intel / QAT_Engine

Intel QuickAssist Technology( QAT) OpenSSL Engine (an OpenSSL Plug-In Engine) which provides cryptographic acceleration for both hardware and optimized software using Intel QuickAssist Technology enabled Intel platforms. https://developer.intel.com/quickassist
BSD 3-Clause "New" or "Revised" License
389 stars 123 forks source link
openssl-engine

Intel® QuickAssist Technology(QAT) OpenSSL* Engine

Intel® QuickAssist Technology OpenSSL* Engine (QAT_Engine) supports acceleration for both hardware as well as optimized software based on vectorized instructions. This change starting with the 3rd Generation Intel® Xeon® Scalable Processors family provides users more options to accelerate their workloads. The QAT OpenSSL* engine now supports the ability to accelerate from the stand OpenSSL* to basic Intel instruction set, to either Hardware acceleration path (via the qat_hw path) or via the optimized SW path (qat_sw lib). This document details the capabilities and interfaces for both internal libraries which maintaining the cohesiveness of being all packaged up with the QAT_Engine.

The image below illustrates the high-level software architecture of the QAT_Engine. Applications such as NGINX and HAProxy are common applications which interfaces to OpenSSL*. OpenSSL* is a toolkit for TLS/SSL protocols and has developed a modular system to plugin device-specific engines starting with version 1.1.0. As mentioned above, within the QAT_Engine are two separate internal entities by which acceleration can be performed. Depending on your particular use case, the QAT_Engine can be configured to meet your specific acceleration needs. This document details the capabilities of the QAT engine as well as the limitations. Both the hardware and software requirements are explained followed by detailed instructions how to install QAT_Engine. If you have any issues integrating the QAT_Engine, we’ve added a troubleshooting section.

drawing

Features

Features of the QAT_Engine are described here.

Limitations and Known Issues

Limitations and known issues for the QAT_Engine are described here.

Requirements

Installation Instructions

Installation consists of the following:

