Lines Matching refs:object
1222 1) If the handle references a transient object, the handle shall reference a loaded object
1226 If the hierarchy for a transient object is disabled, then the transient objects will be flushe d so…
1229 2) If the handle references a persistent object, then
1232 the handle shall reference a persistent object that is currently in TPM non-volatile memory
1237 the hierarchy associated with the object is not disabled (TPM_RC_HIERARCHY); and
1239 iii) if the TPM implementation moves a persistent object to RAM for command processing then
1382 object
1398 c) If the object or NV Index is subject to DA protection, and the authorization is with an HMAC or
1402 An object is subject to DA protection if its noDA attribute is CLEAR. An NV Index is subject to
1423 1) If the entity being authorized is an object and its adminWithPolicy attribute is SET, then the
1451 1) If the entity being authorized is an object and its userWithAuth attribute is CLEAR, then the
1524 For a bound session, if the handle references the object us ed to initiate the session, then the
1529 A policy session may require proof of knowledge of the authValue of the object being authorized.
1842 the reference implementation because of the way that object handles are
1843 allocated. However, other implementations are allowed to assign each object a
1844 unique handle each time the object is loaded. A TPM using this implementation
1846 would be able to load 2 objects before the object space is exhausted.
1851 need an object 'slot'. The most common case where this might be returned is
1852 when an object is loaded (TPM2_Load, TPM2_CreatePrimary(), or
1854 object slots for other reasons. In the reference implementation, the TPM copies a
1855 referenced persistent object into RAM for the duration of the commannd. If all the
1857 to use object slots for other purposes and return this value. The remedy when
1859 object.
1864 not associated with a loaded object. The value of 'x' is in the range 0 to 6 with a
1868 manager needs to find the correct object and load it. It may then adjust the
1919 However, the TPM implementation is allowed to use object slots for other
1921 manager to flush a transient object.
2252 the object context sequence number is reset to zero,
2654 // Reset object context ID to 0
2659 // Initialize object table
3581 c) tpmKey references a symmetric block cipher or a keyedHash object and encryptedSalt contains a
3584 between the session and an object (the bind object). If sessionType is TPM_SE_POLICY or
3624 used to compute the authPolicy for an object.
4184 This command is used to create an object that can be loaded into a TPM using TPM2_Load(). If the
4185 command completes successfully, the TPM will create the new object and return the object’s creation
4187 of the returned data is the responsibility of the caller. The object will need to be loaded (TPM2_L…
4190 new object. The setting for these fields is defined in “Public Area Template” in Part 1 and
4194 When defining the object, the caller provides a template structure for the object in a TPM2B_PUBLIC
4195 …ructure (inPublic), an initial value for the object’s authValue (inSensitive.authValue), and, if t…
4196 a symmetric object, an optional initial data value (inSensitive.data). The TPM shall validate the
4206 sensitive area based on the object type:
4208 1) If inSensitive.data is the Empty Buffer, a TPM-generated key value is placed in the new object’s
4213 inSensitive.data to TPMT_SENSITIVE.sensitive.sym of the new object.
4217 4) The TPMT_PUBLIC.unique.sym.buffer value for the new object is then generated, as shown in
4219 nameAlg of the object.
4258 c) If the Object is a keyedHash object:
4260 the TPM shall return TPM_RC_ATTRIBUTES. This would be a data object with no data.
4262 TPMT_SENSITIVE.sensitive of the new object.
4282 5) The TPMT_PUBLIC.unique.sym.buffer value for the new object is then generated, as shown in
4284 nameAlg of the object.
4292 object. TPMS_CREATION_DATA.outsideInfo is set to outsideInfo. This structure is returned in
4294 TPMT_TK_CREATION is created so that the association between the creation data and the object may
4296 If the object being created is a Storage Key and inPublic.objectAttributes.fixedParent is SET, then…
4346 handle of parent for new object
4367 object to provide permanent, verifiable linkage between
4368 this object and some object owner data
4401 the private portion of the object
4407 the public portion of the created object
4460 between themselves or with those of the parent object; inconsistent
4472 incorrect KDF specified for decrypting keyed hash object
4492 object
4498 hash object is larger than is allowed for the scheme
4507 unknown object type; non-duplicable storage key and its parent have
4533 there is no free slot for the object. This implementation does not
4640 // the size of the data object in inSensitive.
4644 // Mismatch between the object attributes and the parameter.
