1 /* SPDX-License-Identifier: GPL-2.0 */ 2 /* 3 * CP Assist for Cryptographic Functions (CPACF) 4 * 5 * Copyright IBM Corp. 2003, 2023 6 * Author(s): Thomas Spatzier 7 * Jan Glauber 8 * Harald Freudenberger (freude@de.ibm.com) 9 * Martin Schwidefsky <schwidefsky@de.ibm.com> 10 */ 11 #ifndef _ASM_S390_CPACF_H 12 #define _ASM_S390_CPACF_H 13 14 #include <asm/facility.h> 15 16 /* 17 * Instruction opcodes for the CPACF instructions 18 */ 19 #define CPACF_KMAC 0xb91e /* MSA */ 20 #define CPACF_KM 0xb92e /* MSA */ 21 #define CPACF_KMC 0xb92f /* MSA */ 22 #define CPACF_KIMD 0xb93e /* MSA */ 23 #define CPACF_KLMD 0xb93f /* MSA */ 24 #define CPACF_PCKMO 0xb928 /* MSA3 */ 25 #define CPACF_KMF 0xb92a /* MSA4 */ 26 #define CPACF_KMO 0xb92b /* MSA4 */ 27 #define CPACF_PCC 0xb92c /* MSA4 */ 28 #define CPACF_KMCTR 0xb92d /* MSA4 */ 29 #define CPACF_PRNO 0xb93c /* MSA5 */ 30 #define CPACF_KMA 0xb929 /* MSA8 */ 31 #define CPACF_KDSA 0xb93a /* MSA9 */ 32 33 /* 34 * En/decryption modifier bits 35 */ 36 #define CPACF_ENCRYPT 0x00 37 #define CPACF_DECRYPT 0x80 38 39 /* 40 * Function codes for the KM (CIPHER MESSAGE) instruction 41 */ 42 #define CPACF_KM_QUERY 0x00 43 #define CPACF_KM_DEA 0x01 44 #define CPACF_KM_TDEA_128 0x02 45 #define CPACF_KM_TDEA_192 0x03 46 #define CPACF_KM_AES_128 0x12 47 #define CPACF_KM_AES_192 0x13 48 #define CPACF_KM_AES_256 0x14 49 #define CPACF_KM_PAES_128 0x1a 50 #define CPACF_KM_PAES_192 0x1b 51 #define CPACF_KM_PAES_256 0x1c 52 #define CPACF_KM_XTS_128 0x32 53 #define CPACF_KM_XTS_256 0x34 54 #define CPACF_KM_PXTS_128 0x3a 55 #define CPACF_KM_PXTS_256 0x3c 56 57 /* 58 * Function codes for the KMC (CIPHER MESSAGE WITH CHAINING) 59 * instruction 60 */ 61 #define CPACF_KMC_QUERY 0x00 62 #define CPACF_KMC_DEA 0x01 63 #define CPACF_KMC_TDEA_128 0x02 64 #define CPACF_KMC_TDEA_192 0x03 65 #define CPACF_KMC_AES_128 0x12 66 #define CPACF_KMC_AES_192 0x13 67 #define CPACF_KMC_AES_256 0x14 68 #define CPACF_KMC_PAES_128 0x1a 69 #define CPACF_KMC_PAES_192 0x1b 70 #define CPACF_KMC_PAES_256 0x1c 71 #define CPACF_KMC_PRNG 0x43 72 73 /* 74 * Function codes for the KMCTR (CIPHER MESSAGE WITH COUNTER) 75 * instruction 76 */ 77 #define CPACF_KMCTR_QUERY 0x00 78 #define CPACF_KMCTR_DEA 0x01 79 #define CPACF_KMCTR_TDEA_128 0x02 80 #define CPACF_KMCTR_TDEA_192 0x03 81 #define CPACF_KMCTR_AES_128 0x12 82 #define CPACF_KMCTR_AES_192 0x13 83 #define CPACF_KMCTR_AES_256 0x14 84 #define CPACF_KMCTR_PAES_128 0x1a 85 #define CPACF_KMCTR_PAES_192 0x1b 86 #define CPACF_KMCTR_PAES_256 0x1c 87 88 /* 89 * Function codes for the KIMD (COMPUTE INTERMEDIATE MESSAGE DIGEST) 90 * instruction 91 */ 92 #define CPACF_KIMD_QUERY 0x00 93 #define CPACF_KIMD_SHA_1 0x01 94 #define CPACF_KIMD_SHA_256 0x02 95 #define CPACF_KIMD_SHA_512 0x03 96 #define CPACF_KIMD_SHA3_224 0x20 97 #define CPACF_KIMD_SHA3_256 0x21 98 #define CPACF_KIMD_SHA3_384 0x22 99 #define CPACF_KIMD_SHA3_512 0x23 100 #define CPACF_KIMD_GHASH 0x41 101 102 /* 103 * Function codes for the KLMD (COMPUTE LAST MESSAGE DIGEST) 104 * instruction 105 */ 106 #define CPACF_KLMD_QUERY 0x00 107 #define CPACF_KLMD_SHA_1 0x01 108 #define CPACF_KLMD_SHA_256 0x02 109 #define CPACF_KLMD_SHA_512 0x03 110 #define CPACF_KLMD_SHA3_224 0x20 111 #define CPACF_KLMD_SHA3_256 0x21 112 #define CPACF_KLMD_SHA3_384 0x22 113 #define CPACF_KLMD_SHA3_512 0x23 114 115 /* 116 * function codes for the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE) 117 * instruction 118 */ 119 #define CPACF_KMAC_QUERY 0x00 120 #define CPACF_KMAC_DEA 0x01 121 #define CPACF_KMAC_TDEA_128 0x02 122 #define CPACF_KMAC_TDEA_192 0x03 123 124 /* 125 * Function codes for the PCKMO (PERFORM CRYPTOGRAPHIC KEY MANAGEMENT) 126 * instruction 127 */ 128 #define CPACF_PCKMO_QUERY 0x00 129 #define CPACF_PCKMO_ENC_DES_KEY 0x01 130 #define CPACF_PCKMO_ENC_TDES_128_KEY 0x02 131 #define CPACF_PCKMO_ENC_TDES_192_KEY 0x03 132 #define CPACF_PCKMO_ENC_AES_128_KEY 0x12 133 #define CPACF_PCKMO_ENC_AES_192_KEY 0x13 134 #define CPACF_PCKMO_ENC_AES_256_KEY 0x14 135 #define CPACF_PCKMO_ENC_ECC_P256_KEY 0x20 136 #define CPACF_PCKMO_ENC_ECC_P384_KEY 0x21 137 #define CPACF_PCKMO_ENC_ECC_P521_KEY 0x22 138 #define CPACF_PCKMO_ENC_ECC_ED25519_KEY 0x28 139 #define CPACF_PCKMO_ENC_ECC_ED448_KEY 0x29 140 141 /* 142 * Function codes for the PRNO (PERFORM RANDOM NUMBER OPERATION) 143 * instruction 144 */ 145 #define CPACF_PRNO_QUERY 0x00 146 #define CPACF_PRNO_SHA512_DRNG_GEN 0x03 147 #define CPACF_PRNO_SHA512_DRNG_SEED 0x83 148 #define CPACF_PRNO_TRNG_Q_R2C_RATIO 0x70 149 #define CPACF_PRNO_TRNG 0x72 150 151 /* 152 * Function codes for the KMA (CIPHER MESSAGE WITH AUTHENTICATION) 153 * instruction 154 */ 155 #define CPACF_KMA_QUERY 0x00 156 #define CPACF_KMA_GCM_AES_128 0x12 157 #define CPACF_KMA_GCM_AES_192 0x13 158 #define CPACF_KMA_GCM_AES_256 0x14 159 160 /* 161 * Flags for the KMA (CIPHER MESSAGE WITH AUTHENTICATION) instruction 162 */ 163 #define CPACF_KMA_LPC 0x100 /* Last-Plaintext/Ciphertext */ 164 #define CPACF_KMA_LAAD 0x200 /* Last-AAD */ 165 #define CPACF_KMA_HS 0x400 /* Hash-subkey Supplied */ 166 167 typedef struct { unsigned char bytes[16]; } cpacf_mask_t; 168 169 /* 170 * Prototype for a not existing function to produce a link 171 * error if __cpacf_query() or __cpacf_check_opcode() is used 172 * with an invalid compile time const opcode. 