Install Prerequisites
Switch to Build the Intel® QuickAssist Technology OpenSSL* Engine - Example 5 and use the `make depend` target to clone and build the latest compatible versions of the dependant libraries automatically based on the target in the QAT Engine build configure.
qat_hw Prerequisites
Install the Intel® QuickAssist Technology Driver using instructions from the Getting Started Guide | Platform | Getting Started Guide | |----| -| |Intel® Xeon® with Intel® C62X Series Chipset
Intel® Atom™ Processor with Intel® C3xx series
Intel® Communications Chipset 8925 to 8955 Series|Intel® QAT Software for Linux\* - [Getting Started Guide Hardware v1.x CE Release](https://cdrdv2.intel.com/v1/dl/getContent/710059) | |Intel® Xeon® Scalable Processor family with Intel® QAT Gen4/Gen4m| Intel® QAT Software for Linux\* - [Getting Started Guide Hardware v2.0](https://cdrdv2.intel.com/v1/dl/getContent/632506) | Other technical collaterals of the Intel® QuickAssist Technology driver can be found in the below page. * [Intel® QuickAssist Technology](https://developer.intel.com/quickassist) ## Contiguous memory driver The Intel® QAT API requires many of the data structures (those that will be passed to the hardware) to be allocated in contiguous pinned memory in order to support DMA operations. You must either supply your own contiguous memory driver and make changes to the engine to make use of it or use one of the following drivers: ### User Space DMA-able Memory (USDM) Component The Intel® QAT Driver for QAT_HW comes with its own contiguous pinned memory driver that is compatible with the Intel® QAT OpenSSL\* Engine. The USDM component is of a higher quality than the qat\_contig\_mem driver provided within the Intel® QAT OpenSSL\* Engine, and is the preferred option. The USDM component is used by the Intel® QAT Driver itself, and also has the following additional features: * Support for virtualization * Support for configurable slab sizes * Support for configurable secure freeing of memory (overwrite with zeros) * Support for configurable slab caching * Support for newer kernels * Support for thread specific memory to avoid locks (QAT_HW Version 1.7 & 1.8 only) The USDM component is located within the Intel® QAT Driver for QAT_HW source code in the following subdirectory: `quickassist/utilities/libusdm_drv`. As the USDM component is also used by the QAT_HW driver itself it will have already been built when the driver was built. It may also already be loaded as well, and you can check by running `lsmod` and looking for usdm_drv in the list. If not present it can be loaded as follows: ```bash modprobe usdm_drv.ko ``` The USDM thread specific memory can be enabled in QAT_HW driver using the below configure flags in driver build which is only needed for multithreaded application for performance improvement. This is supported from version 4.20 of QAT_HW Version 1.7 driver only. ```bash ./configure --enable-icp-thread-specific-usdm --enable-128k-slab ``` **Note:** See [Limitations and Known Issues](docs/limitations.md) for multithreaded limitations, including performance with OpenSSL. #### Example contiguous memory driver - qat\_contig\_mem This step is not required if using the default USDM driver above. The Intel® QAT OpenSSL\* Engine comes with an example kernel space contiguous memory driver that can be used to try out operation of the engine. It is considered to be an example only and is not written to be a production quality driver. The use of the qat\_contig\_mem driver can be enabled using the configure option `--enable-qat_hw_contig_mem` that tells the build that the Intel® QAT OpenSSL\* Engine should be compiled to use the qat_contig_mem component instead of the USDM memory driver above. Building and loading the qat_contig_mem driver assuming: * The Intel® QAT OpenSSL\* Engine was cloned to its own location at the root of the drive: `/`. To build/install the qat\_contig\_mem driver follow these steps: ```bash cd /QAT_Engine/qat_contig_mem make make load make test ``` The expected output from `make test` should be something similar to the following: seg mapped to 0x7f9eedd6e000, virtualAddress in seg 0xffff880ac9c0c000, length 64 Hello world! # PASS Verify for QAT Contig Mem Test #### Shared Virtual Memory QAT gen4 devices(4xxx) supports Shared Virtual Memory (SVM) that allows the use of unpinned user space memory avoiding the memcpy of buffers to pinned contiguous memory. The SVM support in the driver enables passing of virtual addresses to the QAT hardware for processing acceleration requests, i.e. addresses are the same virtual addresses used in the calling process supporting Zero-copy. This Support in the QAT Engine can be enabled dynamically by setting `SvmEnabled = 1` and `ATEnabled = 1` in the QAT PF and VF device's driver config file(s) along with other prerequistes mentioned below. ### Prerequisites The Following parameter needs to be enabled in BIOS and is supported only in QAT gen4 devices. * Support for Shared Virtual Memory with Intel IOMMU * Enable VT-d * Enable ATS
