Manual Intel EP80579

76 pages 0.65 mb
Download

Go to site of 76

Summary
  • Intel EP80579 - page 1

    Order Number: 320 183-004US Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology Programmer’s Guide August 2009 ...

  • Intel EP80579 - page 2

    Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 2 Order Number: 320183-004US Legal Lines and Discla ime rs INFORMA TION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH IN TEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHE RWISE, T O ANY INTELL ECTUA L PRO PER TY RIGHT S IS GR ...

  • Intel EP80579 - page 3

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 3 Contents—Security Software Contents 1.0 Introduction ......... ......... .......... ........... ........ ........... .......... ......... .......... ........... ........ .... 7 1.1 What’s New in this Chap ter ...... ...

  • Intel EP80579 - page 4

    Security Software—Contents Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 4 Order Number: 320183-004US 7.2 Overview ........... ........... .......... ......... .......... ........... .......... ......... .......... ........... .... 32 7.3 Functional Description .......... ........... ..... ...

  • Intel EP80579 - page 5

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 5 Contents—Security Software 12.4 Data Format ............... .......... ......... .......... ........... .......... ........... ........... .......... .... 64 12.4.1 Flat Buffers ............. ........... .......... .. ...

  • Intel EP80579 - page 6

    Security Software—Revision History Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 6 Order Number: 320183-004US 12 Debug APIs .......... ........... .......... ......... .......... ........... ........ ........... .......... ......... ..........56 13 Cryptographic Common Inte rface Summary ( ...

  • Intel EP80579 - page 7

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 7 Introduction—Security Software 1.0 Introduction 1.1 What’s New in this Chapter Section 1.6 : New Note explaining cryptogr aphic framework “sh im” support. 1.2 About this Document The API Reference Manuals listed ...

  • Intel EP80579 - page 8

    Security Software—Introduction Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 8 Order Number: 320183-004US 1.4 Related Information Note: For conv enience, in this document [GET_ST AR TED_GD] refers to either the Linux or FreeBSD guide . R efer to the appropriate guide for your ope r ating s ...

  • Intel EP80579 - page 9

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 9 Introduction—Security Software CBC Cipher Block Chaining mod e. This is a mode of oper ation of a block cipher that combines the cipherte xt of one block with the plainte xt of the next block. CDRAM Coherent DRAM CTR ...

  • Intel EP80579 - page 10

    Security Software—Introduction Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 10 Order Number: 320183-004US 1.6 Features Supported in this Release The features provided by this software in this release are as follows: • Acceleration of cryptographic oper ations using the “lookaside” m ...

  • Intel EP80579 - page 11

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 11 Architectural Overview—Security Software Part 1: Architectural Overview This section contains the following chapters: • Chapter 2.0, “Silicon Overv iew” • Chapter 3.0, “Software Overview” • Chapter 4.0, ...

  • Intel EP80579 - page 12

    Security Software—Silicon Overview Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 12 Order Number: 320183-004US 2.0 Silicon Overview 2.1 What’s New in this Chapter No updates in this release. 2.2 High Level Overview The Intel ® EP80579 Integrated Processor is a System On a Chip (SOC), in ...

  • Intel EP80579 - page 13

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 13 Silicon Overview—Security Software provides 64 rings (circular buffers) that can be used for message passing between software running on the IA core and firmw are running on the ASU . These features are described in ...

  • Intel EP80579 - page 14

    Security Software—Software Overview Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 14 Order Number: 320183-004US 3.0 Software Overview This chapter presents the high-level architectu re of the Software for Intel ® EP80579 Integrated Processor product line, using concepts from the "4+1 ...

  • Intel EP80579 - page 15

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 15 Software Overview—Security Software event this is not po ssible, the firmware will determine the sizes of these regions and set them accordingly . See Chapter 8.0, “ ASD Hardware Services” for detai ls on how thi ...

  • Intel EP80579 - page 16

    Security Software—Software Overview Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 16 Order Number: 320183-004US The software components at this lay er in the current release are as follows: • Lookaside Crypto Access Layer: This component implements the Cryptographic API (shown as LAC API ...

  • Intel EP80579 - page 17

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 17 Software Overview—Security Software configuration par ameters for example number of sessions to be supported, buffer pool sizes, and so on. See Chap te r 7.0, “ ASD Module Arc hitecture Over view” for more detail ...

