Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

hardware random number generators, testing  [See FIPS 140-1 tests]

hardware validation 

hash functions 

    block ciphers, construction from 

    encryption using 

    incremental hashing 

    insecurity of 

    one-way hash using a block cipher 

hash values 

hash127 

    MAC, usage for 

hash127( ) 

hashes 

hexadecimal format

    ASCII, conversion into binary 

    representing binary keys or raw data in 

high-level vs. low-level modes 

HMAC  2nd 

    nonces, using with 

HMAC algorithm 

HMAC-SHA1 algorithm

    in PRF implementation 

    pseudo-random number generator, using as 

HMAC_cleanup( ) 

HMAC_Final( ) 

HMAC_Init( )  2nd 

HMAC_Update( ) 

hostnames

    checking, adding to certificate verification 

        CryptoAPI 

        OpenSSL 

    restricting access based on 

    spoofing 

Housley, Russ  2nd 

HTML and cross-site scripting attacks 

htonl( ) 

HTTP client for connection to CRL server 

Категории