qat_sw Prerequisites
- Verify qat_sw components are installed as described in [Software requirements](docs/software_requirements.md#qat_sw-requirements)
Install OpenSSL* (Note this step is not required if OpenSSL* is already installed) ## Build OpenSSL\* This step is not required if building the Intel® QAT OpenSSL\* Engine against system prebuilt OpenSSL\* . When using the prebuild system OpenSSL library the engine library is installed in the system OpenSSL engines directory. Clone OpenSSL\* from Github\* at the following location: git clone https://github.com/openssl/openssl.git It is recommended to checkout and build against the OpenSSL\* git tag specified in the Software Requirements section. Due to the nature of the Intel® QAT OpenSSL\* Engine being a dynamic engine it can only be used with shared library builds of OpenSSL\*. Note: It is not recommended to install the accelerated version of OpenSSL\* as your default system library. If you do, you may find that acceleration is used unexpectedly by other applications on the system resulting in undesired/unsupported behaviour. The `--prefix` can be used with the `./config` command to specify the location that `make install` will copy files to. Please see the OpenSSL\* INSTALL file for full details on usage of the `--prefix` option. With OpenSSL\* version 1.1.0 and on, binaries are installed in standard directories by default, and the addition of runpath directories is not done automatically. If you wish to install OpenSSL\* in a non-standard location (recommended), the runpath directories can be specified via the OpenSSL\* Configure command, which recognises the arguments `-rpath` and `-R` to support user-added rpaths. For convenience, a Makefile variable `LIBRPATH` has also been added which is defined as the full path to a subdirectory of the installation directory. The subdirectory is named `lib` by default. If you do not wish to use `LIBRPATH`, the rpath can be specified directly. The syntax for specifying a rpath is as follows: ./config [options] -Wl,-rpath,\${LIBRPATH} The `-rpath` can be replaced with `-R` for brevity. If you do not wish to use the built-in variable LIBRPATH, the syntax for specifying a rpath of `/usr/local/ssl/lib` for example would be: ./config [options] -Wl,-rpath,/usr/local/ssl/lib Alternatively, you can specify the rpath by adding it to the environment variable `LD_LIBRARY_PATH` via the command: export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:`RPATH` where `RPATH` is the full path(s) to the shared libraries. This is not the preferred method though. ` The following example is assuming: * The OpenSSL\* source was cloned from Github* to its own location at the root of the drive: `/`. * You want OpenSSL\* to be installed to `/usr/local/ssl`. An example build would be: ```bash cd /openssl ./config --prefix=/usr/local/ssl -Wl,-rpath,\${LIBRPATH} make depend (if recommended by the OpenSSL* build system) make make install ``` As the Intel® QAT OpenSSL\* Engine will be built as a dynamic engine it is important to tell OpenSSL\* where to find the dynamic engines at runtime. This is achieved by exporting the following environment variable (assuming the example paths above): OpenSSL 1.1.1: export OPENSSL_ENGINES=/usr/local/ssl/lib/engines-1.1 OpenSSL 3.0: export OPENSSL_ENGINES=/usr/local/ssl/lib64/engines-3 Note: This variable will need to be present in the environment whenever the engine is used and not needed when provider is used. Load/Initialize Engine using the OpenSSL\* config file is located [here](docs/openssl_config.md) Further information on building OpenSSL\* can be found in the INSTALL file distributed with the OpenSSL\* source code or on the official OpenSSL\* Wiki in the Compilation and Installation section:
