[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
S/KEY
S/KEY dictionary
S/MIME email, certificates for
SACL (system access control list)
safe primes
2nd
SafeStr library
2nd
functions and C equivalents
SAFESTR_ALLOC( )
SAFESTR_CREATE( )
safestr_free( )
safestr_istrusted( )
safestr_reference( )
safestr_release( )
safestr_t type
SAFESTR_TEMP( )
SAFESTR_TEMP_TRUSTED( )
salt
dictionary attacks, prevention with
hardening hash functions against birthday attacks
sanitizing the environment
SASL (Simple Authentication and Security Layer)
saved user and group IDs
SAX (Symmetric Authenticated eXchange)
2nd
client side
server-side
Schneier, Bruce
secure programming
web sites
secure server certificates
securely creating child processes
securely signing and encrypting with RSA
SecureZeroMemory( )
security authentication mechanisms, requirements
bit size of algorithms
function errors and
initialization and
weak vs. strong passwords
security identifiers
[See SIDs] Security Support Provider Interface (SSPI)
seeds, random numbers
select( ) preventing file descriptor overflows
typical usage
selecting a cipher mode
selecting a public key algorithm
selecting public key sizes
self-signed certificates
sequential nonces vs. random nonces
Serpent
2nd
home page
servers authentication without third-party
for network logging
SSL servers, creating
SSL servers, improving efficiency with caching
session ID context
session IDs
IP addresses as elements of
secure formats for
session keys
session timeout
Set-Cookie headers
SET_FN_PTR macro
SET_VAR macro
setegid( ) and seteuid( )
setgid( ) and setuid( )
dropping privileges after use
drop order
privilege separation, limiting risk with
setgroups( )
SetInformationJobObject( )
2nd
setregid( )
setreuid( )
setrlimit( )
2nd
3rd
SetThreadToken( )
Setuid Demystified
setup_charset_map( )
setup_signal_handler( )
SHA-256, SHA-384, and SHA-512 algorithms
SHA1 (Secure Hash Algorithm 1)
DSA standard and
key generation using
LION
OpenSSL API
whitening, using for
Shamir, Adi
shared locks
shatter attacks, protecting Windows against
ShellExecute( ), risks of
shells, risks of environment variables
shuffling fairly
SID_AND_ATTRIBUTES structures
SIDs (security identifiers)
2nd
3rd
4th
5th
6th
disabling or restricting
sigaction( )
signal handling, perfoming properly
guidelines
program termination
writing signal handlers
signal_was_caught( )
signed data types, unsuitability for key representation
signing data using an RSA private key
SIGTRAP
Simple Authentication and Security Layer (SASL)
Òsimple blobÓ format
smc_encrypt utility
SNOW stream cipher
2nd
3rd
home page
snprintf( )
sockets
Entropy Gathering Daemon
[See EGD] interprocess communication, using for
loopback address
Unix domain sockets, authentication using
SoftICE
software protection
anti-tampering techniques
bit and byte obfuscation
Obcode data types
Obcode library
checksum algorithms, detecting modification with
CRC32 algorithm
constant transforms on variables
costs
debugging difficulty
development time
maintainability
countering disassembly
function truncation
misalignment errors
using NULL bytes
crackers and their motivations
detecting debuggers
finding breakpoints
Unix
Windows
detecting SoftICE
function 0x43 of interrupt 0x68
int3 interface
ÒMelticeÓ technique
disguising Boolean values
function pointers, using
goals
hiding ASCII strings
merging scalar variables
obfuscating code
assembly-language, usage for
C program Òtest-and-branchÓ idiom
conditional expressions
shared library functions
test-for-zero operation
volatile keyword
vs.code maintainability
restructuring arrays
