/dports/databases/hbase/hbase-1.2.1/hbase-server/src/test/java/org/apache/hadoop/hbase/security/visibility/ |
H A D | TestWithDisabledAuthorization.java | 57 private static final String CONFIDENTIAL = "confidential"; field in TestWithDisabledAuthorization 100 new String[] { SECRET, CONFIDENTIAL, PRIVATE }); in setUpBeforeClass() 102 new String[] { SECRET, CONFIDENTIAL }, in setUpBeforeClass() 125 new String[] { SECRET, CONFIDENTIAL }, in testManageUserAuths() 155 assertTrue(authsList.contains(CONFIDENTIAL)); in testManageUserAuths() 172 assertTrue(authsList.contains(CONFIDENTIAL)); in testManageUserAuths() 178 new String[] { CONFIDENTIAL }, in testManageUserAuths() 198 SECRET + "|" + CONFIDENTIAL, in testPassiveVisibility() 199 PRIVATE + "|" + CONFIDENTIAL)) { in testPassiveVisibility() 213 s.setAuthorizations(new Authorizations(SECRET, CONFIDENTIAL)); in testPassiveVisibility() [all …]
|
H A D | TestVisibilityLabelsWithDeletes.java | 71 private static final String CONFIDENTIAL = "CONFIDENTIAL"; field in TestVisibilityLabelsWithDeletes 158 CONFIDENTIAL + "|" + TOPSECRET);) { in testVisibilityLabelsWithDeleteFamily() 196 CONFIDENTIAL + "|" + TOPSECRET, SECRET)) { in testVisibilityLabelsWithDeleteFamilyVersion() 234 CONFIDENTIAL + "|" + TOPSECRET, SECRET);) { in testVisibilityLabelsWithDeleteColumnExactVersion() 507 d.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testDeleteColumnsWithoutAndWithVisibilityLabels() 544 d.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testDeleteColumnsWithAndWithoutVisibilityLabels() 621 d.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testDeleteFamiliesWithoutAndWithVisibilityLabels() 657 d.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testDeleteFamiliesWithAndWithoutVisibilityLabels() 736 d.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testDeletesWithoutAndWithVisibilityLabels() 822 s.setAuthorizations(new Authorizations(CONFIDENTIAL)); in testVisibilityLabelsWithDeleteFamilyWithPutsReAppearing() [all …]
|
H A D | TestVisibilityLabelsWithACL.java | 64 private static final String CONFIDENTIAL = "confidential"; field in TestVisibilityLabelsWithACL 120 final Table table = createTableAndWriteDataWithLabels(tableName, SECRET + "&" + CONFIDENTIAL in testScanForUserWithFewerLabelAuthsThanLabelsInScanAuthorizations() 127 s.setAuthorizations(new Authorizations(SECRET, CONFIDENTIAL)); in testScanForUserWithFewerLabelAuthsThanLabelsInScanAuthorizations() 151 final Table table = createTableAndWriteDataWithLabels(tableName, SECRET + "&" + CONFIDENTIAL in testScanForSuperUserWithFewerLabelAuths() 156 s.setAuthorizations(new Authorizations(SECRET, CONFIDENTIAL)); in testScanForSuperUserWithFewerLabelAuths() 175 final Table table = createTableAndWriteDataWithLabels(tableName, SECRET + "&" + CONFIDENTIAL in testGetForSuperUserWithFewerLabelAuths() 180 g.setAuthorizations(new Authorizations(SECRET, CONFIDENTIAL)); in testGetForSuperUserWithFewerLabelAuths() 209 g.setAuthorizations(new Authorizations(SECRET, CONFIDENTIAL)); in testVisibilityLabelsForUserWithNoAuths() 271 CONFIDENTIAL, PRIVATE }, "user1"); in testLabelsTableOpsWithDifferentUsers() 308 assertTrue(authsList.contains(CONFIDENTIAL)); in testLabelsTableOpsWithDifferentUsers() [all …]
