Home
last modified time | relevance | path

Searched refs:CONFIDENTIAL (Results 1 – 25 of 1917) sorted by relevance

12345678910>>...77

/dports/databases/hbase/hbase-1.2.1/hbase-server/src/test/java/org/apache/hadoop/hbase/security/visibility/
H A DTestWithDisabledAuthorization.java57 private static final String CONFIDENTIAL = "confidential"; field in TestWithDisabledAuthorization
100 new String[] { SECRET, CONFIDENTIAL, PRIVATE }); in setUpBeforeClass()
102 new String[] { SECRET, CONFIDENTIAL }, in setUpBeforeClass()
125 new String[] { SECRET, CONFIDENTIAL }, in testManageUserAuths()
155 assertTrue(authsList.contains(CONFIDENTIAL)); in testManageUserAuths()
172 assertTrue(authsList.contains(CONFIDENTIAL)); in testManageUserAuths()
178 new String[] { CONFIDENTIAL }, in testManageUserAuths()
198 SECRET + "|" + CONFIDENTIAL, in testPassiveVisibility()
199 PRIVATE + "|" + CONFIDENTIAL)) { in testPassiveVisibility()
213 s.setAuthorizations(new Authorizations(SECRET, CONFIDENTIAL)); in testPassiveVisibility()
[all …]
H A DTestVisibilityLabelsWithDeletes.java71 private static final String CONFIDENTIAL = "CONFIDENTIAL"; field in TestVisibilityLabelsWithDeletes
158 CONFIDENTIAL + "|" + TOPSECRET);) { in testVisibilityLabelsWithDeleteFamily()
196 CONFIDENTIAL + "|" + TOPSECRET, SECRET)) { in testVisibilityLabelsWithDeleteFamilyVersion()
234 CONFIDENTIAL + "|" + TOPSECRET, SECRET);) { in testVisibilityLabelsWithDeleteColumnExactVersion()
507 d.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testDeleteColumnsWithoutAndWithVisibilityLabels()
544 d.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testDeleteColumnsWithAndWithoutVisibilityLabels()
621 d.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testDeleteFamiliesWithoutAndWithVisibilityLabels()
657 d.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testDeleteFamiliesWithAndWithoutVisibilityLabels()
736 d.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testDeletesWithoutAndWithVisibilityLabels()
822 s.setAuthorizations(new Authorizations(CONFIDENTIAL)); in testVisibilityLabelsWithDeleteFamilyWithPutsReAppearing()
[all …]
H A DTestVisibilityLabelsWithACL.java64 private static final String CONFIDENTIAL = "confidential"; field in TestVisibilityLabelsWithACL
120 final Table table = createTableAndWriteDataWithLabels(tableName, SECRET + "&" + CONFIDENTIAL in testScanForUserWithFewerLabelAuthsThanLabelsInScanAuthorizations()
127 s.setAuthorizations(new Authorizations(SECRET, CONFIDENTIAL)); in testScanForUserWithFewerLabelAuthsThanLabelsInScanAuthorizations()
151 final Table table = createTableAndWriteDataWithLabels(tableName, SECRET + "&" + CONFIDENTIAL in testScanForSuperUserWithFewerLabelAuths()
156 s.setAuthorizations(new Authorizations(SECRET, CONFIDENTIAL)); in testScanForSuperUserWithFewerLabelAuths()
175 final Table table = createTableAndWriteDataWithLabels(tableName, SECRET + "&" + CONFIDENTIAL in testGetForSuperUserWithFewerLabelAuths()
180 g.setAuthorizations(new Authorizations(SECRET, CONFIDENTIAL)); in testGetForSuperUserWithFewerLabelAuths()
