Next: Example
Up: HARDWARE HELP
Previous: Lock or unlock a
Using a create-new-lock-and-key authorization, and presenting a
source-type representation and a set of access-field-check-bits, a
program may obtain two new capabilities. One will be a lock, the other
a key, otherwise they will be identical. The target-type subfield of
each will be a new, never before seen type. The source-type and
access-field-check-bits will be as given. All access bits will be on
in both.
Any lock or key capabilities created subsequently, with the same
target-type, must be copies of these just created capabilities. They
will have the same source type and access-field-check bits, since all
copy operations leave the datum parts of a capability unchanged. Thus,
the condition required above is met.
Paul McJones
1998-06-22