|
H A D | TestVisibilityLabels.java | 86 public static final String CONFIDENTIAL = "confidential"; field in TestVisibilityLabels 131 PRIVATE + "|" + CONFIDENTIAL)) { in testSimpleVisibilityLabels() 216 + CONFIDENTIAL + ")" + "&" + "!" + TOPSECRET, "(" + PRIVATE + "&" + CONFIDENTIAL + "&" in testVisibilityLabelsWithComplexLabels() 218 + "&" + CONFIDENTIAL + "&" + SECRET + ")")) { in testVisibilityLabelsWithComplexLabels() 246 "(" + SECRET + "|" + CONFIDENTIAL + ")", PRIVATE)){ in testVisibilityLabelsThatDoesNotPassTheCriteria() 269 + CONFIDENTIAL + ")", PRIVATE)){ in testVisibilityLabelsInScanThatDoesNotMatchAnyDefinedLabels() 428 String[] auths = { SECRET, CONFIDENTIAL }; in testSetAndGetUserAuths() 448 assertTrue(auths.contains(CONFIDENTIAL)); in testSetAndGetUserAuths() 466 assertTrue(authsList.contains(CONFIDENTIAL)); in testSetAndGetUserAuths() 475 String[] auths1 = { SECRET, CONFIDENTIAL }; in testSetAndGetUserAuths() [all …]
|
H A D | TestVisibilityLabelsOpWithDifferentUsersNoACL.java | 50 private static final String CONFIDENTIAL = "confidential"; field in TestVisibilityLabelsOpWithDifferentUsersNoACL 89 return VisibilityClient.setAuths(conn, new String[] { CONFIDENTIAL, PRIVATE }, "user1"); in testLabelsTableOpsWithDifferentUsers() 103 return VisibilityClient.setAuths(conn, new String[] { CONFIDENTIAL, PRIVATE }, "user3"); in testLabelsTableOpsWithDifferentUsers() 135 assertTrue(authsList.contains(CONFIDENTIAL)); in testLabelsTableOpsWithDifferentUsers() 143 CONFIDENTIAL, PRIVATE }, "user1"); in testLabelsTableOpsWithDifferentUsers() 165 String[] labels = { SECRET, CONFIDENTIAL, PRIVATE }; in addLabels()
|
H A D | TestVisibilityLabelsWithSLGStack.java | 52 public static final String CONFIDENTIAL = "confidential"; field in TestVisibilityLabelsWithSLGStack 93 put.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testWithSAGStack() 96 LabelFilteringScanLabelGenerator.labelToFilter = CONFIDENTIAL; in testWithSAGStack() 98 s.setAuthorizations(new Authorizations(SECRET, CONFIDENTIAL)); in testWithSAGStack() 110 String[] labels = { SECRET, CONFIDENTIAL }; in addLabels()
|
H A D | TestEnforcingScanLabelGenerator.java | 51 public static final String CONFIDENTIAL = "confidential"; field in TestEnforcingScanLabelGenerator 87 VisibilityClient.addLabels(conn, new String[] { SECRET, CONFIDENTIAL }); in setupBeforeClass() 88 VisibilityClient.setAuths(conn, new String[] { CONFIDENTIAL, }, TESTUSER.getShortName()); in setupBeforeClass() 111 put.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testEnforcingScanLabelGenerator() 143 get.setAuthorizations(new Authorizations(new String[] { SECRET, CONFIDENTIAL })); in testEnforcingScanLabelGenerator()
|
