User Manual

SCSI Commands Reference Manual, Rev. J 213
www.seagate.com Direct Access Block commands (SPC-5 and SBC-4)
3.43 SECURITY PROTOCOL OUT command
The SECURITY PROTOCOL OUT command (see table 183) is used to send data to the logical unit. The data sent specifies one or
more operations to be performed by the logical unit. The format and function of the operations depends on the contents of the
SECURITY PROTOCOL field (see table 184). Depending on the protocol specified by the SECURITY PROTOCOL field, the
application client may use the SECURITY PROTOCOL IN command (see 3.42) to retrieve data derived from these operations.
SECURITY PROTOCOL field
The SECURITY PROTOCOL field (see table 184) specifies which security protocol is being used.
SECURITY PROTOCOL SPECIFIC field
The contents of the SECURITY PROTOCOL SPECIFIC field depend on the protocol specified by the SECURITY PROTOCOL field (see table 184).
Table 183 SECURITY PROTOCOL OUT command
Bit
Byte
7 6 5 4 3 2 1 0
0 OPERATION CODE (B5h)
1 SECURITY PROTOCOL
2
SECURITY PROTOCOL SPECIFIC
3
4 INC_512 Reserved
5 Reserved
6 (MSB)
TRANSFER LENGTH. . .
9 (LSB)
10 Reserved
11 CONTROL
Table 184 SECURITY PROTOCOL field in SECURITY PROTOCOL OUT command
Code Description Reference
00h Reserved
01h - 06h Defined by the TCG https://www.trustedcomputinggroup.org
07h CbCS SPC-5
08h - 1Fh Reserved
20h Tape Data Encryption SSC-3
21h Data Encryption Configuration ADC-3
22h - 40h Reserved
41h IKEv2-SCSI SPC-5
42h - EBh Reserved
ECh JEDEC Universal Flash Storage UFS
EDh SDcard TrustedFlash Security Systems Specification http://www.sdcard.org/
EEh Authentication in Host Attachments of Transient Storage Devices IEEE 1667
EFh ATA Device Server Password Security SAT-3
F0h - FFh Vendor specific