HGST Ultrastar 7K4000 (SAS) Hard Disk Drive Specification
20.10 Multiple Initiator Environment..............................................................................295
20.10.1 Initiator Sense Data.......................................................................................295
20.10.2 Initiator Mode Select/Mode Sense Parameters.............................................295
20.11 Reset.......................................................................................................................296
20.11.1 Reset Sources................................................................................................296
20.11.2 Reset Actions................................................................................................296
20.12 Diagnostics.............................................................................................................296
20.12.1 Power on Diagnostics ...................................................................................296
20.12.2 Self-test via SEND DIAGNOSTIC Command.............................................297
20.13 Idle Time Function.................................................................................................300
20.14 Command Time out Limits ...................................................................................300
20.14.1 Reassignment Time.......................................................................................300
20.14.2 Format Time .................................................................................................300
20.14.3 Start/Stop Unit Time.....................................................................................300
20.14.4 Medium Access Command Time .................................................................301
20.14.5 Time-out Limits for Other Commands.........................................................301
20.15 Recommended Initiator ERP .................................................................................302
20.15.1 Drive Service Strategy..................................................................................302
20.15.2 Recommendations for System Error Log .....................................................303
20.15.3 Data Recovery Procedure .............................................................................303
20.15.4 Nondata Error Recovery Procedure..............................................................305
21.0 TCG SSC ......................................................................................................................313
21.1 Referenced Specifications and Standards................................................................313
21.1.1 TCG Specifications........................................................................................313
21.1.2 Federal Information Processing Standards (FIPS).........................................313
21.1.3 National Institute of Standards (NIST)..........................................................313
21.1.4 Department of Defense..................................................................................313
21.1.5 RSA Laboratories Standards..........................................................................314
21.1.6 Other Standards..............................................................................................314
21.2 Implementation Exceptions .....................................................................................314
21.3 Implementation Features and Details Outside of TCG Specifications....................314
21.4 Encryption Algorithms ...........................................................................................315
21.4.1 Advanced Encryption Standard (AES) Support ............................................315
21.4.2 Level 0 Discovery Vendor Specific Data ......................................................315
21.4.3 Pseudo Random Number Generation (PRNG) ..............................................316
21.4.4 Key Wrapping................................................................................................316
21.4.5 Key Erasure....................................................................................................316
21.5 -TCG SSC Tables ....................................................................................................316
21.5.1 Admin SP C_PIN Table and Locking SP C_PIN Table................................317
21.5.2 K_AES_256 Table.........................................................................................317
21.5.3 Locking SP AccessControl Table..................................................................317
21.5.4 Locking Info Table ........................................................................................318
21.5.5 Locking SP Locking Table ............................................................................318
21.6 Firmware Download and Signing............................................................................319
21.7 Ports .........................................................................................................................319
21.8 MSID ......................................................................................................................322