)
615  		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
616  		  [opc] "i" (CPACF_KMA)
617  		: "cc", "memory", "0", "1");
618  }
619  
620  #endif	/* _ASM_S390_CPACF_H */
621