173 */ 174 void __cpacf_bad_opcode(void); 175 176 static __always_inline void __cpacf_query_rre(u32 opc, u8 r1, u8 r2, 177 cpacf_mask_t *mask) 178 { 179 asm volatile( 180 " la %%r1,%[mask]\n" 181 " xgr %%r0,%%r0\n" 182 " .insn rre,%[opc] << 16,%[r1],%[r2]\n" 183 : [mask] "=R" (*mask) 184 : [opc] "i" (opc), 185 [r1] "i" (r1), [r2] "i" (r2) 186 : "cc", "r0", "r1"); 187 } 188 189 static __always_inline void __cpacf_query_rrf(u32 opc, 190 u8 r1, u8 r2, u8 r3, u8 m4, 191 cpacf_mask_t *mask) 192 { 193 asm volatile( 194 " la %%r1,%[mask]\n" 195 " xgr %%r0,%%r0\n" 196 " .insn rrf,%[opc] << 16,%[r1],%[r2],%[r3],%[m4]\n" 197 : [mask] "=R" (*mask) 198 : [opc] "i" (opc), [r1] "i" (r1), [r2] "i" (r2), 199 [r3] "i" (r3), [m4] "i" (m4) 200 : "cc", "r0", "r1"); 201 } 202 203 static __always_inline void __cpacf_query(unsigned int opcode, 204 cpacf_mask_t *mask) 205 { 206 switch (opcode) { 207 case CPACF_KDSA: 208 __cpacf_query_rre(CPACF_KDSA, 0, 2, mask); 209 break; 210 case CPACF_KIMD: 211 __cpacf_query_rre(CPACF_KIMD, 0, 2, mask); 212 break; 213 case CPACF_KLMD: 214 __cpacf_query_rre(CPACF_KLMD, 0, 2, mask); 215 break; 216 case CPACF_KM: 217 __cpacf_query_rre(CPACF_KM, 2, 4, mask); 218 break; 219 case CPACF_KMA: 220 __cpacf_query_rrf(CPACF_KMA, 2, 4, 6, 0, mask); 221 break; 222 case CPACF_KMAC: 223 __cpacf_query_rre(CPACF_KMAC, 0, 2, mask); 224 break; 225 case CPACF_KMC: 226 __cpacf_query_rre(CPACF_KMC, 2, 4, mask); 227 break; 228 case CPACF_KMCTR: 229 __cpacf_query_rrf(CPACF_KMCTR, 2, 4, 6, 0, mask); 230 break; 231 case CPACF_KMF: 232 __cpacf_query_rre(CPACF_KMF, 2, 4, mask); 233 break; 234 case CPACF_KMO: 235 __cpacf_query_rre(CPACF_KMO, 2, 4, mask); 236 break; 237 case CPACF_PCC: 238 __cpacf_query_rre(CPACF_PCC, 0, 0, mask); 239 break; 240 case CPACF_PCKMO: 241 __cpacf_query_rre(CPACF_PCKMO, 0, 0, mask); 242 break; 243 case CPACF_PRNO: 244 __cpacf_query_rre(CPACF_PRNO, 2, 4, mask); 245 break; 246 default: 247 __cpacf_bad_opcode(); 248 } 249 } 250 251 static __always_inline int __cpacf_check_opcode(unsigned int opcode) 252 { 253 switch (opcode) { 254 case CPACF_KMAC: 255 case CPACF_KM: 256 case CPACF_KMC: 257 case CPACF_KIMD: 258 case CPACF_KLMD: 259 return test_facility(17); /* check for MSA */ 260 case CPACF_PCKMO: 261 return test_facility(76); /* check for MSA3 */ 262 case CPACF_KMF: 263 case CPACF_KMO: 264 case CPACF_PCC: 265 case CPACF_KMCTR: 266 return test_facility(77); /* check for MSA4 */ 267 case CPACF_PRNO: 268 return test_facility(57); /* check for MSA5 */ 269 case CPACF_KMA: 270 return test_facility(146); /* check for MSA8 */ 271 default: 272 __cpacf_bad_opcode(); 273 return 0; 274 } 275 } 276 277 /** 278 * cpacf_query() - check if a specific CPACF function is available 279 * @opcode: the opcode of the crypto instruction 280 * @func: the function code to test for 281 * 282 * Executes the query function for the given crypto instruction @opcode 283 * and checks if @func is available 284 * 285 * Returns 1 if @func is available for @opcode, 0 otherwise 286 */ 287 static __always_inline int cpacf_query(unsigned int