This command allows software to protect secrets so that they are released only if a specified computer configuration is validated. The secret must be encrypted.
This command allows an entity with knowledge of the migration authorization ticket (as generated by TPM_CMK_CreateTicket) ...
This command allows an entity with knowledge of the migration authorization ticket of a key (as created with TPM_CMK_CreateTicket) ...
This command allows an owner of a loaded key to obtain the public key value of that key. The loaded key is created using ...
This command allows or disallows the ability to set an owner. This command requires physical presence at the computer and ...
This command allows software to protect secrets so that they are released only if a specified computer configuration is validated. ...
This command allows the operator of the computer to deactivate the TPM until the next computer restart. The operator must ...
This command allows the owner of the counter to release the specified counter. This command stops all subsequent reads or ...
This command allows the TPM owner to change the TPM owner authorization value or the storage root key (SRK) authorization ...
This command allows the TPM owner to clear the TPM. This means that the only key remaining on the TPM is the endorsement ...