restructuring options
self-modifying code, using
build process complications
ELF executable files, code for encrypting
RC4 encryption
splitting variables
validation checks
spc _ctr_decrypt( )
spc_accept( )
2nd
spc_add_padding( )
spc_array_flat( )
spc_array_fold( )
spc_array_free( )
spc_array_get( )
spc_array_merge( )
spc_array_set( )
spc_array_split( )
spc_base64_encode( )
spc_bcprng_init( )
spc_bcprng_rand( )
spc_bin2words()
SPC_BLOCK_SZ macro
spc_cbc_decrypt( )
spc_cbc_decrypt_final( )
2nd
spc_cbc_decrypt_init( )
spc_cbc_decrypt_update( )
2nd
spc_cbc_encrypt_final( )
spc_cbc_encrypt_init( )
spc_cbc_encrypt_update( )
2nd
3rd
spc_cert_filename( )
spc_cfb_decrypt( )
spc_cfb_decrypt_update( )
spc_cfb_encrypt( )
spc_cfb_encrypt_update( )
2nd
spc_cfb_final( )
2nd
spc_check_int3( )
SPC_CIPHERQ data type
spc_cipherq_cleanup( )
spc_cipherq_decrypt( )
spc_cipherq_encrypt( )
2nd
spc_cipherq_setup( )
spc_confirmation_create( )
spc_confirmation_receive( )
spc_connect( )
spc_connect_ssl( )
spc_cookie_decode( )
spc_cookie_encode( )
spc_cookie_init( )
spc_create_nonced_digest( )
spc_create_sslctx( )
2nd
3rd
4th
flags
spc_create_x509store( )
spc_crypt_encrypt( )
spc_crypt_verify( )
spc_ctr_encrypt( )
spc_ctr_final( )
spc_ctr_update( )
2nd
keystream generation using
SPC_DEBUGGER_PRESENT macro
spc_decode_url( )
SPC_DECRYPT_INIT macro
AES, IDEA implementations
SPC_DEFINE_DBG_SYM macro
spc_delenv( )
SPC_DO_DECRYPT macro
block cipher implementations
SPC_DO_ENCRYPT macro
block cipher implementations
spc_double_mac( )
spc_drop_privileges( )
spc_email_isvalid( )
spc_enable_sessions( )
SPC_ENCRYPT_INIT macro
block cipher implementations
spc_entropy( )
2nd
FIPS testing, using in
spc_escape_html( )
spc_escape_sql( )
spc_extract_digest( )
spc_extract_nonce( )
spc_fd_free( )
spc_fd_setsize( )
spc_fd_wipe( )
spc_file_wipe( )
spc_fips_monobit( )
spc_fips_poker( )
spc_fips_runs( )
spc_fork( )
spc_gather_keyboard_entropy( )
spc_get_credentials( )
spc_getenv( )
spc_getsession( )
spc_group_ismember( )
spc_hex2bin( )
SPC_HMAC_Init( )
spc_host_check( )
spc_host_init( )
spc_incremental_hmac( )
spc_is_safedir( )
SPC_KEY_SCHED macro
spc_keygen( )
2nd
3rd
spc_krb5_cleanup( )
spc_krb5_client( ), client-side authentication using Kerberos
spc_krb5_decrypt( )
spc_krb5_encrypt( )
spc_krb5_isdes( )
spc_krb5_server( ), server-side authentication using Kerberos
spc_lion_decrypt( )
spc_lion_encrypt( )
spc_listen( )
spc_lock_file( )
spc_lookup_key( )
2nd
3rd
spc_mac127( )
spc_mac127_init( )
spc_make_derived_key( )
spc_make_fd_nonblocking( )
spc_md5_encrypt( )
spc_md5_verify( )
spc_mdc2_final( )
spc_mdc2_init( )
spc_mdc2_oneblock( )
spc_mdc2_update( )
spc_memcpy( )
spc_memmove( )
spc_memset( )
spc_memzero( ), key deletion using
spc_mprng_init( )
spc_mprng_rand( )
spc_next_varg( )
spc_ocspresult_t spc_verify_via_ocsp( )
spc_ofb_decrypt( )
spc_ofb_encrypt( )
spc_ofb_final( )
spc_ofb_update( )
2nd
3rd
spc_omac_final( )
2nd
spc_omac_update( )
2nd
spc_omac1_init( )
2nd
spc_OMAC1_nonced( )
spc_omac2_init( )
spc_omc_update( )
spc_pam_login( )
spc_pam_logout( )
spc_pbkdf2( )
arguments
spc_pbkdf2_encrypt( )
spc_pbkdf2_verify( )
spc_pctr_do_odd( )
spc_pctr_setup( )
2nd
SPC_PIPE object
spc_popen( )
spc_print_hex()
spc_putenv( )
spc_rand( )
2nd
3rd
getting random integers using
HMAC-SHA1 pseudo-random number generator
OpenSSL PRNG, usage in
RC4 as a PRNG
spc_rand_add_entropy( )
spc_rand_init( )
spc_rand_range( )
random integer in a range, generation with
shuffling using
spc_rand_real( )
spc_rand_uint( )
spc_read_password( )
spc_reconnect( )
spc_remember_cert( )
spc_remember_key( )
