even use of default engines leaks memory
[openssl.git] / STATUS
diff --git a/STATUS b/STATUS
index e027371a76e69b16921fcfad964d32318494aa6d..820a10ba42ed541a6f85dfca2efdc1f4e56b7ed8 100644 (file)
--- a/STATUS
+++ b/STATUS
@@ -1,11 +1,11 @@
 
   OpenSSL STATUS                           Last modified at
-  ______________                           $Date: 2001/01/23 12:30:43 $
+  ______________                           $Date: 2001/06/11 09:55:54 $
 
   DEVELOPMENT STATE
 
     o  OpenSSL 0.9.7:  Under development...
-    o  OpenSSL 0.9.6a: Bugfix release -- under development...
+    o  OpenSSL 0.9.6a: Released on April      5th, 2001
     o  OpenSSL 0.9.6:  Released on September 24th, 2000
     o  OpenSSL 0.9.5a: Released on April      1st, 2000
     o  OpenSSL 0.9.5:  Released on February  28th, 2000
 
   RELEASE SHOWSTOPPERS
 
-    o
-
   AVAILABLE PATCHES
 
-    o
-
   IN PROGRESS
 
     o Steve is currently working on (in no particular order):
 
   NEEDS PATCH
 
+    o  engine_list.c memory leaks in 0.9.7-dev (built-in engines)
+
     o  apps/ca.c: "Sign the certificate?" - "n" creates empty certificate file
 
-    o  #include <openssl/e_os.h> in exported header files is illegal since
+    o  OpenSSL_0_9_6-stable:
+       #include <openssl/e_os.h> in exported header files is illegal since
        e_os.h is suitable only for library-internal use.
 
-       (This applies to openssl-0.9.6-stable too; openssl/conf.h is the
-       offending header file.  While it is rarely used itself by applications,
-       it is included by openssl/x509v3.h, which is more likely to be used.)
-
     o  Whenever strncpy is used, make sure the resulting string is NULL-terminated
        or an error is reported
 
 
   WISHES
 
-    o 
+    o  SRP in TLS.
+       [wished by:
+        Dj <derek@yo.net>, Tom Wu <tom@arcot.com>,
+        Tom Holroyd <tomh@po.crl.go.jp>]
+
+       See http://search.ietf.org/internet-drafts/draft-ietf-tls-srp-00.txt
+       as well as http://www-cs-students.stanford.edu/~tjw/srp/.
+
+       Tom Holroyd tells us there is a SRP patch for OpenSSH at
+       http://members.tripod.com/professor_tom/archives/, that could
+       be useful.