Wiki pages

  • cryptography
    • bespoke cryptosystems
      • LSA and SAMR application level encryption
      • SMB Signing and Encryption
    • random number generation
    • what parts of samba use cryptography and what algorithms are used
    • what protocols does cryptography protect in samba
    • what third party crypto is used
    • where is the raw crypto implemented
  • data and secrets
    • appendix
    • key rollover
    • overview
  • development practices
    • build system
    • code review
    • history
    • make test
    • overview
    • testing
    • tree layout
  • hardening practices
    • appendix
    • summary
  • Home
  • 1
  • 2