[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] d2i API d2i_X509_CRL_bio( ) DACL (discretionary access control list) Darwin and ELF-based Unix systems data validation rules for database connections, securing MySQL PostgreSQL database fields, encrypting Davies-Meyer algorithm hash function, creation using AES-128 implementation Dean, Drew decrypt_within_charset( ) decryption, parallelizing in modes that allow it Òdefault denyÓ rule defense in depth delta CRLs denial of service attacks, prevention DER (distinguished encoding rules) format, objects convertible to and from representation in PEM format DER_decode_RSA_public( ) deriving symmetric keys from a password DES algorithm, usage by crypt( ) detecting illegal UTF-8 characters determining user access to a file (Unix) /dev/random and /dev/urandom avoiding race conditions binding to a generic API potential for failure supporting Unix distributions /dev/null absence in a chroot( ) environment opening standard descriptors with DH_check( ) DH_compute_key( ) DH_compute_secret( ) DH_generate_key( ) DH_generate_keys( ) DH_generate_parameters( ) DialogBox( ) DialogBoxParam( ), dependence on progress bar control dictionaries for converting text keys to binary keys for representing keys as English text dictionary attacks prevention RSA and Diffie-Hellman algorithm DSA, used with forward secrecy and key exchange protocol generator modulus random number generation for a shared secret recommended key lengths Digest-Auth Digital Signature Algorithm [See DSA] digital signatures DSA and non-repudiation directory security DISASM_FALSERET macro vs. GNU objdump vs. IDA Pro DISASM_MISALIGN macro vs. GNU objdump vs. IDA Pro discretionary access control list (DACL) disk encryption using LION with initialization vectors or nonces disks, encryption of using LION with IVs or nonces distinguished encoding rules (DER) distinguished names distinguishers selection double-encoding attacks dropping privileges in setuid programs DSA (Digital Signature Algorithm) 2nd Diffie-Hellman, used with recommended key lengths signature precomputation DSA_generate_key( ) DSA_generate_parameters( ) DSA_sign( ) DSA_sign_setup( ) DSA_verify( ) dumping core, security aspects DUNS numbers |