Hendelser
19. nov., 23 - 21. nov., 23
Få det konkurransedyktige fortrinnet du trenger med kraftige ai- og skyløsninger ved å delta på Microsoft Ignite online.
Registrer deg nåDenne nettleseren støttes ikke lenger.
Oppgrader til Microsoft Edge for å dra nytte av de nyeste funksjonene, sikkerhetsoppdateringene og den nyeste tekniske støtten.
The IsCommandPresent method of the Win32_Tpm class indicates whether a command with the specified ordinal is supported by the device.
uint32 IsCommandPresent(
[in] uint32 CommandOrdinal,
[out] boolean IsCommandPresent
);
CommandOrdinal [in]
Type: uint32
An integer value that specifies a command on the device.
Value | Meaning |
---|---|
|
Allows the TPM owner to unwrap the session key that allows for the decryption of the Attestation Identity Key (AIK) credential, thereby obtaining assurance that the credential is valid for the TPM. |
|
Allows the TPM owner to create a migration authorization ticket so that users can migrate keys without involvement of the TPM owner. |
|
Certifies a loaded key with the public portion of another key. A TPM identity key can only certify keys that cannot be migrated, while signing and legacy keys can certify all keys. |
|
Based on TPM_CertifyKey, but includes extra parameters to certify a Certifiable Migration Key (CMK). |
|
Performs a full self-test and returns an authenticated value if the test passes. Not upgraded in TPM v1.2. This value is blocked by default. |
|
Allows the owner of an entity (for example, TPM key) to change the authorization value for that entity. |
|
Superseded by establishing a transport session with the TPM and executing TPM_ChangeAuth. This value is blocked by default. |
|
Superseded by establishing a transport session with the TPM and executing TPM_ChangeAuth. This value is blocked by default. |
|
Allows the TPM owner to change the TPM owner authorization value or the storage root key (SRK) authorization value. |
|
Allows the TPM owner to create an authorization ticket for one or more migration selection or migration authorities so that users can create certifiable migration keys (by using TPM_CMK_CreateKey) without involvement of the TPM owner. |
|
Creates a certifiable migration key BLOB that can be loaded onto another platform using the TPM_LoadKey2 function, given a random number and the certifiable migration key's migration BLOB (as generated by using TPM_CMK_CreateBlob). |
|
Allows an entity with knowledge of the migration authorization ticket of a certifiable migration key (as generated by using TPM_AuthorizeMigrationKey) to create a migration BLOB necessary to move the key to a new platform or parent key. |
|
Generates and creates a secure asymmetric certifiable migration key, given the authorization ticket for one or more migration selection or migration authorities (as generated by using TPM_CMK_ApproveMA). |
|
Allows the TPM owner to create a signature verification ticket for a certifiable migration key using a provided public key. |
|
Allows the TPM owner to specify usage of a certifiable migration key. |
|
Informs the TPM that it may complete the self-test of all TPM functions. |
|
Creates a key BLOB that can be loaded onto another platform using the TPM_LoadKey2 function, given a random number and the key's migration BLOB (as generated by using TPM_CreateMigrationBlob). |
|
Allows the TPM owner to create a new monotonic counter, assign an authorization value to that counter, increment the TPM's internal counter value by one, and set the new counter's start value to be the updated internal value. |
|
Creates the TPM endorsement key, if this key does not already exist. |
|
Allows the TPM owner to create a maintenance archive that enables the migration of all data held by the TPM, including the storage root key (SRK), TPM owner authorization, and keys that otherwise cannot be migrated using other functionality. |
|
Allows an entity with knowledge of the migration authorization ticket of a key to create a migration BLOB necessary to move a migration key to a new platform or parent key. |
|
Creates the TPM endorsement key (EK) by using options that specify whether the endorsement key can be reset and, if so, the authorization value necessary to reset this key (if this value is not to be generated by the TPM). This is an optional command that could expose a denial of service (DOS) attack if supported by the platform manufacturer. |
|
Generates and creates a secure asymmetric key. |
|
Allows the TPM owner to establish the Direct Anonymous Attestation (DAA) parameters in the TPM for a specific DAA issuing authority. |
|
Allows the TPM owner to sign data using Direct Anonymous Attestation (DAA). |
|
Allows the owner of a key to delegate the privilege to use that key. |
|
Allows the TPM owner to delegate the privilege to run commands that typically require owner authorization. |
|
Allows the TPM owner to load a row of a delegation table into the TPM's nonvolatile storage. This command cannot be used to load key delegation BLOBs into the TPM. |
|
Allows the TPM owner to manage delegation family tables. This command must be run at least once before delegation commands for that family table can be performed. |
|
Reads the public contents of the family and delegate tables that are stored on the TPM. |
|
Allows the TPM owner to update a delegation entity so that it will continue to be accepted by the TPM. |
|
Interprets a delegate BLOB and returns whether that BLOB is currently valid. |
|
Superseded by TPM_NV_ReadValue and TPM_NV_ReadValueAuth. This value is blocked by default. |
|
Superseded by TPM_NV_WriteValue and TPM_NV_WriteValueAuth. This value is blocked by default. |
|
Disables running the TPM_ForceClear command until the platform restarts. |
|
