搜尋此網誌

2012年9月5日 星期三

SECURITY PROTOCOL IN(A2h)


SECURITY PROTOCOL IN command
The SECURITY PROTOCOL IN command is used to retrieve security protocol information or the results of one or more SECURITY PROTOCOL OUT commands.
Byte                              Bit
7
6
5
4
3
2
1
0
0
OPERATION CODE (A2h)
1
SECURITY PROTOCOL
2
SECURITY PROTOCOL SPECIFIC
3
4
INC_512
Reserved
5
Reserved
6
(MSB)

ALLOCATION LENGTH
(LSB)
7
8
9
10
Reserved
11
CONTROL
The SECURITY PROTOCOL field specifies which security protocol is being used.
Table — SECURITY PROTOCOL field in SECURITY PROTOCOL IN command
Code
Description
Reference
00h
Security protocol information
SPC 7.6.1
01h to 06h
Defined by the TCG
SPC 3.1.176
07h
CbCS
SPC 7.6.4
08h to 1Fh
Reserved

20h
Tape Data Encryption
SSC-3
21h
Data Encryption Configuration
ADC-3
22h to 3Fh
Reserved

40h
SA Creation Capabilities
SPC 7.6.2
41h
IKEv2-SCSI
SPC 7.6.3
42h to ECh
Reserved

EDh
SD Card TrustedFlash specification
SPC 3.1.145
EEh
Authentication in Host Attachments of Transient Storage Devices
IEEE 1667
EFh
ATA Device Server Password Security
SAT-2
F0h to FFh
Vendor Specific

Note - ROW: SECURITY PROTOCOL field code values 22h to 2Fh are tentatively reserved for SSC-x uses.

沒有留言:

張貼留言