  • Intel EP80579 - page 18

    Security Software—Software Overview Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 18 Order Number: 320183-004US 3.5 Process View This section describes the context in which the EP80579 security software code is executed, which is important in terms of understanding concurrency , or where l ...

  • Intel EP80579 - page 19

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 19 Software Overview—Security Software § § Table 5. Deployment View Kernel Module Component icp_asd.ko Acceleration S ystem Driver icp_crypto.ko Lookaside Crypto Acces s Layer QA T Access Layer icp_debug.k o Debug Inf ...

  • Intel EP80579 - page 20

    Security Soft ware—Intel ® QuickAssist Technology Cryptogr aphic API Ar ch itecture Over v iew Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 20 Order Number: 320183-004US 4.0 Intel ® QuickAssist Technology Cryptographic API Architecture Overview 4.1 What’s New in this Chapter No update ...

  • Intel EP80579 - page 21

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 21 Intel ® QuickAssist Technology Cryptographic AP I Architec ture Overvi ew—Securi ty Software the operation is performed ov er the full pack et in a single request. Partial-packet support is provided for Lookaside Ci ...

  • Intel EP80579 - page 22

    Security Soft ware—Intel ® QuickAssist Technology Cryptogr aphic API Ar ch itecture Over v iew Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 22 Order Number: 320183-004US 4.2.1.7 Key Generation EP80579 security software supports the following K ey Gener ation operations: •S S L / T L S ...

  • Intel EP80579 - page 23

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 23 Intel ® QuickAssist Technology Cryptographic AP I Architec ture Overvi ew—Securi ty Software 4.4 Lookaside Security Algo rithms High Level Overview The following sections provide a high lev el overview of the algori ...

  • Intel EP80579 - page 24

    Security Soft ware—Intel ® QuickAssist Technology Cryptogr aphic API Ar ch itecture Over v iew Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 24 Order Number: 320183-004US Note: Exclusive disjunction (u sual symbol xor) is a logical oper ator that results in true if one of the oper ands (n ...

  • Intel EP80579 - page 25

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 25 Intel ® QuickAssist Technology Cryptographic AP I Architec ture Overvi ew—Securi ty Software Note: A stream cipher operates on individual digits each one at a time. (A)RC4 (A)RC4 generates a pseudor andom stream of ...

  • Intel EP80579 - page 26

    Security Soft ware—Intel ® QuickAssist Technology Cryptogr aphic API Ar ch itecture Over v iew Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 26 Order Number: 320183-004US GCM “Galois/Counter Mode (GCM) is a block cipher mode of operation that uses univ ersal hashing over a binary Galois ...

  • Intel EP80579 - page 27

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 27 Intel ® QuickAssist Technology Cryptographic AP I Architec ture Overvi ew—Securi ty Software 4.4.3.2 RSA Cryptographic Standard RSA may be used for encryption or sign ature gener ation. The Chinese Remainder Th eo r ...

  • Intel EP80579 - page 28

    Security Soft ware—Intel ® QuickAssist Technology Cryptogr aphic API Ar ch itecture Over v iew Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 28 Order Number: 320183-004US Prime number testing can gain a performance improvement through par allelism of the requests sent through the Cryptogr ...

  • Intel EP80579 - page 29

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 29 QAT Access Layer Architecture Overvie w—Security Software 5.0 QAT Access Layer Architecture Overview 5.1 What’s New in this Chapter No updates in this release. 5.2 Overview The QA T Access Layer (QA T -AL) is respo ...

  • Intel EP80579 - page 30

    Security Software—Debug Comp onent Arc hitecture Overview Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 30 Order Number: 320183-004US 6.0 Debug Component Architecture Overview 6.1 What’s New in this Chapter • No updates in this release. 6.2 Overview Debugging an application when proble ...

  • Intel EP80579 - page 31

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 31 Debug Component Architecture Overview—Se curity Software 6.5 Data Structure Dump Note: The Data Dump feature is not supported in the current softw are release. Many of the software components in the Intel ® EP80579 ...

  • Intel EP80579 - page 32

    Security Software—ASD Module Architecture Overview Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 32 Order Number: 320183-004US 7.0 ASD Module Architecture Overview 7.1 What’s New in this Chapter • No updates in this release. 7.2 Overview The Acceleration S ystem Driver is the kern el m ...

