tcg storage security subsystem class: enterprise · pdf file subsystem classes (sscs)....
Post on 20-Apr-2020
12 views
Embed Size (px)
TRANSCRIPT
TCG
TCG Storage Security Subsystem Class: Enterprise
Specification Version 1.00 Final Revision 3.00 January 10, 2011 Contacts:
admin@trustedcomputinggroup.org
Copyright © TCG 2011
Specification Version 1.00 Final TCG Copyright 2011
Revision 3.00 Page ii of 90
Copyright © 2011 Trusted Computing Group, Incorporated.
Disclaimers, Notices, and License Terms THIS SPECIFICATION IS PROVIDED "AS IS" WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE.
Without limitation, TCG disclaims all liability, including liability for infringement of any proprietary rights, relating to use of information in this specification and to the implementation of this specification, and TCG disclaims all liability for cost of procurement of substitute goods or services, lost profits, loss of use, loss of data or any incidental, consequential, direct, indirect, or special damages, whether under contract, tort, warranty or otherwise, arising in any way out of use or reliance upon this specification or any information herein.
This document is copyrighted by Trusted Computing Group (TCG), and no license, express or implied, is granted herein other than as follows: You may not copy or reproduce the document or distribute it to others without written permission from TCG, except that you may freely do so for the purposes of (a) examining or implementing TCG specifications or (b) developing, testing, or promoting information technology standards and best practices, so long as you distribute the document with these disclaimers, notices, and license terms.
Contact the Trusted Computing Group at www.trustedcomputinggroup.org for information on specification licensing through membership agreements.
Any marks and brands contained herein are the property of their respective owners.
Specification Version 1.00 Final TCG Copyright 2011
Revision 3.00 Page iii of 90
Specification Version 1.00 Final TCG Copyright 2011
Revision 3.00 Page iv of 90
Revision History
Version 1.00 Date Description
Rev 1.00 27 January, 2009 First publication
Rev 2.00 21 December, 2009 Revised document to incorporate informative appendices into document body to improve readability.
Rev 3.00 10 January, 2011 Incorporated Authenticate Method Failures section, corrected reference in Properties Method Deviations section, added AUTHORITY_LOCKED_OUT section, added MakerSymK authority, clarifications to read/write data and ReadLocked/WriteLocked, fixed page numbering issues and table page break issues, inconsistencies in markup/other editorial issues.
Specification Version 1.00 Final TCG Copyright 2011
Revision 3.00 Page v of 90
TABLE OF CONTENTS
1 INTRODUCTION ..................................................................................................... 11 1.1 Document Purpose ......................................................................................................................................... 11
1.2 Security Subsystem Classes........................................................................................................................... 11
1.3 Scope and Intended Audience ....................................................................................................................... 11
1.4 Goals ............................................................................................................................................................... 11
1.5 Key Words ...................................................................................................................................................... 11
1.6 Precedence ...................................................................................................................................................... 12
1.7 References ....................................................................................................................................................... 12
1.8 Definition of Terms ........................................................................................................................................ 12
2 OVERVIEW ............................................................................................................. 14
3 SSC FEATURES AND CAPABILITY DEFINITIONS .............................................. 15 3.1 Interface Communications Protocol ............................................................................................................ 15
3.2 Cryptographic Features ................................................................................................................................ 15
3.3 Authentication ................................................................................................................................................ 15
3.4 Table Management ........................................................................................................................................ 15
3.5 Issuance .......................................................................................................................................................... 15
3.6 SSC Discovery ................................................................................................................................................ 15
3.6.1 Discovery levels ....................................................................................................................................... 15
3.6.2 Level 0 Discovery .................................................................................................................................... 16
4 COMMUNICATIONS ............................................................................................... 23 4.1 Communication Properties ........................................................................................................................... 23
4.2 Supported Security Protocols ....................................................................................................................... 23
4.3 ComIDs ........................................................................................................................................................... 24
4.3.1 Inactive or Unsupported ComIDs ............................................................................................................ 24
4.4 Synchronous Protocol .................................................................................................................................... 25 4.4.1 Protocol States and State Transitions ....................................................................................................... 25
4.4.2 Restrictions .............................................................................................................................................. 27
4.4.3 Payload Encoding .................................................................................................................................... 30
4.5 Storage Device Resets .................................................................................................................................... 32
4.5.1 Interface Resets ........................................................................................................................................ 32
4.5.2 Protocol Stack Reset Commands ............................................................................................................. 33
Specification Version 1.00 Final TCG Copyright 2011
Revision 3.00 Page vi of 90
5 DATA TYPES.......................................................................................................... 35 5.1 Interface Types .............................................................................................................................................. 35
5.2 Abstract Types ............................................................................................................................................... 35 5.2.1 Abstract Types definitions ....................................................................................................................... 36
6 METHOD STATUS CODE DEVIATIONS ............................................................... 40 6.1 AUTHORITY_LOCKED_OUT ................................................................................................................... 40
7 METHOD SIGNATURES ........................................................................................ 41 7.1 Session Manager ............................................................................................................................................ 41
7.1.1 StartSession/SyncSession ........................................................................................................................ 41
7.1.2 CloseSession ............................................................................................................................................ 42
7.2 Base Template .....................................................................................................