4658 // Create object crypto data
4704 Loading an object is not the same as restoring a saved object context.
4706 The object’s TPMA_OBJECT attributes will be checked according to the rules defined in
4722 The command returns a handle for the loaded object and the Name that the TPM computed for
4727 caller does not implement the hash algorithms specified in the nameAlg of the object.
4731 The returned handle is associated with the object until the object is flushed (TPM2_FlushContext) or
4736 Before use, a loaded object shall be checked to validate that the public and sensitive portions are
4737 properly linked, cryptographically. Use of an object includes use in any policy command. If the par…
4738 object are not properly linked, the TPM shall return TPM_RC_BINDING.
4741 For a symmetric object, the unique value in the public area shall be the digest of the sensitive key
4802 the private portion of the object
4808 the public portion of the object
4835 handle for the loaded object
4841 Name of the loaded object
4891 the size of the object's unique field is not consistent with the indicated
4892 size in the object's parameters
4896 no available object slot
4916 parentHandle is not a storage key, or the object to load is a storage
4978 // Is the object that is being used as the parent actually a parent.
4981 // If the parent is fixedTPM, then the attributes of the object
4983 // when the object was imported. If they pass the integrity
5062 // Compute the name of object
5075 // Create internal object. A lot of different errors may be returned by this
5104 This command is used to load an object that is not a Protected Object into the TPM. The command all…
5112 Load of a public external object area allows the object be associated with a hierarchy so that the …
5114 public and sensitive portions of the object are loaded, hierarchy is required to be TPM_RH_NULL.
5117 If both the public and private portions of an object are loaded, the object is not allowed to appea…
5120 The object’s TPMA_OBJECT attributes will be checked according to the rules defined in
5130 Objects loaded using this command will have a Name. The Name is the nameAlg of the object
5131 …enated with the digest of the public area using the nameAlg. The Qualified Name for the object will
5137 an object with no Name is computed, no Name value is included in the HMAC. To ensure that these
5149 For an ECC object, the TPM will verify that the public key is on the curve of the key before the pu…
5156 Consistency checks are necessary because an object with a Name needs to have the public and
5159 The command returns a handle for the loaded object and the Name that the TPM computed for
5164 caller does not implement the hash algorithm specified in the nameAlg of the object.
5179 The hierarchy parameter associates the external object with a hierarchy. External objects are flush…
5180 when their associated hierarchy is disabled. If hierarchy is TPM_RH_NULL, the object is part of no
5182 If hierarchy is TPM_RH_NULL or nameAlg is TPM_ALG_NULL, a ticket produced using the object shall
5189 External objects are Temporary Objects. The saved external object contexts shall be invalidated at …
5231 the sensitive portion of the object (optional)
5237 the public portion of the object
5243 hierarchy with which the object area is associated
5270 handle for the loaded object
5276 name of the loaded object
5316 loading public and private parts of an object
5320 incorrect KDF selection for decrypting keyedHash object
5324 the size of the object's unique field is not consistent with the indicated
5325 size in the object's parameters
5329 if there is no free slot for an object
5338 object's nameAlg TPM_RH_NULL hierarchy
5403 // If the target hierarchy is turned off, the object can not be loaded.
5411 // For loading an object with both public and sensitive
5414 // An external object can only be loaded at TPM_RH_NULL hierarchy
5417 // An external object with a sensitive area must have fixedTPM == CLEAR
5486 // Create external object. A TPM_RC_BINDING, TPM_RC_KEY, TPM_RC_OBJECT_MEMORY
5512 This command allows access to the public area of a loaded object.
5516 Since the caller is not likely to know the public area of the object associated with objectHandle, …
5519 If objectHandle references a sequence object, the TPM shall return TPM_RC_SEQUENCE.
5560 TPM handle of an object
5588 structure containing the public area of an object
5594 name of the object
5600 the Qualified Name of the object
5660 can not read the public area of a sequence object
5675 *object;
5680 // Get loaded object pointer
5681 object = ObjectGet(in->objectHandle);
5682 // Can not read public area of a sequence object
5683 if(ObjectIsSequence(object))
5687 out->outPublic.t.size = TPMT_PUBLIC_Marshal(&object->publicArea, NULL, NULL);
5689 out->outPublic.t.publicArea = object->publicArea;
5715 This command enables the association of a credential with an object in a way that ensures that the …
5716 has validated the parameters of the credentialed object.