Build the Intel® QuickAssist Technology OpenSSL* Engine ## Build the Intel® QuickAssist Technology OpenSSL\* Engine Clone the Github\* repository containing the Intel® QAT OpenSSL\* Engine: git clone https://github.com/intel/QAT_Engine.git When building it is possible to specify command line options that can be used to turn engine functionality on and off. The complete list of these options is available [here](docs/config_options.md). The prerequisite to run autogen.sh is to have autotools (autoconf, automake, libtool and pkg-config) installed in the system. ```bash cd /QAT_Engine ./autogen.sh ``` ./autogen.sh will regenerate autoconf tools files. ### Example Builds Here are a few example builds that demonstrate how the Intel® QAT OpenSSL\* Engine can be configured to use qat_hw and/or qat_sw.
Example 1: qat_hw target with OpenSSL\* built from source
The following example is assuming: * The Intel® QAT OpenSSL\* Engine was cloned to its own location at the root of the drive: `/`. * The Intel® QAT Driver version 1.7 or 2.0 was unpacked within `/QAT` and using the USDM component. * OpenSSL\* built from source is being used and installed to `/usr/local/ssl`. To build and install the Intel® QAT OpenSSL\* Engine: ```bash cd /QAT_Engine ./configure \ --with-qat_hw_dir=/QAT \ --with-openssl_install_dir=/usr/local/ssl make make install ``` In the above example this will create the file `qatengine.so` and copy it to `/usr/local/ssl/lib64/engines-3`. For building QAT Engine against qatlib(intree driver) from source which is installed to default location "/usr/local" use `--with-qat_hw_dir=/usr/local` or provide the path that is used in the prefix to build qatlib. If qatlib is installed via RPM (both library and development headers) then `-with-qat_hw_dir` is not needed as qatengine automatically picks qatlib libraries and headers from the default location `/usr/lib64`.
Example 2: qat_hw target with Prebuilt OpenSSL\*
The following example is assuming: * The Intel® QAT OpenSSL\* Engine was cloned to its own location at the root of the drive: `/`. * The Intel® QAT Driver was unpacked within `/QAT` and using the USDM component. * Prebuilt OpenSSL\* (both library and devel RPM packages) are installed in the system and the OpenSSL\* version is `3.0` or above. To build and install the Intel® QAT OpenSSL\* Engine: ```bash cd /QAT_Engine ./configure --with-qat_hw_dir=/QAT make make install ``` In the above example this will create the file `qatengine.so` and copy it to the engines dir of the system which can be checked using `pkg-config --variable=enginesdir libcrypto`. If qatlib is installed via RPM (both library and development headers) then `-with-qat_hw_dir` is not needed as qatengine automatically picks qatlib libraries and headers from the default location `/usr/lib64`.
Example 3: qat_hw + qat_sw target with Prebuilt OpenSSL\*
The following example is assuming: * The Intel® QAT OpenSSL\* Engine was cloned to its own location at the root of the drive: `/`. * The Intel® QAT Driver was unpacked within `/QAT` and using the USDM component. * Intel® Multi-Buffer Crypto for IPsec Library was installed to the default path * OpenSSL\* built from source is being used and installed to `/usr/local/ssl`. To build and install the Intel® QAT OpenSSL\* Engine: ```bash cd /QAT_Engine ./configure \ --with-qat_hw_dir=/QAT \ --enable-qat_sw \ --with-openssl_install_dir=/usr/local/ssl make make install ``` - In the above example this will create the file `qatengine.so` and copy it to `/usr/local/ssl/lib64/engines-3`. - AES-GCM operations are handled by qat_sw - Other cryptographic operations are handled by qat_hw
Example 4: qat_sw target with Prebuilt OpenSSL\*
The following example is assuming: * The Intel® QAT OpenSSL\* Engine was cloned to its own location at the root of the drive: `/`. * The Intel® Crypto Multi-buffer library was installed to the default path (/usr/local). * The Intel® Multi-Buffer crypto for IPsec Library was installed to its default path (/usr/). (Optional if QAT SW AES-GCM support is not needed). * Prebuilt OpenSSL\* from the system is used. To build and install the Intel® QAT OpenSSL\* Engine with QAT Software support: ```bash cd /QAT_Engine ./configure --enable-qat_sw make make install ``` In the above example, `--disable-qat_hw` needs to be provided if the system has qatlib installed. Note : `--enable-qat_sw` checks crypto_mb and IPSec_MB libraries in its respective default path (/usr/local/lib and /usr/lib) or in the path provided in the config flag `--with-qat_sw_crypto_mb_install_dir` (for crypto_mb) and `--with-qat_sw_ipsec_mb_install_dir` (for ipsec_mb). If any of the libraries is not installed then their corresponding algorithm support is disabled (crypto_mb library for PKE algorithms and IPSec_mb library for AES-GCM).