209 g.setAuthorizations(new Authorizations(SECRET, CONFIDENTIAL)); in testVisibilityLabelsForUserWithNoAuths()
271 CONFIDENTIAL, PRIVATE }, "user1"); in testLabelsTableOpsWithDifferentUsers()
308 assertTrue(authsList.contains(CONFIDENTIAL)); in testLabelsTableOpsWithDifferentUsers()
[all …]
H A DTestVisibilityLabels.java86 public static final String CONFIDENTIAL = "confidential"; field in TestVisibilityLabels
131 PRIVATE + "|" + CONFIDENTIAL)) { in testSimpleVisibilityLabels()
216 + CONFIDENTIAL + ")" + "&" + "!" + TOPSECRET, "(" + PRIVATE + "&" + CONFIDENTIAL + "&" in testVisibilityLabelsWithComplexLabels()
218 + "&" + CONFIDENTIAL + "&" + SECRET + ")")) { in testVisibilityLabelsWithComplexLabels()
246 "(" + SECRET + "|" + CONFIDENTIAL + ")", PRIVATE)){ in testVisibilityLabelsThatDoesNotPassTheCriteria()
269 + CONFIDENTIAL + ")", PRIVATE)){ in testVisibilityLabelsInScanThatDoesNotMatchAnyDefinedLabels()
428 String[] auths = { SECRET, CONFIDENTIAL }; in testSetAndGetUserAuths()
448 assertTrue(auths.contains(CONFIDENTIAL)); in testSetAndGetUserAuths()
466 assertTrue(authsList.contains(CONFIDENTIAL)); in testSetAndGetUserAuths()
475 String[] auths1 = { SECRET, CONFIDENTIAL }; in testSetAndGetUserAuths()
[all …]
H A DTestVisibilityLabelsOpWithDifferentUsersNoACL.java50 private static final String CONFIDENTIAL = "confidential"; field in TestVisibilityLabelsOpWithDifferentUsersNoACL
89 return VisibilityClient.setAuths(conn, new String[] { CONFIDENTIAL, PRIVATE }, "user1"); in testLabelsTableOpsWithDifferentUsers()
103 return VisibilityClient.setAuths(conn, new String[] { CONFIDENTIAL, PRIVATE }, "user3"); in testLabelsTableOpsWithDifferentUsers()
135 assertTrue(authsList.contains(CONFIDENTIAL)); in testLabelsTableOpsWithDifferentUsers()
143 CONFIDENTIAL, PRIVATE }, "user1"); in testLabelsTableOpsWithDifferentUsers()
165 String[] labels = { SECRET, CONFIDENTIAL, PRIVATE }; in addLabels()
H A DTestVisibilityLabelsWithSLGStack.java52 public static final String CONFIDENTIAL = "confidential"; field in TestVisibilityLabelsWithSLGStack
93 put.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testWithSAGStack()
96 LabelFilteringScanLabelGenerator.labelToFilter = CONFIDENTIAL; in testWithSAGStack()
98 s.setAuthorizations(new Authorizations(SECRET, CONFIDENTIAL)); in testWithSAGStack()
110 String[] labels = { SECRET, CONFIDENTIAL }; in addLabels()
H A DTestEnforcingScanLabelGenerator.java51 public static final String CONFIDENTIAL = "confidential"; field in TestEnforcingScanLabelGenerator
87 VisibilityClient.addLabels(conn, new String[] { SECRET, CONFIDENTIAL }); in setupBeforeClass()
88 VisibilityClient.setAuths(conn, new String[] { CONFIDENTIAL, }, TESTUSER.getShortName()); in setupBeforeClass()
111 put.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testEnforcingScanLabelGenerator()
143 get.setAuthorizations(new Authorizations(new String[] { SECRET, CONFIDENTIAL })); in testEnforcingScanLabelGenerator()
H A DTestVisibilityLablesWithGroups.java61 public static final String CONFIDENTIAL = "confidential"; field in TestVisibilityLablesWithGroups
