xref: /openbmc/linux/arch/s390/include/asm/cpacf.h (revision 6548d543)
1 /* SPDX-License-Identifier: GPL-2.0 */
2 /*
3  * CP Assist for Cryptographic Functions (CPACF)
4  *
5  * Copyright IBM Corp. 2003, 2023
6  * Author(s): Thomas Spatzier
7  *	      Jan Glauber
8  *	      Harald Freudenberger (freude@de.ibm.com)
9  *	      Martin Schwidefsky <schwidefsky@de.ibm.com>
10  */
11 #ifndef _ASM_S390_CPACF_H
12 #define _ASM_S390_CPACF_H
13 
14 #include <asm/facility.h>
15 
16 /*
17  * Instruction opcodes for the CPACF instructions
18  */
19 #define CPACF_KMAC		0xb91e		/* MSA	*/
20 #define CPACF_KM		0xb92e		/* MSA	*/
21 #define CPACF_KMC		0xb92f		/* MSA	*/
22 #define CPACF_KIMD		0xb93e		/* MSA	*/
23 #define CPACF_KLMD		0xb93f		/* MSA	*/
24 #define CPACF_PCKMO		0xb928		/* MSA3 */
25 #define CPACF_KMF		0xb92a		/* MSA4 */
26 #define CPACF_KMO		0xb92b		/* MSA4 */
27 #define CPACF_PCC		0xb92c		/* MSA4 */
28 #define CPACF_KMCTR		0xb92d		/* MSA4 */
29 #define CPACF_PRNO		0xb93c		/* MSA5 */
30 #define CPACF_KMA		0xb929		/* MSA8 */
31 #define CPACF_KDSA		0xb93a		/* MSA9 */
32 
33 /*
34  * En/decryption modifier bits
35  */
36 #define CPACF_ENCRYPT		0x00
37 #define CPACF_DECRYPT		0x80
38 
39 /*
40  * Function codes for the KM (CIPHER MESSAGE) instruction
41  */
42 #define CPACF_KM_QUERY		0x00
43 #define CPACF_KM_DEA		0x01
44 #define CPACF_KM_TDEA_128	0x02
45 #define CPACF_KM_TDEA_192	0x03
46 #define CPACF_KM_AES_128	0x12
47 #define CPACF_KM_AES_192	0x13
48 #define CPACF_KM_AES_256	0x14
49 #define CPACF_KM_PAES_128	0x1a
50 #define CPACF_KM_PAES_192	0x1b
51 #define CPACF_KM_PAES_256	0x1c
52 #define CPACF_KM_XTS_128	0x32
53 #define CPACF_KM_XTS_256	0x34
54 #define CPACF_KM_PXTS_128	0x3a
55 #define CPACF_KM_PXTS_256	0x3c
56 
57 /*
58  * Function codes for the KMC (CIPHER MESSAGE WITH CHAINING)
59  * instruction
60  */
61 #define CPACF_KMC_QUERY		0x00
62 #define CPACF_KMC_DEA		0x01
63 #define CPACF_KMC_TDEA_128	0x02
64 #define CPACF_KMC_TDEA_192	0x03
65 #define CPACF_KMC_AES_128	0x12
66 #define CPACF_KMC_AES_192	0x13
67 #define CPACF_KMC_AES_256	0x14
68 #define CPACF_KMC_PAES_128	0x1a
69 #define CPACF_KMC_PAES_192	0x1b
70 #define CPACF_KMC_PAES_256	0x1c
71 #define CPACF_KMC_PRNG		0x43
72 
73 /*
74  * Function codes for the KMCTR (CIPHER MESSAGE WITH COUNTER)
75  * instruction
76  */
77 #define CPACF_KMCTR_QUERY	0x00
78 #define CPACF_KMCTR_DEA		0x01
79 #define CPACF_KMCTR_TDEA_128	0x02
80 #define CPACF_KMCTR_TDEA_192	0x03
81 #define CPACF_KMCTR_AES_128	0x12
82 #define CPACF_KMCTR_AES_192	0x13
83 #define CPACF_KMCTR_AES_256	0x14
84 #define CPACF_KMCTR_PAES_128	0x1a
85 #define CPACF_KMCTR_PAES_192	0x1b
86 #define CPACF_KMCTR_PAES_256	0x1c
87 
88 /*
89  * Function codes for the KIMD (COMPUTE INTERMEDIATE MESSAGE DIGEST)
