[ Team LiB ] |
[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
hardware random number generators, testing [See FIPS 140-1 tests] hardware validation hash functions block ciphers, construction from encryption using incremental hashing insecurity of one-way hash using a block cipher hash values hash127 MAC, usage for hash127( ) hashes hexadecimal format ASCII, conversion into binary representing binary keys or raw data in high-level vs. low-level modes HMAC 2nd nonces, using with HMAC algorithm HMAC-SHA1 algorithm in PRF implementation pseudo-random number generator, using as HMAC_cleanup( ) HMAC_Final( ) HMAC_Init( ) 2nd HMAC_Update( ) hostnames checking, adding to certificate verification CryptoAPI OpenSSL restricting access based on spoofing Housley, Russ 2nd HTML and cross-site scripting attacks htonl( ) HTTP client for connection to CRL server |
[ Team LiB ] |