Storage WG Core
Total Page:16
File Type:pdf, Size:1020Kb
TCG Storage Architecture Core Specification Specification Version 1.0 Revision 0.9 – draft – May 24, 2007 Draft Work In Progress This document is an intermediate draft for comment only and is subject to change without notice. Readers should not design products based on this document. TCG Copyright © TCG 2007 TCG Storage Architecture Core Specification TCG Copyright 2007 Specification Version 1.0 Copyright © 2003-2007 Trusted Computing Group, Incorporated. Disclaimer THIS SPECIFICATION IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Without limitation, TCG disclaims all liability, including liability for infringement of any proprietary rights, relating to use of information in this specification and to the implementation of this specification, and TCG disclaims all liability for cost of procurement of substitute goods or services, lost profits, loss of use, loss of data or any incidental, consequential, direct, indirect, or special damages, whether under contract, tort, warranty or otherwise, arising in any way out of use or reliance upon this specification or any information herein. No license, express or implied, by estoppel or otherwise, to any TCG or TCG member intellectual property rights is granted herein. Except that a license is hereby granted by TCG to copy and reproduce this specification for internal use only. Contact the Trusted Computing Group at www.trustedcomputinggroup.org for information on specification licensing through membership agreements. Any marks and brands contained herein are the property of their respective owners. Revision 0.9 – draft – Draft Page ii of 265 TCG Storage Architecture Core Specification TCG Copyright 2007 Specification Version 1.0 Revision History a Added Sections R. Thibadeau b 8/25/04 Extensive Edits R. Thibadeau c 8/31/2004 Lot of changes, particularly types J. Nestor d 9/7/04 Added more explanation of SPs R. Thibadeau e 9/16/04 Changed Intro, included example R Thibadeau f-g 8/5/05 Numerous Edits, Filled out ACL Section R. Thibadeau, D. Philips, J. Cox h 8/31/05 More ACL Section work R. Thibadeau, D. Philips, J. Cox j 9/8/05 Slight ACL update, Session update R. Thibadeau, D. Philips, J. Cox J 9/9/05 Secure Messaging R. Thibadeau, D. Philips, J. Cox k-l 9/12/05 Misc. cleanup R. Thibadeau, D. Philips, J. Cox m 9/14/05 Secure Messaging diagrams and cleanup. R. Thibadeau, D. Philips, J. Cox n 9/22/05 Additional Secure Messaging diagrams. R. Thibadeau, D. Philips, J. Cox o-q 10/11/05 Addt’l. core spec details & org. changes. R. Thibadeau, D. Philips, J. Cox p 10-18-05 More small edits for clarity R. Thibadeau r-s 11/04/05 Changes from October Orlando F2F R. Thibadeau, D. Philips, J. Cox t 11/xx/05 Changes from post F2F conference calls R. Thibadeau, D. Philips, J. Cox u-v 11/23/05 Changes from Working Group Core R. Thibadeau, D. Philips, J. Cox Comments, and cleanup of text, small edits, etc. w 12/12/05 Removed SP->SP method calls, clarified R. Thibadeau, D. Philips, J. Cox logging during a read session, etc., some updates from the SF F2F in Dec ‘05 0.2a-b 12/22/05 Moved up to 0.2 as we’re adding fewer R. Thibadeau, D. Philips, J. Cox and fewer new issues. 0.2c-d 1/5/06 Added Life Cycle (Section 10) R. Thibadeau 0.2e-i Numerous clarifying changes as per TCG comments R. Thibadeau, D. Philips, J. Cox 0.3 Numerous clarifying changes as per TCG R. Thibadeau, D. Philips, J. Cox, D. Brown comments, updated EC tables, added curve choices 0.4 4/7/06 Major Format & Section Changes. D. Ybarra Added Registry & Locking SP sections 0.5 Numerous small edits filling in gaps left in reformat R. Thibadeau 0.6 Fixed numerous doc bugs, added section on J. Cox, D. Brown ECMQV 0.7 Many changes, doc bug fixes, clarifications, and J. Cox updates based on WG comments and Triage 0.9 Significant modifications based on SWG document J. Cox and the rest of the SWG review, multiple proposal submissions, etc. in preparation for SWG vote Revision 0.9 – draft – Draft Page iii of 265 TCG Storage Architecture Core Specification TCG Copyright 2007 Specification Version 1.0 TABLE OF CONTENTS 1 INTRODUCTION..................................................................................................... 17 1.1 Scope and Audience......................................................................................................................17 1.2 Key Words.......................................................................................................................................17 1.3 References ......................................................................................................................................17 1.4 Terminology....................................................................................................................................18 1.4.1 Global Terminology...................................................................................................................18 2 TRUSTED STORAGE DEVICE ARCHITECTURE ................................................. 21 2.1 Trusted Storage Device Architecture Overview..........................................................................21 2.2 Core Architecture Components....................................................................................................21 2.2.1 Multicomponent Trusted Platform (MCTP) ...............................................................................21 2.2.2 Host...........................................................................................................................................21 2.2.2.1 Host Applications (APPs) and Component Authentication Administrator (CAA)...............22 2.2.3 Trusted Peripheral (TPer) .........................................................................................................22 2.2.3.1 Security Providers (SP) .....................................................................................................22 2.3 Core Architecture Operations.......................................................................................................23 2.3.1 Host <–> TPer Communication Infrastructure ..........................................................................23 2.3.2 SP Issuance & Personalization Overview.................................................................................24 2.3.3 Security Subsystem Classes Overview ....................................................................................24 3 CORE ARCHITECTURE ELEMENTS .................................................................... 25 3.1 Core Architecture Elements Overview.........................................................................................25 3.2 Data Structure Descriptions..........................................................................................................25 3.2.1 Document Data Formats...........................................................................................................25 3.2.1.1 Tables – Example ..............................................................................................................25 3.2.1.2 Methods – Example ...........................................................................................................25 3.2.2 Data Types................................................................................................................................25 3.2.2.1 Pseudo-code (Expository) .................................................................................................26 3.2.2.2 Messaging Data Types ......................................................................................................26 3.2.2.3 Method Parameter/Column Value Typing and Encoding ..................................................26 3.2.3 Stream Encoding.......................................................................................................................27 3.2.3.1 Data Types.........................................................................................................................27 3.2.3.2 Tokens ...............................................................................................................................28 3.2.3.3 Method Calls......................................................................................................................33 3.2.3.4 ComPackets, Packets & Subpackets ................................................................................37 3.2.3.5 Secure Messaging .............................................................................................................41 3.2.3.6 Method Invocation – Result Retrieval Protocol..................................................................43 3.2.4 Templates .................................................................................................................................43 3.2.5 Tables - Details .........................................................................................................................43 3.2.5.1 Kinds of Tables ..................................................................................................................44 3.2.5.2 Objects...............................................................................................................................44 3.2.5.3 Unique Identifiers (UIDs) ...................................................................................................44