90  * instruction
91  */
92 #define CPACF_KIMD_QUERY	0x00
93 #define CPACF_KIMD_SHA_1	0x01
94 #define CPACF_KIMD_SHA_256	0x02
95 #define CPACF_KIMD_SHA_512	0x03
96 #define CPACF_KIMD_SHA3_224	0x20
97 #define CPACF_KIMD_SHA3_256	0x21
98 #define CPACF_KIMD_SHA3_384	0x22
99 #define CPACF_KIMD_SHA3_512	0x23
100 #define CPACF_KIMD_GHASH	0x41
101 
102 /*
103  * Function codes for the KLMD (COMPUTE LAST MESSAGE DIGEST)
104  * instruction
105  */
106 #define CPACF_KLMD_QUERY	0x00
107 #define CPACF_KLMD_SHA_1	0x01
108 #define CPACF_KLMD_SHA_256	0x02
109 #define CPACF_KLMD_SHA_512	0x03
110 #define CPACF_KLMD_SHA3_224	0x20
111 #define CPACF_KLMD_SHA3_256	0x21
112 #define CPACF_KLMD_SHA3_384	0x22
113 #define CPACF_KLMD_SHA3_512	0x23
114 
115 /*
116  * function codes for the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE)
117  * instruction
118  */
119 #define CPACF_KMAC_QUERY	0x00
120 #define CPACF_KMAC_DEA		0x01
121 #define CPACF_KMAC_TDEA_128	0x02
122 #define CPACF_KMAC_TDEA_192	0x03
123 
124 /*
125  * Function codes for the PCKMO (PERFORM CRYPTOGRAPHIC KEY MANAGEMENT)
126  * instruction
127  */
128 #define CPACF_PCKMO_QUERY		0x00
129 #define CPACF_PCKMO_ENC_DES_KEY		0x01
130 #define CPACF_PCKMO_ENC_TDES_128_KEY	0x02
131 #define CPACF_PCKMO_ENC_TDES_192_KEY	0x03
132 #define CPACF_PCKMO_ENC_AES_128_KEY	0x12
133 #define CPACF_PCKMO_ENC_AES_192_KEY	0x13
134 #define CPACF_PCKMO_ENC_AES_256_KEY	0x14
135 #define CPACF_PCKMO_ENC_ECC_P256_KEY	0x20
136 #define CPACF_PCKMO_ENC_ECC_P384_KEY	0x21
137 #define CPACF_PCKMO_ENC_ECC_P521_KEY	0x22
138 #define CPACF_PCKMO_ENC_ECC_ED25519_KEY	0x28
139 #define CPACF_PCKMO_ENC_ECC_ED448_KEY	0x29
140 
141 /*
142  * Function codes for the PRNO (PERFORM RANDOM NUMBER OPERATION)
143  * instruction
144  */
145 #define CPACF_PRNO_QUERY		0x00
146 #define CPACF_PRNO_SHA512_DRNG_GEN	0x03
147 #define CPACF_PRNO_SHA512_DRNG_SEED	0x83
148 #define CPACF_PRNO_TRNG_Q_R2C_RATIO	0x70
149 #define CPACF_PRNO_TRNG			0x72
150 
151 /*
152  * Function codes for the KMA (CIPHER MESSAGE WITH AUTHENTICATION)
153  * instruction
154  */
155 #define CPACF_KMA_QUERY		0x00
156 #define CPACF_KMA_GCM_AES_128	0x12
157 #define CPACF_KMA_GCM_AES_192	0x13
158 #define CPACF_KMA_GCM_AES_256	0x14
159 
160 /*
161  * Flags for the KMA (CIPHER MESSAGE WITH AUTHENTICATION) instruction
162  */
163 #define CPACF_KMA_LPC	0x100	/* Last-Plaintext/Ciphertext */
164 #define CPACF_KMA_LAAD	0x200	/* Last-AAD */
165 #define CPACF_KMA_HS	0x400	/* Hash-subkey Supplied */
166 
167 typedef struct { unsigned char bytes[16]; } cpacf_mask_t;
168 
169 /*
170  * Prototype for a not existing function to produce a link
171  * error if __cpacf_query() or __cpacf_check_opcode() is used
172  * with an invalid compile time const opcode.
