gecko-dev/security/nss
Franziskus Kiefer d040cb9cea Bug 1345368 - land NSS 1fb7e5f584de, r=me
--HG--
extra : rebase_source : 6ac73d3dc219a02194914ae4cfbe2027c258bbfe
2017-04-03 06:00:54 +02:00
..
automation Bug 1345368 - land NSS 1fb7e5f584de, r=me 2017-04-03 06:00:54 +02:00
cmd Bug 1345368 - land NSS 06158d335df0, r=me 2017-03-24 08:38:05 +01:00
coreconf Bug 1345368 - land NSS 1fb7e5f584de, r=me 2017-04-03 06:00:54 +02:00
cpputil Bug 1345368 - land NSS 215207b4864c, r=me 2017-03-29 06:01:13 +02:00
doc Bug 1305970 - land NSS 0x3e7b53b18112, r=me 2016-10-25 20:38:17 +02:00
fuzz Bug 1345368 - land NSS 1fb7e5f584de, r=me 2017-04-03 06:00:54 +02:00
gtests Bug 1345368 - land NSS 215207b4864c, r=me 2017-03-29 06:01:13 +02:00
lib Bug 1345368 - land NSS 215207b4864c, r=me 2017-03-29 06:01:13 +02:00
nss-tool Bug 1345368 - land NSS cf81ccc154dd, r=me 2017-03-15 19:46:22 +01:00
pkg Bug 1296266 - Land NSS_3_27_BETA1, r=kaie 2016-08-19 11:20:21 +02:00
tests Bug 1345368 - land NSS 215207b4864c, r=me 2017-03-29 06:01:13 +02:00
.clang-format Bug 1277255, land NSS_3_25_BETA1, r=franziskus 2016-06-02 22:33:04 +02:00
.gitignore Bug 1317947 - land NSS ee21c9892907, r=me 2017-01-21 14:23:56 +01:00
.taskcluster.yml Bug 1296266 - NSS 3.27 tip d9f7136f2ae3, r=ttaubert 2016-09-16 10:00:57 -07:00
COPYING
Makefile Bug 1334127 - land NSS 0750d7a0402b, r=me 2017-02-06 06:02:12 +01:00
TAG-INFO Bug 1345368 - land NSS 1fb7e5f584de, r=me 2017-04-03 06:00:54 +02:00
build.sh Bug 1345368 - land NSS 6fafb8fd9ff4, r=me 2017-03-08 08:40:46 +01:00
exports.gyp Bug 1317947 - land NSS 0x5b7a40ced8c5, r=me 2016-11-16 14:06:23 +01:00
help.txt Bug 1345368 - land NSS 6fafb8fd9ff4, r=me 2017-03-08 08:40:46 +01:00
manifest.mn Bug 1317947 - land NSS 0x5b7a40ced8c5, r=me 2016-11-16 14:06:23 +01:00
nss.gyp Bug 1345368 - land NSS 6fafb8fd9ff4, r=me 2017-03-08 08:40:46 +01:00
readme.md Bug 1334127 - land NSS 01d6c0dff06f, r=me 2017-02-13 14:27:06 +01:00
trademarks.txt

readme.md

Network Security Services

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. NSS supports SSL v3-TLS 1.2 (experimental TLS 1.3), PKCS #5, PKCS#7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security standards.

Getting started

In order to get started create a new directory on that you will be uses as your local work area, and check out NSS and NSPR. (Note that there's no git mirror of NSPR and you require mercurial to get the latest NSPR source.)

git clone https://github.com/nss-dev/nss.git
hg clone https://hg.mozilla.org/projects/nspr

NSS can also be cloned with mercurial

hg clone https://hg.mozilla.org/projects/nss

Building NSS

This build system is under development. It does not yet support all the features or platforms that NSS supports. To build on anything other than Mac or Linux please use the legacy build system as described below.

