aboutsummaryrefslogtreecommitdiffstats
path: root/arch/s390/crypto/crypt_z990_query.c
blob: 7133983d13846e16de90bc40f5dab9238f7c5cf6 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
/*
 * Cryptographic API.
 *
 * Support for z990 cryptographic instructions.
 * Testing module for querying processor crypto capabilities.
 *
 * Copyright (c) 2003 IBM Deutschland Entwicklung GmbH, IBM Corporation
 * Author(s): Thomas Spatzier (tspat@de.ibm.com)
 *
 * This program is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License as published by the Free
 * Software Foundation; either version 2 of the License, or (at your option)
 * any later version.
 *
 */
#include <linux/module.h>
#include <linux/init.h>
#include <linux/kernel.h>
#include <asm/errno.h>
#include "crypt_z990.h"

static void
query_available_functions(void)
{
	printk(KERN_INFO "#####################\n");
	//query available KM functions
	printk(KERN_INFO "KM_QUERY: %d\n",
			crypt_z990_func_available(KM_QUERY));
	printk(KERN_INFO "KM_DEA: %d\n",
			crypt_z990_func_available(KM_DEA_ENCRYPT));
	printk(KERN_INFO "KM_TDEA_128: %d\n",
			crypt_z990_func_available(KM_TDEA_128_ENCRYPT));
	printk(KERN_INFO "KM_TDEA_192: %d\n",
			crypt_z990_func_available(KM_TDEA_192_ENCRYPT));
	//query available KMC functions
	printk(KERN_INFO "KMC_QUERY: %d\n",
			crypt_z990_func_available(KMC_QUERY));
	printk(KERN_INFO "KMC_DEA: %d\n",
			crypt_z990_func_available(KMC_DEA_ENCRYPT));
	printk(KERN_INFO "KMC_TDEA_128: %d\n",
			crypt_z990_func_available(KMC_TDEA_128_ENCRYPT));
	printk(KERN_INFO "KMC_TDEA_192: %d\n",
			crypt_z990_func_available(KMC_TDEA_192_ENCRYPT));
	//query available KIMD fucntions
	printk(KERN_INFO "KIMD_QUERY: %d\n",
			crypt_z990_func_available(KIMD_QUERY));
	printk(KERN_INFO "KIMD_SHA_1: %d\n",
			crypt_z990_func_available(KIMD_SHA_1));
	//query available KLMD functions
	printk(KERN_INFO "KLMD_QUERY: %d\n",
			crypt_z990_func_available(KLMD_QUERY));
	printk(KERN_INFO "KLMD_SHA_1: %d\n",
			crypt_z990_func_available(KLMD_SHA_1));
	//query available KMAC functions
	printk(KERN_INFO "KMAC_QUERY: %d\n",
			crypt_z990_func_available(KMAC_QUERY));
	printk(KERN_INFO "KMAC_DEA: %d\n",
			crypt_z990_func_available(KMAC_DEA));
	printk(KERN_INFO "KMAC_TDEA_128: %d\n",
			crypt_z990_func_available(KMAC_TDEA_128));
	printk(KERN_INFO "KMAC_TDEA_192: %d\n",
			crypt_z990_func_available(KMAC_TDEA_192));
}

static int
init(void)
{
	struct crypt_z990_query_status status = {
		.high = 0,
		.low = 0
	};

	printk(KERN_INFO "crypt_z990: querying available crypto functions\n");
	crypt_z990_km(KM_QUERY, &status, NULL, NULL, 0);
	printk(KERN_INFO "KM: %016llx %016llx\n",
			(unsigned long long) status.high,
			(unsigned long long) status.low);
	status.high = status.low = 0;
	crypt_z990_kmc(KMC_QUERY, &status, NULL, NULL, 0);
	printk(KERN_INFO "KMC: %016llx %016llx\n",
			(unsigned long long) status.high,
			(unsigned long long) status.low);
	status.high = status.low = 0;
	crypt_z990_kimd(KIMD_QUERY, &status, NULL, 0);
	printk(KERN_INFO "KIMD: %016llx %016llx\n",
			(unsigned long long) status.high,
			(unsigned long long) status.low);
	status.high = status.low = 0;
	crypt_z990_klmd(KLMD_QUERY, &status, NULL, 0);
	printk(KERN_INFO "KLMD: %016llx %016llx\n",
			(unsigned long long) status.high,
			(unsigned long long) status.low);
	status.high = status.low = 0;
	crypt_z990_kmac(KMAC_QUERY, &status, NULL, 0);
	printk(KERN_INFO "KMAC: %016llx %016llx\n",
			(unsigned long long) status.high,
			(unsigned long long) status.low);

	query_available_functions();
	return -1;
}

static void __exit
cleanup(void)
{
}

module_init(init);
module_exit(cleanup);

MODULE_LICENSE("GPL");