Example 5: Using `make depend` for building dependant libraries and build QAT Engine
This QAT Engine supports building and installing the dependant libraries automatically when the make option `make depend` is specified before make which clones the latest release of dependant libraries (OpenSSL, QAT_HW(QAT1.7, QAT1.8 & QAT2.0 OOT Linux driver), QAT_SW(ipp-crypto & ipsec_mb) based on the flags enabled in the QAT Engine build configure. ```bash cd /QAT_Engine git submodule update --init ./configure \ --with-qat_hw_dir=/QAT \ #For QAT_HW supported platforms --enable-qat_sw \ #For QAT_SW supported platforms --with-openssl_install_dir=/usr/local/ssl # OpenSSL install path make depend make make install ``` In the above example this will clone and install QAT Engine(qat_hw + qat_sw) along with their dependant libraries installed in the path specifed for QAT_HW and default path for QAT_SW (`/usr/local` for ipp-crypto & `/usr` for ipsec_mb) with qatengine.so library installed in the path `/usr/local/ssl/lib64/engines-3`. The dependant libaries are built and installed based on the QAT Engine build configure flags provided for qat_hw, qat_sw or qat_hw + qat_sw target using OpenSSL3.0. Please note `make depend` target is not supported in FreeBSD OS, Virtualized environment, BoringSSL, BabaSSL and qatlib dependency build. The Dependant library versions used are updated in [Software Requirements section](https://github.com/intel/QAT_Engine/blob/master/docs/software_requirements.md) and OpenSSL version is latest of 3.0
Enable plock optimization in QAT Engine for Multithread applications
Progressive Lock (plock) optimization in QAT Engine provides an alternative to pthread's rwlock as in Haproxy. This plock is an alternative to read/write locks in the pthread library and optimizes read/write locking with a series of atomic operations and there will be no more syscalls in case of contention. The benefit of plock is that it saves lot of CPU and improves performance with higher number of threads for multithread applications. In case of Haproxy, this can directly enabled in the Haproxy build with addition build flag "USE_PTHREAD_EMULATION=1". ### Build Flag to enable plock optimization QAT Engine generates dynamic libraries and currently enables Plock by preloading. - When compiling the qat engine, add the compilation option `--enable-qat_plock`, and the `libplock.so` will be generated. eg: ./configure --enable-qat_sw --enable-qat_plock --with-openssl_install_dir=${OPENSSL_INSTALL_DIR} - Set the environment variable ‘LD_PRELOAD’ to use the plock optimization. eg: export LD_PRELOAD = ${OPENSSL_INSTALL_DIR}/lib/engine-1.1/libplock.so Note: The `LD_PRELOAD` must be set before launching the multithread Application.
[For BoringSSL only] Build the Intel® QuickAssist Technology BoringSSL* Library Please refer [BoringSSL section](docs/bssl_support.md) for steps to build the Intel® QuickAssist Technology BoringSSL* library which supports RSA and ECDSA QAT Hardware and QAT Software Acceleration using BoringSSL.
Copy the Intel® QuickAssist Technology Driver config file(s) ## Copy the Intel® QuickAssist Technology Driver config files for qat_hw This step is not required for qat_sw target. The Intel® QAT OpenSSL\* Engine includes example conf files to use with the Intel® QAT Driver. The Intel® QAT OpenSSL\* Engine will not function with the default Intel® QAT Driver conf file because the default conf does not contain a `[SHIM]` section which the Intel® QAT OpenSSL\* Engine requires by default. The default section name in the QAT OpenSSL\* Engine can be modified if required by either using the engine ctrl command SET_CONFIGURATION_SECTION_NAME or by setting the environment variable "QAT_SECTION_NAME". The conf files are located at: /path/to/qat_engine/qat_hw_config The files are grouped by acceleration device(dh895xcc or c6xx or c3xxx or 200xx or c4xxx or 4xxx), please choose the files appropriate to your acceleration device only. The files are also split into `multi_process` and `multi_thread`. If your application runs one (or very few) processes, but has multiple threads in each process, each accessing the acceleration device, then you should pick the `multi_thread` config files. An example of this is a webserver that creates a new thread for each incoming connection. If your application scales by creating new processes, then you should pick the `multi_process` config files. An example of this is an event driven application that runs as a single thread in an event loop. In this type of application it is usual for the application to create at least one new process for each cpu core you want to utilize. For event driven polling based application, change the parameter `Cy$nIsPolled=1` to `Cy$nIsPolled=2` for each instances($n) in the respective config file to use event driven polling support. Event driven config files are only supported in Linux. Once you have decided which config file you should use, or created your own you should follow the procedure below to install it: 1. Stop the acceleration driver as described in the Section 3.4 Starting/Stopping the Acceleration software from the Getting Started Guide available in [Intel® QuickAssist Technology Driver](https://developer.intel.com/quickassist) 2. Copy the appropriate `.conf` file to `/etc` for n number of QAT devices 3. Start the acceleration driver as described in the Section 3.4 Starting/Stopping the Acceleration software from the Getting Started Guide available in [Intel® QuickAssist Technology Driver](https://developer.intel.com/quickassist)
