Intel EP80579 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Intel EP80579, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Intel EP80579 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Intel EP80579. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Intel EP80579 should contain:
- informations concerning technical data of Intel EP80579
- name of the manufacturer and a year of construction of the Intel EP80579 item
- rules of operation, control and maintenance of the Intel EP80579 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Intel EP80579 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Intel EP80579, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Intel service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Intel EP80579.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Intel EP80579 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    Order Number: 320 183-004US Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology Programmer’s Guide August 2009[...]

  • Page 2

    Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 2 Order Number: 320183-004US Legal Lines and Discla ime rs INFORMA TION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH IN TEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHE RWISE, T O ANY INTELL ECTUA L PRO PER TY RIGHT S IS GR [...]

  • Page 3

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 3 Contents—Security Software Contents 1.0 Introduction ......... ......... .......... ........... ........ ........... .......... ......... .......... ........... ........ .... 7 1.1 What’s New in this Chap ter ......[...]

  • Page 4

    Security Software—Contents Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 4 Order Number: 320183-004US 7.2 Overview ........... ........... .......... ......... .......... ........... .......... ......... .......... ........... .... 32 7.3 Functional Description .......... ........... .....[...]

  • Page 5

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 5 Contents—Security Software 12.4 Data Format ............... .......... ......... .......... ........... .......... ........... ........... .......... .... 64 12.4.1 Flat Buffers ............. ........... .......... ..[...]

  • Page 6

    Security Software—Revision History Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 6 Order Number: 320183-004US 12 Debug APIs .......... ........... .......... ......... .......... ........... ........ ........... .......... ......... ..........56 13 Cryptographic Common Inte rface Summary ([...]

  • Page 7

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 7 Introduction—Security Software 1.0 Introduction 1.1 What’s New in this Chapter Section 1.6 : New Note explaining cryptogr aphic framework “sh im” support. 1.2 About this Document The API Reference Manuals listed[...]

  • Page 8

    Security Software—Introduction Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 8 Order Number: 320183-004US 1.4 Related Information Note: For conv enience, in this document [GET_ST AR TED_GD] refers to either the Linux or FreeBSD guide . R efer to the appropriate guide for your ope r ating s[...]

  • Page 9

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 9 Introduction—Security Software CBC Cipher Block Chaining mod e. This is a mode of oper ation of a block cipher that combines the cipherte xt of one block with the plainte xt of the next block. CDRAM Coherent DRAM CTR [...]

  • Page 10

    Security Software—Introduction Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 10 Order Number: 320183-004US 1.6 Features Supported in this Release The features provided by this software in this release are as follows: • Acceleration of cryptographic oper ations using the “lookaside” m[...]

  • Page 11

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 11 Architectural Overview—Security Software Part 1: Architectural Overview This section contains the following chapters: • Chapter 2.0, “Silicon Overv iew” • Chapter 3.0, “Software Overview” • Chapter 4.0,[...]

  • Page 12

    Security Software—Silicon Overview Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 12 Order Number: 320183-004US 2.0 Silicon Overview 2.1 What’s New in this Chapter No updates in this release. 2.2 High Level Overview The Intel ® EP80579 Integrated Processor is a System On a Chip (SOC), in[...]

  • Page 13

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 13 Silicon Overview—Security Software provides 64 rings (circular buffers) that can be used for message passing between software running on the IA core and firmw are running on the ASU . These features are described in [...]

  • Page 14

    Security Software—Software Overview Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 14 Order Number: 320183-004US 3.0 Software Overview This chapter presents the high-level architectu re of the Software for Intel ® EP80579 Integrated Processor product line, using concepts from the "4+1[...]

  • Page 15

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 15 Software Overview—Security Software event this is not po ssible, the firmware will determine the sizes of these regions and set them accordingly . See Chapter 8.0, “ ASD Hardware Services” for detai ls on how thi[...]

  • Page 16

    Security Software—Software Overview Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 16 Order Number: 320183-004US The software components at this lay er in the current release are as follows: • Lookaside Crypto Access Layer: This component implements the Cryptographic API (shown as LAC API[...]

  • Page 17

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 17 Software Overview—Security Software configuration par ameters for example number of sessions to be supported, buffer pool sizes, and so on. See Chap te r 7.0, “ ASD Module Arc hitecture Over view” for more detail[...]

  • Page 18

    Security Software—Software Overview Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 18 Order Number: 320183-004US 3.5 Process View This section describes the context in which the EP80579 security software code is executed, which is important in terms of understanding concurrency , or where l[...]

