A few more reports
[openssl.git] / STATUS
diff --git a/STATUS b/STATUS
index 72761db839646c35e5ccc8778a76607f3d4788c1..ba7da58d4b3fe04fda8edeb6fca026b256718834 100644 (file)
--- a/STATUS
+++ b/STATUS
@@ -1,19 +1,62 @@
 
   OpenSSL STATUS                           Last modified at
-  ______________                           $Date: 2000/03/21 20:42:35 $
+  ______________                           $Date: 2000/09/18 13:35:05 $
 
   DEVELOPMENT STATE
 
-    o  OpenSSL 0.9.5a: Under development...
-                       0.9.5a-beta1 is available.
-                        sunos-gcc                       - failed (ssize_t)
-                        ultrix-gcc, ultrix-cc           - failed (ssize_t)
-                        sco5-cc                         - bc fails in test
-                       VC-Win32 (MSVC6SP3, nasm)       - failed (fixed) 
-                       FreeBSD-elf (i686-pc-freebsd3.2)- failed (fixed)
-                       HPUX (hpux-parisc-cc w/ +02)    - passed
-                       OpenBSD-x86                     - passed
+    o  OpenSSL 0.9.6:  Under development (in release cycle)...
+                       Proposed release date September 24, 2000
+                       0.9.6-beta1 is available:
+                       OpenBSD-x86 2.7                 - failed
+                               ftime not supported [FIXED]
+                       hpux-parisc-cc 10.20            - passed
+                       hpux-parisc-gcc 10.20           - passed
+                       hpux-parisc-gcc 11.00           - passed
+                       hpux-gcc                        - passed
+                       hpux-brokengcc                  - failed
+                               BN_sqr fails in test
+                       linux-elf                       - passed
+                       linux-sparcv7                   - passed
+                       linux-ppc                       - passed
+                       Solaris [engine]                - failed
+                               speed cswift gives odd errors [FIXED]
+                       solaris-sparcv8-gcc             - passed
+                       solaris-sparcv9-gcc             - passed
                        solaris-sparcv9-cc              - passed
+                       solaris64-sparcv9-cc            - passed
+                       sco5-gcc                        - passed
+                       sco5-cc                         - passed
+                       FreeBSD                         - passed
+                       Win32 VC++                      - failed
+                               PCURSORINFO not defined unless Win2000 [FIXED]
+                               RAND_poll() problem on Win2000 [FIXED]
+                               DSO method always DSO_METHOD_null [FIXED]
+                       CygWin32                        - test failed
+                       MingW32                         - failed
+                               thelp32.h
+                       aix-gcc (AIX 4.3.2)             - passed
+                       VMS/Alpha                       - failed
+                               Some things were missing [FIXED]
+                       0.9.6-beta2 is available:
+                       sunos-gcc                       - passed
+                       aix-gcc                         - passed
+                       Win32 w/ VC6 or Mingw32         - failed
+                               RAND_poll(), a few uninitialised vars [FIXED]
+                               RAND_poll() should used LoadLibrary instead of
+                                       GetModuleHandle [FIXED]
+                               Major compilation problem with VC6 on NT
+                               Mingw32 says "175: parse error before `DWORD'"
+                       Win32 w/ CygWin                 - success?
+                       VMS/Alpha 7.1 (CPQ C 5.6-003, TCP/IP 5.0) - success
+                               Just a small warning in dso_vms.c [FIXED]
+                       VMS/Alpha 7.2-1 (CPQ 5.6-003, TCP/IP 5.0A) - success
+                       VMS/VAX 7.2-1 (CPQ 5.2-003, TCP/IP 5.0) - success
+                       hpux-parisc-cc (HP-UX B.11.00)  - failed
+                               Typo in Configure, -ldl should be -ldld [FIXED]
+                       solaris-sparcv9-gcc (2.6/ultra5)- success
+                       FreeBSD (2.2.5-RELEASE)         - success
+                       solaris-sparcv9-cc (SunOS 5.7 SC3.0) - failed
+    o  OpenSSL 0.9.5a: Released on April     1st, 2000
     o  OpenSSL 0.9.5:  Released on February 28th, 2000
     o  OpenSSL 0.9.4:  Released on August   09th, 1999
     o  OpenSSL 0.9.3a: Released on May      29th, 1999
   IN PROGRESS
 
     o Steve is currently working on (in no particular order):
+        ASN1 code redesign, butchery, replacement.
+        EVP cipher enhancement.
         Proper (or at least usable) certificate chain verification.
        Private key, certificate and CRL API and implementation.
        Developing and bugfixing PKCS#7 (S/MIME code).
         Various X509 issues: character sets, certificate request extensions.
-       Documentation for the openssl utility.
+    o Geoff and Richard are currently working on:
+       ENGINE (the new code that gives hardware support among others).
+    o Richard is currently working on:
+       UTIL (a new set of library functions to support some higher level
+             functionality that is currently missing).
+       Dynamic thread-lock support.
+       Shared library support for VMS.
 
   NEEDS PATCH
 
                to date.
                Paul +1
 
-    o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER
-      structure for each cipher. This may make sense for things like DES but
-      for variable length ciphers like RC2 and RC4 it is NBG. Need a way to
-      use the EVP interface and set up the cipher parameters. The ASN1 stuff
-      is also foo wrt ciphers whose AlgorithmIdentifier has more than just
-      an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open
-      don't work unless the key length matches the fixed value (some vendors
-      use a key length decided by the size of the RSA encrypted key and expect
-      RC2 to adapt).
-
-    o ERR_error_string(..., buf) does not know how large buf is,
-      there should be ERR_error_string_n(..., buf, bufsize)
-      or similar.
-
   WISHES
 
     o