X-Git-Url: https://git.openssl.org/?p=openssl.git;a=blobdiff_plain;f=STATUS;h=baafbd40ab098266e48d5becfad37d4aa97744f0;hp=0db443a15271d07f58d8a643096cdaecfa5b99f6;hb=a5868b3fe291065dc3232a9703a6269572933acd;hpb=7d05b51ade70f6d03ed3a6ccfae29b14e5437ecb diff --git a/STATUS b/STATUS index 0db443a152..baafbd40ab 100644 --- a/STATUS +++ b/STATUS @@ -1,77 +1,78 @@ OpenSSL STATUS Last modified at - ______________ $Date: 2000/03/25 10:44:28 $ + ______________ $Date: 2002/04/25 07:46:35 $ DEVELOPMENT STATE - o OpenSSL 0.9.5a: Under development... - Proposed release date March 31st, 2000 - 0.9.5a-beta1 is available. - sunos-gcc - failed (ssize_t) - ultrix-gcc, ultrix-cc - failed (ssize_t) - sco5-cc - bc fails in test - VC-Win32 (MSVC6SP3, nasm) - failed (fixed) - FreeBSD-elf (i686-pc-freebsd3.2)- failed (fixed) - HPUX (hpux-parisc-cc w/ +02) - passed - OpenBSD-x86 - passed - solaris-sparcv9-cc - passed - 0.9.5a-beta2 is available. - linux-elf - passed - linux-ppc (egcs 2.91.66) - passed - OpenBSD-elf - passed - FreeBSD-elf (i586-pc-freebsd3.2)- passed - solaris-sparcv9-cc - passed - solaris-sparcv9-gcc - passed - Mingw32 - passed - VMS/Alpha 7.1 w/ DEC C 5.6-003 - passed - VMS/Alpha 7.2-1 w/ CPQ C 6.2-003- passed - VMS/VAX 7.1 w/ DEC C 5.6-003 - passed - VMS/VAX 7.2 w/ DEC C 6.0-001 - passed - AIX 4.3.3.0 w/ cc - passed - AIX 4.3.3.0 w/ gcc (2.7.2.3?) - passed - Irix 6.4 w/ cc - passed - Irix 6.4 w/ gcc - passed - Irix 6.5 w/ cc - passed - Irix 6.5 w/ gcc - passed - NetBSD-x86 - passed - Unixware 7.0.1 w/ native cc - passed - Solaris-x86 2.6 w/ gcc 2.7.2.3 - passed - Solaris-x86 2.7 w/ gcc 2.7.2.3 - passed - True64 Unix w/ gcc 2.7.2.3 - passed - Win32 w/ VC++ 5 & NASM 0.98 - passed - - o OpenSSL 0.9.5: Released on February 28th, 2000 - o OpenSSL 0.9.4: Released on August 09th, 1999 - o OpenSSL 0.9.3a: Released on May 29th, 1999 - o OpenSSL 0.9.3: Released on May 25th, 1999 - o OpenSSL 0.9.2b: Released on March 22th, 1999 - o OpenSSL 0.9.1c: Released on December 23th, 1998 + o OpenSSL 0.9.7: Under development... + o OpenSSL 0.9.6c: Released on December 21st, 2001 + o OpenSSL 0.9.6b: Released on July 9th, 2001 + o OpenSSL 0.9.6a: Released on April 5th, 2001 + o OpenSSL 0.9.6: Released on September 24th, 2000 + o OpenSSL 0.9.5a: Released on April 1st, 2000 + o OpenSSL 0.9.5: Released on February 28th, 2000 + o OpenSSL 0.9.4: Released on August 09th, 1999 + o OpenSSL 0.9.3a: Released on May 29th, 1999 + o OpenSSL 0.9.3: Released on May 25th, 1999 + o OpenSSL 0.9.2b: Released on March 22th, 1999 + o OpenSSL 0.9.1c: Released on December 23th, 1998 RELEASE SHOWSTOPPERS + o BIGNUM library failures on 64-bit platforms (0.9.7-dev): + - BN_mod_mul verificiation (bc) fails for solaris64-sparcv9-cc + and other 64-bit platforms + + Checked on Result + alpha-cc (Tru64 version 4.0) works + linux-alpha+bwx-gcc doesn't work. Reported by + Sean O'Riordain + OpenBSD-sparc64 doesn't work. BN_mod_mul breaks. + + Needs checked on + [add platforms here] + + - BN_mod_mul verification fails for mips3-sgi-irix + unless configured with no-asm + AVAILABLE PATCHES - o CA.pl patch (Damien Miller) + o IN PROGRESS o Steve is currently working on (in no particular order): - Proper (or at least usable) certificate chain verification. + ASN1 code redesign, butchery, replacement. + OCSP + EVP cipher enhancement. + Enhanced certificate chain verification. Private key, certificate and CRL API and implementation. Developing and bugfixing PKCS#7 (S/MIME code). Various X509 issues: character sets, certificate request extensions. - Documentation for the openssl utility. + o Geoff and Richard are currently working on: + ENGINE (the new code that gives hardware support among others). + o Richard is currently working on: + UI (User Interface) + UTIL (a new set of library functions to support some higher level + functionality that is currently missing). + Shared library support for VMS. + Kerberos 5 authentication + Constification + OCSP NEEDS PATCH - o non-blocking socket on AIX - o $(PERL) in */Makefile.ssl - o "Sign the certificate?" - "n" creates empty certificate file + o parameters should be omitted (not NULL) with id-dsa-with-sha1 OID + in X.509 signatures - OPEN ISSUES + o inappropriate AlgorithmIdentifier used in S/MIME signatures + (key type instead of signature algorithm) + + o apps/ca.c: "Sign the certificate?" - "n" creates empty certificate file - o internal_verify doesn't know about X509.v3 (basicConstraints - CA flag ...) + o "OpenSSL STATUS" is never up-to-date. + + OPEN ISSUES o The Makefile hierarchy and build mechanism is still not a round thing: @@ -97,36 +98,20 @@ which apparently is not flexible enough to generate libcrypto) + WISHES + + o Add variants of DH_generate_parameters() and BN_generate_prime() [etc?] + where the callback function can request that the function be aborted. + [Gregory Stark , ] - o The perl/ stuff needs a major overhaul. Currently it's - totally obsolete. Either we clean it up and enhance it to be up-to-date - with the C code or we also could replace it with the really nice - Net::SSLeay package we can find under - http://www.neuronio.pt/SSLeay.pm.html. Ralf uses this package for a - longer time and it works fine and is a nice Perl module. Best would be - to convince the author to work for the OpenSSL project and create a - Net::OpenSSL or Crypt::OpenSSL package out of it and maintains it for - us. - - Status: Ralf thinks we should both contact the author of Net::SSLeay - and look how much effort it is to bring Eric's perl/ stuff up - to date. - Paul +1 - - o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER - structure for each cipher. This may make sense for things like DES but - for variable length ciphers like RC2 and RC4 it is NBG. Need a way to - use the EVP interface and set up the cipher parameters. The ASN1 stuff - is also foo wrt ciphers whose AlgorithmIdentifier has more than just - an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open - don't work unless the key length matches the fixed value (some vendors - use a key length decided by the size of the RSA encrypted key and expect - RC2 to adapt). - - o ERR_error_string(..., buf) does not know how large buf is, - there should be ERR_error_string_n(..., buf, bufsize) - or similar. + o SRP in TLS. + [wished by: + Dj , Tom Wu , + Tom Holroyd ] - WISHES + See http://search.ietf.org/internet-drafts/draft-ietf-tls-srp-00.txt + as well as http://www-cs-students.stanford.edu/~tjw/srp/. - o + Tom Holroyd tells us there is a SRP patch for OpenSSH at + http://members.tripod.com/professor_tom/archives/, that could + be useful.