Security Protocol Out Command
August 2016 Commands 221
SPOUT Implementation Notes
The following table lists the possible Key-Associated Data (KAD) parameters
supported in the Set Data Encryption page.
Note – The references in the following paragraphs refer to SSC-3.
• If the SECURITY PROTOCOL or the SECURITY PROTOCOL SPECIFIC field is set
to a reserved or unsupported value.
The device server shall terminate the command with CHECK CONDITION status,
with the sense key set to ILLEGAL REQUEST, and the additional sense code set to
INVALID FIELD IN CDB.
• If the SPOUT command is sent to an older drive firmware that does not support
the SPIN/SPOUT commands.
TABLE 3-169 Key-Associated Data Reported Parameters (SPOUT)
Record
Information
Decryption
Mode Read Data
Encryption
Status
Key-Associated Descriptors
Notes
U-KAD
00h
A-KAD
01h
Nonce
02h
Metadata
03h
0h Disable 0h Disable C/C P P P P P
0h Disable 1h Raw Not
Supported
0h Disable 2h Decrypt D/C M M
1
PP P
0h Disable 3h Mixed D/C M M
1
PP P
1h External 0h Disable Not
Supported
1h External 1h Raw Not
Supported
1h External 2h Decrypt Not
Supported
1h External 3h Mixed Not
Supported
2h Encrypt 0h Disable C/E M O
2
PP P
2h Encrypt 1h Raw Not
Supported
2h Encrypt 2h Decrypt D/E M M
1
PP P
2h Encrypt 3h Mixed D/E M M
1
PP P
Legend:
C = Cleartext read & write data
D = Decrypted read data
E = Encrypted write data
P = Prohibited
M= Mandatory
O = Optional
n/a = Not Applicable
Notes:
1. Pending ANSI approval.
2. Optional when SDK is not supported, SDK
supported will become Mandatory.