opcode, cpacf_mask_t *mask) 288 { 289 if (__cpacf_check_opcode(opcode)) { 290 __cpacf_query(opcode, mask); 291 return 1; 292 } 293 memset(mask, 0, sizeof(*mask)); 294 return 0; 295 } 296 297 static inline int cpacf_test_func(cpacf_mask_t *mask, unsigned int func) 298 { 299 return (mask->bytes[func >> 3] & (0x80 >> (func & 7))) != 0; 300 } 301 302 static __always_inline int cpacf_query_func(unsigned int opcode, unsigned int func) 303 { 304 cpacf_mask_t mask; 305 306 if (cpacf_query(opcode, &mask)) 307 return cpacf_test_func(&mask, func); 308 return 0; 309 } 310 311 /** 312 * cpacf_km() - executes the KM (CIPHER MESSAGE) instruction 313 * @func: the function code passed to KM; see CPACF_KM_xxx defines 314 * @param: address of parameter block; see POP for details on each func 315 * @dest: address of destination memory area 316 * @src: address of source memory area 317 * @src_len: length of src operand in bytes 318 * 319 * Returns 0 for the query func, number of processed bytes for 320 * encryption/decryption funcs 321 */ 322 static inline int cpacf_km(unsigned long func, void *param, 323 u8 *dest, const u8 *src, long src_len) 324 { 325 union register_pair d, s; 326 327 d.even = (unsigned long)dest; 328 s.even = (unsigned long)src; 329 s.odd = (unsigned long)src_len; 330 asm volatile( 331 " lgr 0,%[fc]\n" 332 " lgr 1,%[pba]\n" 333 "0: .insn rre,%[opc] << 16,%[dst],%[src]\n" 334 " brc 1,0b\n" /* handle partial completion */ 335 : [src] "+&d" (s.pair), [dst] "+&d" (d.pair) 336 : [fc] "d" (func), [pba] "d" ((unsigned long)param), 337 [opc] "i" (CPACF_KM) 338 : "cc", "memory", "0", "1"); 339 340 return src_len - s.odd; 341 } 342 343 /** 344 * cpacf_kmc() - executes the KMC (CIPHER MESSAGE WITH CHAINING) instruction 345 * @func: the function code passed to KM; see CPACF_KMC_xxx defines 346 * @param: address of parameter block; see POP for details on each func 347 * @dest: address of destination memory area 348 * @src: address of source memory area 349 * @src_len: length of src operand in bytes 350 * 351 * Returns 0 for the query func, number of processed bytes for 352 * encryption/decryption funcs 353 */ 354 static inline int cpacf_kmc(unsigned long func, void *param, 355 u8 *dest, const u8 *src, long src_len) 356 { 357 union register_pair d, s; 358 359 d.even = (unsigned long)dest; 360 s.even = (unsigned long)src; 361 s.odd = (unsigned long)src_len; 362 asm volatile( 363 " lgr 0,%[fc]\n" 364 " lgr 1,%[pba]\n" 365 "0: .insn rre,%[opc] << 16,%[dst],%[src]\n" 366 " brc 1,0b\n" /* handle partial completion */ 367 : [src] "+&d" (s.pair), [dst] "+&d" (d.pair) 368 : [fc] "d" (func), [pba] "d" ((unsigned long)param), 369 [opc] "i" (CPACF_KMC) 370 : "cc", "memory", "0", "1"); 371 372 return src_len - s.odd; 373 } 374 375 /** 376 * cpacf_kimd() - executes the KIMD (COMPUTE INTERMEDIATE MESSAGE DIGEST) 377 * instruction 378 * @func: the function code passed to KM; see CPACF_KIMD_xxx defines 379 * @param: address of parameter block; see POP for details on each func 380 * @src: address of source memory area 381 * @src_len: length of src operand in bytes 382 */ 383 static inline void cpacf_kimd(unsigned long func, void *param, 384 const u8 *src, long src_len) 385 { 386 union register_pair s; 387 388 s.even = (unsigned long)src; 389 s.odd = (unsigned long)src_len; 390 asm volatile( 391 " lgr 0,%[fc]\n" 392 " lgr 1,%[pba]\n" 393 "0: .insn rre,%[opc] << 16,0,%[src]\n" 394 " brc 1,0b\n" /* handle partial completion */ 395 : [src] "+&d" (s.pair) 396 : [fc] "d" (func), [pba] "d" ((unsigned long)(param)), 397 [opc] "i" (CPACF_KIMD) 398 : "cc", "memory", "0", "1"); 399 } 400 401 /** 402 * cpacf_klmd() - executes the KLMD (COMPUTE LAST MESSAGE DIGEST) instruction 403 * @func: the function code passed to KM; see CPACF_KLMD_xxx defines 404 * @param: address of parameter block; see POP for details on each func 405 * @src: address of source memory area 406 * @src_len: length of src operand in bytes 407 */ 408 static inline void cpacf_klmd(unsigned long func, void *param, 409 const u8 *src, long src_len) 410 { 411 union register_pair s; 412 413 s.even = (unsigned long)src; 414 s.odd = (unsigned long)src_len; 415 asm volatile( 416 " lgr 0,%[fc]\n" 417 " lgr 1,%[pba]\n" 418 "0: .insn rre,%[opc] << 16,0,%[src]\n" 419 " brc 1,0b\n" /* handle partial completion */ 420 : [src] "+&d" (s.pair) 421 : [fc] "d" (func), [pba] "d" ((unsigned long)param), 422 [opc] "i" (CPACF_KLMD) 423 : "cc", "memory", "0", "1"); 424 } 425 426 /** 427 * cpacf_kmac() - executes the KMAC (COMPUTE MESSAGE AUTHENTICATION CODE) 428 * instruction 429 * @func: the function code passed to KM; see CPACF_KMAC_xxx defines 430 * @param: address of parameter block; see POP for details on each func 431 * @src: address of source memory area 432 * @src_len: length of src operand in bytes 433 * 434 * Returns 0 for the query func, number of processed bytes for digest funcs 435 */ 436 static inline int cpacf_kmac(unsigned long func, void *param, 437 const u8 *src, long src_len) 438 { 439 union register_pair s; 440 441 s.even = (unsigned long)src; 442 s.odd = (unsigned long)src_len; 443 asm volatile( 444 " lgr 0,%[fc]\n" 445 " lgr 1,%[pba]\n" 446 "0: .insn rre,%[opc] << 16,0,%[src]\n" 447 " brc 1,0b\n" /* handle partial completion */ 448 : [src] "+&d" (s.pair) 449 : [fc] "d" (func), [pba] "d" ((unsigned long)param), 450 [opc] "i" (CPACF_KMAC) 451 : "cc", "memory", "0", "1"); 452 453 return src_len - s.odd; 454 } 455 456 /** 457 * cpacf_kmctr() - executes the KMCTR (CIPHER MESSAGE WITH COUNTER) instruction 458 * @func: the function code passed to KMCTR; see CPACF_KMCTR_xxx