Lines Matching refs:object
1222 1) If the handle references a transient object, the handle shall reference a loaded object
1226 If the hierarchy for a transient object is disabled, then the transient objects will be flushe d so…
1229 2) If the handle references a persistent object, then
1232 the handle shall reference a persistent object that is currently in TPM non-volatile memory
1237 the hierarchy associated with the object is not disabled (TPM_RC_HIERARCHY); and
1239 iii) if the TPM implementation moves a persistent object to RAM for command processing then
1382 object
1398 c) If the object or NV Index is subject to DA protection, and the authorization is with an HMAC or
1402 An object is subject to DA protection if its noDA attribute is CLEAR. An NV Index is subject to
1423 1) If the entity being authorized is an object and its adminWithPolicy attribute is SET, then the
1451 1) If the entity being authorized is an object and its userWithAuth attribute is CLEAR, then the
1524 For a bound session, if the handle references the object us ed to initiate the session, then the
1529 A policy session may require proof of knowledge of the authValue of the object being authorized.
1842 the reference implementation because of the way that object handles are
1843 allocated. However, other implementations are allowed to assign each object a
1844 unique handle each time the object is loaded. A TPM using this implementation
1846 would be able to load 2 objects before the object space is exhausted.
1851 need an object 'slot'. The most common case where this might be returned is
1852 when an object is loaded (TPM2_Load, TPM2_CreatePrimary(), or
1854 object slots for other reasons. In the reference implementation, the TPM copies a
1855 referenced persistent object into RAM for the duration of the commannd. If all the
1857 to use object slots for other purposes and return this value. The remedy when
1859 object.
1864 not associated with a loaded object. The value of 'x' is in the range 0 to 6 with a
1868 manager needs to find the correct object and load it. It may then adjust the
1919 However, the TPM implementation is allowed to use object slots for other
1921 manager to flush a transient object.
2252 the object context sequence number is reset to zero,
2654 // Reset object context ID to 0
2659 // Initialize object table
3581 c) tpmKey references a symmetric block cipher or a keyedHash object and encryptedSalt contains a
3584 between the session and an object (the bind object). If sessionType is TPM_SE_POLICY or
3624 used to compute the authPolicy for an object.
4182 This command is used to create an object that can be loaded into a TPM using TPM2_Load(). If the
4183 command completes successfully, the TPM will create the new object and return the object’s creation
4185 of the returned data is the responsibility of the caller. The object will need to be loaded (TPM2_L…
4188 new object. The setting for these fields is defined in “Public Area Template” in Part 1 and
4192 When defining the object, the caller provides a template structure for the object in a TPM2B_PUBLIC
4193 …ructure (inPublic), an initial value for the object’s authValue (inSensitive.authValue), and, if t…
4194 a symmetric object, an optional initial data value (inSensitive.data). The TPM shall validate the
4204 sensitive area based on the object type:
4206 1) If inSensitive.data is the Empty Buffer, a TPM-generated key value is placed in the new object’s
4211 inSensitive.data to TPMT_SENSITIVE.sensitive.sym of the new object.
4215 4) The TPMT_PUBLIC.unique.sym.buffer value for the new object is then generated, as shown in
4217 nameAlg of the object.
4256 c) If the Object is a keyedHash object:
4258 the TPM shall return TPM_RC_ATTRIBUTES. This would be a data object with no data.
4260 TPMT_SENSITIVE.sensitive of the new object.
4280 5) The TPMT_PUBLIC.unique.sym.buffer value for the new object is then generated, as shown in
4282 nameAlg of the object.
4290 object. TPMS_CREATION_DATA.outsideInfo is set to outsideInfo. This structure is returned in
4292 TPMT_TK_CREATION is created so that the association between the creation data and the object may
4294 If the object being created is a Storage Key and inPublic.objectAttributes.fixedParent is SET, then…
4344 handle of parent for new object
4365 object to provide permanent, verifiable linkage between
4366 this object and some object owner data
4399 the private portion of the object
4405 the public portion of the created object
4458 between themselves or with those of the parent object; inconsistent
4470 incorrect KDF specified for decrypting keyed hash object
4490 object
4496 hash object is larger than is allowed for the scheme
4505 unknown object type; non-duplicable storage key and its parent have
4531 there is no free slot for the object. This implementation does not
4638 // the size of the data object in inSensitive.
4642 // Mismatch between the object attributes and the parameter.
