OpenSSL STATUS Last modified at
- ______________ $Date: 1999/12/05 00:40:53 $
+ ______________ $Date: 2000/09/20 15:15:37 $
DEVELOPMENT STATE
- o OpenSSL 0.9.5: Under development...
+ o OpenSSL 0.9.6: Under development (in release cycle)...
+ Proposed release date September 24, 2000
+ 0.9.6-beta1 is available:
+ OpenBSD-x86 2.7 - failed
+ ftime not supported [FIXED]
+ hpux-parisc-cc 10.20 - passed
+ hpux-parisc-gcc 10.20 - passed
+ hpux-parisc-gcc 11.00 - passed
+ hpux-gcc - passed
+ hpux-brokengcc - failed
+ BN_sqr fails in test
+ linux-elf - passed
+ linux-sparcv7 - passed
+ linux-ppc - passed
+ Solaris [engine] - failed
+ speed cswift gives odd errors [FIXED]
+ solaris-sparcv8-gcc - passed
+ solaris-sparcv9-gcc - passed
+ solaris-sparcv9-cc - passed
+ solaris64-sparcv9-cc - passed
+ sco5-gcc - passed
+ sco5-cc - passed
+ FreeBSD - passed
+ Win32 VC++ - failed
+ PCURSORINFO not defined unless Win2000 [FIXED]
+ RAND_poll() problem on Win2000 [FIXED]
+ DSO method always DSO_METHOD_null [FIXED]
+ CygWin32 - test failed
+ MingW32 - failed
+ thelp32.h
+ aix-gcc (AIX 4.3.2) - passed
+ VMS/Alpha - failed
+ Some things were missing [FIXED]
+ 0.9.6-beta2 is available:
+ linux/openbsd (all platforms?) - mod_exp bug
+ sunos-gcc - passed
+ aix-gcc - passed
+ Win32 w/ VC6 or Mingw32 - failed
+ RAND_poll(), a few uninitialised vars [FIXED]
+ RAND_poll() should used LoadLibrary instead of
+ GetModuleHandle [FIXED]
+ Major compilation problem with VC6 on NT.
+ [FIXED]
+ Mingw32 says "175: parse error before `DWORD'"
+ [FIXED?]
+ Win32 w/ CygWin - success?
+ VMS/Alpha 7.1 (CPQ C 5.6-003, TCP/IP 5.0) - success
+ Just a small warning in dso_vms.c [FIXED]
+ VMS/Alpha 7.2-1 (CPQ 5.6-003, TCP/IP 5.0A) - success
+ VMS/VAX 7.2-1 (CPQ 5.2-003, TCP/IP 5.0) - success
+ hpux-parisc-cc (HP-UX B.11.00) - success
+ hpux-parisc2-cc (11.00) - success
+ hpux64-parisc2-cc (11.00) - success
+ hpux-parisc1_1-cc (11.00) - success
+ hpux-parisc-cc (10.20 w/ -ldld) - success
+ hpux-parisc-gcc (10.20 w/ -ldld) - success
+ hpux-parisc-cc [engine] (10.20 w/ -ldld)- success
+ hpux-parisc-gcc [endine] (10.20 w/ -ldld)- success
+ All hpux 10.20 targets succeeded provided -ldl
+ has been changed to -ldld.
+ solaris-sparcv9-gcc (2.6/ultra5) - success
+ solaris-sparcv9-cc (SunOS 5.7 SC3.0) - failed
+ Complaints about a number of -x parameters to
+ the compiler and failed to compile an
+ assembler file. Maybe a too old
+ compiler?
+ FreeBSD (2.2.5-RELEASE) - success
+ alpha-cc [engine] (OSF1 5.0A) - success
+ irix-mips3-cc [engine] (Irix 6.2) - success
+ One has to do the same as for OpenBSD in
+ speed.c [FIXED]
+ aix-cc (3.2.5, cc 1.3.0.44) - success
+ aix-gcc (3.2.5, gcc 2.8.1) - success
+ Both first failed to compiled due to ftime().