100 VisibilityClient.addLabels(conn, new String[] { SECRET, CONFIDENTIAL }); in setupBeforeClass()
102 VisibilityClient.setAuths(conn, new String[] { CONFIDENTIAL }, "@testgroup"); in setupBeforeClass()
127 put.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testGroupAuths()
186 assertTrue(authsList.contains(CONFIDENTIAL)); in testGroupAuths()
222 s1.setAuthorizations(new Authorizations(new String[] { SECRET, CONFIDENTIAL })); in testGroupAuths()
271 CONFIDENTIAL }, "@testgroup"); in testGroupAuths()
306 s1.setAuthorizations(new Authorizations(new String[] { SECRET, CONFIDENTIAL })); in testGroupAuths()
H A DTestVisibilityLabelsReplication.java94 public static final String CONFIDENTIAL = "confidential"; field in TestVisibilityLabelsReplication
223 "(" + SECRET + "&" + PUBLIC + ")" + "|(" + CONFIDENTIAL in testVisibilityReplication()
224 + ")&(" + TOPSECRET + ")", "(" + PRIVATE + "|" + CONFIDENTIAL + ")&(" + PUBLIC + "|" in testVisibilityReplication()
225 + TOPSECRET + ")", "(" + SECRET + "|" + CONFIDENTIAL + ")" + "&" + "!" + TOPSECRET, in testVisibilityReplication()
228 s.setAuthorizations(new Authorizations(SECRET, CONFIDENTIAL, PRIVATE, TOPSECRET, in testVisibilityReplication()
266 verifyGet(row1, expectedVisString[0], expected[0], false, TOPSECRET, CONFIDENTIAL); in testVisibilityReplication()
268 verifyGet(row2, expectedVisString[1], expected[1], false, CONFIDENTIAL, PUBLIC); in testVisibilityReplication()
352 String[] labels = { SECRET, TOPSECRET, CONFIDENTIAL, PUBLIC, PRIVATE, UNICODE_VIS_TAG }; in addLabels()
370 CONFIDENTIAL, PRIVATE, TOPSECRET, UNICODE_VIS_TAG }, "user1"); in setAuths()
H A DTestDefaultScanLabelGeneratorStack.java53 public static final String CONFIDENTIAL = "confidential"; field in TestDefaultScanLabelGeneratorStack
89 VisibilityClient.addLabels(conn, new String[] { SECRET, CONFIDENTIAL }); in setupBeforeClass()
90 VisibilityClient.setAuths(conn, new String[] { CONFIDENTIAL }, TESTUSER.getShortName()); in setupBeforeClass()
113 put.setCellVisibility(new CellVisibility(CONFIDENTIAL)); in testDefaultScanLabelGeneratorStack()
189 s1.setAuthorizations(new Authorizations(new String[] { SECRET, CONFIDENTIAL })); in testDefaultScanLabelGeneratorStack()
/dports/graphics/dia/dia-0.97.3/objects/SISSI/
H A Dclassification.h22 CONFIDENTIAL, enumerator
41 { N_("Confidential") , CONFIDENTIAL },
/dports/databases/hbase/hbase-1.2.1/hbase-it/src/test/java/org/apache/hadoop/hbase/test/
H A DIntegrationTestWithCellVisibilityLoadAndVerify.java86 private static final String CONFIDENTIAL = "confidential"; field in IntegrationTestWithCellVisibilityLoadAndVerify
91 private static final String[] LABELS = { CONFIDENTIAL, TOPSECRET, SECRET, PRIVATE, PUBLIC };
92 private static final String[] VISIBILITY_EXPS = { CONFIDENTIAL + AND + TOPSECRET + AND + PRIVATE,
93 CONFIDENTIAL + OR + TOPSECRET, PUBLIC,
94 '(' + SECRET + OR + PRIVATE + ')' + AND + NOT + CONFIDENTIAL };
144 VisibilityClient.setAuths(util.getConnection(), new String[] { CONFIDENTIAL, TOPSECRET, in addLabelsAndAuths()
