112
Western Digital Hard Disk Drive OEM Specification
9.21.14.2 TCG Enterprise SSC Commands
The table below describes how the required TCG Enterprise SSC commands behave on encryption drives in the
locked and unlocked states. The TCG Enterprise requires the implementation of the Base, Admin, Locking, and
Crypto Templates.
There are two types of sessions:
1) Read-Only session.
2) Read-Write session.
The SSC requires us to support Read-Write sessions. Read-Only
session is not allowed. A session is always initiated by the host.
See the “Write” parameter in the Start Session method description
@ TCG Core 5.2.3.1, and see SSC requirement in SSC 6.2.1.2.
Returns session properties to host.
Response to say session successfully started.
Table 89 TCG Enterprise SSC Commands Behavior -1
Allows the host to discover a TCG drive, its properties,
and table values.
Discovery request sent by host as IF-RCV command.
Security Protocol = 0x01, COMID=0x0001
Request basic TPER capabilities via properties using
host messaging.
TCG methods retrieve table cell values.
Table 90 TCG Enterprise SSC Commands Behavior -2
This is the only required method in the crypto
template for SSC. It is a random number
generator in software.
N/A - Not related to
bands/data on drive.
Authentication
required.
N/A - Not related to
bands/data on drive.
Authentication required.
Table 91 TCG Enterprise SSC Commands Behavior -3