  • Intel EP80579 - page 33

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 33 ASD Module Architecture Overview—Security Software Table 6. Cryptographic System Resource Variables Parameter Name Description Default Value NUM_CONCURRENT_LAC_SYMMETRIC_REQUESTS Number of concurrent Cryptograp hic ( ...

  • Intel EP80579 - page 34

    Security Software— Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 34 Order Number: 320183 7.4 Boot Time Configuration Instructions A user space c o nfiguration program (asd_c t l) is included in the release package and is run automatically as part of the load script. The configuration file ...

  • Intel EP80579 - page 35

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183 35 ASD Hardware Services—Security Software 8.0 ASD Hardware Services 8.1 What’s New in this Chapter • No updates in this rele ase. 8.2 Overview This section describes the hardware-related services that the Acceleration Sy ...

  • Intel EP80579 - page 36

    Security Software—ASD Hardware Services Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 36 Order Number: 320183 The sequence diagram in Figure 7 illustrates how this oper ates: Table 8. QAT-AL ISR Primitives Function/Symbol Description Usage QatComms_intr This is the QAT -AL main ISR functio ...

  • Intel EP80579 - page 37

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183 37 ASD Hardware Services—Security Software Figure 7. ISR Sequence Diag ram R i ng Co nt rol l er I nt er r upt occur s In terr up t QAT - AL In it Q A T A L Cr ea t e BH R egi st er BH Schedul e f uncti on R egi st er t he i ...

  • Intel EP80579 - page 38

    Security Software—ASD Hardware Services Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 38 Order Number: 320183 8.3.2 NCDRAM/CDRAM Interface 8.3.2.1 Development Board Environment The EP80579 with QuickAss ist SKUs provide a dire ct non-coherent (NCDRAM) path between AIOC de vices and the Mem ...

  • Intel EP80579 - page 39

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183 39 ASD Hardware Services—Security Software Figure 8. Intel ® EP80579 Integrated Processor with Intel ® QuickAssist Technology Block Diagram Acceleration and I/O Complex ‡ Enabling so ftware required. IMCH PCI Express Inte ...

  • Intel EP80579 - page 40

    Security Software—ASD Hardware Services Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 40 Order Number: 320183 8.3.2.1.1 ACPI ASD uses the ACPI mechanism to retrieve th e memory region information set up by the pre-boot firmware. This mechanism is dependent on an ACPI BI OS which su pports ...

  • Intel EP80579 - page 41

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 41 Using the API—Security Software Part 2: Using the API This part of the document provides an overview of how to use the EP80579 security software acceleration APIs to build an application. Individual APIs are describe ...

  • Intel EP80579 - page 42

    Security Software—Introd uction to Use Cases Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 42 Order Number: 320183-004US 9.0 Introduction to Use Cases This chapter discusses what’s in volved in building an application using the Intel ® EP80579 Software for Securi ty Applications on Inte ...

  • Intel EP80579 - page 43

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 43 Programming Model—Security Software 10.0 Programming Model 10.1 What’s New in this Chapter No updates in this release. 10.2 Overview There are two different “categories” of API supplied with EP80579 integrated ...

  • Intel EP80579 - page 44

    Security Software—Programming Model Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 44 Order Number: 320183-004US 10.3.2 Data Buffer Models Data buffers that are passed across the API interface in one of the following formats: • Flat Buffers represent a single region of physically contiguo ...

  • Intel EP80579 - page 45

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 45 Programming Model—Security Software Because it is blocking, synchronous mode should not be used in contexts where blocking is not allowed, for example in interrupt context on Linux. 10.3.4 Pre-Registration In a numbe ...

  • Intel EP80579 - page 46

    Security Software—Programming Model Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 46 Order Number: 320183-004US • There is a 1:1 relationship between an asynchronous request call and a completion callback (response). [NPF API] allows for 1:N relationships here. The complexity associated ...

  • Intel EP80579 - page 47

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 47 Programming Model—Security Software — Oper ation type. F or the typical case, where the same callback data structure type is used for multiple different functions (operation t ypes) on a given API, this is used to ...

  • Intel EP80579 - page 48

    Security Software—Debugging Applications Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 48 Order Number: 320183-004US 11.0 Debugging Applications 11.1 What’s New in this Chapter • No updates in this release. 11.2 Management Interface Layer (MIL) Introduction A reference application call ...