173  */
174 void __cpacf_bad_opcode(void);
175 
176 static __always_inline void __cpacf_query_rre(u32 opc, u8 r1, u8 r2,
177 					      cpacf_mask_t *mask)
178 {
179 	asm volatile(
180 		"	la	%%r1,%[mask]\n"
181 		"	xgr	%%r0,%%r0\n"
182 		"	.insn	rre,%[opc] << 16,%[r1],%[r2]\n"
183 		: [mask] "=R" (*mask)
184 		: [opc] "i" (opc),
185 		  [r1] "i" (r1), [r2] "i" (r2)
186 		: "cc", "r0", "r1");
187 }
188 
189 static __always_inline void __cpacf_query_rrf(u32 opc,
190 					      u8 r1, u8 r2, u8 r3, u8 m4,
191 					      cpacf_mask_t *mask)
192 {
193 	asm volatile(
194 		"	la	%%r1,%[mask]\n"
195 		"	xgr	%%r0,%%r0\n"
196 		"	.insn	rrf,%[opc] << 16,%[r1],%[r2],%[r3],%[m4]\n"
197 		: [mask] "=R" (*mask)
198 		: [opc] "i" (opc), [r1] "i" (r1), [r2] "i" (r2),
199 		  [r3] "i" (r3), [m4] "i" (m4)
200 		: "cc", "r0", "r1");
201 }
202 
203 static __always_inline void __cpacf_query(unsigned int opcode,
204 					  cpacf_mask_t *mask)
205 {
206 	switch (opcode) {
207 	case CPACF_KDSA:
208 		__cpacf_query_rre(CPACF_KDSA, 0, 2, mask);
209 		break;
210 	case CPACF_KIMD:
211 		__cpacf_query_rre(CPACF_KIMD, 0, 2, mask);
212 		break;
213 	case CPACF_KLMD:
214 		__cpacf_query_rre(CPACF_KLMD, 0, 2, mask);
215 		break;
216 	case CPACF_KM:
217 		__cpacf_query_rre(CPACF_KM, 2, 4, mask);
218 		break;
219 	case CPACF_KMA:
220 		__cpacf_query_rrf(CPACF_KMA, 2, 4, 6, 0, mask);
221 		break;
222 	case CPACF_KMAC:
223 		__cpacf_query_rre(CPACF_KMAC, 0, 2, mask);
224 		break;
225 	case CPACF_KMC:
226 		__cpacf_query_rre(CPACF_KMC, 2, 4, mask);
227 		break;
228 	case CPACF_KMCTR:
229 		__cpacf_query_rrf(CPACF_KMCTR, 2, 4, 6, 0, mask);
230 		break;
231 	case CPACF_KMF:
232 		__cpacf_query_rre(CPACF_KMF, 2, 4, mask);
233 		break;
234 	case CPACF_KMO:
235 		__cpacf_query_rre(CPACF_KMO, 2, 4, mask);
236 		break;
237 	case CPACF_PCC:
238 		__cpacf_query_rre(CPACF_PCC, 0, 0, mask);
239 		break;
240 	case CPACF_PCKMO:
241 		__cpacf_query_rre(CPACF_PCKMO, 0, 0, mask);
242 		break;
243 	case CPACF_PRNO:
244 		__cpacf_query_rre(CPACF_PRNO, 2, 4, mask);
245 		break;
246 	default:
247 		__cpacf_bad_opcode();
248 	}
249 }
250 
251 static __always_inline int __cpacf_check_opcode(unsigned int opcode)
252 {
253 	switch (opcode) {
254 	case CPACF_KMAC:
255 	case CPACF_KM:
256 	case CPACF_KMC:
257 	case CPACF_KIMD:
258 	case CPACF_KLMD:
259 		return test_facility(17);	/* check for MSA */
260 	case CPACF_PCKMO:
261 		return test_facility(76);	/* check for MSA3 */
262 	case CPACF_KMF:
263 	case CPACF_KMO:
264 	case CPACF_PCC:
265 	case CPACF_KMCTR:
266 		return test_facility(77);	/* check for MSA4 */
267 	case CPACF_PRNO:
268 		return test_facility(57);	/* check for MSA5 */
269 	case CPACF_KMA:
270 		return test_facility(146);	/* check for MSA8 */
271 	default:
272 		__cpacf_bad_opcode();
273 		return 0;
274 	}
275 }
276 
277 /**
278  * cpacf_query() - check if a specific CPACF function is available
279  * @opcode: the opcode of the crypto instruction
280  * @func: the function code to test for