Build requirements:

After changing into the NSS directory a typical build is done as follows

./build.sh

Once the build is done the build output is found in the directory ../dist/Debug for debug builds and ../dist/Release for opt builds. Exported header files can be found in the include directory, library files in directory lib, and tools in directory bin. In order to run the tools, set your system environment to use the libraries of your build from the "lib" directory, e.g., using the LD_LIBRARY_PATH or DYLD_LIBRARY_PATH.

Usage: build.sh [-hcv] [-j <n>] [--nspr] [--gyp|-g] [--opt|-o] [-m32]
                [--test] [--fuzz] [--pprof] [--scan-build[=output]]
                [--asan] [--ubsan] [--msan] [--sancov[=edge|bb|func|...]]
                [--ct-verif] [--disable-tests]

This script builds NSS with gyp and ninja.

This build system is still under development.  It does not yet support all
the features or platforms that NSS supports.

NSS build tool options:

    -h               display this help and exit
    -c               clean before build
    -v               verbose build
    -j <n>           run at most <n> concurrent jobs
    --nspr           force a rebuild of NSPR
    --gyp|-g         force a rerun of gyp
    --opt|-o         do an opt build
    -m32             do a 32-bit build on a 64-bit system
    --test           ignore map files and export everything we have
    --fuzz           enable fuzzing mode. this always enables test builds
    --pprof          build with gperftool support
    --ct-verif       build with valgrind for ct-verif
    --scan-build     run the build with scan-build (scan-build has to be in the path)
                     --scan-build=/out/path sets the output path for scan-build
    --asan           do an asan build
    --ubsan          do an ubsan build
                     --ubsan=bool,shift,... sets specific UB sanitizers
    --msan           do an msan build
    --sancov         do sanitize coverage builds
                     --sancov=func sets coverage to function level for example
    --disable-tests  don't build tests and corresponding cmdline utils

Building NSS (legacy build system)

After changing into the NSS directory a typical build of 32-bit NSS is done as follows:

make nss_build_all

The following environment variables might be useful:

  • BUILD_OPT=1 to get an optimised build

  • USE_64=1 to get a 64-bit build (recommended)

The complete list of environment variables can be found here.

To clean the build directory run:

make nss_clean_all

Tests

Setup

Make sure that the address $HOST.$DOMSUF on your computer is available. This is necessary because NSS tests generate certificates and establish TLS connections, which requires a fully qualified domain name. You can test this by calling ping $HOST.$DOMSUF. If this is working, you're all set. If it's not, set or export:

HOST=nss
DOMSUF=local

Note that you might have to add nss.local to /etc/hosts if it's not there. The entry should look something like 127.0.0.1 nss.local nss.

If you get name resolution errors, try to ensure that you are using an IPv4 address; IPv6 is the default on many systems for the loopback device which doesn't work.

Running tests

Runnning all tests will take a while!

cd tests
./all.sh

Make sure that all environment variables set for the build are set while running the tests as well. Test results are published in the folder ../../test_results/.

Individual tests can be run with the NSS_TESTS environment variable, e.g. NSS_TESTS=ssl_gtests ./all.sh or by changing into the according directory and running the bash script there cd ssl_gtests && ./ssl_gtests.sh. The following tests are available:

cipher lowhash libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec gtests ssl_gtests bogo

To make tests run faster it's recommended to set NSS_CYCLES=standard to run only the standard cycle.

Releases

NSS releases can be found at Mozilla's download server. Because NSS depends on the base library NSPR you should download the archive that combines both NSS and NSPR.

Contributing

Bugzilla is used to track NSS development and bugs. File new bugs in the NSS product.

A list with good first bugs to start with are listed here.

NSS Folder Structure

The nss directory contains the following important subdirectories:

  • coreconf contains the build logic.

  • lib contains all library code that is used to create the runtime libraries.

  • cmd contains a set of various tool programs that are built with NSS. Several tools are general purpose and can be used to inspect and manipulate the storage files that software using the NSS library creates and modifies. Other tools are only used for testing purposes.

  • test and gtests contain the NSS test suite. While test contains shell scripts to drive test programs in cmd, gtests holds a set of gtests.

A more comprehensible overview of the NSS folder structure and API guidelines can be found here.