mirror of
https://github.com/FEX-Emu/linux.git
synced 2024-12-27 20:07:09 +00:00
0b28002fdf
s/fucntion/function/ typo fixes Signed-off-by: Akinobu Mita <mita@miraclelinux.com> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: Linus Torvalds <torvalds@osdl.org>
130 lines
4.2 KiB
C
130 lines
4.2 KiB
C
/*
|
|
* Cryptographic API.
|
|
*
|
|
* Support for s390 cryptographic instructions.
|
|
* Testing module for querying processor crypto capabilities.
|
|
*
|
|
* Copyright (c) 2003 IBM Deutschland Entwicklung GmbH, IBM Corporation
|
|
* Author(s): Thomas Spatzier (tspat@de.ibm.com)
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License as published by the Free
|
|
* Software Foundation; either version 2 of the License, or (at your option)
|
|
* any later version.
|
|
*
|
|
*/
|
|
#include <linux/module.h>
|
|
#include <linux/init.h>
|
|
#include <linux/kernel.h>
|
|
#include <asm/errno.h>
|
|
#include "crypt_s390.h"
|
|
|
|
static void query_available_functions(void)
|
|
{
|
|
printk(KERN_INFO "#####################\n");
|
|
|
|
/* query available KM functions */
|
|
printk(KERN_INFO "KM_QUERY: %d\n",
|
|
crypt_s390_func_available(KM_QUERY));
|
|
printk(KERN_INFO "KM_DEA: %d\n",
|
|
crypt_s390_func_available(KM_DEA_ENCRYPT));
|
|
printk(KERN_INFO "KM_TDEA_128: %d\n",
|
|
crypt_s390_func_available(KM_TDEA_128_ENCRYPT));
|
|
printk(KERN_INFO "KM_TDEA_192: %d\n",
|
|
crypt_s390_func_available(KM_TDEA_192_ENCRYPT));
|
|
printk(KERN_INFO "KM_AES_128: %d\n",
|
|
crypt_s390_func_available(KM_AES_128_ENCRYPT));
|
|
printk(KERN_INFO "KM_AES_192: %d\n",
|
|
crypt_s390_func_available(KM_AES_192_ENCRYPT));
|
|
printk(KERN_INFO "KM_AES_256: %d\n",
|
|
crypt_s390_func_available(KM_AES_256_ENCRYPT));
|
|
|
|
/* query available KMC functions */
|
|
printk(KERN_INFO "KMC_QUERY: %d\n",
|
|
crypt_s390_func_available(KMC_QUERY));
|
|
printk(KERN_INFO "KMC_DEA: %d\n",
|
|
crypt_s390_func_available(KMC_DEA_ENCRYPT));
|
|
printk(KERN_INFO "KMC_TDEA_128: %d\n",
|
|
crypt_s390_func_available(KMC_TDEA_128_ENCRYPT));
|
|
printk(KERN_INFO "KMC_TDEA_192: %d\n",
|
|
crypt_s390_func_available(KMC_TDEA_192_ENCRYPT));
|
|
printk(KERN_INFO "KMC_AES_128: %d\n",
|
|
crypt_s390_func_available(KMC_AES_128_ENCRYPT));
|
|
printk(KERN_INFO "KMC_AES_192: %d\n",
|
|
crypt_s390_func_available(KMC_AES_192_ENCRYPT));
|
|
printk(KERN_INFO "KMC_AES_256: %d\n",
|
|
crypt_s390_func_available(KMC_AES_256_ENCRYPT));
|
|
|
|
/* query available KIMD functions */
|
|
printk(KERN_INFO "KIMD_QUERY: %d\n",
|
|
crypt_s390_func_available(KIMD_QUERY));
|
|
printk(KERN_INFO "KIMD_SHA_1: %d\n",
|
|
crypt_s390_func_available(KIMD_SHA_1));
|
|
printk(KERN_INFO "KIMD_SHA_256: %d\n",
|
|
crypt_s390_func_available(KIMD_SHA_256));
|
|
|
|
/* query available KLMD functions */
|
|
printk(KERN_INFO "KLMD_QUERY: %d\n",
|
|
crypt_s390_func_available(KLMD_QUERY));
|
|
printk(KERN_INFO "KLMD_SHA_1: %d\n",
|
|
crypt_s390_func_available(KLMD_SHA_1));
|
|
printk(KERN_INFO "KLMD_SHA_256: %d\n",
|
|
crypt_s390_func_available(KLMD_SHA_256));
|
|
|
|
/* query available KMAC functions */
|
|
printk(KERN_INFO "KMAC_QUERY: %d\n",
|
|
crypt_s390_func_available(KMAC_QUERY));
|
|
printk(KERN_INFO "KMAC_DEA: %d\n",
|
|
crypt_s390_func_available(KMAC_DEA));
|
|
printk(KERN_INFO "KMAC_TDEA_128: %d\n",
|
|
crypt_s390_func_available(KMAC_TDEA_128));
|
|
printk(KERN_INFO "KMAC_TDEA_192: %d\n",
|
|
crypt_s390_func_available(KMAC_TDEA_192));
|
|
}
|
|
|
|
static int init(void)
|
|
{
|
|
struct crypt_s390_query_status status = {
|
|
.high = 0,
|
|
.low = 0
|
|
};
|
|
|
|
printk(KERN_INFO "crypt_s390: querying available crypto functions\n");
|
|
crypt_s390_km(KM_QUERY, &status, NULL, NULL, 0);
|
|
printk(KERN_INFO "KM:\t%016llx %016llx\n",
|
|
(unsigned long long) status.high,
|
|
(unsigned long long) status.low);
|
|
status.high = status.low = 0;
|
|
crypt_s390_kmc(KMC_QUERY, &status, NULL, NULL, 0);
|
|
printk(KERN_INFO "KMC:\t%016llx %016llx\n",
|
|
(unsigned long long) status.high,
|
|
(unsigned long long) status.low);
|
|
status.high = status.low = 0;
|
|
crypt_s390_kimd(KIMD_QUERY, &status, NULL, 0);
|
|
printk(KERN_INFO "KIMD:\t%016llx %016llx\n",
|
|
(unsigned long long) status.high,
|
|
(unsigned long long) status.low);
|
|
status.high = status.low = 0;
|
|
crypt_s390_klmd(KLMD_QUERY, &status, NULL, 0);
|
|
printk(KERN_INFO "KLMD:\t%016llx %016llx\n",
|
|
(unsigned long long) status.high,
|
|
(unsigned long long) status.low);
|
|
status.high = status.low = 0;
|
|
crypt_s390_kmac(KMAC_QUERY, &status, NULL, 0);
|
|
printk(KERN_INFO "KMAC:\t%016llx %016llx\n",
|
|
(unsigned long long) status.high,
|
|
(unsigned long long) status.low);
|
|
|
|
query_available_functions();
|
|
return -ECANCELED;
|
|
}
|
|
|
|
static void __exit cleanup(void)
|
|
{
|
|
}
|
|
|
|
module_init(init);
|
|
module_exit(cleanup);
|
|
|
|
MODULE_LICENSE("GPL");
|