H A D | TestVisibilityLablesWithGroups.java | 61 public static final String CONFIDENTIAL = "confidential"; field in TestVisibilityLablesWithGroups 100 VisibilityClient.addLabels(conn, new String[] { SECRET, CONFIDENTIAL }); in setupBeforeClass() 102 VisibilityClient.setAuths(conn, new String[] { CONFIDENTIAL }, "@testgroup"); in setupBeforeClass() 127 put.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testGroupAuths() 186 assertTrue(authsList.contains(CONFIDENTIAL)); in testGroupAuths() 222 s1.setAuthorizations(new Authorizations(new String[] { SECRET, CONFIDENTIAL })); in testGroupAuths() 271 CONFIDENTIAL }, "@testgroup"); in testGroupAuths() 306 s1.setAuthorizations(new Authorizations(new String[] { SECRET, CONFIDENTIAL })); in testGroupAuths()
|
H A D | TestVisibilityLabelsReplication.java | 94 public static final String CONFIDENTIAL = "confidential"; field in TestVisibilityLabelsReplication 223 "(" + SECRET + "&" + PUBLIC + ")" + "|(" + CONFIDENTIAL in testVisibilityReplication() 224 + ")&(" + TOPSECRET + ")", "(" + PRIVATE + "|" + CONFIDENTIAL + ")&(" + PUBLIC + "|" in testVisibilityReplication() 225 + TOPSECRET + ")", "(" + SECRET + "|" + CONFIDENTIAL + ")" + "&" + "!" + TOPSECRET, in testVisibilityReplication() 228 s.setAuthorizations(new Authorizations(SECRET, CONFIDENTIAL, PRIVATE, TOPSECRET, in testVisibilityReplication() 266 verifyGet(row1, expectedVisString[0], expected[0], false, TOPSECRET, CONFIDENTIAL); in testVisibilityReplication() 268 verifyGet(row2, expectedVisString[1], expected[1], false, CONFIDENTIAL, PUBLIC); in testVisibilityReplication() 352 String[] labels = { SECRET, TOPSECRET, CONFIDENTIAL, PUBLIC, PRIVATE, UNICODE_VIS_TAG }; in addLabels() 370 CONFIDENTIAL, PRIVATE, TOPSECRET, UNICODE_VIS_TAG }, "user1"); in setAuths()
|
H A D | TestDefaultScanLabelGeneratorStack.java | 53 public static final String CONFIDENTIAL = "confidential"; field in TestDefaultScanLabelGeneratorStack 89 VisibilityClient.addLabels(conn, new String[] { SECRET, CONFIDENTIAL }); in setupBeforeClass() 90 VisibilityClient.setAuths(conn, new String[] { CONFIDENTIAL }, TESTUSER.getShortName()); in setupBeforeClass() 113 put.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testDefaultScanLabelGeneratorStack() 189 s1.setAuthorizations(new Authorizations(new String[] { SECRET, CONFIDENTIAL })); in testDefaultScanLabelGeneratorStack()
|
/dports/graphics/dia/dia-0.97.3/objects/SISSI/ |
H A D | classification.h | 22 CONFIDENTIAL, enumerator 41 { N_("Confidential") , CONFIDENTIAL },
|
/dports/databases/hbase/hbase-1.2.1/hbase-it/src/test/java/org/apache/hadoop/hbase/test/ |
H A D | IntegrationTestWithCellVisibilityLoadAndVerify.java | 86 private static final String CONFIDENTIAL = "confidential"; field in IntegrationTestWithCellVisibilityLoadAndVerify 91 private static final String[] LABELS = { CONFIDENTIAL, TOPSECRET, SECRET, PRIVATE, PUBLIC }; 92 private static final String[] VISIBILITY_EXPS = { CONFIDENTIAL + AND + TOPSECRET + AND + PRIVATE, 93 CONFIDENTIAL + OR + TOPSECRET, PUBLIC, 94 '(' + SECRET + OR + PRIVATE + ')' + AND + NOT + CONFIDENTIAL }; 144 VisibilityClient.setAuths(util.getConnection(), new String[] { CONFIDENTIAL, TOPSECRET, in addLabelsAndAuths() 267 System.out.println(String.format("Verifying for auths %s, %s, %s, %s", CONFIDENTIAL, TOPSECRET, in doVerify() 272 return doVerify(conf, htd, CONFIDENTIAL, TOPSECRET, SECRET, PRIVATE); in doVerify()
