HomeSort by relevance Sort by last modified time
    Searched full:levelrange (Results 1 - 25 of 25) sorted by null

  /external/selinux/secilc/docs/
cil_mls_labeling_statements.md 4 Because there are many options for MLS labeling, the examples show a limited selection of statements, however there is a simple policy that will build shown in the [`levelrange`](cil_mls_labeling_statements.md#levelrange) section.
304 - Category expressions are allowed in [`categoryset`](cil_mls_labeling_statements.md#categoryset), [`sensitivitycategory`](cil_mls_labeling_statements.md#sensitivitycategory), [`level`](cil_mls_labeling_statements.md#level), and [`levelrange`](cil_mls_labeling_statements.md#levelrange) statements.
464 levelrange
471 (levelrange levelrange_id (low_level_id high_level_id))
482 <td align="left"><p><code>levelrange</code></p></td>
483 <td align="left"><p>The <code>levelrange</code> keyword.</p></td>
487 <td align="left"><p>The <code>levelrange</code> identifier.</p></td>
502 This example policy shows [`levelrange`](cil_mls_labeling_statements.md#levelrange) statement and all the other MLS labeling statements d (…)
    [all...]
cil_xen_statements.md 37 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
77 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
115 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
153 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
191 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
cil_user_statements.md 225 Associates a previously declared [`user`](cil_user_statements.md#user) identifer with a previously declared [`levelrange`](cil_mls_labeling_statements.md#levelrange) identifier. The [`levelrange`](cil_mls_labeling_statements.md#levelrange) may be named or anonymous.
249 <td align="left"><p>A previously declared <code>levelrange</code> identifier. This may be formed by named or anonymous components as discussed in the <code>levelrange</code> statement and shown in the examples.</p></td>
256 This example will associate `unconfined.user` with a named [`levelrange`](cil_mls_labeling_statements.md#levelrange) of `low_high`, other anonymous examples are also shown:
267 (levelrange low_high (systemLow systemHigh))
cil_context_statement.md 51 <td align="left"><p>A single previously declared <code>levelrange</code> identifier. This entry may also be defined by anonymous or named <code>level</code>, <code>sensitivity</code>, <code>sensitivityalias</code>, <code>category</code>, <code>categoryalias</code> or <code>categoryset</code> as discussed in the <a href="#mls_labeling_statements">Multi-Level Security Labeling Statements</a> section and shown in the examples.</p></td>
68 This example uses an anonymous context where the previously declared `user role type levelrange` identifiers are used to specifiy two [`portcon`](cil_network_labeling_statements.md#portcon) statements:
cil_network_labeling_statements.md 82 <p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
87 <p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
136 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
188 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
README.md 93 * [levelrange](cil_mls_labeling_statements.md#levelrange)
cil_file_labeling_statements.md 81 <li><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></li>
141 <p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
201 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
cil_sid_statements.md 105 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
cil_reference_guide.md 55 levelrange
240 Category expressions are also allowed in [`sensitivitycategory`](cil_mls_labeling_statements.md#sensitivitycategory), [`level`](cil_mls_labeling_statements.md#level), and [`levelrange`](cil_mls_labeling_statements.md#levelrange) statements.
cil_call_macro_statements.md 83 <p>The list of valid <code>param_type</code> entries are: <code>type</code>, <code>typealias</code>, <code>role</code>, <code>user</code>, <code>sensitivity</code>, <code>sensitivityalias</code>, <code>category</code>, <code>categoryalias</code>, <code>categoryset</code> (named or anonymous), <code>level</code> (named or anonymous), <code>levelrange</code> (named or anonymous), <code>class</code>, <code>classpermission</code> (named or anonymous), <code>ipaddr</code> (named or anonymous), <code>block</code>, <code>name</code> (a string), <code>classmap</code></p></td>
  /external/selinux/secilc/test/
policy.cil 42 (levelrange low_high (low high))
43 (levelrange lh1 ((s0 (c0)) (s2 (c0 c3))))
44 (levelrange lh2 (low (s2 (c0 c3))))
45 (levelrange lh3 ((s0 cats04) (s2 (range c0 c5))))
46 (levelrange lh4 ((s0) (s1)))
integration.cil 26 (levelrange low_high (low high))
  /external/selinux/libsepol/cil/src/
cil_reset_ast.c 9 static inline void cil_reset_levelrange(struct cil_levelrange *levelrange);
245 static inline void cil_reset_levelrange(struct cil_levelrange *levelrange)
247 if (levelrange->low_str == NULL) {
248 cil_reset_level(levelrange->low);
251 if (levelrange->high_str == NULL) {
252 cil_reset_level(levelrange->high);
cil_resolve_ast.h 72 int cil_resolve_levelrange(struct cil_tree_node *current, struct cil_levelrange *levelrange, void *extra_args);
cil_post.c     [all...]
cil_resolve_ast.c 659 /* This could still be an anonymous levelrange even if range_str is set, if range_str is a param_str*/
878 /* This could still be an anonymous levelrange even if levelrange_str is set, if levelrange_str is a param_str*/
955 /* This could still be an anonymous levelrange even if range_str is set, if range_str is a param_str*/
    [all...]
cil_copy_ast.c 1029 cil_log(CIL_INFO, "cil_copy_levelrange: levelrange cannot be redefined\n");
    [all...]
cil_tree.c 1244 cil_log(CIL_INFO, "LEVELRANGE %s:", lvlrange->datum.name);
    [all...]
cil.c 131 CIL_KEY_LEVELRANGE = cil_strpool_add("levelrange");
    [all...]
cil_build_ast.c     [all...]
  /frameworks/base/media/tests/MediaFrameworkTest/src/com/android/mediaframeworktest/functional/audio/
MediaEqualizerTest.java 134 short[] levelRange = mEqualizer.getBandLevelRange();
135 assertTrue(msg + ": min level too high", levelRange[0] <= MIN_BAND_LEVEL);
136 assertTrue(msg + ": max level too low", levelRange[1] >= MAX_BAND_LEVEL);
138 mEqualizer.setBandLevel((short)0, levelRange[1]);
142 ((float)level > (float)levelRange[1] * 0.9f) &&
143 ((float)level < (float)levelRange[1] * 1.1f));
  /cts/tests/tests/media/src/android/media/cts/
EqualizerTest.java 83 short[] levelRange = mEqualizer.getBandLevelRange();
84 assertTrue("min level too high", levelRange[0] <= MAX_LEVEL_RANGE_LOW);
85 assertTrue("max level too low", levelRange[1] >= MIN_LEVEL_RANGE_HIGH);
87 mEqualizer.setBandLevel((short)0, levelRange[1]);
91 (level >= (levelRange[1] - TOLERANCE)) &&
92 (level <= (levelRange[1] + TOLERANCE)));
  /external/opencv3/3rdparty/openexr/IlmImf/
ImfInputFile.cpp 222 Box2i levelRange = ifd->tFile->dataWindowForLevel(0);
262 int xStart = levelRange.min.x;
293 x <= levelRange.max.x;
  /external/selinux/libsepol/cil/test/unit/
test_cil_resolve_ast.c     [all...]
test_cil_build_ast.c     [all...]

Completed in 478 milliseconds