+ [FIXED]
+ alpha-cc (V4.0E) - success
+ alpha-gcc (V4.0E, gcc 2.8.1) - success
+ ultrix-cc (V4.5) - success
+ ultrix-gcc (V4.5, gcc 2.8.1) - success
+ o OpenSSL 0.9.5a: Released on April 1st, 2000
+ o OpenSSL 0.9.5: Released on February 28th, 2000
o OpenSSL 0.9.4: Released on August 09th, 1999
o OpenSSL 0.9.3a: Released on May 29th, 1999
o OpenSSL 0.9.3: Released on May 25th, 1999
AVAILABLE PATCHES
- o shared libraries <behnke@trustcenter.de>
- o getenv in ca.c and x509_def.c (jaltman@watsun.cc.columbia.edu)
- o SMIME tool (demo), Sampo Kellomaki <sampo@iki.fi>
o CA.pl patch (Damien Miller)
- o FreeBSD 3.0 changes (Richard Levitte)
IN PROGRESS
o Steve is currently working on (in no particular order):
+ ASN1 code redesign, butchery, replacement.
+ EVP cipher enhancement.
Proper (or at least usable) certificate chain verification.
Private key, certificate and CRL API and implementation.
Developing and bugfixing PKCS#7 (S/MIME code).
Various X509 issues: character sets, certificate request extensions.
- Documentation for the openssl utility.
-
- o Mark is currently working on:
- Folding in any changes that are in the C2Net code base that were
- not in the original SSLeay-0.9.1.b release. Plus other minor
- tidying.
-
- o Ralf is currently working on:
- 1. Support for SSL_set_default_verify_paths(),
- SSL_load_verify_locations(), SSL_get_cert_store() and
- SSL_set_cert_store() functions which work like their existing
- SSL_CTX_xxx() variants but on a per connection basis. That's needed
- to let us provide full-featured per-URL client verification in
- mod_ssl or Apache-SSL.
- => It still dumps core, so I suspend this and investigate
- again for OpenSSL 0.9.3.
- 2. The perl/ stuff to make it really work the first time ;-)
- => I'll investigate a few more hours for OpenSSL 0.9.2
- 3. The new documentation set in POD format under doc/
- => I'll investigate a few more hours for OpenSSL 0.9.2
- 4. More cleanups to get rid of obsolete/old/ugly files in the
- source tree which are not really needed.
- => Done all which were possible with my personal knowledge
-
- o Ben is currently working on:
- 1. Function Prototype Thought Police issues.
- 2. Integrated documentation.
- 3. New TLS Ciphersuites.
- 4. Anything else that takes his fancy.
+ o Geoff and Richard are currently working on:
+ ENGINE (the new code that gives hardware support among others).
+ o Richard is currently working on:
+ UTIL (a new set of library functions to support some higher level
+ functionality that is currently missing).
+ Dynamic thread-lock support.
+ Shared library support for VMS.
NEEDS PATCH
- o salzr@certco.com (Rich Salz): Bug in X509_name_print
- <29E0A6D39ABED111A36000A0C99609CA2C2BA4@macertco-srv1.ma.certco.com>
+ o non-blocking socket on AIX
o $(PERL) in */Makefile.ssl
o "Sign the certificate?" - "n" creates empty certificate file
to date.
Paul +1
- o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER
- structure for each cipher. This may make sense for things like DES but
- for variable length ciphers like RC2 and RC4 it is NBG. Need a way to
- use the EVP interface and set up the cipher parameters. The ASN1 stuff
- is also foo wrt ciphers whose AlgorithmIdentifier has more than just
- an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open
- don't work unless the key length matches the fixed value (some vendors
- use a key length decided by the size of the RSA encrypted key and expect
- RC2 to adapt).
-
- o Properly initialize the PRNG in the absence of /dev/random.
-
- o ERR_error_string(..., buf) does not know how large buf is,
- there should be ERR_error_string_n(..., buf, bufsize)
- or similar.
-
WISHES
o