crypt_s390_query.c 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129
  1. /*
  2. * Cryptographic API.
  3. *
  4. * Support for s390 cryptographic instructions.
  5. * Testing module for querying processor crypto capabilities.
  6. *
  7. * Copyright (c) 2003 IBM Deutschland Entwicklung GmbH, IBM Corporation
  8. * Author(s): Thomas Spatzier (tspat@de.ibm.com)
  9. *
  10. * This program is free software; you can redistribute it and/or modify it
  11. * under the terms of the GNU General Public License as published by the Free
  12. * Software Foundation; either version 2 of the License, or (at your option)
  13. * any later version.
  14. *
  15. */
  16. #include <linux/module.h>
  17. #include <linux/init.h>
  18. #include <linux/kernel.h>
  19. #include <asm/errno.h>
  20. #include "crypt_s390.h"
  21. static void query_available_functions(void)
  22. {
  23. printk(KERN_INFO "#####################\n");
  24. /* query available KM functions */
  25. printk(KERN_INFO "KM_QUERY: %d\n",
  26. crypt_s390_func_available(KM_QUERY));
  27. printk(KERN_INFO "KM_DEA: %d\n",
  28. crypt_s390_func_available(KM_DEA_ENCRYPT));
  29. printk(KERN_INFO "KM_TDEA_128: %d\n",
  30. crypt_s390_func_available(KM_TDEA_128_ENCRYPT));
  31. printk(KERN_INFO "KM_TDEA_192: %d\n",
  32. crypt_s390_func_available(KM_TDEA_192_ENCRYPT));
  33. printk(KERN_INFO "KM_AES_128: %d\n",
  34. crypt_s390_func_available(KM_AES_128_ENCRYPT));
  35. printk(KERN_INFO "KM_AES_192: %d\n",
  36. crypt_s390_func_available(KM_AES_192_ENCRYPT));
  37. printk(KERN_INFO "KM_AES_256: %d\n",
  38. crypt_s390_func_available(KM_AES_256_ENCRYPT));
  39. /* query available KMC functions */
  40. printk(KERN_INFO "KMC_QUERY: %d\n",
  41. crypt_s390_func_available(KMC_QUERY));
  42. printk(KERN_INFO "KMC_DEA: %d\n",
  43. crypt_s390_func_available(KMC_DEA_ENCRYPT));
  44. printk(KERN_INFO "KMC_TDEA_128: %d\n",
  45. crypt_s390_func_available(KMC_TDEA_128_ENCRYPT));
  46. printk(KERN_INFO "KMC_TDEA_192: %d\n",
  47. crypt_s390_func_available(KMC_TDEA_192_ENCRYPT));
  48. printk(KERN_INFO "KMC_AES_128: %d\n",
  49. crypt_s390_func_available(KMC_AES_128_ENCRYPT));
  50. printk(KERN_INFO "KMC_AES_192: %d\n",
  51. crypt_s390_func_available(KMC_AES_192_ENCRYPT));
  52. printk(KERN_INFO "KMC_AES_256: %d\n",
  53. crypt_s390_func_available(KMC_AES_256_ENCRYPT));
  54. /* query available KIMD functions */
  55. printk(KERN_INFO "KIMD_QUERY: %d\n",
  56. crypt_s390_func_available(KIMD_QUERY));
  57. printk(KERN_INFO "KIMD_SHA_1: %d\n",
  58. crypt_s390_func_available(KIMD_SHA_1));
  59. printk(KERN_INFO "KIMD_SHA_256: %d\n",
  60. crypt_s390_func_available(KIMD_SHA_256));
  61. /* query available KLMD functions */
  62. printk(KERN_INFO "KLMD_QUERY: %d\n",
  63. crypt_s390_func_available(KLMD_QUERY));
  64. printk(KERN_INFO "KLMD_SHA_1: %d\n",
  65. crypt_s390_func_available(KLMD_SHA_1));
  66. printk(KERN_INFO "KLMD_SHA_256: %d\n",
  67. crypt_s390_func_available(KLMD_SHA_256));
  68. /* query available KMAC functions */
  69. printk(KERN_INFO "KMAC_QUERY: %d\n",
  70. crypt_s390_func_available(KMAC_QUERY));
  71. printk(KERN_INFO "KMAC_DEA: %d\n",
  72. crypt_s390_func_available(KMAC_DEA));
  73. printk(KERN_INFO "KMAC_TDEA_128: %d\n",
  74. crypt_s390_func_available(KMAC_TDEA_128));
  75. printk(KERN_INFO "KMAC_TDEA_192: %d\n",
  76. crypt_s390_func_available(KMAC_TDEA_192));
  77. }
  78. static int init(void)
  79. {
  80. struct crypt_s390_query_status status = {
  81. .high = 0,
  82. .low = 0
  83. };
  84. printk(KERN_INFO "crypt_s390: querying available crypto functions\n");
  85. crypt_s390_km(KM_QUERY, &status, NULL, NULL, 0);
  86. printk(KERN_INFO "KM:\t%016llx %016llx\n",
  87. (unsigned long long) status.high,
  88. (unsigned long long) status.low);
  89. status.high = status.low = 0;
  90. crypt_s390_kmc(KMC_QUERY, &status, NULL, NULL, 0);
  91. printk(KERN_INFO "KMC:\t%016llx %016llx\n",
  92. (unsigned long long) status.high,
  93. (unsigned long long) status.low);
  94. status.high = status.low = 0;
  95. crypt_s390_kimd(KIMD_QUERY, &status, NULL, 0);
  96. printk(KERN_INFO "KIMD:\t%016llx %016llx\n",
  97. (unsigned long long) status.high,
  98. (unsigned long long) status.low);
  99. status.high = status.low = 0;
  100. crypt_s390_klmd(KLMD_QUERY, &status, NULL, 0);
  101. printk(KERN_INFO "KLMD:\t%016llx %016llx\n",
  102. (unsigned long long) status.high,
  103. (unsigned long long) status.low);
  104. status.high = status.low = 0;
  105. crypt_s390_kmac(KMAC_QUERY, &status, NULL, 0);
  106. printk(KERN_INFO "KMAC:\t%016llx %016llx\n",
  107. (unsigned long long) status.high,
  108. (unsigned long long) status.low);
  109. query_available_functions();
  110. return -ECANCELED;
  111. }
  112. static void __exit cleanup(void)
  113. {
  114. }
  115. module_init(init);
  116. module_exit(cleanup);
  117. MODULE_LICENSE("GPL");