5722 The Name of the object associated with activateHandle and the recovered seed are used in a KDF to
5726 in credentialBlob has not been modified. The linkage to the object associated with activateHandle is
5769 handle of the object associated with certificate in
5938 *object;
5951 object = ObjectGet(in->keyHandle);
5952 // Get certificated object pointer
5956 !CryptIsAsymAlgorithm(object->publicArea.type)
5957 || object->publicArea.objectAttributes.decrypt == CLEAR
5958 || object->publicArea.objectAttributes.restricted == CLEAR)
6092 Name of the object to which the credential applies
6226 *object;
6233 // Get object pointer
6234 object = ObjectGet(in->handle);
6238 !CryptIsAsymAlgorithm(object->publicArea.type)
6239 || object->publicArea.objectAttributes.decrypt == CLEAR
6240 || object->publicArea.objectAttributes.restricted == CLEAR
6245 if(in->credential.t.size > CryptGetHashDigestSize(object->publicArea.nameAlg))
6328 handle of a loaded data object
6416 itemHandle is not a KEYEDHASH data object
6423 *object;
6426 // Get pointer to loaded object
6427 object = ObjectGet(in->itemHandle);
6428 // Input handle must be a data object
6429 if(object->publicArea.type != TPM_ALG_KEYEDHASH)
6432 object->publicArea.objectAttributes.decrypt == SET
6433 || object->publicArea.objectAttributes.sign == SET
6434 || object->publicArea.objectAttributes.restricted == SET)
6438 MemoryCopy2B(&out->outData.b, &object->sensitive.sensitive.bits.b,
6461 This command is used to change the authorization secret for a TPM-resident object.
6462 If successful, a new private area for the TPM-resident object associated with objectHandle is retur…
6464 This command does not change the authorization of the TPM-resident object on which it operates.
6465 Therefore, the old authValue (of the TPM-resident object) is used when generating the response HMAC
6473 The TPM-resident object may be persistent and changing the authorization value of the persistent
6474 object could prevent other users from accessing the object. This is why this command does not
6475 change the TPM-resident object.
6530 handle of the object
6654 the key referenced by parentHandle is not the parent of the object
6655 referenced by objectHandle; or objectHandle is a sequence object.
6676 *object;
6681 // Get object pointer
6682 object = ObjectGet(in->objectHandle);
6683 // Can not change auth on sequence object
6684 if(ObjectIsSequence(object))
6688 > CryptGetHashDigestSize(object->publicArea.nameAlg))
6690 // Check parent for object
6691 // parent handle must be the parent of object handle. In this
6692 // implementation we verify this by checking the QN of object. Other
6695 ObjectComputeQualifiedName(&parentQN, object->publicArea.nameAlg,
6696 &object->name, &QNCompare);
6702 sensitive = object->sensitive;
6706 SensitiveToPrivate(&sensitive, &object->name, in->parentHandle,
6725 object->publicArea.nameAlg,
6753 This command duplicates a loaded object so that it may be used in a different hierarchy. The new pa…
6761 If encryptedDuplication is SET in the object being duplicated, then the TPM shall return
6770 to use an object does not grant authority to duplicate the object.
6851 loaded object to duplicate
7012 the object has a NULL nameAlg
7040 *object;
7044 // Get duplicate object pointer
7045 object = ObjectGet(in->objectHandle);
7047 if(object->publicArea.objectAttributes.fixedParent == SET)
7049 // Do not duplicate object with NULL nameAlg
7050 if(object->publicArea.nameAlg == TPM_ALG_NULL)
7052 // new parent key must be a storage object or TPM_RH_NULL
7056 // If the duplicates object has encryptedDuplication SET, then there must be
7058 if(object->publicArea.objectAttributes.encryptedDuplication == SET)
7167 sensitive = object->sensitive;
7169 SensitiveToDuplicate(&sensitive, &object->name, in->newParentHandle,
7170 object->publicArea.nameAlg, (TPM2B_SEED *) &data,
7244 parent of object
7252 new parent of the object
7259 an object encrypted using symmetric key derived from
7266 the Name of the object being rewrapped
7310 an object encrypted using symmetric key derived from
7446 // old parent key must be a storage object
7561 // New parent must be a storage object
7629 This command allows an object to be encrypted using the symmetric encryption values of a Storage Ke…
7630 After encryption, the object may be loaded and used in the new hierarchy. The imported object (dupl…
7633 If encryptedDuplication is SET in the object referenced by parentHandle, then encryptedDuplication …
7635 Recovery of the sensitive data of the object occurs in the TPM in a three-step process in the follo…
7645 If the encryptedDuplication attribute of the object
7678 not validated by this command, the binding must be checked each time the object is loaded. For an
7679 object that is imported under a parent with fixedTPM SET, binding need only be checked at import. If
7680 the parent has fixedTPM CLEAR, then the binding needs to be checked each time the object is
7685 If the new parent is not fixedTPM, then that object will be loadable on any TPM (including SW
7686 versions) on which the new parent exists. This means that, each time an object is loaded under a
7687 parent that is not fixedTPM, it is necessary to validate all of the properties of that object. If t…
7689 parent. So, it is sufficient to validate the object’s properties (attribute and public -private bin…
7716 a child object.
