Technical information

HGST Ultrastar C15K600 Hard Disk Drive Specification
349
21.14.2
TCG SSC Commands
The table below describes how the required TCG Enterprise SSC commands behave on encryption drives in the
locked and unlocked states. The TCG SSC requires the implementation of the Base, Admin, Locking, and Crypto
Templates. As noted, the Crypto template was not implemented. In addition the SSC does not require any Admin
Template tables or methods, so they are not mentioned in the table below.
Table 299 TCG Enterprise SSC Commands Behavior -1
Command
Description
unlocked
Locked
Session
Management
There are two types of sessions:
1) Read-Only session
2) Read-Write session.
The SSC requires us to support Read-Write sessions.
Read-Only session is not allowed. A session is always
initiated by the host.
See the “Write” parameter in the Start Session method
description @ TCG Core 5.2.3.1, and see SSC requirement in
SSC 6.2.1.2.
Properties
Returns session properties to host.
N/A N/A
Start Session Start a session N/A N/A
Syc Session Response to say session successfully started.
N/A N/A
Close Session End (Close) a session N/A N/A
Table 300 TCG Enterprise SSC Commands Behavior -2
Command
Description
unlocked
Locked
Discovery Allows the host to discover a TCG drive, its
properties, and table values.
Level 0 Discovery request sent by host as IF-RCV command.
Security Protocol = 0x01, COMID=0x0001
N/A N/A
Level 1
Request basic TPER capabilities via properties using host
messaging.
Uses properties
method.
Uses properties
method.
Level 2
TCG methods retrieve table cell values.
See methods
below.
See methods
below.
Table 301 TCG Enterprise SSC Commands Behavior -3
Command Description unlocked Locked
Cryptographic
Template
Random function is only function required under SSC
Random
This is the only required method in the crypto template for
SSC. It is a random number generator in software.
N/A - Not related
to bands/data on
drive.
Authentication
required.
N/A - Not related
to bands/data on
drive.
Authentication
required.