Test the Intel® QuickAssist Technology OpenSSL* Engine ## Test the Intel® QuickAssist Technology OpenSSL\* Engine Run this command to verify the Intel® QAT OpenSSL\* Engine is loaded correctly: This should not be used to determine QAT Engine capabilities as it will not display all the algorithms that are supported in QAT Engine. ```text cd /path/to/openssl_install/bin ./openssl engine -t -c -v qatengine ``` qat_hw target output will be: ```text (qatengine) Reference implementation of QAT crypto engine(qat_hw) [RSA, DSA, DH, AES-128-CBC-HMAC-SHA1, AES-128-CBC-HMAC-SHA256, AES-256-CBC-HMAC-SHA1, AES-256-CBC-HMAC-SHA256, TLS1-PRF, HKDF, X25519, X448] [ available ] ENABLE_EXTERNAL_POLLING, POLL, SET_INSTANCE_FOR_THREAD, GET_NUM_OP_RETRIES, SET_MAX_RETRY_COUNT, SET_INTERNAL_POLL_INTERVAL, GET_EXTERNAL_POLLING_FD, ENABLE_EVENT_DRIVEN_POLLING_MODE, GET_NUM_CRYPTO_INSTANCES, DISABLE_EVENT_DRIVEN_POLLING_MODE, SET_EPOLL_TIMEOUT, SET_CRYPTO_SMALL_PACKET_OFFLOAD_THRESHOLD, ENABLE_INLINE_POLLING, ENABLE_HEURISTIC_POLLING, GET_NUM_REQUESTS_IN_FLIGHT, INIT_ENGINE, SET_CONFIGURATION_SECTION_NAME, ENABLE_SW_FALLBACK, HEARTBEAT_POLL, DISABLE_QAT_OFFLOAD ``` qat_sw target output will be: ```text (qatengine) Reference implementation of QAT crypto engine(qat_sw) [RSA, id-aes128-GCM, id-aes192-GCM, id-aes256-GCM, X25519] [ available ] ENABLE_EXTERNAL_POLLING, POLL, ENABLE_HEURISTIC_POLLING, GET_NUM_REQUESTS_IN_FLIGHT, INIT_ENGINE ``` Detailed information about the engine specific messages is available [here](docs/engine_specific_messages.md). Also `./openssl engine -t -c -vvvv qatengine` gives brief description about each ctrl command.
Testing the Intel® QuickAssist Technology OpenSSL* Engine using OpenSSL* speed utility ## Testing the Intel® QuickAssist Technology OpenSSL\* Engine using OpenSSL\* speed utility ```text cd /path/to/openssl_install/bin qat_hw * RSA 2K * Asynchronous ./openssl speed -engine qatengine -elapsed -async_jobs 72 rsa2048 * Synchronous ./openssl speed -engine qatengine -elapsed rsa2048 * OpenSSL Software ./openssl speed -elapsed rsa2048 * ECDH Compute Key * Asynchronous ./openssl speed -engine qatengine -elapsed -async_jobs 36 ecdh * Synchronous ./openssl speed -engine qatengine -elapsed ecdh * OpenSSL Software ./openssl speed -elapsed ecdh * Chained Cipher: aes-128-cbc-hmac-sha1 * Asynchronous ./openssl speed -engine qatengine -elapsed -async_jobs 128 -multi 2 -evp aes-128-cbc-hmac-sha1 * Synchronous ./openssl speed -engine qatengine -elapsed -multi 2 -evp aes-128-cbc-hmac-sha1 * OpenSSL Software ./openssl speed -elapsed -multi 2 -evp aes-128-cbc-hmac-sha1 qat_sw (Intel(R) Crypto Multi-buffer library) * RSA 2K ./openssl speed -engine qatengine -elapsed -async_jobs 8 rsa2048 * ECDH X25519 ./openssl speed -engine qatengine -elapsed -async_jobs 8 ecdhx25519 * ECDH P-256 ./openssl speed -engine qatengine -elapsed -async_jobs 8 ecdhp256 * ECDSA P-256 ./openssl speed -engine qatengine -elapsed -async_jobs 8 ecdsap256 * ECDH P-384 ./openssl speed -engine qatengine -elapsed -async_jobs 8 ecdhp384 * ECDSA P-384 ./openssl speed -engine qatengine -elapsed -async_jobs 8 ecdsap384 qat_sw (Intel(R) Multi-Buffer Crypto for IPsec) * AES-128-GCM ./openssl speed -engine qatengine -elapsed -evp aes-128-gcm * AES-192-GCM ./openssl speed -engine qatengine -elapsed -evp aes-192-gcm * AES-256-GCM ./openssl speed -engine qatengine -elapsed -evp aes-256-gcm ```
Testing the Intel® QuickAssist Technology OpenSSL* Engine using testapp utility ## Testing the Intel® QuickAssist Technology OpenSSL* Engine using testapp utility ```text cd /path/to/qat_engine make test ./testapp.sh QAT_HW (For testing algorithms supported by QAT_HW) ./testapp.sh QAT_SW (For testing algorithms supported by QAT_SW) ``` The `testapp.sh` script will run the corresponding functional tests supported by QAT_HW and QAT_SW. Please note that the QAT Engine should be built with that support for the tests. Additional information for testapp tests available with the help option `./testapp -help`

Troubleshooting

Troubleshooting information is available here.

Further Reading

Links to additional content is available here.

Licensing Information

Licensing information is available here.

Legal

Legal information is available here.