  • Page 19

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 19 Software Overview—Security Software § § Table 5. Deployment View Kernel Module Component icp_asd.ko Acceleration S ystem Driver icp_crypto.ko Lookaside Crypto Acces s Layer QA T Access Layer icp_debug.k o Debug Inf[...]

  • Page 20

    Security Soft ware—Intel ® QuickAssist Technology Cryptogr aphic API Ar ch itecture Over v iew Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 20 Order Number: 320183-004US 4.0 Intel ® QuickAssist Technology Cryptographic API Architecture Overview 4.1 What’s New in this Chapter No update[...]

  • Page 21

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 21 Intel ® QuickAssist Technology Cryptographic AP I Architec ture Overvi ew—Securi ty Software the operation is performed ov er the full pack et in a single request. Partial-packet support is provided for Lookaside Ci[...]

  • Page 22

    Security Soft ware—Intel ® QuickAssist Technology Cryptogr aphic API Ar ch itecture Over v iew Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 22 Order Number: 320183-004US 4.2.1.7 Key Generation EP80579 security software supports the following K ey Gener ation operations: •S S L / T L S [...]

  • Page 23

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 23 Intel ® QuickAssist Technology Cryptographic AP I Architec ture Overvi ew—Securi ty Software 4.4 Lookaside Security Algo rithms High Level Overview The following sections provide a high lev el overview of the algori[...]

  • Page 24

    Security Soft ware—Intel ® QuickAssist Technology Cryptogr aphic API Ar ch itecture Over v iew Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 24 Order Number: 320183-004US Note: Exclusive disjunction (u sual symbol xor) is a logical oper ator that results in true if one of the oper ands (n[...]

  • Page 25

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 25 Intel ® QuickAssist Technology Cryptographic AP I Architec ture Overvi ew—Securi ty Software Note: A stream cipher operates on individual digits each one at a time. (A)RC4 (A)RC4 generates a pseudor andom stream of [...]

  • Page 26

    Security Soft ware—Intel ® QuickAssist Technology Cryptogr aphic API Ar ch itecture Over v iew Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 26 Order Number: 320183-004US GCM “Galois/Counter Mode (GCM) is a block cipher mode of operation that uses univ ersal hashing over a binary Galois[...]

  • Page 27

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 27 Intel ® QuickAssist Technology Cryptographic AP I Architec ture Overvi ew—Securi ty Software 4.4.3.2 RSA Cryptographic Standard RSA may be used for encryption or sign ature gener ation. The Chinese Remainder Th eo r[...]

  • Page 28

    Security Soft ware—Intel ® QuickAssist Technology Cryptogr aphic API Ar ch itecture Over v iew Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 28 Order Number: 320183-004US Prime number testing can gain a performance improvement through par allelism of the requests sent through the Cryptogr[...]

  • Page 29

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 29 QAT Access Layer Architecture Overvie w—Security Software 5.0 QAT Access Layer Architecture Overview 5.1 What’s New in this Chapter No updates in this release. 5.2 Overview The QA T Access Layer (QA T -AL) is respo[...]

  • Page 30

    Security Software—Debug Comp onent Arc hitecture Overview Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 30 Order Number: 320183-004US 6.0 Debug Component Architecture Overview 6.1 What’s New in this Chapter • No updates in this release. 6.2 Overview Debugging an application when proble[...]

  • Page 31

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 31 Debug Component Architecture Overview—Se curity Software 6.5 Data Structure Dump Note: The Data Dump feature is not supported in the current softw are release. Many of the software components in the Intel ® EP80579 [...]

  • Page 32

    Security Software—ASD Module Architecture Overview Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 32 Order Number: 320183-004US 7.0 ASD Module Architecture Overview 7.1 What’s New in this Chapter • No updates in this release. 7.2 Overview The Acceleration S ystem Driver is the kern el m[...]

  • Page 33

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 33 ASD Module Architecture Overview—Security Software Table 6. Cryptographic System Resource Variables Parameter Name Description Default Value NUM_CONCURRENT_LAC_SYMMETRIC_REQUESTS Number of concurrent Cryptograp hic ([...]

  • Page 34

    Security Software— Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 34 Order Number: 320183 7.4 Boot Time Configuration Instructions A user space c o nfiguration program (asd_c t l) is included in the release package and is run automatically as part of the load script. The configuration file [...]

