VMS didn't work out too well...
[openssl.git] / STATUS
diff --git a/STATUS b/STATUS
index 7c0307e5f1ec966528ea30d9eed0c60541c6f355..77d0ff1b5c39dfdcec4a7722995d11f12bb6a896 100644 (file)
--- a/STATUS
+++ b/STATUS
@@ -1,38 +1,44 @@
 
   OpenSSL STATUS                           Last modified at
-  ______________                           $Date: 2000/02/27 19:58:16 $
+  ______________                           $Date: 2000/09/17 11:56:53 $
 
   DEVELOPMENT STATE
 
-    o  OpenSSL 0.9.5:  Under development...
-                       0.9.5-beta1 was available.
-                         Debian GNU/Linux 2.1 - test passed
-                         Mingw32 egcs 1.1.2   - test passed
-                         FreeBSD 3.0-RELEASE  - test passed
-                         FreeBSD 3.2-RELEASE  - test passed
-                         solaris-sparcv9-cc   - test passed
-                         solaris-sparcv9-gcc  - test passed
-                         hpux-parisc-gcc      - test passed
-                         AIX 4.3 (aix-cc)     - test passed
-                         VC++                 - test passed
-                       0.9.5beta2 is available.
-                         hpux-parisc-cc       - test passed
-                         hpux-parisc-gcc (gcc 2.7.1) - test passed
-                         hpux-parisc-gcc (gcc 2.8.0) - test passed
-                         AIX 4.3 (aix-cc)     - test passed
-                         FreeBSD 3.0-RELEASE  - test passed
-                         OpenVMS V7.1/Alpha   - test passed
-                         OpenVMS V7.2-1/Alpha - test passed
-                         OpenVMS V7.2/VAX     - test failed (is corrected)
-                         OpenVMS V7.1/VAX     - test failed (is corrected)
-                         solaris-sparcv9-cc   - test passed 
-                        irix-mips3-cc        - test passed
-                        irix64-mips4-cc      - test passed
-                        Rhapsody (MacOS X)   - test passed
-                        solaris64-sparcv9-cc - test passed
-                        linux-alpha+bwx-ccc  - test passed
-                        linux-alpha-gcc (gcc 2.95.1) - test passed
-                       Proposed release time: Monday, February 28th 2000
+    o  OpenSSL 0.9.6:  Under development (in release cycle)...
+                       Proposed release date September 24, 2000
+                       0.9.6-beta1 is available:
+                       OpenBSD-x86 2.7                 - failed
+                               ftime not supported [FIXED]
+                       hpux-parisc-cc 10.20            - passed
+                       hpux-parisc-gcc 10.20           - passed
+                       hpux-parisc-gcc 11.00           - passed
+                       hpux-gcc                        - passed
+                       hpux-brokengcc                  - failed
+                               BN_sqr fails in test
+                       linux-elf                       - passed
+                       linux-sparcv7                   - passed
+                       linux-ppc                       - passed
+                       Solaris [engine]                - failed
+                               speed cswift gives odd errors [FIXED]
+                       solaris-sparcv8-gcc             - passed
+                       solaris-sparcv9-gcc             - passed
+                       solaris-sparcv9-cc              - passed
+                       solaris64-sparcv9-cc            - passed
+                       sco5-gcc                        - passed
+                       sco5-cc                         - passed
+                       FreeBSD                         - passed
+                       Win32 VC++                      - failed
+                               PCURSORINFO not defined unless Win2000 [FIXED]
+                               RAND_poll() problem on Win2000 [FIXED]
+                               DSO method always DSO_METHOD_null [FIXED]
+                       CygWin32                        - test failed
+                       MingW32                         - failed
+                               thelp32.h
+                       aix-gcc (AIX 4.3.2)             - passed
+                       VMS/Alpha                       - failed
+                               Some things were missing [FIXED]
+    o  OpenSSL 0.9.5a: Released on April     1st, 2000
+    o  OpenSSL 0.9.5:  Released on February 28th, 2000
     o  OpenSSL 0.9.4:  Released on August   09th, 1999
     o  OpenSSL 0.9.3a: Released on May      29th, 1999
     o  OpenSSL 0.9.3:  Released on May      25th, 1999
 
   AVAILABLE PATCHES
 
-    o shared libraries <behnke@trustcenter.de>
     o CA.pl patch (Damien Miller)
 
   IN PROGRESS
 
     o Steve is currently working on (in no particular order):
+        ASN1 code redesign, butchery, replacement.
+        EVP cipher enhancement.
         Proper (or at least usable) certificate chain verification.
        Private key, certificate and CRL API and implementation.
        Developing and bugfixing PKCS#7 (S/MIME code).
         Various X509 issues: character sets, certificate request extensions.
-       Documentation for the openssl utility.
+    o Geoff and Richard are currently working on:
+       ENGINE (the new code that gives hardware support among others).
+    o Richard is currently working on:
+       UTIL (a new set of library functions to support some higher level
+             functionality that is currently missing).
+       Dynamic thread-lock support.
+       Shared library support for VMS.
 
   NEEDS PATCH
 
                to date.
                Paul +1
 
-    o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER
-      structure for each cipher. This may make sense for things like DES but
-      for variable length ciphers like RC2 and RC4 it is NBG. Need a way to
-      use the EVP interface and set up the cipher parameters. The ASN1 stuff
-      is also foo wrt ciphers whose AlgorithmIdentifier has more than just
-      an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open
-      don't work unless the key length matches the fixed value (some vendors
-      use a key length decided by the size of the RSA encrypted key and expect
-      RC2 to adapt).
-
-    o ERR_error_string(..., buf) does not know how large buf is,
-      there should be ERR_error_string_n(..., buf, bufsize)
-      or similar.
-
   WISHES
 
     o