X-Git-Url: https://git.openssl.org/?p=openssl.git;a=blobdiff_plain;f=STATUS;h=e027371a76e69b16921fcfad964d32318494aa6d;hp=0e05b6c5e025187cb1d2d605affb294d37b0198e;hb=d8770f3ece3bef28eb749af6d5854b38e6c15e4e;hpb=6eec83bcf93e1240b57ad1c0cb6d80bce3ddb174 diff --git a/STATUS b/STATUS index 0e05b6c5e0..e027371a76 100644 --- a/STATUS +++ b/STATUS @@ -1,64 +1,69 @@ OpenSSL STATUS Last modified at - ______________ $Date: 2000/02/27 18:55:01 $ + ______________ $Date: 2001/01/23 12:30:43 $ DEVELOPMENT STATE - o OpenSSL 0.9.5: Under development... - 0.9.5-beta1 was available. - Debian GNU/Linux 2.1 - test passed - Mingw32 egcs 1.1.2 - test passed - FreeBSD 3.0-RELEASE - test passed - FreeBSD 3.2-RELEASE - test passed - solaris-sparcv9-cc - test passed - solaris-sparcv9-gcc - test passed - hpux-parisc-gcc - test passed - AIX 4.3 (aix-cc) - test passed - VC++ - test passed - 0.9.5beta2 is available. - hpux-parisc-cc - test passed - hpux-parisc-gcc (gcc 2.7.1) - test passed - hpux-parisc-gcc (gcc 2.8.0) - test passed - AIX 4.3 (aix-cc) - test passed - FreeBSD 3.0-RELEASE - test passed - OpenVMS V7.1/Alpha - test passed - OpenVMS V7.2-1/Alpha - test passed - OpenVMS V7.1/VAX - test failed on BN (config prob) - irix-mips3-cc - test passed - irix64-mips4-cc - test passed - Proposed release time: Monday, February 28th 2000 - o OpenSSL 0.9.4: Released on August 09th, 1999 - o OpenSSL 0.9.3a: Released on May 29th, 1999 - o OpenSSL 0.9.3: Released on May 25th, 1999 - o OpenSSL 0.9.2b: Released on March 22th, 1999 - o OpenSSL 0.9.1c: Released on December 23th, 1998 + o OpenSSL 0.9.7: Under development... + o OpenSSL 0.9.6a: Bugfix release -- under development... + o OpenSSL 0.9.6: Released on September 24th, 2000 + o OpenSSL 0.9.5a: Released on April 1st, 2000 + o OpenSSL 0.9.5: Released on February 28th, 2000 + o OpenSSL 0.9.4: Released on August 09th, 1999 + o OpenSSL 0.9.3a: Released on May 29th, 1999 + o OpenSSL 0.9.3: Released on May 25th, 1999 + o OpenSSL 0.9.2b: Released on March 22th, 1999 + o OpenSSL 0.9.1c: Released on December 23th, 1998 RELEASE SHOWSTOPPERS + o + AVAILABLE PATCHES - o shared libraries - o CA.pl patch (Damien Miller) + o IN PROGRESS o Steve is currently working on (in no particular order): - Proper (or at least usable) certificate chain verification. + ASN1 code redesign, butchery, replacement. + OCSP + EVP cipher enhancement. + Enhanced certificate chain verification. Private key, certificate and CRL API and implementation. Developing and bugfixing PKCS#7 (S/MIME code). Various X509 issues: character sets, certificate request extensions. - Documentation for the openssl utility. + o Geoff and Richard are currently working on: + ENGINE (the new code that gives hardware support among others). + o Richard is currently working on: + UTIL (a new set of library functions to support some higher level + functionality that is currently missing). + Shared library support for VMS. + OCSP + Kerberos 5 authentication + Constification NEEDS PATCH - o non-blocking socket on AIX - o $(PERL) in */Makefile.ssl - o "Sign the certificate?" - "n" creates empty certificate file + o apps/ca.c: "Sign the certificate?" - "n" creates empty certificate file + + o #include in exported header files is illegal since + e_os.h is suitable only for library-internal use. + + (This applies to openssl-0.9.6-stable too; openssl/conf.h is the + offending header file. While it is rarely used itself by applications, + it is included by openssl/x509v3.h, which is more likely to be used.) + + o Whenever strncpy is used, make sure the resulting string is NULL-terminated + or an error is reported OPEN ISSUES - o internal_verify doesn't know about X509.v3 (basicConstraints - CA flag ...) + o crypto/ex_data.c is not really thread-safe and so must be used + with care (e.g., extra locking where necessary, or don't call + CRYPTO_get_ex_new_index once multiple threads exist). + The current API is not suitable for everything that it pretends + to offer. o The Makefile hierarchy and build mechanism is still not a round thing: @@ -100,20 +105,6 @@ to date. Paul +1 - o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER - structure for each cipher. This may make sense for things like DES but - for variable length ciphers like RC2 and RC4 it is NBG. Need a way to - use the EVP interface and set up the cipher parameters. The ASN1 stuff - is also foo wrt ciphers whose AlgorithmIdentifier has more than just - an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open - don't work unless the key length matches the fixed value (some vendors - use a key length decided by the size of the RSA encrypted key and expect - RC2 to adapt). - - o ERR_error_string(..., buf) does not know how large buf is, - there should be ERR_error_string_n(..., buf, bufsize) - or similar. - WISHES o