This will be used for follow-up checks after a client has written something, for security modules that enforce a set of valid values a client can set. Signed-off-by: Eamon Walsh <ewalsh@tycho.nsa.gov>
These were determined through an analysis of the core protocol and 35 of the most common protocol extensions. There remain four bits for future use.