  • Intel EP80579 - page 49

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 49 Debugging Applications—Security Software The MIL application is invoke d from the command line using the following syntax: debugmgr {command} where {command} is one of the following: —h e l p —D e b u g E n a b l ...

  • Intel EP80579 - page 50

    Security Software—Debugging Applications Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 50 Order Number: 320183-004US 11.3.1 help The help command lists all the user space commands av ailable. 11.3.2 DebugEnable The DebugEnable command enables the debu g facility within the EP80579 security ...

  • Intel EP80579 - page 51

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 51 Debugging Applications—Security Software 11.3.3 DebugDisable The DebugDisable command disables the de bug facility within the EP80579 se curity software acceler ation subsystem. Specifically , it unregisters the SEN ...

  • Intel EP80579 - page 52

    Security Software—Debugging Applications Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 52 Order Number: 320183-004US 11.3.4 VersionDumpAll This command results in the version of all components within the software stack being logged to the syslog file as specified in Figure 1 3 . Figure 13. ...

  • Intel EP80579 - page 53

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 53 Debugging Applications—Security Software 11.3.5 setHC <timeout> This command is used to specify the maxi mum time interv al for any one thread to punch the liveness value. When the timeou t is ex ceeded, a thre ...

  • Intel EP80579 - page 54

    Security Software—Debugging Applications Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 54 Order Number: 320183-004US 11.3.6 SystemHealthCheck This command causes the liveness of e ach ac tive thread in the system to be queried and displays this information in the syslog file as shown in Fi ...

  • Intel EP80579 - page 55

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 55 Debugging Applications—Security Software 11.3.7 DataDump Note: The Data Dump feature is not supported in the current softw are release. This command is used to generate a data dump from the entire acceleration subsys ...

  • Intel EP80579 - page 56

    Security Software—Debugging Applications Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 56 Order Number: 320183-004US 11.3.8 SetFileName <filename> This command is used to set the name of the system log file which contains all the debug information. The maximum length of the <filen ...

  • Intel EP80579 - page 57

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 57 Debugging Applications—Security Software § § icp_DccLiv enessR esponseSizeGet The user calls this API to get the buffer size to be allocated for the retrieval of system response information. The user should free th ...

  • Intel EP80579 - page 58

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 58 Order Number: 320183-004US 12.0 Using the Intel ® QuickAssist Technology Cryptographic API The Intel ® QuickAssist T echnology Cryptographic API for the Lookasid ...

  • Intel EP80579 - page 59

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 59 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software contains the API for key gener ation. The file cpa_cy_ran d.h contains the API for random number gener ation. • Asymmetric : The PKE A ...

  • Intel EP80579 - page 60

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 60 Order Number: 320183-004US 12.2.1 Modes of Operation The Cryptographic API may be called in asynchronous or synchronous modes. Note: Asynchronous mode is prefe rre ...

  • Intel EP80579 - page 61

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 61 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software 12.2.2.1 Interrupt Coalescing Interrupt coalescing is the combining of sever al interrupts into one interrupt. This feature is available ...

  • Intel EP80579 - page 62

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 62 Order Number: 320183-004US 1. The application or framework initializes a session using the API session initialization function, this is a synchronous oper at ion. ...

  • Intel EP80579 - page 63

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 63 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software 4. The Cryptographic API makes a call to an internal function which handles the operation and understands the message format to send to ...

  • Intel EP80579 - page 64

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 64 Order Number: 320183-004US 2. Once the session has been initialized, the status of the session initialization is returned to the application or fr amework, along w ...

  • Intel EP80579 - page 65

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 65 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software 12.4.2 Buffer List The Cryptographic API uses a scatter gather buffer list structure. This buffer structure is typically used where more ...

  • Intel EP80579 - page 66

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 66 Order Number: 320183-004US Note: For details on the most optimal usage of the Cryptographic API, refer to the API manual for the specific inte rface in question . ...

  • Intel EP80579 - page 67

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 67 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software 12.7.1.3 Stop Stop must be called prior to execution of the shutdown command. Once the Cryptographic API module is shutdown, it will no ...

