summaryrefslogtreecommitdiffstats
path: root/arch/s390/crypto/sha256_s390.c
diff options
context:
space:
mode:
authorMartin Schwidefsky <schwidefsky@de.ibm.com>2016-08-18 12:59:46 +0200
committerMartin Schwidefsky <schwidefsky@de.ibm.com>2016-08-29 11:05:09 +0200
commit69c0e360f990c2dc737681f40a361195066cef02 (patch)
treee5e5ff1ff6f09e21b28752b948283589803d81eb /arch/s390/crypto/sha256_s390.c
parentd863d5945f2be0abfcd9d36b1a7c605f3eaef517 (diff)
downloadlinux-stable-69c0e360f990c2dc737681f40a361195066cef02.tar.gz
linux-stable-69c0e360f990c2dc737681f40a361195066cef02.tar.bz2
linux-stable-69c0e360f990c2dc737681f40a361195066cef02.zip
s390/crypto: cpacf function detection
The CPACF code makes some assumptions about the availablity of hardware support. E.g. if the machine supports KM(AES-256) without chaining it is assumed that KMC(AES-256) with chaining is available as well. For the existing CPUs this is true but the architecturally correct way is to check each CPACF functions on its own. This is what the query function of each instructions is all about. Reviewed-by: Harald Freudenberger <freude@linux.vnet.ibm.com> Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Diffstat (limited to 'arch/s390/crypto/sha256_s390.c')
-rw-r--r--arch/s390/crypto/sha256_s390.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/s390/crypto/sha256_s390.c b/arch/s390/crypto/sha256_s390.c
index 10aac0b11988..53c277999a28 100644
--- a/arch/s390/crypto/sha256_s390.c
+++ b/arch/s390/crypto/sha256_s390.c
@@ -123,7 +123,7 @@ static int __init sha256_s390_init(void)
{
int ret;
- if (!cpacf_query(CPACF_KIMD, CPACF_KIMD_SHA_256))
+ if (!cpacf_query_func(CPACF_KIMD, CPACF_KIMD_SHA_256))
return -EOPNOTSUPP;
ret = crypto_register_shash(&sha256_alg);
if (ret < 0)