4656 // Create object crypto data
4702 Loading an object is not the same as restoring a saved object context.
4704 The object’s TPMA_OBJECT attributes will be checked according to the rules defined in
4720 The command returns a handle for the loaded object and the Name that the TPM computed for
4725 caller does not implement the hash algorithms specified in the nameAlg of the object.
4729 The returned handle is associated with the object until the object is flushed (TPM2_FlushContext) or
4734 Before use, a loaded object shall be checked to validate that the public and sensitive portions are
4735 properly linked, cryptographically. Use of an object includes use in any policy command. If the par…
4736 object are not properly linked, the TPM shall return TPM_RC_BINDING.
4739 For a symmetric object, the unique value in the public area shall be the digest of the sensitive key
4800 the private portion of the object
4806 the public portion of the object
4833 handle for the loaded object
4839 Name of the loaded object
4889 the size of the object's unique field is not consistent with the indicated
4890 size in the object's parameters
4894 no available object slot
4914 parentHandle is not a storage key, or the object to load is a storage
4976 // Is the object that is being used as the parent actually a parent.
4979 // If the parent is fixedTPM, then the attributes of the object
4981 // when the object was imported. If they pass the integrity
5060 // Compute the name of object
5073 // Create internal object. A lot of different errors may be returned by this
5102 This command is used to load an object that is not a Protected Object into the TPM. The command all…
5110 Load of a public external object area allows the object be associated with a hierarchy so that the …
5112 public and sensitive portions of the object are loaded, hierarchy is required to be TPM_RH_NULL.
5115 If both the public and private portions of an object are loaded, the object is not allowed to appea…
5118 The object’s TPMA_OBJECT attributes will be checked according to the rules defined in
5128 Objects loaded using this command will have a Name. The Name is the nameAlg of the object
5129 …enated with the digest of the public area using the nameAlg. The Qualified Name for the object will
5135 an object with no Name is computed, no Name value is included in the HMAC. To ensure that these
5147 For an ECC object, the TPM will verify that the public key is on the curve of the key before the pu…
5154 Consistency checks are necessary because an object with a Name needs to have the public and
5157 The command returns a handle for the loaded object and the Name that the TPM computed for
5162 caller does not implement the hash algorithm specified in the nameAlg of the object.
5177 The hierarchy parameter associates the external object with a hierarchy. External objects are flush…
5178 when their associated hierarchy is disabled. If hierarchy is TPM_RH_NULL, the object is part of no
5180 If hierarchy is TPM_RH_NULL or nameAlg is TPM_ALG_NULL, a ticket produced using the object shall
5187 External objects are Temporary Objects. The saved external object contexts shall be invalidated at …
5229 the sensitive portion of the object (optional)
5235 the public portion of the object
5241 hierarchy with which the object area is associated
5268 handle for the loaded object
5274 name of the loaded object
5314 loading public and private parts of an object
5318 incorrect KDF selection for decrypting keyedHash object
5322 the size of the object's unique field is not consistent with the indicated
5323 size in the object's parameters
5327 if there is no free slot for an object
5336 object's nameAlg TPM_RH_NULL hierarchy
5401 // If the target hierarchy is turned off, the object can not be loaded.
5409 // For loading an object with both public and sensitive
5412 // An external object can only be loaded at TPM_RH_NULL hierarchy
5415 // An external object with a sensitive area must have fixedTPM == CLEAR
5484 // Create external object. A TPM_RC_BINDING, TPM_RC_KEY, TPM_RC_OBJECT_MEMORY
5510 This command allows access to the public area of a loaded object.
5514 Since the caller is not likely to know the public area of the object associated with objectHandle, …
5517 If objectHandle references a sequence object, the TPM shall return TPM_RC_SEQUENCE.
5558 TPM handle of an object
5586 structure containing the public area of an object
5592 name of the object
5598 the Qualified Name of the object
5658 can not read the public area of a sequence object
5673 *object;
5678 // Get loaded object pointer
5679 object = ObjectGet(in->objectHandle);
5680 // Can not read public area of a sequence object
5681 if(ObjectIsSequence(object))
5685 out->outPublic.t.size = TPMT_PUBLIC_Marshal(&object->publicArea, NULL, NULL);
5687 out->outPublic.t.publicArea = object->publicArea;
5713 This command enables the association of a credential with an object in a way that ensures that the …
5714 has validated the parameters of the credentialed object.
