Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

d2i API 

d2i_X509_CRL_bio( ) 

DACL (discretionary access control list) 

Darwin and ELF-based Unix systems 

data validation 

    rules for 

database connections, securing 

    MySQL 

    PostgreSQL 

database fields, encrypting 

Davies-Meyer algorithm 

    hash function, creation using 

        AES-128 implementation 

Dean, Drew 

decrypt_within_charset( ) 

decryption, parallelizing in modes that allow it 

Òdefault denyÓ rule 

defense in depth 

delta CRLs 

denial of service attacks, prevention 

DER (distinguished encoding rules) 

    format, objects convertible to and from 

    representation in PEM format 

DER_decode_RSA_public( ) 

deriving symmetric keys from a password 

DES algorithm, usage by crypt( ) 

detecting illegal UTF-8 characters 

determining user access to a file (Unix) 

/dev/random and /dev/urandom 

    avoiding race conditions 

    binding to a generic API 

    potential for failure 

    supporting Unix distributions 

/dev/null

    absence in a chroot( ) environment 

    opening standard descriptors with 

DH_check( ) 

DH_compute_key( ) 

DH_compute_secret( ) 

DH_generate_key( ) 

DH_generate_keys( ) 

DH_generate_parameters( ) 

DialogBox( ) 

DialogBoxParam( ), dependence on progress bar control 

dictionaries

    for converting text keys to binary keys 

    for representing keys as English text 

dictionary attacks

    prevention 

    RSA and 

Diffie-Hellman algorithm 

    DSA, used with 

    forward secrecy and 

    key exchange protocol 

        generator 

        modulus 

    random number generation for a shared secret 

    recommended key lengths 

Digest-Auth 

Digital Signature Algorithm  [See DSA]

digital signatures 

    DSA 

    and non-repudiation 

directory security 

DISASM_FALSERET macro 

    vs. GNU objdump 

    vs. IDA Pro 

DISASM_MISALIGN macro 

    vs. GNU objdump 

    vs. IDA Pro 

discretionary access control list (DACL) 

disk encryption 

    using LION 

    with initialization vectors or nonces 

disks, encryption of 

    using LION 

    with IVs or nonces 

distinguished encoding rules (DER) 

distinguished names 

distinguishers 

    selection 

double-encoding attacks 

dropping privileges in setuid programs 

DSA (Digital Signature Algorithm)  2nd 

    Diffie-Hellman, used with 

    recommended key lengths 

    signature precomputation 

DSA_generate_key( ) 

DSA_generate_parameters( ) 

DSA_sign( ) 

DSA_sign_setup( ) 

DSA_verify( ) 

dumping core, security aspects 

DUNS numbers 

Категории