21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

deriving symmetric keys from a<br />

password, 136–142<br />

DES algorithm, usage by crypt( ), 400<br />

detecting illegal UTF-8 characters, 110–111<br />

determining user access to a file<br />

(Unix), 43–44<br />

/dev/random and /dev/urandom, 575–579<br />

avoiding race conditions, 578<br />

binding to a generic API, 577<br />

potential for failure, 576<br />

supporting Unix distributions, 575<br />

/dev/null<br />

absence in a chroot( ) environment, 24<br />

opening standard descriptors with, 24<br />

DH_check( ), 433<br />

DH_compute_key( ), 434<br />

DH_compute_secret( ), 435<br />

DH_generate_key( ), 434<br />

DH_generate_keys( ), 435<br />

DH_generate_parameters( ), 433<br />

DialogBox( ), 635<br />

DialogBoxParam( ), dependence on progress<br />

bar control, 642<br />

dictionaries<br />

for converting text keys to binary<br />

keys, 130<br />

for representing keys as English text, 128<br />

dictionary attacks<br />

prevention, 133<br />

RSA and, 335<br />

Diffie-Hellman algorithm, 312<br />

DSA, used with, 436<br />

forward secrecy and, 446<br />

key exchange protocol, 432–436<br />

generator, 433<br />

modulus, 432<br />

random number generation for a shared<br />

secret, 435<br />

recommended key lengths, 313<br />

Digest-Auth, 368<br />

Digital Signature Algorithm (see DSA)<br />

digital signatures, 307<br />

DSA, 347<br />

and non-repudiation, 311<br />

directory security, 45<br />

DISASM_FALSERET macro, 691<br />

vs. GNU objdump, 693<br />

vs. IDA Pro, 692<br />

DISASM_MISALIGN macro, 690<br />

vs. GNU objdump, 691<br />

vs. IDA Pro, 690<br />

discretionary access control list (DACL), 41<br />

744 | Index<br />

disk encryption, 213–217<br />

using LION, 214–217<br />

with IVs or nonces, 213<br />

disks, encryption of, 213–217<br />

using LION, 214–217<br />

with IVs or nonces, 213<br />

distinguished encoding rules (DER), 352<br />

distinguished names, 504<br />

distinguishers, 142<br />

selection, 144<br />

double-encoding attacks, 100<br />

dropping privileges in setuid<br />

programs, 16–20<br />

DSA (Digital Signature Algorithm), 312,<br />

347–352<br />

Diffie-Hellman, used with, 436<br />

recommended key lengths, 313<br />

signature precomputation, 349<br />

DSA_generate_key( ), 349<br />

DSA_generate_parameters( ), 348<br />

DSA_sign( ), 350<br />

DSA_sign_setup( ), 349<br />

DSA_verify( ), 351<br />

dumping core, security aspects, 36<br />

DUNS numbers, 517<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.<br />

E<br />

ECB (Electronic Code Book) mode, 164,<br />

171–175<br />

OpenSSL block ciphers<br />

implementations, 173–175<br />

setup, 221<br />

effective, real and saved user and group<br />

IDs, 17, 38<br />

effective vs. real user and group IDs, 17<br />

EGADS (Entropy Gathering and Distribution<br />

System), 599–603<br />

security, 599<br />

supported platforms, 599<br />

egads_destroy( ), 601<br />

egads_entropy( ), 600<br />

egads_init( ), 600<br />

egads_randfname( ), 602<br />

egads_randint( ), 602<br />

egads_randlong( ), 602<br />

egads_randrange( ), 602<br />

egads_randreal( ), 602<br />

egads_randstring( ), 602<br />

egads_randuint( ), 602<br />

egads_randulong( ), 602<br />

egads_randuniform( ), 602

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!