5720 The Name of the object associated with activateHandle and the recovered seed are used in a KDF to
5724 in credentialBlob has not been modified. The linkage to the object associated with activateHandle is
5767 handle of the object associated with certificate in
5936 *object;
5949 object = ObjectGet(in->keyHandle);
5950 // Get certificated object pointer
5954 !CryptIsAsymAlgorithm(object->publicArea.type)
5955 || object->publicArea.objectAttributes.decrypt == CLEAR
5956 || object->publicArea.objectAttributes.restricted == CLEAR)
6090 Name of the object to which the credential applies
6222 *object;
6229 // Get object pointer
6230 object = ObjectGet(in->handle);
6234 !CryptIsAsymAlgorithm(object->publicArea.type)
6235 || object->publicArea.objectAttributes.decrypt == CLEAR
6236 || object->publicArea.objectAttributes.restricted == CLEAR
6241 if(in->credential.t.size > CryptGetHashDigestSize(object->publicArea.nameAlg))
6322 handle of a loaded data object
6412 itemHandle is not a KEYEDHASH data object
6419 *object;
6422 // Get pointer to loaded object
6423 object = ObjectGet(in->itemHandle);
6424 // Input handle must be a data object
6425 if(object->publicArea.type != TPM_ALG_KEYEDHASH)
6428 object->publicArea.objectAttributes.decrypt == SET
6429 || object->publicArea.objectAttributes.sign == SET
6430 || object->publicArea.objectAttributes.restricted == SET)
6434 MemoryCopy2B(&out->outData.b, &object->sensitive.sensitive.bits.b,
6457 This command is used to change the authorization secret for a TPM-resident object.
6458 If successful, a new private area for the TPM-resident object associated with objectHandle is retur…
6460 This command does not change the authorization of the TPM-resident object on which it operates.
6461 Therefore, the old authValue (of the TPM-resident object) is used when generating the response HMAC
6469 The TPM-resident object may be persistent and changing the authorization value of the persistent
6470 object could prevent other users from accessing the object. This is why this command does not
6471 change the TPM-resident object.
6526 handle of the object
6650 the key referenced by parentHandle is not the parent of the object
6651 referenced by objectHandle; or objectHandle is a sequence object.
6672 *object;
6677 // Get object pointer
6678 object = ObjectGet(in->objectHandle);
6679 // Can not change auth on sequence object
6680 if(ObjectIsSequence(object))
6684 > CryptGetHashDigestSize(object->publicArea.nameAlg))
6686 // Check parent for object
6687 // parent handle must be the parent of object handle. In this
6688 // implementation we verify this by checking the QN of object. Other
6691 ObjectComputeQualifiedName(&parentQN, object->publicArea.nameAlg,
6692 &object->name, &QNCompare);
6698 sensitive = object->sensitive;
6702 SensitiveToPrivate(&sensitive, &object->name, in->parentHandle,
6721 object->publicArea.nameAlg,
6749 This command duplicates a loaded object so that it may be used in a different hierarchy. The new pa…
6757 If encryptedDuplication is SET in the object being duplicated, then the TPM shall return
6766 to use an object does not grant authority to duplicate the object.
6847 loaded object to duplicate
7006 the object has a NULL nameAlg
7034 *object;
7038 // Get duplicate object pointer
7039 object = ObjectGet(in->objectHandle);
7041 if(object->publicArea.objectAttributes.fixedParent == SET)
7043 // Do not duplicate object with NULL nameAlg
7044 if(object->publicArea.nameAlg == TPM_ALG_NULL)
7046 // new parent key must be a storage object or TPM_RH_NULL
7050 // If the duplicates object has encryptedDuplication SET, then there must be
7052 if(object->publicArea.objectAttributes.encryptedDuplication == SET)
7161 sensitive = object->sensitive;
7163 SensitiveToDuplicate(&sensitive, &object->name, in->newParentHandle,
7164 object->publicArea.nameAlg, (TPM2B_SEED *) &data,
7238 parent of object
7246 new parent of the object
7253 an object encrypted using symmetric key derived from
7260 the Name of the object being rewrapped
7300 an object encrypted using symmetric key derived from
7436 // old parent key must be a storage object
7551 // New parent must be a storage object
7619 This command allows an object to be encrypted using the symmetric encryption values of a Storage Ke…
7620 After encryption, the object may be loaded and used in the new hierarchy. The imported object (dupl…
7623 If encryptedDuplication is SET in the object referenced by parentHandle, then encryptedDuplication …
7625 Recovery of the sensitive data of the object occurs in the TPM in a three-step process in the follo…
7635 If the encryptedDuplication attribute of the object
7668 not validated by this command, the binding must be checked each time the object is loaded. For an
7669 object that is imported under a parent with fixedTPM SET, binding need only be checked at import. If
7670 the parent has fixedTPM CLEAR, then the binding needs to be checked each time the object is
7675 If the new parent is not fixedTPM, then that object will be loadable on any TPM (including SW
7676 versions) on which the new parent exists. This means that, each time an object is loaded under a
7677 parent that is not fixedTPM, it is necessary to validate all of the properties of that object. If t…
7679 parent. So, it is sufficient to validate the object’s properties (attribute and public -private bin…
7706 a child object.
