tcg storage security subsystem class: enterprise · pdf file subsystem classes (sscs)....

Click here to load reader

Post on 20-Apr-2020

12 views

Category:

Documents

0 download

Embed Size (px)

TRANSCRIPT

  • TCG

    TCG Storage Security Subsystem Class: Enterprise

    Specification Version 1.00 Final Revision 3.00 January 10, 2011 Contacts:

    admin@trustedcomputinggroup.org

    Copyright © TCG 2011

  • Specification Version 1.00 Final TCG Copyright 2011

    Revision 3.00 Page ii of 90

    Copyright © 2011 Trusted Computing Group, Incorporated.

    Disclaimers, Notices, and License Terms THIS SPECIFICATION IS PROVIDED "AS IS" WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE.

    Without limitation, TCG disclaims all liability, including liability for infringement of any proprietary rights, relating to use of information in this specification and to the implementation of this specification, and TCG disclaims all liability for cost of procurement of substitute goods or services, lost profits, loss of use, loss of data or any incidental, consequential, direct, indirect, or special damages, whether under contract, tort, warranty or otherwise, arising in any way out of use or reliance upon this specification or any information herein.

    This document is copyrighted by Trusted Computing Group (TCG), and no license, express or implied, is granted herein other than as follows: You may not copy or reproduce the document or distribute it to others without written permission from TCG, except that you may freely do so for the purposes of (a) examining or implementing TCG specifications or (b) developing, testing, or promoting information technology standards and best practices, so long as you distribute the document with these disclaimers, notices, and license terms.

    Contact the Trusted Computing Group at www.trustedcomputinggroup.org for information on specification licensing through membership agreements.

    Any marks and brands contained herein are the property of their respective owners.

  • Specification Version 1.00 Final TCG Copyright 2011

    Revision 3.00 Page iii of 90

  • Specification Version 1.00 Final TCG Copyright 2011

    Revision 3.00 Page iv of 90

    Revision History

    Version 1.00 Date Description

    Rev 1.00 27 January, 2009 First publication

    Rev 2.00 21 December, 2009 Revised document to incorporate informative appendices into document body to improve readability.

    Rev 3.00 10 January, 2011 Incorporated Authenticate Method Failures section, corrected reference in Properties Method Deviations section, added AUTHORITY_LOCKED_OUT section, added MakerSymK authority, clarifications to read/write data and ReadLocked/WriteLocked, fixed page numbering issues and table page break issues, inconsistencies in markup/other editorial issues.

  • Specification Version 1.00 Final TCG Copyright 2011

    Revision 3.00 Page v of 90

    TABLE OF CONTENTS

    1 INTRODUCTION ..................................................................................................... 11 1.1 Document Purpose ......................................................................................................................................... 11

    1.2 Security Subsystem Classes........................................................................................................................... 11

    1.3 Scope and Intended Audience ....................................................................................................................... 11

    1.4 Goals ............................................................................................................................................................... 11

    1.5 Key Words ...................................................................................................................................................... 11

    1.6 Precedence ...................................................................................................................................................... 12

    1.7 References ....................................................................................................................................................... 12

    1.8 Definition of Terms ........................................................................................................................................ 12

    2 OVERVIEW ............................................................................................................. 14

    3 SSC FEATURES AND CAPABILITY DEFINITIONS .............................................. 15 3.1 Interface Communications Protocol ............................................................................................................ 15

    3.2 Cryptographic Features ................................................................................................................................ 15

    3.3 Authentication ................................................................................................................................................ 15

    3.4 Table Management ........................................................................................................................................ 15

    3.5 Issuance .......................................................................................................................................................... 15

    3.6 SSC Discovery ................................................................................................................................................ 15

    3.6.1 Discovery levels ....................................................................................................................................... 15

    3.6.2 Level 0 Discovery .................................................................................................................................... 16

    4 COMMUNICATIONS ............................................................................................... 23 4.1 Communication Properties ........................................................................................................................... 23

    4.2 Supported Security Protocols ....................................................................................................................... 23

    4.3 ComIDs ........................................................................................................................................................... 24

    4.3.1 Inactive or Unsupported ComIDs ............................................................................................................ 24

    4.4 Synchronous Protocol .................................................................................................................................... 25 4.4.1 Protocol States and State Transitions ....................................................................................................... 25

    4.4.2 Restrictions .............................................................................................................................................. 27

    4.4.3 Payload Encoding .................................................................................................................................... 30

    4.5 Storage Device Resets .................................................................................................................................... 32

    4.5.1 Interface Resets ........................................................................................................................................ 32

    4.5.2 Protocol Stack Reset Commands ............................................................................................................. 33

  • Specification Version 1.00 Final TCG Copyright 2011

    Revision 3.00 Page vi of 90

    5 DATA TYPES.......................................................................................................... 35 5.1 Interface Types .............................................................................................................................................. 35

    5.2 Abstract Types ............................................................................................................................................... 35 5.2.1 Abstract Types definitions ....................................................................................................................... 36

    6 METHOD STATUS CODE DEVIATIONS ............................................................... 40 6.1 AUTHORITY_LOCKED_OUT ................................................................................................................... 40

    7 METHOD SIGNATURES ........................................................................................ 41 7.1 Session Manager ............................................................................................................................................ 41

    7.1.1 StartSession/SyncSession ........................................................................................................................ 41

    7.1.2 CloseSession ............................................................................................................................................ 42

    7.2 Base Template .....................................................................................................

View more