[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
d2i API
d2i_X509_CRL_bio( )
DACL (discretionary access control list)
Darwin and ELF-based Unix systems
data validation
rules for
database connections, securing
MySQL
PostgreSQL
database fields, encrypting
Davies-Meyer algorithm
hash function, creation using
AES-128 implementation
Dean, Drew
decrypt_within_charset( )
decryption, parallelizing in modes that allow it
Òdefault denyÓ rule
defense in depth
delta CRLs
denial of service attacks, prevention
DER (distinguished encoding rules)
format, objects convertible to and from
representation in PEM format
DER_decode_RSA_public( )
deriving symmetric keys from a password
DES algorithm, usage by crypt( )
detecting illegal UTF-8 characters
determining user access to a file (Unix)
/dev/random and /dev/urandom
avoiding race conditions
binding to a generic API
potential for failure
supporting Unix distributions
/dev/null absence in a chroot( ) environment
opening standard descriptors with
DH_check( )
DH_compute_key( )
DH_compute_secret( )
DH_generate_key( )
DH_generate_keys( )
DH_generate_parameters( )
DialogBox( )
DialogBoxParam( ), dependence on progress bar control
dictionaries for converting text keys to binary keys
for representing keys as English text
dictionary attacks prevention
RSA and
Diffie-Hellman algorithm
DSA, used with
forward secrecy and
key exchange protocol
generator
modulus
random number generation for a shared secret
recommended key lengths
Digest-Auth
Digital Signature Algorithm
[See DSA] digital signatures
DSA
and non-repudiation
directory security
DISASM_FALSERET macro
vs. GNU objdump
vs. IDA Pro
DISASM_MISALIGN macro
vs. GNU objdump
vs. IDA Pro
discretionary access control list (DACL)
disk encryption
using LION
with initialization vectors or nonces
disks, encryption of
using LION
with IVs or nonces
distinguished encoding rules (DER)
distinguished names
distinguishers
selection
double-encoding attacks
dropping privileges in setuid programs
DSA (Digital Signature Algorithm)
2nd
Diffie-Hellman, used with
recommended key lengths
signature precomputation
DSA_generate_key( )
DSA_generate_parameters( )
DSA_sign( )
DSA_sign_setup( )
DSA_verify( )
dumping core, security aspects
DUNS numbers
|