7755 the handle of the new parent for the object
7774 the public area of the object to be imported
7776 and the object attributes can be checked.
7783 Even if the integrity value of the object is not
7784 checked on input, the object Name is required to
7785 create the integrity value for the imported object.
7787 the symmetrically encrypted duplicate object that may
7897 objectPublic representing decrypting keyed hash object specifies
7913 no available object slot
7919 for keyed hash object
8101 // Compute name of object
8172 // If the parent of this object has fixedTPM SET, then fully validate this
8173 // object so that validation can be skipped when it is loaded
8186 // Create internal object. A TPM_RC_KEY_SIZE, TPM_RC_KEY or
8193 // Don't need the object, just needed the checks to be performed so
8194 // flush the object
9000 This function is the equivalent of encrypting data to another object’s public key. The seed value is
10068 keyHandle shall reference a symmetric cipher object (TPM_RC_KEY).
10879 // Get HMAC key object and public area pointers
11270 structure, assign a handle to the sequence, and set the authValue of the sequence object to the val…
11274 The structure of a sequence object is vendor -dependent.
11488 no space to create an internal object
11570 // Get HMAC key object and public area pointers
11621 // Create a HMAC sequence object. A TPM_RC_OBJECT_MEMORY error may be
11771 no space to create an internal object
11820 Proper authorization for the sequence object associated with sequenceHandle is required. If an
11871 handle for the sequence object
11978 object
11992 *object;
11995 // Get sequence object pointer
11996 object = ObjectGet(in->sequenceHandle);
11997 // Check that referenced object is a sequence object.
11998 if(!ObjectIsSequence(object))
12001 if(object->attributes.eventSeq == SET)
12003 // Update event sequence object
12007 *hashObject = (HASH_OBJECT *)object;
12010 // Update sequence object
12017 *hashObject = (HASH_OBJECT *)object;
12018 // Update hash/HMAC sequence object
12032 // Update sequence object hash/HMAC stack
12061 else if(object->attributes.hmacSeq == SET)
12064 *hashObject = (HASH_OBJECT *)object;
12065 // Update sequence object hash/HMAC stack
12107 Proper authorization for the sequence object associated with sequenceHandle is required. If an
12110 If this command completes successfully, the sequenceHandle object will be flushed.
12280 object
12295 *object;
12300 // Get hash object pointer
12301 object = ObjectGet(in->sequenceHandle);
12302 // input handle must be a hash or HMAC sequence object.
12304 object->attributes.hashSeq == CLEAR
12305 && object->attributes.hmacSeq == CLEAR)
12308 if(object->attributes.hashSeq == SET)
12309 // sequence object for hash
12313 *hashObject = (HASH_OBJECT *)object;
12389 else if(object->attributes.ticketSafe == CLEAR)
12406 *hashObject = (HASH_OBJECT *)object;
12422 // mark sequence object as evict so it will be flushed on the way out
12423 object->attributes.evict = SET;
12450 Proper authorization for the sequence object associated with sequenceHandle is required. If an
12453 If this command completes successfully, the sequenceHandle object will be flushed.
12618 input handle is not a valid event sequence object
12644 // get the event sequence object pointer
12646 // input handle must reference an event sequence object
12729 // mark sequence object as evict so it will be flushed on the way out
12842 The purpose of this command is to prove that an object with a specific Name is loaded in the TPM. By
12843 certifying that the object is loaded, the TPM warrants that a public area with a given Name is self…
12852 use. That is, authority to use an object does not grant authority to certify the object.
