X-Git-Url: https://git.openssl.org/?p=openssl.git;a=blobdiff_plain;f=STATUS;h=7c0307e5f1ec966528ea30d9eed0c60541c6f355;hp=d2195741f5e4d89730ecad028c6b2fe62de00cfd;hb=6b46ca135a70ad7f77bba771496751f555e4863c;hpb=670fc9d2f0dcf682098a0e01ae7bd1f6c967a246 diff --git a/STATUS b/STATUS index d2195741f5..a5f2b4008b 100644 --- a/STATUS +++ b/STATUS @@ -1,77 +1,69 @@ OpenSSL STATUS Last modified at - ______________ $Date: 1999/08/08 10:25:50 $ + ______________ $Date: 2001/07/17 14:39:26 $ DEVELOPMENT STATE - o OpenSSL 0.9.4: In preparation for release! - Proposed code freeze: August, 2nd 1999 - Proposed release date: August, 9th 1999 - Tarball Rolling is proposed to be done - by Ralf on dev.openssl.org at 09.08.1999, 14:00 CET - - At least three OpenSSL developers should give their +1 vote - for OpenSSL 0.9.4 before the tarball should be actually rolled: - Votes: Ralf +1 - - o OpenSSL 0.9.3a: Released on May 29th, 1999 - o OpenSSL 0.9.3: Released on May 25th, 1999 - o OpenSSL 0.9.2b: Released on March 22th, 1999 - o OpenSSL 0.9.1c: Released on December 23th, 1998 + o OpenSSL 0.9.7: Under development... + o OpenSSL 0.9.6b: Released on July 9th, 2001 + o OpenSSL 0.9.6a: Released on April 5th, 2001 + o OpenSSL 0.9.6: Released on September 24th, 2000 + o OpenSSL 0.9.5a: Released on April 1st, 2000 + o OpenSSL 0.9.5: Released on February 28th, 2000 + o OpenSSL 0.9.4: Released on August 09th, 1999 + o OpenSSL 0.9.3a: Released on May 29th, 1999 + o OpenSSL 0.9.3: Released on May 25th, 1999 + o OpenSSL 0.9.2b: Released on March 22th, 1999 + o OpenSSL 0.9.1c: Released on December 23th, 1998 RELEASE SHOWSTOPPERS AVAILABLE PATCHES - o OCSP (titchenert@certco.com) - o getenv in ca.c and x509_def.c (jaltman@watsun.cc.columbia.edu) + o IA-64 (a.k.a. Intel Itanium) public-key operation performance + patch for Linux is available for download at + http://www.openssl.org/~appro/096b.linux-ia64.diff. As URL + suggests the patch is relative to OpenSSL 0.9.6b. IN PROGRESS o Steve is currently working on (in no particular order): - Proper (or at least usable) certificate chain verification. + ASN1 code redesign, butchery, replacement. + OCSP + EVP cipher enhancement. + Enhanced certificate chain verification. Private key, certificate and CRL API and implementation. - Checking and bugfixing PKCS#7 (S/MIME code). - - o Mark is currently working on: - Folding in any changes that are in the C2Net code base that were - not in the original SSLeay-0.9.1.b release. Plus other minor - tidying. - - o Ralf is currently working on: - 1. Support for SSL_set_default_verify_paths(), - SSL_load_verify_locations(), SSL_get_cert_store() and - SSL_set_cert_store() functions which work like their existing - SSL_CTX_xxx() variants but on a per connection basis. That's needed - to let us provide full-featured per-URL client verification in - mod_ssl or Apache-SSL. - => It still dumps core, so I suspend this and investigate - again for OpenSSL 0.9.3. - 2. The perl/ stuff to make it really work the first time ;-) - => I'll investigate a few more hours for OpenSSL 0.9.2 - 3. The new documentation set in POD format under doc/ - => I'll investigate a few more hours for OpenSSL 0.9.2 - 4. More cleanups to get rid of obsolete/old/ugly files in the - source tree which are not really needed. - => Done all which were possible with my personal knowledge - - o Ben is currently working on: - 1. Function Prototype Thought Police issues. - 2. Integrated documentation. - 3. New TLS Ciphersuites. - 4. Anything else that takes his fancy. + Developing and bugfixing PKCS#7 (S/MIME code). + Various X509 issues: character sets, certificate request extensions. + o Geoff and Richard are currently working on: + ENGINE (the new code that gives hardware support among others). + o Richard is currently working on: + UI (User Interface) + UTIL (a new set of library functions to support some higher level + functionality that is currently missing). + Shared library support for VMS. + Kerberos 5 authentication + Constification + OCSP NEEDS PATCH - o salzr@certco.com (Rich Salz): Bug in X509_name_print - <29E0A6D39ABED111A36000A0C99609CA2C2BA4@macertco-srv1.ma.certco.com> - o $(PERL) in */Makefile.ssl - o "Sign the certificate?" - "n" creates empty certificate file + o apps/ca.c: "Sign the certificate?" - "n" creates empty certificate file + + o OpenSSL_0_9_6-stable: + #include in exported header files is illegal since + e_os.h is suitable only for library-internal use. + + o Whenever strncpy is used, make sure the resulting string is NULL-terminated + or an error is reported OPEN ISSUES - o internal_verify doesn't know about X509.v3 (basicConstraints - CA flag ...) + o crypto/ex_data.c is not really thread-safe and so must be used + with care (e.g., extra locking where necessary, or don't call + CRYPTO_get_ex_new_index once multiple threads exist). + The current API is not suitable for everything that it pretends + to offer. o The Makefile hierarchy and build mechanism is still not a round thing: @@ -93,6 +85,11 @@ compiler PIC and linker DSO flags from Apache into the OpenSSL Configure script. + Ulf: +1 for using GNU autoconf and libtool (but not automake, + which apparently is not flexible enough to generate + libcrypto) + + o The perl/ stuff needs a major overhaul. Currently it's totally obsolete. Either we clean it up and enhance it to be up-to-date with the C code or we also could replace it with the really nice @@ -108,22 +105,16 @@ to date. Paul +1 - o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER - structure for each cipher. This may make sense for things like DES but - for variable length ciphers like RC2 and RC4 it is NBG. Need a way to - use the EVP interface and set up the cipher parameters. The ASN1 stuff - is also foo wrt ciphers whose AlgorithmIdentifier has more than just - an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open - don't work unless the key length matches the fixed value (some vendors - use a key length decided by the size of the RSA encrypted key and expect - RC2 to adapt). - - o Properly initialize the PRNG in the absence of /dev/random. + WISHES - o ERR_error_string(..., buf) does not know how large buf is, - there should be ERR_error_string_n(..., buf, bufsize) - or similar. + o SRP in TLS. + [wished by: + Dj , Tom Wu , + Tom Holroyd ] - WISHES + See http://search.ietf.org/internet-drafts/draft-ietf-tls-srp-00.txt + as well as http://www-cs-students.stanford.edu/~tjw/srp/. - o + Tom Holroyd tells us there is a SRP patch for OpenSSH at + http://members.tripod.com/professor_tom/archives/, that could + be useful.