Allows the TPM owner to permanently disable the ability to run the TPM_OwnerClear command. Once used, the only method of clearing the TPM will require executing the TPM_ForceClear command. |
|
Superseded by having TPM_TakeOwnership automatically disable reading the public portion of the endorsement key (EK) by using TPM_ReadPubek. This value is blocked by default. |
|
Generates an authorization session handle for the Delegate-Specific Authorization Protocol (DSAP) used to securely pass delegated authorization data to the TPM and the information the TPM needs to track this authorization session handle. |
|
Establishes a transport session that can be used to confidentially transmit shared secrets, encryption keys, and session logs to the TPM (by using TPM_ExecuteTransport). |
|
Superseded by TPM_FlushSpecific. This value is blocked by default. |
|
Delivers a wrapped TPM command to the TPM within a transport session. The TPM unwraps the command and then runs the command. |
|
Adds a new digest to a specified platform configuration register (PCR) and returns this extended digest. |
|
Allows a manufacturer upgrade of TPM functionality. This command is specific to the TPM manufacturer. |
|
Flushes from the TPM a specified resource handle. |
|
Clears the TPM. This command requires physical presence at the platform and cannot be run by the operating system. |
|
Returns the TPM audit digest. |
|
Returns a signed TPM audit digest and list of currently audited commands. |
|
Removed due to security concerns. This value is blocked by default. |
|
Removed due to security concerns. This value is blocked by default. |
|
Returns TPM information. |
|
Removed due to security concerns. This value is blocked by default. |
|
Removed due to security concerns. This value is blocked by default. |
|
Removed due to security concerns. This value is blocked by default. |
|
Allows an owner of a loaded key to obtain the public key value of that key. |
|
Returns random data of a specified length from the TPM random number generator. |
|
Provides manufacturer specific and diagnostic information regarding the results of the self-test. |
|
Returns current tick count of TPM. |
|
Indicates physical presence at the platform. This command cannot be run by the operating system. |
|
Indicates whether a special sequence to create a trusted operating system occurred on the platform. |
|
Allows the owner of the counter to increment that counter by one and return this updated value. |
|
Command first sent by the platform to the TPM during the start process. This command cannot be run by software. |
|
Allows the TPM owner to control certain attributes of keys that are stored within the TPM key cache. |
|
Allows the TPM owner to prevent the creation of a maintenance archive (by using TPM_CreateMaintenanceArchive). This action is valid until a new TPM owner is set (by using TPM_TakeOwnership). |
|
Superseded by TPM_LoadContext. This value is blocked by default. |
|
Loads into the TPM a previously saved context. |
|
Superseded by TPM_LoadKey2. This value is blocked by default. |
|
Loads a key into TPM for further usage (for example, wrap, unwrap, bind, unbind, seal, unseal, sign). |
|
Superseded by TPM_LoadContext. This value is blocked by default. |
|
Allows the TPM owner to load a maintenance archive (generated by using TPM_CreateMaintenanceArchive). When loaded, the authorization value for the storage root key (SRK) is set to be same as the TPM owner authorization. |
|
Loads the platform manufacturer's public key into the TPM for use in the maintenance process. This command can only be run once and should be run before a platform ships. |
|
Allows the TPM owner to generate an Attestation Identity Key (AIK) that can be used to sign information generated internally by the TPM. |
|
Allows the TPM to migrate a BLOB (as generated by using TPM_CreateMigrationBlob or TPM_CMK_CreateBlob) to a destination by reencrypting it with a given public key. |
|
Allows the TPM owner to define space for an area of nonvolatile storage on the TPM. This definition include the access requirements for writing and reading the area. |
|
Reads from a defined nonvolatile storage area. |
|
Reads from a defined nonvolatile storage area, given the required authorization for that area. |
|
Writes a specified value to a defined nonvolatile storage area. |
|
Writes a specified value to a defined nonvolatile storage area, given the required authorization for that area. |
|
Generates an authorization session handle for the Object-Independent Authorization Protocol (OIAP) used to securely pass authorization data to the TPM and the information the TPM needs to track this authorization session handle. |
|
Generates an authorization session handle for the Object-Specific Authorization Protocol (OSAP) used to securely pass authorization data to the TPM and the information the TPM needs to track this authorization session handle. |
|
Allows the TPM owner to clear the TPM. |
|
Allows the TPM owner to return the public portion of the TPM endorsement key (EK) or storage root key (SRK). |
|
Superseded by TPM_OwnerReadInternalPub. This value is blocked by default. |
|
Allows the TPM owner to enable or disable the TPM. |
|
Resets the specified platform configuration registers (PCR's) to its default state. |
|
Returns the contents of a specified platform configuration register (PCR). |
|
Disables the TPM. This command requires physical presence at the platform and cannot be run by the operating system. |
|
Enables the TPM. This command requires physical presence at the platform and cannot be run by the operating system. |
|
Activates or deactivates the TPM. This command requires physical presence at the platform and cannot be run by the operating system. |
