[38857] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Detecting Crypto backend

daemon@ATHENA.MIT.EDU (Greg Hudson)
Thu Jan 21 15:15:18 2021

To: rachit chokshi <rachitchokshi@gmail.com>,
        "kerberos@mit.edu"
	<kerberos@mit.edu>
From: Greg Hudson <ghudson@mit.edu>
Message-ID: <6af5146b-6de2-0943-2fbd-49b76cbaf33a@mit.edu>
Date: Thu, 21 Jan 2021 15:12:18 -0500
MIME-Version: 1.0
In-Reply-To: <da7ebce6-00fb-406d-97a6-675c083d968a@Spark>
Content-Language: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

On 1/21/21 12:12 PM, rachit chokshi wrote:
> Any pointers on how to find out current backend used by an installation?

We don't have an interrogation mechanism and the runtime behavior is to
mostly indistinguishable, but on Linux or similar you can use OS
mechanisms.  ldd on libk5crypto.so.3.1 should show a dependency on
libcrypto, nm should show dependencies on EVP functions, and sotruss on
kinit or kvno should show calls into libcrypto.
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post