搜尋此網誌

2012年9月7日 星期五

TRUSTED SEND(5Eh) - ATA Trusted Commands


TRUSTED SEND(5Eh) PIO Data-Out
This 28-bit command is mandatory for devices implementing the Trusted Computing feature set.
The TRUSTED SEND command is used to send data to the device. The data sent contains one or more Security Protocol specific instructions to be performed by the device. The host uses TRUSTED RECEIVE commands to retrieve any data resulting from these instructions.
Any association between a TRUSTED SEND command and a subsequent TRUSTED RECEIVE command depends on the protocol specified by the Security Protocol field.  Each protocol shall specify whether:
A.        the device shall complete the command with normal status as soon as it determines the data has been received without error. An indication that the data has been processed is obtained by sending a TRUSTED RECEIVE command and receiving the results in the associated data transfer; or
B.        the device shall complete the command with normal status only after the data has been processed without error and an associated TRUSTED RECEIVE command is not required.
There may be intentional side effects, depending on the trusted operation requested. Most trusted operations have no side effects, but there may be some allowable exceptions. For example, a request to lock the device is expected to cause subsequent reads or writes to fail.
The completion of background activity resulting from a trusted command shall not return command aborted for any outstanding queued commands.
The format of the data and some of the parameters depends on the protocol specified by the Security Protocol field.
Inputs:
Register
7
6
5
4
3
2
1
0
Feature
Security Protocol
Sector Count
Transfer Length (7:0)
LBA Low(7:0)
Transfer Length (15:8)
LBA Mid(15:8)
SP Specific(7:0) - Security Protocol Specific
LBA High(23:16)
SP Specific(15:8) - Security Protocol Specific
Device
obs
N/A
obs
TD
LBA(27:24) Reserved
Command
5Eh
Transfer Length:The Transfer Length is security protocol specific
TD: Transport Dependent - All bits and fields that are labelled transport dependent are defined in the transport standards.

Security Protocol
The Security Protocol field identifies which security protocol is being used. This determines the format of the parameters and of the data that is transferred. If the Security Protocol field is set to a reserved value, the device shall return command aborted.
Value
Description
00h
Reserved
01h – 06h
Defined by TCG
07h – 1Fh
Reserved
20h
Reserved for T10
21h-EDh
Reserved
EEh
Defined by IEEE 1667
EFh
Reserved for T10
F0h – FFh
Vendor Specific.
The meaning of the security protocol-specific fields are defined by each security protocol.

Parameters for Security Protocol 01h - 06h
The Transfer Length Field contains the number of 512-byte blocks of data to be transferred (e.g., one means 512 bytes, two means 1,024 bytes, etc.). Pad bytes are appended to the valid data as needed to meet this requirement.  ad bytes shall have a value of 00h. A transfer length of zero is invalid.
The SP Specific field provides Security Protocol field specific information. The meaning of this field is defined by each security protocol.

沒有留言:

張貼留言