OpenSSL STATUS Last modified at
- ______________ $Date: 1999/08/08 10:25:50 $
+ ______________ $Date: 2000/03/24 16:55:32 $
DEVELOPMENT STATE
- o OpenSSL 0.9.4: In preparation for release!
- Proposed code freeze: August, 2nd 1999
- Proposed release date: August, 9th 1999
- Tarball Rolling is proposed to be done
- by Ralf on dev.openssl.org at 09.08.1999, 14:00 CET
-
- At least three OpenSSL developers should give their +1 vote
- for OpenSSL 0.9.4 before the tarball should be actually rolled:
- Votes: Ralf +1
-
+ o OpenSSL 0.9.5a: Under development...
+ 0.9.5a-beta1 is available.
+ sunos-gcc - failed (ssize_t)
+ ultrix-gcc, ultrix-cc - failed (ssize_t)
+ sco5-cc - bc fails in test
+ VC-Win32 (MSVC6SP3, nasm) - failed (fixed)
+ FreeBSD-elf (i686-pc-freebsd3.2)- failed (fixed)
+ HPUX (hpux-parisc-cc w/ +02) - passed
+ OpenBSD-x86 - passed
+ solaris-sparcv9-cc - passed
+ 0.9.5a-beta2 is available.
+ linux-elf - passed
+ linux-ppc (egcs 2.91.66) - passed
+ OpenBSD-elf - passed
+ FreeBSD-elf (i586-pc-freebsd3.2)- passed
+ solaris-sparcv9-cc - passed
+ solaris-sparcv9-gcc - passed
+ Mingw32 - passed
+ VMS/Alpha 7.1 w/ DEC C 5.6-003 - passed
+ VMS/Alpha 7.2-1 w/ CPQ C 6.2-003- passed
+ AIX 4.3.3.0 w/ cc - passed
+ AIX 4.3.3.0 w/ gcc (2.7.2.3?) - passed
+ Irix 6.4 w/ cc - passed
+ Irix 6.4 w/ gcc - passed
+ Irix 6.5 w/ cc - passed
+ Irix 6.5 w/ gcc - passed
+ NetBSD-x86 - passed
+ Unixware 7.0.1 w/ native cc - passed
+ Solaris-x86 2.6 w/ gcc 2.7.2.3 - passed
+ Solaris-x86 2.7 w/ gcc 2.7.2.3 - passed
+ True64 Unix w/ gcc 2.7.2.3 - passed
+ Win32 w/ VC++ 5 & NASM 0.98 - passed
+
+ o OpenSSL 0.9.5: Released on February 28th, 2000
+ o OpenSSL 0.9.4: Released on August 09th, 1999
o OpenSSL 0.9.3a: Released on May 29th, 1999
o OpenSSL 0.9.3: Released on May 25th, 1999
o OpenSSL 0.9.2b: Released on March 22th, 1999
AVAILABLE PATCHES
- o OCSP (titchenert@certco.com)
- o getenv in ca.c and x509_def.c (jaltman@watsun.cc.columbia.edu)
+ o CA.pl patch (Damien Miller)
IN PROGRESS
o Steve is currently working on (in no particular order):
Proper (or at least usable) certificate chain verification.
Private key, certificate and CRL API and implementation.
- Checking and bugfixing PKCS#7 (S/MIME code).
-
- o Mark is currently working on:
- Folding in any changes that are in the C2Net code base that were
- not in the original SSLeay-0.9.1.b release. Plus other minor
- tidying.
-
- o Ralf is currently working on:
- 1. Support for SSL_set_default_verify_paths(),
- SSL_load_verify_locations(), SSL_get_cert_store() and
- SSL_set_cert_store() functions which work like their existing
- SSL_CTX_xxx() variants but on a per connection basis. That's needed
- to let us provide full-featured per-URL client verification in
- mod_ssl or Apache-SSL.
- => It still dumps core, so I suspend this and investigate
- again for OpenSSL 0.9.3.
- 2. The perl/ stuff to make it really work the first time ;-)
- => I'll investigate a few more hours for OpenSSL 0.9.2
- 3. The new documentation set in POD format under doc/
- => I'll investigate a few more hours for OpenSSL 0.9.2
- 4. More cleanups to get rid of obsolete/old/ugly files in the
- source tree which are not really needed.
- => Done all which were possible with my personal knowledge
-
- o Ben is currently working on:
- 1. Function Prototype Thought Police issues.
- 2. Integrated documentation.
- 3. New TLS Ciphersuites.
- 4. Anything else that takes his fancy.
+ Developing and bugfixing PKCS#7 (S/MIME code).
+ Various X509 issues: character sets, certificate request extensions.
+ Documentation for the openssl utility.
NEEDS PATCH
- o salzr@certco.com (Rich Salz): Bug in X509_name_print
- <29E0A6D39ABED111A36000A0C99609CA2C2BA4@macertco-srv1.ma.certco.com>
+ o non-blocking socket on AIX
o $(PERL) in */Makefile.ssl
o "Sign the certificate?" - "n" creates empty certificate file
compiler PIC and linker DSO flags from Apache
into the OpenSSL Configure script.
+ Ulf: +1 for using GNU autoconf and libtool (but not automake,
+ which apparently is not flexible enough to generate
+ libcrypto)
+
+
o The perl/ stuff needs a major overhaul. Currently it's
totally obsolete. Either we clean it up and enhance it to be up-to-date
with the C code or we also could replace it with the really nice
use a key length decided by the size of the RSA encrypted key and expect
RC2 to adapt).
- o Properly initialize the PRNG in the absence of /dev/random.
-
o ERR_error_string(..., buf) does not know how large buf is,
there should be ERR_error_string_n(..., buf, bufsize)
or similar.