281  *
282  * Executes the query function for the given crypto instruction @opcode
283  * and checks if @func is available
284  *
285  * Returns 1 if @func is available for @opcode, 0 otherwise
286  */
287 static __always_inline int cpacf_query(unsigned int opcode, cpacf_mask_t *mask)
288 {
289 	if (__cpacf_check_opcode(opcode)) {
290 		__cpacf_query(opcode, mask);
291 		return 1;
292 	}
293 	memset(mask, 0, sizeof(*mask));
294 	return 0;
295 }
296 
297 static inline int cpacf_test_func(cpacf_mask_t *mask, unsigned int func)
298 {
299 	return (mask->bytes[func >> 3] & (0x80 >> (func & 7))) != 0;
300 }
301 
302 static __always_inline int cpacf_query_func(unsigned int opcode, unsigned int func)
303 {
304 	cpacf_mask_t mask;
305 
306 	if (cpacf_query(opcode, &mask))
307 		return cpacf_test_func(&mask, func);
308 	return 0;
309 }
310 
311 /**
312  * cpacf_km() - executes the KM (CIPHER MESSAGE) instruction
313  * @func: the function code passed to KM; see CPACF_KM_xxx defines
314  * @param: address of parameter block; see POP for details on each func
315  * @dest: address of destination memory area
316  * @src: address of source memory area
317  * @src_len: length of src operand in bytes
318  *
319  * Returns 0 for the query func, number of processed bytes for
320  * encryption/decryption funcs
321  */
322 static inline int cpacf_km(unsigned long func, void *param,
323 			   u8 *dest, const u8 *src, long src_len)
324 {
325 	union register_pair d, s;
326 
327 	d.even = (unsigned long)dest;
328 	s.even = (unsigned long)src;
329 	s.odd  = (unsigned long)src_len;
330 	asm volatile(
331 		"	lgr	0,%[fc]\n"
332 		"	lgr	1,%[pba]\n"
333 		"0:	.insn	rre,%[opc] << 16,%[dst],%[src]\n"
334 		"	brc	1,0b\n" /* handle partial completion */
335 		: [src] "+&d" (s.pair), [dst] "+&d" (d.pair)
336 		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
337 		  [opc] "i" (CPACF_KM)
338 		: "cc", "memory", "0", "1");
339 
340 	return src_len - s.odd;
341 }
342 
343 /**
344  * cpacf_kmc() - executes the KMC (CIPHER MESSAGE WITH CHAINING) instruction
345  * @func: the function code passed to KM; see CPACF_KMC_xxx defines
346  * @param: address of parameter block; see POP for details on each func
347  * @dest: address of destination memory area
348  * @src: address of source memory area
349  * @src_len: length of src operand in bytes
350  *
351  * Returns 0 for the query func, number of processed bytes for
352  * encryption/decryption funcs
353  */
354 static inline int cpacf_kmc(unsigned long func, void *param,
355 			    u8 *dest, const u8 *src, long src_len)
356 {
357 	union register_pair d, s;
358 
359 	d.even = (unsigned long)dest;
360 	s.even = (unsigned long)src;
361 	s.odd  = (unsigned long)src_len;
362 	asm volatile(
363 		"	lgr	0,%[fc]\n"
364 		"	lgr	1,%[pba]\n"
365 		"0:	.insn	rre,%[opc] << 16,%[dst],%[src]\n"
366 		"	brc	1,0b\n" /* handle partial completion */
367 		: [src] "+&d" (s.pair), [dst] "+&d" (d.pair)
368 		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