7745 the handle of the new parent for the object
7764 the public area of the object to be imported
7766 and the object attributes can be checked.
7773 Even if the integrity value of the object is not
7774 checked on input, the object Name is required to
7775 create the integrity value for the imported object.
7777 the symmetrically encrypted duplicate object that may
7886 objectPublic representing decrypting keyed hash object specifies
7902 no available object slot
7908 for keyed hash object
8090 // Compute name of object
8161 // If the parent of this object has fixedTPM SET, then fully validate this
8162 // object so that validation can be skipped when it is loaded
8175 // Create internal object. A TPM_RC_KEY_SIZE, TPM_RC_KEY or
8182 // Don't need the object, just needed the checks to be performed so
8183 // flush the object
8989 This function is the equivalent of encrypting data to another object’s public key. The seed value is
10057 keyHandle shall reference a symmetric cipher object (TPM_RC_KEY).
10868 // Get HMAC key object and public area pointers
11259 structure, assign a handle to the sequence, and set the authValue of the sequence object to the val…
11263 The structure of a sequence object is vendor -dependent.
11477 no space to create an internal object
11559 // Get HMAC key object and public area pointers
11610 // Create a HMAC sequence object. A TPM_RC_OBJECT_MEMORY error may be
11760 no space to create an internal object
11809 Proper authorization for the sequence object associated with sequenceHandle is required. If an
11860 handle for the sequence object
11967 object
11981 *object;
11984 // Get sequence object pointer
11985 object = ObjectGet(in->sequenceHandle);
11986 // Check that referenced object is a sequence object.
11987 if(!ObjectIsSequence(object))
11990 if(object->attributes.eventSeq == SET)
11992 // Update event sequence object
11996 *hashObject = (HASH_OBJECT *)object;
11999 // Update sequence object
12006 *hashObject = (HASH_OBJECT *)object;
12007 // Update hash/HMAC sequence object
12021 // Update sequence object hash/HMAC stack
12050 else if(object->attributes.hmacSeq == SET)
12053 *hashObject = (HASH_OBJECT *)object;
12054 // Update sequence object hash/HMAC stack
12096 Proper authorization for the sequence object associated with sequenceHandle is required. If an
12099 If this command completes successfully, the sequenceHandle object will be flushed.
12269 object
12284 *object;
12289 // Get hash object pointer
12290 object = ObjectGet(in->sequenceHandle);
12291 // input handle must be a hash or HMAC sequence object.
12293 object->attributes.hashSeq == CLEAR
12294 && object->attributes.hmacSeq == CLEAR)
12297 if(object->attributes.hashSeq == SET)
12298 // sequence object for hash
12302 *hashObject = (HASH_OBJECT *)object;
12378 else if(object->attributes.ticketSafe == CLEAR)
12395 *hashObject = (HASH_OBJECT *)object;
12411 // mark sequence object as evict so it will be flushed on the way out
12412 object->attributes.evict = SET;
12439 Proper authorization for the sequence object associated with sequenceHandle is required. If an
12442 If this command completes successfully, the sequenceHandle object will be flushed.
12607 input handle is not a valid event sequence object
12633 // get the event sequence object pointer
12635 // input handle must reference an event sequence object
12718 // mark sequence object as evict so it will be flushed on the way out
12831 The purpose of this command is to prove that an object with a specific Name is loaded in the TPM. By
12832 certifying that the object is loaded, the TPM warrants that a public area with a given Name is self…
12841 use. That is, authority to use an object does not grant authority to certify the object.
