[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
ECB (Electronic Code Book) mode
2nd
OpenSSL block cipher implementations
block cipher setup
effective vs. real user and group IDs
effective, real and saved
effective, real, and saved
EGADS (Entropy Gathering and Distribution System)
security
supported platforms
egads_destroy( )
egads_entropy( )
egads_init( )
egads_randfname( )
egads_randint( )
egads_randlong( )
egads_randrange( )
egads_randreal( )
egads_randstring( )
egads_randuint( )
egads_randulong( )
egads_randuniform( )
EGD (Entropy Gathering Daemon)
commands
risks as an entropy source
socket directory
ELF-based Unix and environment variables
elf_get_entry( )
elliptic curve cryptography
licensing
email addresses, validating
confirming requests via
lexical rules, validation against
email, certificates for use in
EME-OAEP padding
ENCMAP data type
encrypt-then-authenticate paradigm
encrypt_within_charset( )
encryption in a single reduced character set
Kerberos, using
message integrity and
parallelizing in modes that allow it
using hash functions
encryption algorithms choosing
supporting multiple algorithms
ÒEncryption QueueÓ implementation of CWC
endianess
endpwent( )
Enhanced SNACC ASN.1 compiler, source
entropy
adding, reasons for
collection tips
compression of entropy-containing data
determining required quantity
EGADS (Entropy Gathering and Distribution System), using
EGD and compatible third-party tools
entropy harvesters
estimation and management
attacks on entropy sources
disk access, entropy in
insecurity of boot time as entropy source
key presses, entropy in
mouse events, entropy in
network data, entropy in
sound devices, entropy in
thread timing and system state, entropy in
threat models
timestamps, entropy in
Unix systems, observable entropy
fractional bits
generic API for
getting at startup
key length and
keyboards, gathering from
Unix
Windows
mouse events, gathering from in Windows
system state, gathering from
thread timings, gathering from
Unix tools for generating
usefulness
whitening
Entropy Gathering and Distribution System
[See EGADS] Entropy Gathering Daemon
[See EGD] ENTROPY_PER_SAMPLE macro
enveloping interfaces
environ global variable (C language)
environment validation
environment variables CGI scripts, used by
deleting
inheritance
obtaining
protecting from exploitation
secure usage
TZ (time zone)
Unix and Windows dependencies
value, changing
ephemeral Diffie-Hellman
ephemeral keying
equals (=), base64 padding character
erasing files securely
error handling
evaluating URL encodings
event-driven systems and shatter attacks
EVP_CIPHER_CTX_cipher( )
EVP_CIPHER_CTX_ctrl( )
EVP_CIPHER_CTX_init( )
EVP_CIPHER_CTX_mode( )
EVP_CIPHER_CTX_set_key_length( )
2nd
EVP_CIPHER_CTX_set_padding( )
EVP_DecryptFinal_ex( )
EVP_DecryptInit( )
EVP_DecryptInit_ex( )
2nd
EVP_DigestFinal( )
EVP_EncryptFinal_ex( )
2nd
EVP_EncryptInit( )
EVP_EncryptInit_ex( )
2nd
3rd
EVP_EncryptUpdate( )
2nd
EVP_get_cipherbyname( )
EVP_MD_CTX_size( )
exception handling
C language
C++
XXL, compared to
XXL library
exchange keys
exclusive locks
exec*( ) family of functions
executing external programs securely Unix
Windows
execv( )
execve( )
2nd
3rd
extKeyUsage extension
extracting raw key data from a CryptoAPI key object
|