|
Returns a signed digest that is a combination of the contents of a specified platform configuration register (PCR) and some specified external data. The digest is signed with a loaded key. |
|
Similar to the command TPM_Quote with the inclusion of locality information to provide a more complete view of the current platform configuration. |
|
Returns the value of the specified counter. |
|
Returns the digest of the platform manufacturer's public maintenance key (loaded by using TPM_LoadManuMaintPub). |
|
Returns the public portion of the TPM endorsement key. This command is disabled when ownership of the TPM is taken. |
|
Allows the owner of the counter to release the specified counter. No subsequent reads or increments of the counter will succeed. |
|
Allows the TPM owner to release the specified counter. No subsequent reads or increments of the counter will succeed. |
|
Completes the transport session. If logging is turned on, this command returns hash of all operations performed during session along with the digital signature of hash. |
|
Releases all resources associated with existing authorization sessions. Not upgraded in TPM v1.2. This value is blocked by default. |
|
Resets the mechanisms used to protect against attacks on TPM authorization values. |
|
Clears a revocable TPM endorsement key (generated by using TPM_CreateRevocableEK) and resets the TPM, given the necessary authorization value for this reset and platform support for this command. This command requires physical presence at the platform and cannot be run by the operating system. |
|
Superseded by TPM_SaveContext. This value is blocked by default. |
|
Saves a loaded resource outside the TPM. After successfully running this command, the TPM automatically releases the internal memory for sessions but leaves keys in place. |
|
Superseded by TPM_SaveContext. This value is blocked by default. |
|
Warns a TPM to save some state information. |
|
Allows software to protect secrets so that they are released only if a specified platform configuration is validated. |
|
Allows software to protect secrets so that they are released only if a specified platform configuration is validated. The secret must be encrypted. |
|
Tests all of the TPM's internal functions. Any failure causes the TPM to enter into failure mode. |
|
Allows the TPM owner to set values in the TPM. |
|
Defines the operator authorization value. This command requires physical presence at the platform and cannot be run by the operating system. |
|
Allows the TPM owner to set the audit flag for a given command number. |
|
Allows or disallows the ability to insert an owner. This command requires physical presence at the platform and cannot be run by the operating system. |
|
Sets the reference to the owner authorization that the TPM uses when executing an OIAP or OSAP session. This command should only be used to provide owner delegation functionality for legacy code that does not support DSAP. |
|
Allows the TPM to directly communicate with a connected security processor by redirecting output. |
|
Allows the operator of the platform to deactivate the TPM until the next start of the platform. The operator must either have physical presence at the platform or present the operator authorization value defined with the command TPM_SetOperatorAuth. |
|
Completes a pending SHA-1 digest process and returns the resulting SHA-1 hash output. |
|
Completes a pending SHA-1 digest process, returns the resulting SHA-1 hash output, and incorporates this hash into a platform configuration register (PCR). |
|
Starts the process of calculating a SHA-1 digest. This command must be followed by running the TPM_SHA1Update command, or the SHA-1 process is invalidated. |
|
Inputs complete blocks of data into a pending SHA-1 digest (started by using TPM_SHA1Start). |
|
Signs data with a loaded signing key and returns resulting digital signature. |
|
Command that must be called after TPM_Init to transmit additional platform information to the TPM about the type of reset that is occurring. |
|
Adds entropy to the TPM random number generator state. |
|
Takes ownership of the TPM with a new owner authorization value, derived from the owner password. Among other conditions that must be met before this command can run, the TPM must be enabled and activated. |
|
Superseded by TPM_FlushSpecific. This value is blocked by default. |
|
Signs a specified digest with the TPM's current tick count using a loaded signature key. |
|
Decrypts data previously encrypted with the public portion of a TPM-bound key. |
|
Releases secrets previously sealed by the TPM if integrity, platform configuration, and authorization checks succeed. |
IsCommandPresent [out]
Type: boolean
If true a command with the specified ordinal is supported by the device.
Type: uint32
All TPM errors as well as errors specific to TPM Base Services can be returned.
Common return codes are listed below.
Return code/value | Description |
---|---|
|
The method was successful. |
Managed Object Format (MOF) files contain the definitions for Windows Management Instrumentation (WMI) classes. MOF files are not installed as part of the Windows SDK. They are installed on the server when you add the associated role by using the Server Manager. For more information about MOF files, see Managed Object Format (MOF).
Requirement | Value |
---|---|
Minimum supported client |
Windows Vista [desktop apps only] |
Minimum supported server |
Windows Server 2008 [desktop apps only] |
Namespace |
Root\CIMV2\Security\MicrosoftTpm |
MOF |
|
DLL |
|
Hendelser
19. nov., 23 - 21. nov., 23
Få det konkurransedyktige fortrinnet du trenger med kraftige ai- og skyløsninger ved å delta på Microsoft Ignite online.
Registrer deg nå