12842 The object may be any object that is loaded with TPM2_Load() or TPM2_CreatePrimary(). An object that
12846 The restriction occurs because the Name is used to identify the object being certified. If the TPM
12848 area may not represent a valid object a nd cannot be certified.
12850 The certification includes the Name and Qualified Name of the certified object as well as the Name …
12851 the Qualified Name of the certifying object.
12888 handle of the object to be certified
13074 // Certified object name
13078 // Certified object qualified name
13151 This command is used to prove the association between an object and its creation data. The TPM will
13174 ObjectHandle may be any object that is loaded with TPM2_Load() or TPM2_CreatePrimary().
13223 the object associated with the creation data
13398 // Get certified object name
15641 The sensitive area of the symmetric object is required to allow verification of the symmetric
15833 // Get sign object pointer
15835 // The object to validate the signature must be a signing key.
15886 // Get object name that verifies the signature
18175 If no object memory is available for creation of the sequence context, the TPM will flush the conte…
18176 object so that creation of the Event sequence context will always succeed.
18181 object context slot is available or to deal with the consequences of having the TPM select an
18182 arbitrary object to be flushed. If this indication occurs before TPM2_Startup() then all context sl…
18263 // If a DRTM sequence object exists, terminate it.
18266 // Create an event sequence object and store the handle in global
18282 // so that it can be assigned for use as the DRTM sequence object.
18285 // try to flush the first object
18294 // Try to create an event sequence object again. This time, we must
18399 // If there is no DRTM sequence object, then _TPM_Hash_Start
18411 // Update sequence object
18577 // Get DRTM sequence object
18636 // Flush sequence object.
18666 authorizations required to use an object have been provided. Many of the commands will also modify
19016 The authorizing object will sign a digest of the authorization qualifiers: nonceTPM, expiration, cp…
19040 time limit on authorization set by authorizing object. This 32-bit
19367 // pointer for the object
19480 expiration time limit on authorization set by authorizing object.
19498 object. Set to the NULLdigest if no hash is present.
20117 name of the object that provided the authorization
23192 For the TPM2_Duplicate() command, two handles are provided. One is the handle of the object
23231 This command will often be used with TPM2_PolicyAuthorize() where the owner of the object being
23232 duplicated provides approval for their object to be migrated to a specific new parent.
23462 When an object is created when the list of allowed duplication targets is known, the policy would be
23511 is only valid for a specific pair of duplication object and new parent.
23518 want to limit the authorization so that the approval allows only a specific object to be duplicated…
23570 the Name of the object to be duplicated
23816 and it is more efficient to check a ticket than to load an object each time to chec k a signature.
23819 The keySign parameter is required to be a valid object name using nameAlg other than TPM_ALG_NULL.
24065 // Compute aHash. The authorizing object sign a digest
24152 This command allows a policy to be bound to the authorization value of the authorized object.
24349 This command allows a policy to be bound to the authorization value of the authorized object.
24351 authValue of the authorized object will be checked when the session is used for authorization. The …
24368 done using either an HMAC or a password with no change to the authPolicy of the object. The
24555 to perform the actions required to pre-compute the authPolicy for an object.
24971 under TPM_RH_NULL. The command uses a TPM2B_PUBLIC as a template for the object to be created.
24980 Any type of object and attributes combination that is allowed by TPM2_Create() may be created by th…
24984 For setting of the attributes of the created object, fixedParent, fixedTPM, userWithAuth, adminWith…
24987 The TPM will derive the object from the Primary Seed indicated in primaryHandle using an approved
25065 object to provide permanent, verifiable linkage between
25066 this object and some object owner data
25105 the public portion of the created object
25130 the name of the created object
25167 between themselves or with those of the parent object; inconsistent
25174 incorrect KDF specified for decrypting keyed hash object
25178 there is no free slot for the object
25184 object
25190 hash object is larger than is allowed for the scheme
25230 unknown object type;
25253 // the size of the data object in inSensitive.
25257 // Mismatch between the object attributes and the parameter.