369 		  [opc] "i" (CPACF_KMC)
370 		: "cc", "memory", "0", "1");
371 
372 	return src_len - s.odd;
373 }
374 
375 /**
376  * cpacf_kimd() - executes the KIMD (COMPUTE INTERMEDIATE MESSAGE DIGEST)
377  *		  instruction
378  * @func: the function code passed to KM; see CPACF_KIMD_xxx defines
379  * @param: address of parameter block; see POP for details on each func
380  * @src: address of source memory area
381  * @src_len: length of src operand in bytes
382  */
383 static inline void cpacf_kimd(unsigned long func, void *param,
384 			      const u8 *src, long src_len)
385 {
386 	union register_pair s;
387 
388 	s.even = (unsigned long)src;
389 	s.odd  = (unsigned long)src_len;
390 	asm volatile(
391 		"	lgr	0,%[fc]\n"
392 		"	lgr	1,%[pba]\n"
393 		"0:	.insn	rre,%[opc] << 16,0,%[src]\n"
394 		"	brc	1,0b\n" /* handle partial completion */
395 		: [src] "+&d" (s.pair)
396 		: [fc] "d" (func), [pba] "d" ((unsigned long)(param)),
397 		  [opc] "i" (CPACF_KIMD)
398 		: "cc", "memory", "0", "1");
399 }
400 
401 /**
402  * cpacf_klmd() - executes the KLMD (COMPUTE LAST MESSAGE DIGEST) instruction
403  * @func: the function code passed to KM; see CPACF_KLMD_xxx defines
404  * @param: address of parameter block; see POP for details on each func
405  * @src: address of source memory area
406  * @src_len: length of src operand in bytes
407  */
408 static inline void cpacf_klmd(unsigned long func, void *param,
409 			      const u8 *src, long src_len)
410 {
411 	union register_pair s;
412 
413 	s.even = (unsigned long)src;
414 	s.odd  = (unsigned long)src_len;
415 	asm volatile(
416 		"	lgr	0,%[fc]\n"
417 		"	lgr	1,%[pba]\n"
418 		"0:	.insn	rre,%[opc] << 16,0,%[src]\n"
419 		"	brc	1,0b\n" /* handle partial completion */
420 		: [src] "+&d" (s.pair)
421 		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
422 		  [opc] "i" (CPACF_KLMD)
423 		: "cc", "memory", "0", "1");
424 }
425 
426 /**
427  * cpacf_kmac() - executes the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE)
428  *		  instruction
429  * @func: the function code passed to KM; see CPACF_KMAC_xxx defines
430  * @param: address of parameter block; see POP for details on each func
431  * @src: address of source memory area
432  * @src_len: length of src operand in bytes
433  *
434  * Returns 0 for the query func, number of processed bytes for digest funcs
435  */
436 static inline int cpacf_kmac(unsigned long func, void *param,
437 			     const u8 *src, long src_len)
438 {
439 	union register_pair s;
440 
441 	s.even = (unsigned long)src;
442 	s.odd  = (unsigned long)src_len;
443 	asm volatile(
444 		"	lgr	0,%[fc]\n"
445 		"	lgr	1,%[pba]\n"
446 		"0:	.insn	rre,%[opc] << 16,0,%[src]\n"
447 		"	brc	1,0b\n" /* handle partial completion */
448 		: [src] "+&d" (s.pair)
449 		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
450 		  [opc] "i" (CPACF_KMAC)
451 		: "cc", "memory", "0", "1");
452 
453 	return src_len - s.odd;
454 }
455 
456 /**
