X-Git-Url: https://git.openssl.org/?p=openssl.git;a=blobdiff_plain;f=STATUS;h=e04c545aa058b2c1a886720ca32389bfd0e8a830;hp=527116a96916207b88e2047a85441b25d0dea519;hb=9f100cf3441a56bdb4404bf5cc9747085e2c53a0;hpb=e147c6fef8d0982c29a75251c54f8e23ef5a3056 diff --git a/STATUS b/STATUS index 527116a969..e04c545aa0 100644 --- a/STATUS +++ b/STATUS @@ -1,79 +1,91 @@ OpenSSL STATUS Last modified at - ______________ $Date: 2000/09/13 11:33:09 $ + ______________ $Date: 2002/12/12 19:40:55 $ DEVELOPMENT STATE - o OpenSSL 0.9.6: Under development (in release cycle)... - Proposed release date September 24, 2000 - 0.9.6-beta1 is available: - OpenBSD-x86 2.7 - failed - ftime not supported [FIXED] - hpux-parisc-cc 10.20 - passed - hpux-parisc-gcc 10.20 - passed - hpux-gcc - passed - hpux-brokengcc - failed - BN_sqr fails in test - linux-elf - passed - linux-sparcv7 - passed - linux-ppc - passed - Solaris [engine] - failed - speed cswift gives odd errors [FIXED] - solaris-sparcv8-gcc - passed - solaris-sparcv9-gcc - passed - solaris-sparcv9-cc - passed - solaris64-sparcv9-cc - passed - sco5-gcc - passed - sco5-cc - passed - FreeBSD - passed - Win32 VC++ - failed - PCURSORINFO not defined unless Win2000 [FIXED] - RAND_poll() problem on Win2000 [FIXED] - CygWin32 - test failed - MingW32 - failed - thelp32.h - aix-gcc (AIX 4.3.2) - passed - o OpenSSL 0.9.5a: Released on April 1st, 2000 - o OpenSSL 0.9.5: Released on February 28th, 2000 - o OpenSSL 0.9.4: Released on August 09th, 1999 - o OpenSSL 0.9.3a: Released on May 29th, 1999 - o OpenSSL 0.9.3: Released on May 25th, 1999 - o OpenSSL 0.9.2b: Released on March 22th, 1999 - o OpenSSL 0.9.1c: Released on December 23th, 1998 + o OpenSSL 0.9.8: Under development... + o OpenSSL 0.9.7-beta5: Released on December 5th, 2002 + o OpenSSL 0.9.7-beta4: Released on November 19th, 2002 + Debian GNU/Linux (kernel version 2.4.19, gcc 2.95.4) - PASSED + o OpenSSL 0.9.7-beta3: Released on July 30th, 2002 + o OpenSSL 0.9.7-beta2: Released on June 16th, 2002 + o OpenSSL 0.9.7-beta1: Released on June 1st, 2002 + o OpenSSL 0.9.6h: Released on December 5th, 2002 + o OpenSSL 0.9.6g: Released on August 9th, 2002 + o OpenSSL 0.9.6f: Released on August 8th, 2002 + o OpenSSL 0.9.6e: Released on July 30th, 2002 + o OpenSSL 0.9.6d: Released on May 9th, 2002 + o OpenSSL 0.9.6c: Released on December 21st, 2001 + o OpenSSL 0.9.6b: Released on July 9th, 2001 + o OpenSSL 0.9.6a: Released on April 5th, 2001 + o OpenSSL 0.9.6: Released on September 24th, 2000 + o OpenSSL 0.9.5a: Released on April 1st, 2000 + o OpenSSL 0.9.5: Released on February 28th, 2000 + o OpenSSL 0.9.4: Released on August 09th, 1999 + o OpenSSL 0.9.3a: Released on May 29th, 1999 + o OpenSSL 0.9.3: Released on May 25th, 1999 + o OpenSSL 0.9.2b: Released on March 22th, 1999 + o OpenSSL 0.9.1c: Released on December 23th, 1998 + + [See also http://www.openssl.org/support/rt2.html] RELEASE SHOWSTOPPERS + o BN_mod_mul verification fails for mips3-sgi-irix + unless configured with no-asm + + o [2002-11-21] + PR 343 mentions that scrubbing memory with 'memset(ptr, 0, n)' may + be optimized away in modern compilers. This is definitely not good + and needs to be fixed immediately. The formula to use is presented + in: + + http://online.securityfocus.com/archive/82/297918/2002-10-27/2002-11-02/0 + + The problem report that mentions this is: + + https://www.aet.TU-Cottbus.DE/rt2/Ticket/Display.html?id=343 + AVAILABLE PATCHES - o CA.pl patch (Damien Miller) + o IN PROGRESS o Steve is currently working on (in no particular order): ASN1 code redesign, butchery, replacement. + OCSP EVP cipher enhancement. - Proper (or at least usable) certificate chain verification. + Enhanced certificate chain verification. Private key, certificate and CRL API and implementation. Developing and bugfixing PKCS#7 (S/MIME code). Various X509 issues: character sets, certificate request extensions. o Geoff and Richard are currently working on: ENGINE (the new code that gives hardware support among others). o Richard is currently working on: + UI (User Interface) UTIL (a new set of library functions to support some higher level functionality that is currently missing). - Dynamic thread-lock support. Shared library support for VMS. + Kerberos 5 authentication (Heimdal) + Constification + Compression + Attribute Certificate support + Certificate Pair support + Storage Engines (primarly an LDAP storage engine) + Certificate chain validation with full RFC 3280 compatibility NEEDS PATCH - o non-blocking socket on AIX - o $(PERL) in */Makefile.ssl - o "Sign the certificate?" - "n" creates empty certificate file + o 0.9.8-dev: COMPLEMENTOFALL and COMPLEMENTOFDEFAULT do not + handle ECCdraft cipher suites correctly. - OPEN ISSUES + o apps/ca.c: "Sign the certificate?" - "n" creates empty certificate file + + o "OpenSSL STATUS" is never up-to-date. - o internal_verify doesn't know about X509.v3 (basicConstraints - CA flag ...) + OPEN ISSUES o The Makefile hierarchy and build mechanism is still not a round thing: @@ -99,22 +111,20 @@ which apparently is not flexible enough to generate libcrypto) + WISHES - o The perl/ stuff needs a major overhaul. Currently it's - totally obsolete. Either we clean it up and enhance it to be up-to-date - with the C code or we also could replace it with the really nice - Net::SSLeay package we can find under - http://www.neuronio.pt/SSLeay.pm.html. Ralf uses this package for a - longer time and it works fine and is a nice Perl module. Best would be - to convince the author to work for the OpenSSL project and create a - Net::OpenSSL or Crypt::OpenSSL package out of it and maintains it for - us. + o Add variants of DH_generate_parameters() and BN_generate_prime() [etc?] + where the callback function can request that the function be aborted. + [Gregory Stark , ] - Status: Ralf thinks we should both contact the author of Net::SSLeay - and look how much effort it is to bring Eric's perl/ stuff up - to date. - Paul +1 + o SRP in TLS. + [wished by: + Dj , Tom Wu , + Tom Holroyd ] - WISHES + See http://search.ietf.org/internet-drafts/draft-ietf-tls-srp-00.txt + as well as http://www-cs-students.stanford.edu/~tjw/srp/. - o + Tom Holroyd tells us there is a SRP patch for OpenSSH at + http://members.tripod.com/professor_tom/archives/, that could + be useful.