  • Page 35

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183 35 ASD Hardware Services—Security Software 8.0 ASD Hardware Services 8.1 What’s New in this Chapter • No updates in this rele ase. 8.2 Overview This section describes the hardware-related services that the Acceleration Sy[...]

  • Page 36

    Security Software—ASD Hardware Services Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 36 Order Number: 320183 The sequence diagram in Figure 7 illustrates how this oper ates: Table 8. QAT-AL ISR Primitives Function/Symbol Description Usage QatComms_intr This is the QAT -AL main ISR functio[...]

  • Page 37

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183 37 ASD Hardware Services—Security Software Figure 7. ISR Sequence Diag ram R i ng Co nt rol l er I nt er r upt occur s In terr up t QAT - AL In it Q A T A L Cr ea t e BH R egi st er BH Schedul e f uncti on R egi st er t he i [...]

  • Page 38

    Security Software—ASD Hardware Services Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 38 Order Number: 320183 8.3.2 NCDRAM/CDRAM Interface 8.3.2.1 Development Board Environment The EP80579 with QuickAss ist SKUs provide a dire ct non-coherent (NCDRAM) path between AIOC de vices and the Mem[...]

  • Page 39

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183 39 ASD Hardware Services—Security Software Figure 8. Intel ® EP80579 Integrated Processor with Intel ® QuickAssist Technology Block Diagram Acceleration and I/O Complex ‡ Enabling so ftware required. IMCH PCI Express Inte[...]

  • Page 40

    Security Software—ASD Hardware Services Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 40 Order Number: 320183 8.3.2.1.1 ACPI ASD uses the ACPI mechanism to retrieve th e memory region information set up by the pre-boot firmware. This mechanism is dependent on an ACPI BI OS which su pports [...]

  • Page 41

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 41 Using the API—Security Software Part 2: Using the API This part of the document provides an overview of how to use the EP80579 security software acceleration APIs to build an application. Individual APIs are describe[...]

  • Page 42

    Security Software—Introd uction to Use Cases Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 42 Order Number: 320183-004US 9.0 Introduction to Use Cases This chapter discusses what’s in volved in building an application using the Intel ® EP80579 Software for Securi ty Applications on Inte[...]

  • Page 43

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 43 Programming Model—Security Software 10.0 Programming Model 10.1 What’s New in this Chapter No updates in this release. 10.2 Overview There are two different “categories” of API supplied with EP80579 integrated [...]

  • Page 44

    Security Software—Programming Model Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 44 Order Number: 320183-004US 10.3.2 Data Buffer Models Data buffers that are passed across the API interface in one of the following formats: • Flat Buffers represent a single region of physically contiguo[...]

  • Page 45

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 45 Programming Model—Security Software Because it is blocking, synchronous mode should not be used in contexts where blocking is not allowed, for example in interrupt context on Linux. 10.3.4 Pre-Registration In a numbe[...]

  • Page 46

    Security Software—Programming Model Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 46 Order Number: 320183-004US • There is a 1:1 relationship between an asynchronous request call and a completion callback (response). [NPF API] allows for 1:N relationships here. The complexity associated [...]

  • Page 47

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 47 Programming Model—Security Software — Oper ation type. F or the typical case, where the same callback data structure type is used for multiple different functions (operation t ypes) on a given API, this is used to [...]

  • Page 48

    Security Software—Debugging Applications Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 48 Order Number: 320183-004US 11.0 Debugging Applications 11.1 What’s New in this Chapter • No updates in this release. 11.2 Management Interface Layer (MIL) Introduction A reference application call[...]

  • Page 49

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 49 Debugging Applications—Security Software The MIL application is invoke d from the command line using the following syntax: debugmgr {command} where {command} is one of the following: —h e l p —D e b u g E n a b l[...]

  • Page 50

    Security Software—Debugging Applications Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 50 Order Number: 320183-004US 11.3.1 help The help command lists all the user space commands av ailable. 11.3.2 DebugEnable The DebugEnable command enables the debu g facility within the EP80579 security[...]

  • Page 51

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 51 Debugging Applications—Security Software 11.3.3 DebugDisable The DebugDisable command disables the de bug facility within the EP80579 se curity software acceler ation subsystem. Specifically , it unregisters the SEN [...]

  • Page 52

    Security Software—Debugging Applications Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 52 Order Number: 320183-004US 11.3.4 VersionDumpAll This command results in the version of all components within the software stack being logged to the syslog file as specified in Figure 1 3 . Figure 13.[...]