25341 // Create a internal object. A TPM_RC_OBJECT_MEMORY error may be returned
26179 // Flush loaded object in platform hierarchy
26181 // Flush platform evict object and index in NV
26401 // Flush loaded object in endorsement hierarchy
26403 // Flush evict object of endorsement hierarchy stored in NV
26676 // Flush loaded object in storage and endorsement hierarchy
26679 // Flush owner and endorsement object and owner index in NV
27207 object’s or Index’s authValue unless the authorization applies to an entry in the Platform hierarch…
28118 Persistent object allocations and contents; and
28661 This command saves a session context, object context, or sequence object context outside the TPM.
28877 // handle of an object will be replaced, while the output handle
28886 // Perform object or session specific context save
28972 *object = ObjectGet(in->saveHandle);
28981 fingerprintSize + sizeof(*object);
28984 *outObject = *object;
28985 // Increment object context ID
28987 // If object context ID overflows, TPM should be put in failure mode
28990 // Fill in other return values for an object.
28992 // For regular object, savedHandle is 0x80000000. For sequence object,
28993 // savedHandle is 0x80000001. For object with stClear, savedHandle
28995 if(ObjectIsSequence(object))
28998 SequenceDataImportExport(object, outObject, EXPORT_STATE);
29000 else if(object->attributes.stClear == SET)
29008 // Get object hierarchy
29009 out->context.hierarchy = ObjectDataGetHierarchy(object);
29117 // SaveContext may only take an object handle or a session handle.
29135 // Compute integrity hash for the object
29172 Contexts for authorization sessions and for sequence object s belong to the NULL hierarchy which is
29292 no free slot for an object
29493 // Perform object or session specific input check
29498 // Get a pointer to the object in the context blob
29504 // If hierarchy is disabled, no object context can be loaded in this
29508 // Restore object. A TPM_RC_OBJECT_MEMORY error may be returned at
29513 // If this is a sequence object, the crypto library may need to
29606 // Context blob may only have an object handle or a session handle.
29632 This command causes all context associated with a loaded object or session to be removed from TPM
29634 This command may not be used to remove a persistent object from the TPM.
29656 If the handle is for a transient object and the handle is not associated with a loaded object, then…
29796 flushHandle does not reference a loaded object or session
29809 // Call object or session specific routine to flush
29815 // Flush object
29833 // This command only take object or session handle.
29862 This command allows a transient object to be made persistent or a persistent object to be evicted.
29865 A transient object is one that may be removed from TPM memory using either TPM2_FlushContext
29866 or TPM2_Startup(). A persistent object is not removed from TPM memory by TPM2_FlushContext()
29869 If objectHandle is a transient object, then the call is to make the object persistent and assign
29870 persistentHandle to the persistent version of the object. If objectHandle is a persistent object, t…
29871 is to evict the persistent object.
29873 object that is resident on the TPM and that persistentHandle is a valid handle for a persistent obj…
29877 is always a persistent object.
29879 If objectHandle references a transient object:
29882 2) only the public portion of the object is loaded, or
29883 3) the stClear is SET in the object or in an ancestor key.
29884 b) The TPM shall return TPM_RC_HIERARCHY if the object is not in the proper hierarchy as
29895 d) The TPM shall return TPM_RC_NV_DEFINED if a persistent object exists with the same handle as
29897 e) The TPM shall return TPM_RC_NV_SPACE if insufficient space is available to make the object
29905 …s non volatile and not subject to endurance issues. In such case, there is no movement of an object
29923 g) If the TPM returns TPM_RC_SUCCESS, the object referenced by objectHandle will not be flushed
29924 and both objectHandle and persistentHandle may be used to access the object.
29925 If objectHandle references a persistent object:
29928 81 7F FF FF16. If auth is TPM_RC_PLATFORM, objectHandle may be any valid persistent object
29937 The persistent object is not converted to a transient object, as this would prevent the immediate
29938 revocation of an object by removing it from persistent memory.
29985 the handle of a loaded object
29990 if objectHandle is a transient object handle, then this is
29991 the persistent handle for the object
29992 if objectHandle is a persistent object handle, then this
30042 an object with temporary, stClear or publicOnly attribute SET cannot
30051 evictHandle of the persistent object to be evicted is not the same as
30133 // Get internal object pointer
30142 // If objectHandle refers to a persistent object, it should be the same as
30155 // Platform auth can not set evict object in storage or endorsement
30225 // Platform auth can delete any persistent object
30229 // Owner auth can not set or clear evict object in platform hierarchy
30249 // Make object persistent
30257 // Delete the persistent object in NV
30810 the first read, set the property to TRANSIENT_FIRST and propertyCount to one. If a transient object
32538 object does not grant authority to undefined the object.
35048 authorization value of the referenced object.
35101 handle of the object