Config.src 3.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. #
  2. # For a description of the syntax of this configuration file,
  3. # see docs/Kconfig-language.txt.
  4. #
  5. menu "Login/Password Management Utilities"
  6. config FEATURE_SHADOWPASSWDS
  7. bool "Support shadow passwords"
  8. default y
  9. help
  10. Build support for shadow password in /etc/shadow. This file is only
  11. readable by root and thus the encrypted passwords are no longer
  12. publicly readable.
  13. config USE_BB_PWD_GRP
  14. bool "Use internal password and group functions rather than system functions"
  15. default y
  16. help
  17. If you leave this disabled, busybox will use the system's password
  18. and group functions. And if you are using the GNU C library
  19. (glibc), you will then need to install the /etc/nsswitch.conf
  20. configuration file and the required /lib/libnss_* libraries in
  21. order for the password and group functions to work. This generally
  22. makes your embedded system quite a bit larger.
  23. Enabling this option will cause busybox to directly access the
  24. system's /etc/password, /etc/group files (and your system will be
  25. smaller, and I will get fewer emails asking about how glibc NSS
  26. works). When this option is enabled, you will not be able to use
  27. PAM to access remote LDAP password servers and whatnot. And if you
  28. want hostname resolution to work with glibc, you still need the
  29. /lib/libnss_* libraries.
  30. If you need to use glibc's nsswitch.conf mechanism
  31. (e.g. if user/group database is NOT stored in /etc/passwd etc),
  32. you must NOT use this option.
  33. If you enable this option, it will add about 1.5k.
  34. config USE_BB_SHADOW
  35. bool "Use internal shadow password functions"
  36. default y
  37. depends on USE_BB_PWD_GRP && FEATURE_SHADOWPASSWDS
  38. help
  39. If you leave this disabled, busybox will use the system's shadow
  40. password handling functions. And if you are using the GNU C library
  41. (glibc), you will then need to install the /etc/nsswitch.conf
  42. configuration file and the required /lib/libnss_* libraries in
  43. order for the shadow password functions to work. This generally
  44. makes your embedded system quite a bit larger.
  45. Enabling this option will cause busybox to directly access the
  46. system's /etc/shadow file when handling shadow passwords. This
  47. makes your system smaller (and I will get fewer emails asking about
  48. how glibc NSS works). When this option is enabled, you will not be
  49. able to use PAM to access shadow passwords from remote LDAP
  50. password servers and whatnot.
  51. config USE_BB_CRYPT
  52. bool "Use internal crypt functions"
  53. default y
  54. help
  55. Busybox has internal DES and MD5 crypt functions.
  56. They produce results which are identical to corresponding
  57. standard C library functions.
  58. If you leave this disabled, busybox will use the system's
  59. crypt functions. Most C libraries use large (~70k)
  60. static buffers there, and also combine them with more general
  61. DES encryption/decryption.
  62. For busybox, having large static buffers is undesirable,
  63. especially on NOMMU machines. Busybox also doesn't need
  64. DES encryption/decryption and can do with smaller code.
  65. If you enable this option, it will add about 4.8k of code
  66. if you are building dynamically linked executable.
  67. In static build, it makes code _smaller_ by about 1.2k,
  68. and likely many kilobytes less of bss.
  69. config USE_BB_CRYPT_SHA
  70. bool "Enable SHA256/512 crypt functions"
  71. default y
  72. depends on USE_BB_CRYPT
  73. help
  74. Enable this if you have passwords starting with "$5$" or "$6$"
  75. in your /etc/passwd or /etc/shadow files. These passwords
  76. are hashed using SHA256 and SHA512 algorithms. Support for them
  77. was added to glibc in 2008.
  78. With this option off, login will fail password check for any
  79. user which has password encrypted with these algorithms.
  80. INSERT
  81. endmenu