457  * cpacf_kmctr() - executes the KMCTR (CIPHER MESSAGE WITH COUNTER) instruction
458  * @func: the function code passed to KMCTR; see CPACF_KMCTR_xxx defines
459  * @param: address of parameter block; see POP for details on each func
460  * @dest: address of destination memory area
461  * @src: address of source memory area
462  * @src_len: length of src operand in bytes
463  * @counter: address of counter value
464  *
465  * Returns 0 for the query func, number of processed bytes for
466  * encryption/decryption funcs
467  */
468 static inline int cpacf_kmctr(unsigned long func, void *param, u8 *dest,
469 			      const u8 *src, long src_len, u8 *counter)
470 {
471 	union register_pair d, s, c;
472 
473 	d.even = (unsigned long)dest;
474 	s.even = (unsigned long)src;
475 	s.odd  = (unsigned long)src_len;
476 	c.even = (unsigned long)counter;
477 	asm volatile(
478 		"	lgr	0,%[fc]\n"
479 		"	lgr	1,%[pba]\n"
480 		"0:	.insn	rrf,%[opc] << 16,%[dst],%[src],%[ctr],0\n"
481 		"	brc	1,0b\n" /* handle partial completion */
482 		: [src] "+&d" (s.pair), [dst] "+&d" (d.pair),
483 		  [ctr] "+&d" (c.pair)
484 		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
485 		  [opc] "i" (CPACF_KMCTR)
486 		: "cc", "memory", "0", "1");
487 
488 	return src_len - s.odd;
489 }
490 
491 /**
492  * cpacf_prno() - executes the PRNO (PERFORM RANDOM NUMBER OPERATION)
493  *		  instruction
494  * @func: the function code passed to PRNO; see CPACF_PRNO_xxx defines
495  * @param: address of parameter block; see POP for details on each func
496  * @dest: address of destination memory area
497  * @dest_len: size of destination memory area in bytes
498  * @seed: address of seed data
499  * @seed_len: size of seed data in bytes
500  */
501 static inline void cpacf_prno(unsigned long func, void *param,
502 			      u8 *dest, unsigned long dest_len,
503 			      const u8 *seed, unsigned long seed_len)
504 {
505 	union register_pair d, s;
506 
507 	d.even = (unsigned long)dest;
508 	d.odd  = (unsigned long)dest_len;
509 	s.even = (unsigned long)seed;
510 	s.odd  = (unsigned long)seed_len;
511 	asm volatile (
512 		"	lgr	0,%[fc]\n"
513 		"	lgr	1,%[pba]\n"
514 		"0:	.insn	rre,%[opc] << 16,%[dst],%[seed]\n"
515 		"	brc	1,0b\n"	  /* handle partial completion */
516 		: [dst] "+&d" (d.pair)
517 		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
518 		  [seed] "d" (s.pair), [opc] "i" (CPACF_PRNO)
519 		: "cc", "memory", "0", "1");
520 }
521 
522 /**
523  * cpacf_trng() - executes the TRNG subfunction of the PRNO instruction
524  * @ucbuf: buffer for unconditioned data
525  * @ucbuf_len: amount of unconditioned data to fetch in bytes
526  * @cbuf: buffer for conditioned data
527  * @cbuf_len: amount of conditioned data to fetch in bytes
528  */
529 static inline void cpacf_trng(u8 *ucbuf, unsigned long ucbuf_len,
530 			      u8 *cbuf, unsigned long cbuf_len)
531 {
532 	union register_pair u, c;
533 
534 	u.even = (unsigned long)ucbuf;
535 	u.odd  = (unsigned long)ucbuf_len;
536 	c.even = (unsigned long)cbuf;
