Rev 1212 | Rev 1278 | Go to most recent revision | Show entire file | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed
| Rev 1212 | Rev 1264 | ||
|---|---|---|---|
| Line 25... | Line 25... | ||
| 25 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
25 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| 26 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
26 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 27 | */ |
27 | */ |
| 28 | 28 | ||
| 29 | /** |
29 | /** |
| - | 30 | * @file cap.h |
|
| 30 | * Capabilities definitions. |
31 | * @brief Capabilities definitions. |
| - | 32 | * |
|
| - | 33 | * Capabilities represent virtual rights that entitle their |
|
| - | 34 | * holder to perform certain security sensitive tasks. |
|
| - | 35 | * |
|
| 31 | * Each task can have arbitrary combination of the capabilities |
36 | * Each task can have arbitrary combination of the capabilities |
| 32 | * defined in this file. Therefore, they are required to be powers |
37 | * defined in this file. Therefore, they are required to be powers |
| 33 | * of two. |
38 | * of two. |
| 34 | */ |
39 | */ |
| 35 | 40 | ||