12853 The object may be any object that is loaded with TPM2_Load() or TPM2_CreatePrimary(). An object that
12857 The restriction occurs because the Name is used to identify the object being certified. If the TPM
12859 area may not represent a valid object a nd cannot be certified.
12861 The certification includes the Name and Qualified Name of the certified object as well as the Name …
12862 the Qualified Name of the certifying object.
12901 handle of the object to be certified
13085 // Certified object name
13089 // Certified object qualified name
13162 This command is used to prove the association between an object and its creation data. The TPM will
13185 ObjectHandle may be any object that is loaded with TPM2_Load() or TPM2_CreatePrimary().
13234 the object associated with the creation data
13409 // Get certified object name
15652 The sensitive area of the symmetric object is required to allow verification of the symmetric
15844 // Get sign object pointer
15846 // The object to validate the signature must be a signing key.
15897 // Get object name that verifies the signature
18186 If no object memory is available for creation of the sequence context, the TPM will flush the conte…
18187 object so that creation of the Event sequence context will always succeed.
18192 object context slot is available or to deal with the consequences of having the TPM select an
18193 arbitrary object to be flushed. If this indication occurs before TPM2_Startup() then all context sl…
18274 // If a DRTM sequence object exists, terminate it.
18277 // Create an event sequence object and store the handle in global
18293 // so that it can be assigned for use as the DRTM sequence object.
18296 // try to flush the first object
18305 // Try to create an event sequence object again. This time, we must
18410 // If there is no DRTM sequence object, then _TPM_Hash_Start
18422 // Update sequence object
18588 // Get DRTM sequence object
18647 // Flush sequence object.
18677 authorizations required to use an object have been provided. Many of the commands will also modify
19027 The authorizing object will sign a digest of the authorization qualifiers: nonceTPM, expiration, cp…
19051 time limit on authorization set by authorizing object. This 32-bit
19378 // pointer for the object
19491 expiration time limit on authorization set by authorizing object.
19509 object. Set to the NULLdigest if no hash is present.
20128 name of the object that provided the authorization
23203 For the TPM2_Duplicate() command, two handles are provided. One is the handle of the object
23242 This command will often be used with TPM2_PolicyAuthorize() where the owner of the object being
23243 duplicated provides approval for their object to be migrated to a specific new parent.
23473 When an object is created when the list of allowed duplication targets is known, the policy would be
23522 is only valid for a specific pair of duplication object and new parent.
23529 want to limit the authorization so that the approval allows only a specific object to be duplicated…
23581 the Name of the object to be duplicated
23827 and it is more efficient to check a ticket than to load an object each time to chec k a signature.
23830 The keySign parameter is required to be a valid object name using nameAlg other than TPM_ALG_NULL.
24076 // Compute aHash. The authorizing object sign a digest
24163 This command allows a policy to be bound to the authorization value of the authorized object.
24360 This command allows a policy to be bound to the authorization value of the authorized object.
24362 authValue of the authorized object will be checked when the session is used for authorization. The …
24379 done using either an HMAC or a password with no change to the authPolicy of the object. The
24566 to perform the actions required to pre-compute the authPolicy for an object.
24982 under TPM_RH_NULL. The command uses a TPM2B_PUBLIC as a template for the object to be created.
24991 Any type of object and attributes combination that is allowed by TPM2_Create() may be created by th…
24995 For setting of the attributes of the created object, fixedParent, fixedTPM, userWithAuth, adminWith…
24998 The TPM will derive the object from the Primary Seed indicated in primaryHandle using an approved
25076 object to provide permanent, verifiable linkage between
25077 this object and some object owner data
25116 the public portion of the created object
25141 the name of the created object
25178 between themselves or with those of the parent object; inconsistent
25185 incorrect KDF specified for decrypting keyed hash object
25189 there is no free slot for the object
25195 object
25201 hash object is larger than is allowed for the scheme
25241 unknown object type;
25264 // the size of the data object in inSensitive.
25268 // Mismatch between the object attributes and the parameter.