defines 459 * @param: address of parameter block; see POP for details on each func 460 * @dest: address of destination memory area 461 * @src: address of source memory area 462 * @src_len: length of src operand in bytes 463 * @counter: address of counter value 464 * 465 * Returns 0 for the query func, number of processed bytes for 466 * encryption/decryption funcs 467 */ 468 static inline int cpacf_kmctr(unsigned long func, void *param, u8 *dest, 469 const u8 *src, long src_len, u8 *counter) 470 { 471 union register_pair d, s, c; 472 473 d.even = (unsigned long)dest; 474 s.even = (unsigned long)src; 475 s.odd = (unsigned long)src_len; 476 c.even = (unsigned long)counter; 477 asm volatile( 478 " lgr 0,%[fc]\n" 479 " lgr 1,%[pba]\n" 480 "0: .insn rrf,%[opc] << 16,%[dst],%[src],%[ctr],0\n" 481 " brc 1,0b\n" /* handle partial completion */ 482 : [src] "+&d" (s.pair), [dst] "+&d" (d.pair), 483 [ctr] "+&d" (c.pair) 484 : [fc] "d" (func), [pba] "d" ((unsigned long)param), 485 [opc] "i" (CPACF_KMCTR) 486 : "cc", "memory", "0", "1"); 487 488 return src_len - s.odd; 489 } 490 491 /** 492 * cpacf_prno() - executes the PRNO (PERFORM RANDOM NUMBER OPERATION) 493 * instruction 494 * @func: the function code passed to PRNO; see CPACF_PRNO_xxx defines 495 * @param: address of parameter block; see POP for details on each func 496 * @dest: address of destination memory area 497 * @dest_len: size of destination memory area in bytes 498 * @seed: address of seed data 499 * @seed_len: size of seed data in bytes 500 */ 501 static inline void cpacf_prno(unsigned long func, void *param, 502 u8 *dest, unsigned long dest_len, 503 const u8 *seed, unsigned long seed_len) 504 { 505 union register_pair d, s; 506 507 d.even = (unsigned long)dest; 508 d.odd = (unsigned long)dest_len; 509 s.even = (unsigned long)seed; 510 s.odd = (unsigned long)seed_len; 511 asm volatile ( 512 " lgr 0,%[fc]\n" 513 " lgr 1,%[pba]\n" 514 "0: .insn rre,%[opc] << 16,%[dst],%[seed]\n" 515 " brc 1,0b\n" /* handle partial completion */ 516 : [dst] "+&d" (d.pair) 517 : [fc] "d" (func), [pba] "d" ((unsigned long)param), 518 [seed] "d" (s.pair), [opc] "i" (CPACF_PRNO) 519 : "cc", "memory", "0", "1"); 520 } 521 522 /** 523 * cpacf_trng() - executes the TRNG subfunction of the PRNO instruction 524 * @ucbuf: buffer for unconditioned data 525 * @ucbuf_len: amount of unconditioned data to fetch in bytes 526 * @cbuf: buffer for conditioned data 527 * @cbuf_len: amount of conditioned data to fetch in bytes 528 */ 529 static inline void cpacf_trng(u8 *ucbuf, unsigned long ucbuf_len, 530 u8 *cbuf, unsigned long cbuf_len) 531 { 532 union register_pair u, c; 533 534 u.even = (unsigned long)ucbuf; 535 u.odd = (unsigned long)ucbuf_len; 536 c.even = (unsigned long)cbuf; 537 c.odd = (unsigned long)cbuf_len; 538 asm