Index E

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

ECB (Electronic Code Book) mode  2nd 
    OpenSSL
        block cipher implementations 
        block cipher setup 
effective vs. real user and group IDs 
effective, real and saved 
effective, real, and saved 
EGADS (Entropy Gathering and Distribution System) 
    security 
    supported platforms 
egads_destroy( ) 
egads_entropy( ) 
egads_init( ) 
egads_randfname( ) 
egads_randint( ) 
egads_randlong( ) 
egads_randrange( ) 
egads_randreal( ) 
egads_randstring( ) 
egads_randuint( ) 
egads_randulong( ) 
egads_randuniform( ) 
EGD (Entropy Gathering Daemon) 
    commands 
    risks as an entropy source 
    socket directory 
ELF-based Unix and environment variables 
elf_get_entry( ) 
elliptic curve cryptography 
    licensing 
email
    addresses, validating 
    confirming requests via 
    lexical rules, validation against 
email, certificates for use in 
EME-OAEP padding 
ENCMAP data type 
encrypt-then-authenticate paradigm 
encrypt_within_charset( ) 
encryption
    in a single reduced character set 
    Kerberos, using 
    message integrity and 
    parallelizing in modes that allow it 
    using hash functions 
encryption algorithms
    choosing 
    supporting multiple algorithms 
ÒEncryption QueueÓ implementation of CWC 
endianess 
endpwent( ) 
Enhanced SNACC ASN.1 compiler, source 
entropy 
    adding, reasons for 
    collection tips 
    compression of entropy-containing data 
    determining required quantity 
    EGADS (Entropy Gathering and Distribution System), using 
    EGD and compatible third-party tools 
    entropy harvesters 
    estimation and management 
        attacks on entropy sources 
        disk access, entropy in 
        insecurity of boot time as entropy source 
        key presses, entropy in 
        mouse events, entropy in 
        network data, entropy in 
        sound devices, entropy in 
        thread timing and system state, entropy in 
        threat models 
        timestamps, entropy in 
        Unix systems, observable entropy 
    fractional bits 
    generic API for 
    getting at startup 
    key length and 
    keyboards, gathering from 
        Unix 
        Windows 
    mouse events, gathering from in Windows 
    system state, gathering from 
    thread timings, gathering from 
    Unix tools for generating 
    usefulness 
    whitening 
Entropy Gathering and Distribution System  [See EGADS]
Entropy Gathering Daemon  [See EGD]
ENTROPY_PER_SAMPLE macro 
enveloping interfaces 
environ global variable (C language) 
environment validation 
environment variables
    CGI scripts, used by 
    deleting 
    inheritance 
    obtaining 
    protecting from exploitation 
    secure usage 
    TZ (time zone) 
    Unix and Windows dependencies 
    value, changing 
ephemeral Diffie-Hellman 
ephemeral keying 
equals (=), base64 padding character 
erasing files securely 
error handling 
evaluating URL encodings 
event-driven systems and shatter attacks 
EVP_CIPHER_CTX_cipher( ) 
EVP_CIPHER_CTX_ctrl( ) 
EVP_CIPHER_CTX_init( ) 
EVP_CIPHER_CTX_mode( ) 
EVP_CIPHER_CTX_set_key_length( )  2nd 
EVP_CIPHER_CTX_set_padding( ) 
EVP_DecryptFinal_ex( ) 
EVP_DecryptInit( ) 
EVP_DecryptInit_ex( )  2nd 
EVP_DigestFinal( ) 
EVP_EncryptFinal_ex( )  2nd 
EVP_EncryptInit( ) 
EVP_EncryptInit_ex( )  2nd  3rd 
EVP_EncryptUpdate( )  2nd 
EVP_get_cipherbyname( ) 
EVP_MD_CTX_size( ) 
exception handling 
    C language 
    C++ 
        XXL, compared to 
    XXL library 
exchange keys 
exclusive locks 
exec*( ) family of functions 
executing external programs securely
    Unix 
    Windows 
execv( ) 
execve( )  2nd  3rd 
extKeyUsage extension 
extracting raw key data from a CryptoAPI key object 



Secure Programming Cookbook for C and C++
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
ISBN: 0596003943
EAN: 2147483647
Year: 2005
Pages: 266

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net