537 	c.odd  = (unsigned long)cbuf_len;
538 	asm volatile (
539 		"	lghi	0,%[fc]\n"
540 		"0:	.insn	rre,%[opc] << 16,%[ucbuf],%[cbuf]\n"
541 		"	brc	1,0b\n"	  /* handle partial completion */
542 		: [ucbuf] "+&d" (u.pair), [cbuf] "+&d" (c.pair)
543 		: [fc] "K" (CPACF_PRNO_TRNG), [opc] "i" (CPACF_PRNO)
544 		: "cc", "memory", "0");
545 }
546 
547 /**
548  * cpacf_pcc() - executes the PCC (PERFORM CRYPTOGRAPHIC COMPUTATION)
549  *		 instruction
550  * @func: the function code passed to PCC; see CPACF_KM_xxx defines
551  * @param: address of parameter block; see POP for details on each func
552  */
553 static inline void cpacf_pcc(unsigned long func, void *param)
554 {
555 	asm volatile(
556 		"	lgr	0,%[fc]\n"
557 		"	lgr	1,%[pba]\n"
558 		"0:	.insn	rre,%[opc] << 16,0,0\n" /* PCC opcode */
559 		"	brc	1,0b\n" /* handle partial completion */
560 		:
561 		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
562 		  [opc] "i" (CPACF_PCC)
563 		: "cc", "memory", "0", "1");
564 }
565 
566 /**
567  * cpacf_pckmo() - executes the PCKMO (PERFORM CRYPTOGRAPHIC KEY
568  *		  MANAGEMENT) instruction
569  * @func: the function code passed to PCKMO; see CPACF_PCKMO_xxx defines
570  * @param: address of parameter block; see POP for details on each func
571  *
572  * Returns 0.
573  */
574 static inline void cpacf_pckmo(long func, void *param)
575 {
576 	asm volatile(
577 		"	lgr	0,%[fc]\n"
578 		"	lgr	1,%[pba]\n"
579 		"       .insn   rre,%[opc] << 16,0,0\n" /* PCKMO opcode */
580 		:
581 		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
582 		  [opc] "i" (CPACF_PCKMO)
583 		: "cc", "memory", "0", "1");
584 }
585 
586 /**
587  * cpacf_kma() - executes the KMA (CIPHER MESSAGE WITH AUTHENTICATION)
588  *		 instruction
589  * @func: the function code passed to KMA; see CPACF_KMA_xxx defines
590  * @param: address of parameter block; see POP for details on each func
591  * @dest: address of destination memory area
592  * @src: address of source memory area
593  * @src_len: length of src operand in bytes
594  * @aad: address of additional authenticated data memory area
595  * @aad_len: length of aad operand in bytes
596  */
597 static inline void cpacf_kma(unsigned long func, void *param, u8 *dest,
598 			     const u8 *src, unsigned long src_len,
599 			     const u8 *aad, unsigned long aad_len)
600 {
601 	union register_pair d, s, a;
602 
603 	d.even = (unsigned long)dest;
604 	s.even = (unsigned long)src;
605 	s.odd  = (unsigned long)src_len;
606 	a.even = (unsigned long)aad;
607 	a.odd  = (unsigned long)aad_len;
608 	asm volatile(
609 		"	lgr	0,%[fc]\n"
610 		"	lgr	1,%[pba]\n"
611 		"0:	.insn	rrf,%[opc] << 16,%[dst],%[src],%[aad],0\n"
612 		"	brc	1,0b\n"	/* handle partial completion */
613 		: [dst] "+&d" (d.pair), [src] "+&d" (s.pair),
614 		  [aad] "+&d" (a.pair)
615 		: [fc] "d" (func), [pba] "d" ((unsigned long)param),
616 		  [opc] "i" (CPACF_KMA)
617 		: "cc", "memory", "0", "1");
618 }
619 
620 #endif	/* _ASM_S390_CPACF_H */
621