|
/dports/databases/hbase/hbase-1.2.1/hbase-rest/src/test/java/org/apache/hadoop/hbase/rest/ |
H A D | TestScannersWithLabels.java | 82 private final static String CONFIDENTIAL = "confidential"; field in TestScannersWithLabels 103 put.setCellVisibility(new CellVisibility("(" + SECRET + "|" + CONFIDENTIAL + ")" + "&" + "!" in insertData() 170 String[] labels = { SECRET, CONFIDENTIAL, PRIVATE, PUBLIC, TOPSECRET }; in createLabels() 182 String[] labels = { SECRET, CONFIDENTIAL, PRIVATE, PUBLIC, TOPSECRET }; in setAuths()
|
/dports/databases/hbase/hbase-1.2.1/hbase-thrift/src/test/java/org/apache/hadoop/hbase/thrift2/ |
H A D | TestThriftHBaseServiceHandlerWithLabels.java | 97 private final static String CONFIDENTIAL = "confidential"; field in TestThriftHBaseServiceHandlerWithLabels 156 String[] labels = { SECRET, CONFIDENTIAL, PRIVATE, PUBLIC, TOPSECRET }; in createLabels() 169 String[] labels = { SECRET, CONFIDENTIAL, PRIVATE, PUBLIC, TOPSECRET }; in setAuths() 207 + "|" + CONFIDENTIAL + ")" + "&" + "!" + TOPSECRET)); in testScanWithVisibilityLabels() 277 + "|" + CONFIDENTIAL + ")" + "&" + "!" + TOPSECRET)); in testGetScannerResultsWithAuthorizations() 332 + CONFIDENTIAL + ")" + "&" + "!" + TOPSECRET)); in testGetsWithLabels()
|
/dports/mail/rainloop-community/rainloop-community-php74-1.16.0_1/rainloop/v/1.16.0/app/libraries/MailSo/Mime/Enumerations/ |
H A D | Sensitivity.php | 22 const CONFIDENTIAL = 1; define in MailSo\\Mime\\Enumerations\\Sensitivity
|
/dports/mail/rainloop/rainloop-php74-1.16.0_1/rainloop/v/1.16.0/app/libraries/MailSo/Mime/Enumerations/ |
H A D | Sensitivity.php | 22 const CONFIDENTIAL = 1; define in MailSo\\Mime\\Enumerations\\Sensitivity
|
/dports/devel/p5-Text-vFile-asData/Text-vFile-asData-0.08/examples/rfc2445-objects/ |
H A D | 4.6.1-event-3.ics | 6 CLASS:CONFIDENTIAL
|
H A D | 4.6.2-todo-1.ics | 7 CLASS:CONFIDENTIAL
|
/dports/java/openjdk11/jdk11u-jdk-11.0.13-8-1/test/jdk/javax/crypto/SecretKeyFactory/ |
H A D | security.properties | 2 # ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.
|
/dports/java/openjdk13/jdk13u-jdk-13.0.10-1-1/test/jdk/javax/crypto/SecretKeyFactory/ |
H A D | security.properties | 2 # ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.
|
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/test/jdk/javax/crypto/SecretKeyFactory/ |
H A D | security.properties | 2 # ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.
|
/dports/java/openjdk15/jdk15u-jdk-15.0.6-1-1/test/jdk/javax/crypto/SecretKeyFactory/ |
H A D | security.properties | 2 # ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.
|
/dports/java/openjdk11-jre/jdk11u-jdk-11.0.13-8-1/test/jdk/javax/crypto/SecretKeyFactory/ |
H A D | security.properties | 2 # ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.
|
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/test/jdk/javax/crypto/SecretKeyFactory/ |
H A D | security.properties | 2 # ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.
|
/dports/databases/evolution-data-server/evolution-data-server-3.42.1/tests/libedata-cal/components/ |
H A D | event-2.ics | 12 CLASS:CONFIDENTIAL
|