X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=blobdiff_plain;f=STATUS;h=77b266c14966d62f432ea6ccca5f78d3d06ca0a2;hp=f4b43037852ca2b54644a5179e718f9bc5c5c55c;hb=27d7260075ba525c69e5b8e8ccb1b98010b56dd3;hpb=74cdf6f73adf00b3c7d2fb0c0773fd824221a4c6 diff --git a/STATUS b/STATUS index f4b4303785..77b266c149 100644 --- a/STATUS +++ b/STATUS @@ -1,9 +1,11 @@ OpenSSL STATUS Last modified at - ______________ $Date: 2000/02/28 11:59:02 $ + ______________ $Date: 2000/07/02 21:11:11 $ DEVELOPMENT STATE + o OpenSSL 0.9.6: Under development... + o OpenSSL 0.9.5a: Released on April 1st, 2000 o OpenSSL 0.9.5: Released on February 28th, 2000 o OpenSSL 0.9.4: Released on August 09th, 1999 o OpenSSL 0.9.3a: Released on May 29th, 1999 @@ -15,17 +17,23 @@ AVAILABLE PATCHES - o shared libraries o CA.pl patch (Damien Miller) IN PROGRESS o Steve is currently working on (in no particular order): + ASN1 code redesign, butchery, replacement. + EVP cipher enhancement. Proper (or at least usable) certificate chain verification. Private key, certificate and CRL API and implementation. Developing and bugfixing PKCS#7 (S/MIME code). Various X509 issues: character sets, certificate request extensions. - Documentation for the openssl utility. + o Geoff and Richard are currently working on: + ENGINE (the new code that gives hardware support among others). + o Richard is currently working on: + UTIL (a new set of library functions to support some higher level + functionality that is currently missing). + Dynamic thread-lock support. NEEDS PATCH @@ -78,20 +86,6 @@ to date. Paul +1 - o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER - structure for each cipher. This may make sense for things like DES but - for variable length ciphers like RC2 and RC4 it is NBG. Need a way to - use the EVP interface and set up the cipher parameters. The ASN1 stuff - is also foo wrt ciphers whose AlgorithmIdentifier has more than just - an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open - don't work unless the key length matches the fixed value (some vendors - use a key length decided by the size of the RSA encrypted key and expect - RC2 to adapt). - - o ERR_error_string(..., buf) does not know how large buf is, - there should be ERR_error_string_n(..., buf, bufsize) - or similar. - WISHES o