  • Intel EP80579 - page 68

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 68 Order Number: 320183-004US Note: The session context memory must be a vailable to the API for the dur ation of the session. Other session memory may be freed once ...

  • Intel EP80579 - page 69

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 69 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software 1. P opulate the symmetric oper ation data structure 2. Call the symmetric operation perform API With the following steps which are used ...

  • Intel EP80579 - page 70

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 70 Order Number: 320183-004US 5. Completion of the operation, see Section 12.8.1 Note: The API for TLS key operations is based on the TLS 1.1 standard (RFC 4346). Bac ...

  • Intel EP80579 - page 71

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 71 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software server_random)[0..15] This maps to the Cryptogr aphic API’ s CpaCyK eyGenTlsOpData as follows: TLS User Defined Derivation: tlsOp = CP ...

  • Intel EP80579 - page 72

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 72 Order Number: 320183-004US a. Prime Candidate b. Perf orm GCD test c. Perform F ermat test d. Number of Miller-R abin rounds e. P erform Lucas test • Output: T e ...

  • Intel EP80579 - page 73

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 73 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software 12.8.3.5 DSA Signature Verification 1. Define a DSA callback function as per DS A generic callback API prototype, see the API manual. If ...

  • Intel EP80579 - page 74

    Security Software—Using the Intel ® QuickAssist Technology Cryptographic API Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 74 Order Number: 320183-004US 2. Allocate memory for the oper ation 3. Populate the appropriate Large Number operation data structure, see the API manual • Fill in ...

  • Intel EP80579 - page 75

    Intel ® EP80579 Software for Security Applications on Intel ® QuickAssist Technology August 2009 PG Order Number: 320183-004US 75 Using the Intel ® QuickAssist Technology Crypto graphic API—Secur ity Software There are several open-source projects whic h implement these protocols. These include Openswan* (which implements IPSec), Open SSL* (wh ...

  • Intel EP80579 - page 76

    Security Software—NPF Copyright Notic e Intel ® EP80579 Software for Security Applicati ons on Intel ® QuickAssist Technolo gy PG August 2009 76 Order Number: 320183-004US Appendix A NPF Copyright Notice The following copyright notice is included because some of the content in this manual (specifically , Section 10.0, “Programming Model” on ...

Manufacturer Intel Category Security Camera

Documents that we receive from a manufacturer of a Intel EP80579 can be divided into several groups. They are, among others:
- Intel technical drawings
- EP80579 manuals
- Intel product data sheets
- information booklets
- or energy labels Intel EP80579
All of them are important, but the most important information from the point of view of use of the device are in the user manual Intel EP80579.

A group of documents referred to as user manuals is also divided into more specific types, such as: Installation manuals Intel EP80579, service manual, brief instructions and user manuals Intel EP80579. Depending on your needs, you should look for the document you need. In our website you can view the most popular manual of the product Intel EP80579.

Similar manuals

A complete manual for the device Intel EP80579, how should it look like?
A manual, also referred to as a user manual, or simply "instructions" is a technical document designed to assist in the use Intel EP80579 by users. Manuals are usually written by a technical writer, but in a language understandable to all users of Intel EP80579.

A complete Intel manual, should contain several basic components. Some of them are less important, such as: cover / title page or copyright page. However, the remaining part should provide us with information that is important from the point of view of the user.

1. Preface and tips on how to use the manual Intel EP80579 - At the beginning of each manual we should find clues about how to use the guidelines. It should include information about the location of the Contents of the Intel EP80579, FAQ or common problems, i.e. places that are most often searched by users in each manual
2. Contents - index of all tips concerning the Intel EP80579, that we can find in the current document
3. Tips how to use the basic functions of the device Intel EP80579 - which should help us in our first steps of using Intel EP80579
4. Troubleshooting - systematic sequence of activities that will help us diagnose and subsequently solve the most important problems with Intel EP80579
5. FAQ - Frequently Asked Questions
6. Contact detailsInformation about where to look for contact to the manufacturer/service of Intel EP80579 in a specific country, if it was not possible to solve the problem on our own.

Do you have a question concerning Intel EP80579?

Use the form below

If you did not solve your problem by using a manual Intel EP80579, ask a question using the form below. If a user had a similar problem with Intel EP80579 it is likely that he will want to share the way to solve it.

Copy the text from the picture

Comments (0)