25352 // Create a internal object. A TPM_RC_OBJECT_MEMORY error may be returned
26190 // Flush loaded object in platform hierarchy
26192 // Flush platform evict object and index in NV
26412 // Flush loaded object in endorsement hierarchy
26414 // Flush evict object of endorsement hierarchy stored in NV
26687 // Flush loaded object in storage and endorsement hierarchy
26690 // Flush owner and endorsement object and owner index in NV
27218 object’s or Index’s authValue unless the authorization applies to an entry in the Platform hierarch…
28129 Persistent object allocations and contents; and
28672 This command saves a session context, object context, or sequence object context outside the TPM.
28888 // handle of an object will be replaced, while the output handle
28897 // Perform object or session specific context save
28983 *object = ObjectGet(in->saveHandle);
28992 fingerprintSize + sizeof(*object);
28995 *outObject = *object;
28996 // Increment object context ID
28998 // If object context ID overflows, TPM should be put in failure mode
29001 // Fill in other return values for an object.
29003 // For regular object, savedHandle is 0x80000000. For sequence object,
29004 // savedHandle is 0x80000001. For object with stClear, savedHandle
29006 if(ObjectIsSequence(object))
29009 SequenceDataImportExport(object, outObject, EXPORT_STATE);
29011 else if(object->attributes.stClear == SET)
29019 // Get object hierarchy
29020 out->context.hierarchy = ObjectDataGetHierarchy(object);
29128 // SaveContext may only take an object handle or a session handle.
29146 // Compute integrity hash for the object
29183 Contexts for authorization sessions and for sequence object s belong to the NULL hierarchy which is
29303 no free slot for an object
29504 // Perform object or session specific input check
29509 // Get a pointer to the object in the context blob
29515 // If hierarchy is disabled, no object context can be loaded in this
29519 // Restore object. A TPM_RC_OBJECT_MEMORY error may be returned at
29524 // If this is a sequence object, the crypto library may need to
29617 // Context blob may only have an object handle or a session handle.
29643 This command causes all context associated with a loaded object or session to be removed from TPM
29645 This command may not be used to remove a persistent object from the TPM.
29667 If the handle is for a transient object and the handle is not associated with a loaded object, then…
29807 flushHandle does not reference a loaded object or session
29820 // Call object or session specific routine to flush
29826 // Flush object
29844 // This command only take object or session handle.
29873 This command allows a transient object to be made persistent or a persistent object to be evicted.
29876 A transient object is one that may be removed from TPM memory using either TPM2_FlushContext
29877 or TPM2_Startup(). A persistent object is not removed from TPM memory by TPM2_FlushContext()
29880 If objectHandle is a transient object, then the call is to make the object persistent and assign
29881 persistentHandle to the persistent version of the object. If objectHandle is a persistent object, t…
29882 is to evict the persistent object.
29884 object that is resident on the TPM and that persistentHandle is a valid handle for a persistent obj…
29888 is always a persistent object.
29890 If objectHandle references a transient object:
29893 2) only the public portion of the object is loaded, or
29894 3) the stClear is SET in the object or in an ancestor key.
29895 b) The TPM shall return TPM_RC_HIERARCHY if the object is not in the proper hierarchy as
29906 d) The TPM shall return TPM_RC_NV_DEFINED if a persistent object exists with the same handle as
29908 e) The TPM shall return TPM_RC_NV_SPACE if insufficient space is available to make the object
29916 …s non volatile and not subject to endurance issues. In such case, there is no movement of an object
29934 g) If the TPM returns TPM_RC_SUCCESS, the object referenced by objectHandle will not be flushed
29935 and both objectHandle and persistentHandle may be used to access the object.
29936 If objectHandle references a persistent object:
29939 81 7F FF FF16. If auth is TPM_RC_PLATFORM, objectHandle may be any valid persistent object
29948 The persistent object is not converted to a transient object, as this would prevent the immediate
29949 revocation of an object by removing it from persistent memory.
29996 the handle of a loaded object
30003 if objectHandle is a transient object handle, then this is
30004 the persistent handle for the object
30005 if objectHandle is a persistent object handle, then this
30053 an object with temporary, stClear or publicOnly attribute SET cannot
30062 evictHandle of the persistent object to be evicted is not the same as
30144 // Get internal object pointer
30153 // If objectHandle refers to a persistent object, it should be the same as
30166 // Platform auth can not set evict object in storage or endorsement
30236 // Platform auth can delete any persistent object
30240 // Owner auth can not set or clear evict object in platform hierarchy
30260 // Make object persistent
30268 // Delete the persistent object in NV
30821 the first read, set the property to TRANSIENT_FIRST and propertyCount to one. If a transient object
32547 object does not grant authority to undefined the object.
35057 authorization value of the referenced object.
35110 handle of the object