OpenSSL STATUS Last modified at
- ______________ $Date: 1999/02/20 16:50:53 $
+ ______________ $Date: 1999/04/27 12:01:53 $
DEVELOPMENT STATE
- o OpenSSL 0.9.2: Still under development.
- Proposed freeze time: Monday, March 8th 1999
- Proposed release time: Monday, March 15th 1999
+ o OpenSSL 0.9.3: Under development...
+ Proposed freeze date: Mon May 8th, 1999
+ Proposed release date: Mon May 17th, 1999
+ o OpenSSL 0.9.2b: Released on March 22th, 1999
o OpenSSL 0.9.1c: Released on December 23th, 1998
+ [ Proposed new numbering scheme: <major>.<minor>[<patchlevel>]
+ 0.9.1c is 0913
+ 1.0 is 010000
+ 1.0 a is 010001
+ 1.8 z is 01081a ]
+
RELEASE SHOWSTOPPERS
+ o Compilation warnings: ctype-related int vs. char
+ o BSD/OS: assembler functions must not have leading underscores
+ o exptest and rsa_oaep_test fail with irix64-*
+ (Don Badrak <dbadrak@geo.census.gov>: "Re: Problems to compile openssl
+ on IRIX 6.2", openssl-users)
+ o BN_add test fails on Caldera OpenLinux 1.3
+ (Marc Christensen <Marc.Christensen@m.cc.utah.edu>
+ "Compiles but fails big number test?", openssl-users)
+
AVAILABLE PATCHES
+ o OCSP (titchenert@certco.com)
+ o Install prefix for packagers (dharris@drh.net)
+ o getenv in ca.c and x509_def.c (jaltman@watsun.cc.columbia.edu)
+ o linux dynamic libs (colin@field.medicine.adelaide.edu.au)
+ o MingW support (niklas@canit.se)
+
IN PROGRESS
- o Steve is currently working on:
- X509 V3 extension code including:
- 1. Support for the more common PKIX extensions.
- 2. Proper (or at least usable) certificate chain verification.
- 3. Support in standard applications (req, x509, ca).
- 4. Documentation on how all the above works.
- Next on the list is probably PKCS#12 integration.
+ o Steve is currently working on (in no particular order):
+ Proper (or at least usable) certificate chain verification.
+ Documentation on X509 V3 extension code.
+ PKCS#12 code cleanup and enhancement.
+ PKCS #8 and PKCS#5 v2.0 support.
+ Private key, certificate and CRL API and implementation.
o Mark is currently working on:
Folding in any changes that are in the C2Net code base that were
SSL_CTX_xxx() variants but on a per connection basis. That's needed
to let us provide full-featured per-URL client verification in
mod_ssl or Apache-SSL.
+ => It still dumps core, so I suspend this and investigate
+ again for OpenSSL 0.9.3.
2. The perl/ stuff to make it really work the first time ;-)
- 3. The new documentation set in PID format under doc/
+ => I'll investigate a few more hours for OpenSSL 0.9.2
+ 3. The new documentation set in POD format under doc/
+ => I'll investigate a few more hours for OpenSSL 0.9.2
4. More cleanups to get rid of obsolete/old/ugly files in the
source tree which are not really needed.
+ => Done all which were possible with my personal knowledge
+
+ o Ben is currently working on:
+ 1. Function Prototype Thought Police issues.
+ 2. Integrated documentation.
+ 3. New TLS Ciphersuites.
+ 4. Anything else that takes his fancy.
NEEDS PATCH
+ o broken demos
+ o salzr@certco.com (Rich Salz): Bug in X509_name_print
+ <29E0A6D39ABED111A36000A0C99609CA2C2BA4@macertco-srv1.ma.certco.com>
+ o Jean-Hugues ROYER <jhroyer@joher.com>: rsa_oaep.c with Watcom C
+ o $(PERL) in */Makefile.ssl
+ o "Sign the certificate?" - "n" creates empty certificate file
+ o dubious declaration of crypt() in des.h
+
OPEN ISSUES
o The Makefile hierarchy and build mechanism is still not a round thing:
itself. Then we can avoid a lot of those platform checks
which are currently in Configure.
- 2. The xxx.org -> xxx.h generation:
- It's not obvious for which file xxx.org is the source.
- Suggestion: Rename xxx.org to xxx.h.in (Autoconf style), this way
- one sees that xxx.h.in is the input for xxx.h
-
- Status: Mark +1
-
o The installation under "make install" produces a very
installation layout: $prefix/certs and $prefix/private dirs. That's
not nice. Ralf suggests to move the two certs and private dirs either
use a key length decided by the size of the RSA encrypted key and expect
RC2 to adapt).
+ o Properly initialize the PRNG in the absence of /dev/random.
+
+ o ERR_error_string(..., buf) does not know how large buf is,
+ there should be ERR_error_string_n(..., buf, bufsize)
+ or similar.
+
WISHES
o Damien Miller:
SSLeay-0.9.1b RPM already includes some patches which do some of this.
I can forward them if you wish."
+ o Mats Nilsson <mats.nilsson@xware.se>:
+ "Add reference counting to all substructures of X509 etc. For instance,
+ X509_NAME lacks a reference counter, while EVP_PKEY has one. I'm
+ making COM-wrappers for selected parts of SSLeay for a project of ours,
+ and has found this inconsistency in copy semantics annoying."
+