spc_remove_padding( )
spc_restore_privileges( )
spc_rsrclimit( )
spc_sanitize_environment( )
spc_sanitize_files( )
spc_send_credentials( )
spc_smc_decrypt( )
spc_socket_accept( )
spc_socket_close( )
spc_socket_recvfrom( )
spc_socket_sendto( )
spc_socketpool_close( )
spc_socketpool_init( )
spc_socketpool_setlimit( )
spc_ssock_client_send( )
spc_ssock_t object erasure
initialization
SPC_TEST_BOOL macro
spc_threadpool_cleanup( )
spc_threadpool_init( )
spc_threadpool_schedule( )
2nd
spc_throttle( )
spc_trap_detect( )
spc_unix_connect( )
spc_unix_server( )
SPC_USE_DBG_SYM macro
spc_user_getname( )
spc_utf8_isvalid( )
spc_verify_callback( )
spc_verify_cert( )
spc_verify_cert_hostname( )
spc_verify_nonced_digest( )
spc_verify_via_ocsp( )
spc_verifyandmaybesave_callback( )
spc_words2bin()
spc_x509store_addusecert( )
spc_x509store_clearflags( )
spc_x509store_setcafile( )
spc_x509store_setcallback( )
spc_x509store_setcapath( )
2nd
spc_x509store_setcrlfile( )
spc_x509store_setflags( )
spc_x509store_setusecertfile( )
spc_x509store_t objects
2nd
SpcDecrypt( )
SpcEncrypt( )
SpcExportKeyData( )
SpcFingerPrintCert( )
SpcGatherKeyboardEntropy( )
2nd
SpcGatherMouseEntropy( )
2nd
SpcGetCertCRLURL( )
SpcGetCryptContext( )
SpcGetExportableContext( )
2nd
SpcImportKeyData( )
2nd
SpcIncrementalHMAC( )
SpcLockResource( )
SpcLookupCACert( )
2nd
SpcLookupName( )
SpcLookupSid( )
SpcMakeTempFile( )
SpcNewStoreForCert( )
SpcPBKDF2( )
SpcResolvePath( )
SpcRetrieveCRL( )
SpcSetIV( )
SpcUnlockResource( )
SpcVerifyCert( )
SpcVerifyCertHostName( )
SpcWipeFile( )
SPLIT_VAR macro
spoofing of hostnames, IP addresses
sprintf( )
SQL injection attacks
SRP (Secure Remote Password)
SSL (Secure Sockets Layer)
clients, creating
database connections, securing with
MySQL
PostgreSQL
servers, creating
session caching
session caching modes
sessions vs. connections
tunnels
verifying a peerÕs certificate
SSL_accept( )
SSL_CTX objects
2nd
flagging and modes
SSL_CTX_set_cipher_list( )
SSL_CTX_set_verify( )
SSL_SESSION objects
SSL_SESSION_free( )
SSLv2 protocol, insecurity of
SSPI (Security Support Provider Interface)
stack-smashing attacks
preventive technologies
StackGuard
stat( )
station-to-station protocol
stdarg.h file
stdin, stdout, and stderr file descriptors
Stevens, W. Richard
str, input to spc_words2bin( )
strcpy( )
strdup( )
stream ciphers
2nd
3rd
precomputing keystream for
PRNGs compared to
using as PRNGs
RC4
strings of random ASCII characters, getting
strlcat( )
strlcpy( )
strncpy( )
2nd
strsafe.h
Stunnel
accept and connect keys
certificate and verification limitations
client mode, enabling
configuration file
server mode, enabling
Version 4.00 changes in configuration controls
surreptitious forwarding attacks
symmetric cryptography
algorithms
choosing
noncommercial, patent-free implementations
speed
supporting multiple
cipher modes
CBC (Cipher Block Chaining)
2nd
CCM (CTR plus CBC-MAC) mode
CFB (Cipher Feedback) mode
2nd
CTR (counter)
2nd
CWC (Carter-Wegman + CTR)
2nd
ECB (Electronic Code Book)
2nd
OCB (Offset Codebook) mode
OFB (Output Feedback) mode
2nd
selecting
CryptoAPI key objects, creating from symmetric keys
keys extraction from CryptoAPI key objects
generating from one secret
length
length of configurable ciphers
length of public keys, compared to
passwords, conversion to
providing forward secrecy
random data, effective usage
shared secrets
stream ciphers
symmetric encryption algorithms
symmetric primitives
synchronization of resource access
across processes Unix
Windows
syslog utility
syslog( )
syslog-ng
system access control list (SACL)
system( ), risks of
|