21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

GetFileInformationByHandle( ), 54<br />

GetFileSize( ), 54<br />

GetFullPathName( ), 98<br />

getgrgid( ), 374<br />

getgrnam( ), 374<br />

GetLastError( ), 64, 67, 242<br />

getpass( ), 393<br />

getpwnam( ), 373<br />

getpwuid( ), 3, 372<br />

getrusage( ), 153<br />

gets( ), 79<br />

GetTempFileName( ), 66<br />

GetTempPath( ), 66<br />

gettimeofday( ), 153<br />

entropy gathering, using for, 631<br />

vs. RDTSC, 153<br />

getuid( ), 3<br />

GET_VAR macro, 667<br />

Gladman, Brian<br />

AES for OpenSSL, 172<br />

AES implementation, 159<br />

Cryptographic Technology page, 160<br />

CWC implementation, 202<br />

group IDs, 39<br />

groups, acquiring information about<br />

on Unix, 372–375<br />

on Windows, 375–379<br />

grp.h file, 374<br />

Gutmann, Peter, 48<br />

H<br />

hardware random number generators, testing<br />

(see FIPS 140-1 tests)<br />

hardware validation, 648<br />

hash functions, 249–253<br />

block ciphers, construction<br />

from, 291–294<br />

encryption using, 301–303<br />

incremental hashing, 262–267<br />

insecurity of, 262<br />

one-way hash using a block<br />

cipher, 294–298<br />

hash values, 250<br />

hash127, 250<br />

MAC, usage for, 287–290<br />

hash127( ), 288<br />

hashes, 249–306<br />

hexadecimal format<br />

ASCII, conversion into binary, 121<br />

representing binary keys or raw data<br />

in, 120<br />

high-level vs. low-level modes, 162<br />

HMAC, 143, 260<br />

nonces, using with, 285<br />

HMAC algorithm, 276–280<br />

HMAC_cleanup( ), 276<br />

HMAC_Final( ), 276<br />

HMAC_Init( ), 276, 277<br />

HMAC-SHA1 algorithm<br />

in PRF implementation, 144<br />

pseudo-random number generator, using<br />

as, 589<br />

HMAC_Update( ), 276<br />

hostnames<br />

checking, adding to certificate<br />

verification, 539–544<br />

CryptoAPI, 541<br />

OpenSSL, 540<br />

restricting access based on, 379–386<br />

spoofing, 379<br />

Housley, Russ, 170, 502<br />

HTML and cross-site scripting attacks, 103<br />

htonl( ), 332<br />

HTTP client for connection to CRL<br />

server, 552<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.<br />

I<br />

i2d API, 353<br />

IBM ProPolice, 83<br />

IDs, 17, 38<br />

IFS environment variable, 4<br />

Immunix FormatGuard, 77<br />

Immunix StackGuard, 78<br />

incrementally hashing data, 262–267<br />

increment_nonce( ), 135<br />

information leakage, 368<br />

initialization, 1–37<br />

security and, 1<br />

initialization vectors (see IVs)<br />

input validation, 71–115, 648<br />

basic data validation techniques, 71–75<br />

buffer overflows, preventing, 78–85<br />

data validation, 72<br />

vs. access control, 72<br />

SQL command strings and, 108<br />

insecure random number generators, 569<br />

int3 opcode, 681<br />

integer coercion, preventing, 88–91<br />

signed-to-unsigned, 89<br />

size mismatches, 91<br />

unsigned-to-signed, 90<br />

integer values, random collection of, 605<br />

Index | 747

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!