267 System.out.println(String.format("Verifying for auths %s, %s, %s, %s", CONFIDENTIAL, TOPSECRET, in doVerify()
272 return doVerify(conf, htd, CONFIDENTIAL, TOPSECRET, SECRET, PRIVATE); in doVerify()
/dports/databases/hbase/hbase-1.2.1/hbase-rest/src/test/java/org/apache/hadoop/hbase/rest/
H A DTestScannersWithLabels.java82 private final static String CONFIDENTIAL = "confidential"; field in TestScannersWithLabels
103 put.setCellVisibility(new CellVisibility("(" + SECRET + "|" + CONFIDENTIAL + ")" + "&" + "!" in insertData()
170 String[] labels = { SECRET, CONFIDENTIAL, PRIVATE, PUBLIC, TOPSECRET }; in createLabels()
182 String[] labels = { SECRET, CONFIDENTIAL, PRIVATE, PUBLIC, TOPSECRET }; in setAuths()
/dports/databases/hbase/hbase-1.2.1/hbase-thrift/src/test/java/org/apache/hadoop/hbase/thrift2/
H A DTestThriftHBaseServiceHandlerWithLabels.java97 private final static String CONFIDENTIAL = "confidential"; field in TestThriftHBaseServiceHandlerWithLabels
156 String[] labels = { SECRET, CONFIDENTIAL, PRIVATE, PUBLIC, TOPSECRET }; in createLabels()
169 String[] labels = { SECRET, CONFIDENTIAL, PRIVATE, PUBLIC, TOPSECRET }; in setAuths()
207 + "|" + CONFIDENTIAL + ")" + "&" + "!" + TOPSECRET)); in testScanWithVisibilityLabels()
277 + "|" + CONFIDENTIAL + ")" + "&" + "!" + TOPSECRET)); in testGetScannerResultsWithAuthorizations()
332 + CONFIDENTIAL + ")" + "&" + "!" + TOPSECRET)); in testGetsWithLabels()
/dports/mail/rainloop-community/rainloop-community-php74-1.16.0_1/rainloop/v/1.16.0/app/libraries/MailSo/Mime/Enumerations/
H A DSensitivity.php22 const CONFIDENTIAL = 1; define in MailSo\\Mime\\Enumerations\\Sensitivity
/dports/mail/rainloop/rainloop-php74-1.16.0_1/rainloop/v/1.16.0/app/libraries/MailSo/Mime/Enumerations/
H A DSensitivity.php22 const CONFIDENTIAL = 1; define in MailSo\\Mime\\Enumerations\\Sensitivity
/dports/devel/p5-Text-vFile-asData/Text-vFile-asData-0.08/examples/rfc2445-objects/
H A D4.6.1-event-3.ics6 CLASS:CONFIDENTIAL
H A D4.6.2-todo-1.ics7 CLASS:CONFIDENTIAL
/dports/java/openjdk11/jdk11u-jdk-11.0.13-8-1/test/jdk/javax/crypto/SecretKeyFactory/
H A Dsecurity.properties2 # ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.
/dports/java/openjdk13/jdk13u-jdk-13.0.10-1-1/test/jdk/javax/crypto/SecretKeyFactory/
H A Dsecurity.properties2 # ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/test/jdk/javax/crypto/SecretKeyFactory/
H A Dsecurity.properties2 # ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.
/dports/java/openjdk15/jdk15u-jdk-15.0.6-1-1/test/jdk/javax/crypto/SecretKeyFactory/
H A Dsecurity.properties2 # ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.
/dports/java/openjdk11-jre/jdk11u-jdk-11.0.13-8-1/test/jdk/javax/crypto/SecretKeyFactory/
H A Dsecurity.properties2 # ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/test/jdk/javax/crypto/SecretKeyFactory/
H A Dsecurity.properties2 # ORACLE PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.
/dports/databases/evolution-data-server/evolution-data-server-3.42.1/tests/libedata-cal/components/
H A Devent-2.ics12 CLASS:CONFIDENTIAL

12345678910>>...77