  • Page 53

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 53 Debugging Applications—Security Software 11.3.5 setHC <timeout> This command is used to specify the maxi mum time interv al for any one thread to punch the liveness value. When the timeou t is ex ceeded, a thre[...]

  • Page 54

    Security Software—Debugging Applications Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 54 Order Number: 320183-004US 11.3.6 SystemHealthCheck This command causes the liveness of e ach ac tive thread in the system to be queried and displays this information in the syslog file as shown in Fi[...]

  • Page 55

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 55 Debugging Applications—Security Software 11.3.7 DataDump Note: The Data Dump feature is not supported in the current softw are release. This command is used to generate a data dump from the entire acceleration subsys[...]

  • Page 56

    Security Software—Debugging Applications Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 56 Order Number: 320183-004US 11.3.8 SetFileName <filename> This command is used to set the name of the system log file which contains all the debug information. The maximum length of the <filen[...]

  • Page 57

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 57 Debugging Applications—Security Software § § icp_DccLiv enessR esponseSizeGet The user calls this API to get the buffer size to be allocated for the retrieval of system response information. The user should free th[...]

  • Page 58

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 58 Order Number: 320183-004US 12.0 Using the Intel ® QuickAssist Technology Cryptographic API The Intel ® QuickAssist T echnology Cryptographic API for the Lookasid[...]

  • Page 59

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 59 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software contains the API for key gener ation. The file cpa_cy_ran d.h contains the API for random number gener ation. • Asymmetric : The PKE A[...]

  • Page 60

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 60 Order Number: 320183-004US 12.2.1 Modes of Operation The Cryptographic API may be called in asynchronous or synchronous modes. Note: Asynchronous mode is prefe rre[...]

  • Page 61

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 61 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software 12.2.2.1 Interrupt Coalescing Interrupt coalescing is the combining of sever al interrupts into one interrupt. This feature is available[...]

  • Page 62

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 62 Order Number: 320183-004US 1. The application or framework initializes a session using the API session initialization function, this is a synchronous oper at ion. [...]

  • Page 63

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 63 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software 4. The Cryptographic API makes a call to an internal function which handles the operation and understands the message format to send to [...]

  • Page 64

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 64 Order Number: 320183-004US 2. Once the session has been initialized, the status of the session initialization is returned to the application or fr amework, along w[...]

  • Page 65

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 65 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software 12.4.2 Buffer List The Cryptographic API uses a scatter gather buffer list structure. This buffer structure is typically used where more[...]

  • Page 66

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 66 Order Number: 320183-004US Note: For details on the most optimal usage of the Cryptographic API, refer to the API manual for the specific inte rface in question . [...]

  • Page 67

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 67 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software 12.7.1.3 Stop Stop must be called prior to execution of the shutdown command. Once the Cryptographic API module is shutdown, it will no [...]

  • Page 68

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 68 Order Number: 320183-004US Note: The session context memory must be a vailable to the API for the dur ation of the session. Other session memory may be freed once [...]

  • Page 69

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 69 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software 1. P opulate the symmetric oper ation data structure 2. Call the symmetric operation perform API With the following steps which are used[...]

  • Page 70

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 70 Order Number: 320183-004US 5. Completion of the operation, see Section 12.8.1 Note: The API for TLS key operations is based on the TLS 1.1 standard (RFC 4346). Bac[...]

  • Page 71

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 71 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software server_random)[0..15] This maps to the Cryptogr aphic API’ s CpaCyK eyGenTlsOpData as follows: TLS User Defined Derivation: tlsOp = CP[...]

  • Page 72

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 72 Order Number: 320183-004US a. Prime Candidate b. Perf orm GCD test c. Perform F ermat test d. Number of Miller-R abin rounds e. P erform Lucas test • Output: T e[...]

  • Page 73

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 73 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software 12.8.3.5 DSA Signature Verification 1. Define a DSA callback function as per DS A generic callback API prototype, see the API manual. If[...]

  • Page 74

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 74 Order Number: 320183-004US 2. Allocate memory for the oper ation 3. Populate the appropriate Large Number operation data structure, see the API manual • Fill in [...]

  • Page 75

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 75 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software There are several open-source projects whic h implement these protocols. These include Openswan* (which implements IPSec), Open SSL* (wh[...]

  • Page 76

    Security Software—NPF Copyright Notic e Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 76 Order Number: 320183-004US Appendix A NPF Copyright Notice The following copyright notice is included because some of the content in this manual (specifically , Section 10.0, “Programming Model” on[...]