volatile ( 539 " lghi 0,%[fc]\n" 540 "0: .insn rre,%[opc] << 16,%[ucbuf],%[cbuf]\n" 541 " brc 1,0b\n" /* handle partial completion */ 542 : [ucbuf] "+&d" (u.pair), [cbuf] "+&d" (c.pair) 543 : [fc] "K" (CPACF_PRNO_TRNG), [opc] "i" (CPACF_PRNO) 544 : "cc", "memory", "0"); 545 } 546 547 /** 548 * cpacf_pcc() - executes the PCC (PERFORM CRYPTOGRAPHIC COMPUTATION) 549 * instruction 550 * @func: the function code passed to PCC; see CPACF_KM_xxx defines 551 * @param: address of parameter block; see POP for details on each func 552 */ 553 static inline void cpacf_pcc(unsigned long func, void *param) 554 { 555 asm volatile( 556 " lgr 0,%[fc]\n" 557 " lgr 1,%[pba]\n" 558 "0: .insn rre,%[opc] << 16,0,0\n" /* PCC opcode */ 559 " brc 1,0b\n" /* handle partial completion */ 560 : 561 : [fc] "d" (func), [pba] "d" ((unsigned long)param), 562 [opc] "i" (CPACF_PCC) 563 : "cc", "memory", "0", "1"); 564 } 565 566 /** 567 * cpacf_pckmo() - executes the PCKMO (PERFORM CRYPTOGRAPHIC KEY 568 * MANAGEMENT) instruction 569 * @func: the function code passed to PCKMO; see CPACF_PCKMO_xxx defines 570 * @param: address of parameter block; see POP for details on each func 571 * 572 * Returns 0. 573 */ 574 static inline void cpacf_pckmo(long func, void *param) 575 { 576 asm volatile( 577 " lgr 0,%[fc]\n" 578 " lgr 1,%[pba]\n" 579 " .insn rre,%[opc] << 16,0,0\n" /* PCKMO opcode */ 580 : 581 : [fc] "d" (func), [pba] "d" ((unsigned long)param), 582 [opc] "i" (CPACF_PCKMO) 583 : "cc", "memory", "0", "1"); 584 } 585 586 /** 587 * cpacf_kma() - executes the KMA (CIPHER MESSAGE WITH AUTHENTICATION) 588 * instruction 589 * @func: the function code passed to KMA; see CPACF_KMA_xxx defines 590 * @param: address of parameter block; see POP for details on each func 591 * @dest: address of destination memory area 592 * @src: address of source memory area 593 * @src_len: length of src operand in bytes 594 * @aad: address of additional authenticated data memory area 595 * @aad_len: length of aad operand in bytes 596 */ 597 static inline void cpacf_kma(unsigned long func, void *param, u8 *dest, 598 const u8 *src, unsigned long src_len, 599 const u8 *aad, unsigned long aad_len) 600 { 601 union register_pair d, s, a; 602 603 d.even = (unsigned long)dest; 604 s.even = (unsigned long)src; 605 s.odd = (unsigned long)src_len; 606 a.even = (unsigned long)aad; 607 a.odd = (unsigned long)aad_len; 608 asm volatile( 609 " lgr 0,%[fc]\n" 610 " lgr 1,%[pba]\n" 611 "0: .insn rrf,%[opc] << 16,%[dst],%[src],%[aad],0\n" 612 " brc 1,0b\n" /* handle partial completion */ 613 : [dst] "+&d" (d.pair), [src] "+&d" (s.pair), 614 [aad] "+&d" (a.pair) 615 : [fc] "d" (func), [pba] "d" ((unsigned long)param), 616 [opc] "i" (CPACF_KMA) 617 : "cc", "memory", "0", "1"); 618 } 619 620 #endif /* _ASM_S390_CPACF_H */ 621