[ Team LiB ]

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

d2i API 
d2i_X509_CRL_bio( ) 
DACL (discretionary access control list) 
Darwin and ELF-based Unix systems 
data validation 
    rules for 
database connections, securing 
    MySQL 
    PostgreSQL 
database fields, encrypting 
Davies-Meyer algorithm 
    hash function, creation using 
        AES-128 implementation 
Dean, Drew 
decrypt_within_charset( ) 
decryption, parallelizing in modes that allow it 
Òdefault denyÓ rule 
defense in depth 
delta CRLs 
denial of service attacks, prevention 
DER (distinguished encoding rules) 
    format, objects convertible to and from 
    representation in PEM format 
DER_decode_RSA_public( ) 
deriving symmetric keys from a password 
DES algorithm, usage by crypt( ) 
detecting illegal UTF-8 characters 
determining user access to a file (Unix) 
/dev/random and /dev/urandom 
    avoiding race conditions 
    binding to a generic API 
    potential for failure 
    supporting Unix distributions 
/dev/null
    absence in a chroot( ) environment 
    opening standard descriptors with 
DH_check( ) 
DH_compute_key( ) 
DH_compute_secret( ) 
DH_generate_key( ) 
DH_generate_keys( ) 
DH_generate_parameters( ) 
DialogBox( ) 
DialogBoxParam( ), dependence on progress bar control 
dictionaries
    for converting text keys to binary keys 
    for representing keys as English text 
dictionary attacks
    prevention 
    RSA and 
Diffie-Hellman algorithm 
    DSA, used with 
    forward secrecy and 
    key exchange protocol 
        generator 
        modulus 
    random number generation for a shared secret 
    recommended key lengths 
Digest-Auth 
Digital Signature Algorithm  [See DSA]
digital signatures 
    DSA 
    and non-repudiation 
directory security 
DISASM_FALSERET macro 
    vs. GNU objdump 
    vs. IDA Pro 
DISASM_MISALIGN macro 
    vs. GNU objdump 
    vs. IDA Pro 
discretionary access control list (DACL) 
disk encryption 
    using LION 
    with initialization vectors or nonces 
disks, encryption of 
    using LION 
    with IVs or nonces 
distinguished encoding rules (DER) 
distinguished names 
distinguishers 
    selection 
double-encoding attacks 
dropping privileges in setuid programs 
DSA (Digital Signature Algorithm)  2nd 
    Diffie-Hellman, used with 
    recommended key lengths 
    signature precomputation 
DSA_generate_key( ) 
DSA_generate_parameters( ) 
DSA_sign( ) 
DSA_sign_setup( ) 
DSA_verify( ) 
dumping core, security aspects 
DUNS numbers 

[ Team LiB ]