User Manual

SCSI Commands Reference Manual, Rev. J 204
www.seagate.com Direct Access Block commands (SPC-5 and SBC-4)
3.42 SECURITY PROTOCOL IN command
3.42.1 Command description
The SECURITY PROTOCOL IN command (see table 173) is used to retrieve security protocol information or the results of one or
more SECURITY PROTOCOL OUT commands.
SECURITY PROTOCOL field
The SECURITY PROTOCOL field (see table 174) specifies which security protocol is being used.
The contents of the SECURITY PROTOCOL SPECIFIC field depend on the protocol specified by the SECURITY PROTOCOL field (see table 174).
Table 173 SECURITY PROTOCOL IN command
Bit
Byte
7 6 5 4 3 2 1 0
0 OPERATION CODE (A2h)
1 SECURITY PROTOCOL
2
SECURITY PROTOCOL SPECIFIC
3
4 INC_512 Reserved
5 Reserved
6 (MSB)
ALLOCATION LENGTH. . .
9 (LSB)
10 Reserved
11 CONTROL
Table 174 SECURITY PROTOCOL field in SECURITY PROTOCOL IN command
Code Description Reference
00h Security protocol information 3.42.2
01h - 06h Defined by the TCG https://www.trustedcomputinggroup.org
07h CbCS SPC-5
08h - 1Fh Reserved
20h Tape Data Encryption SSC-3
21h Data Encryption Configuration ADC-3
22h - 3Fh Reserved
40h SA Creation Capabilities SPC-5
41h IKEv2-SCSI SPC-5
42h to EBh Reserved
ECh JEDEC Universal Flash Storage UFS
EDh SDcard TrustedFlash Security Systems Specification 1.1.3 http://www.sdcard.org/
EEh Authentication in Host Attachments of Transient Storage Deices IEEE 1667
EFh ATA Device Server Password Security SAT-3
F0h - FFh Vendor specific