X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=blobdiff_plain;f=STATUS;h=77d0ff1b5c39dfdcec4a7722995d11f12bb6a896;hp=7c0307e5f1ec966528ea30d9eed0c60541c6f355;hb=8e913bff55adfb2b2f0ee9e3065b1432bb5d59bc;hpb=88b04f03cf47d37dd7fd245ba56747bf6024055e diff --git a/STATUS b/STATUS index 7c0307e5f1..77d0ff1b5c 100644 --- a/STATUS +++ b/STATUS @@ -1,38 +1,44 @@ OpenSSL STATUS Last modified at - ______________ $Date: 2000/02/27 19:58:16 $ + ______________ $Date: 2000/09/17 11:56:53 $ DEVELOPMENT STATE - o OpenSSL 0.9.5: Under development... - 0.9.5-beta1 was available. - Debian GNU/Linux 2.1 - test passed - Mingw32 egcs 1.1.2 - test passed - FreeBSD 3.0-RELEASE - test passed - FreeBSD 3.2-RELEASE - test passed - solaris-sparcv9-cc - test passed - solaris-sparcv9-gcc - test passed - hpux-parisc-gcc - test passed - AIX 4.3 (aix-cc) - test passed - VC++ - test passed - 0.9.5beta2 is available. - hpux-parisc-cc - test passed - hpux-parisc-gcc (gcc 2.7.1) - test passed - hpux-parisc-gcc (gcc 2.8.0) - test passed - AIX 4.3 (aix-cc) - test passed - FreeBSD 3.0-RELEASE - test passed - OpenVMS V7.1/Alpha - test passed - OpenVMS V7.2-1/Alpha - test passed - OpenVMS V7.2/VAX - test failed (is corrected) - OpenVMS V7.1/VAX - test failed (is corrected) - solaris-sparcv9-cc - test passed - irix-mips3-cc - test passed - irix64-mips4-cc - test passed - Rhapsody (MacOS X) - test passed - solaris64-sparcv9-cc - test passed - linux-alpha+bwx-ccc - test passed - linux-alpha-gcc (gcc 2.95.1) - test passed - Proposed release time: Monday, February 28th 2000 + o OpenSSL 0.9.6: Under development (in release cycle)... + Proposed release date September 24, 2000 + 0.9.6-beta1 is available: + OpenBSD-x86 2.7 - failed + ftime not supported [FIXED] + hpux-parisc-cc 10.20 - passed + hpux-parisc-gcc 10.20 - passed + hpux-parisc-gcc 11.00 - passed + hpux-gcc - passed + hpux-brokengcc - failed + BN_sqr fails in test + linux-elf - passed + linux-sparcv7 - passed + linux-ppc - passed + Solaris [engine] - failed + speed cswift gives odd errors [FIXED] + solaris-sparcv8-gcc - passed + solaris-sparcv9-gcc - passed + solaris-sparcv9-cc - passed + solaris64-sparcv9-cc - passed + sco5-gcc - passed + sco5-cc - passed + FreeBSD - passed + Win32 VC++ - failed + PCURSORINFO not defined unless Win2000 [FIXED] + RAND_poll() problem on Win2000 [FIXED] + DSO method always DSO_METHOD_null [FIXED] + CygWin32 - test failed + MingW32 - failed + thelp32.h + aix-gcc (AIX 4.3.2) - passed + VMS/Alpha - failed + Some things were missing [FIXED] + o OpenSSL 0.9.5a: Released on April 1st, 2000 + o OpenSSL 0.9.5: Released on February 28th, 2000 o OpenSSL 0.9.4: Released on August 09th, 1999 o OpenSSL 0.9.3a: Released on May 29th, 1999 o OpenSSL 0.9.3: Released on May 25th, 1999 @@ -43,17 +49,24 @@ AVAILABLE PATCHES - o shared libraries o CA.pl patch (Damien Miller) IN PROGRESS o Steve is currently working on (in no particular order): + ASN1 code redesign, butchery, replacement. + EVP cipher enhancement. Proper (or at least usable) certificate chain verification. Private key, certificate and CRL API and implementation. Developing and bugfixing PKCS#7 (S/MIME code). Various X509 issues: character sets, certificate request extensions. - Documentation for the openssl utility. + o Geoff and Richard are currently working on: + ENGINE (the new code that gives hardware support among others). + o Richard is currently working on: + UTIL (a new set of library functions to support some higher level + functionality that is currently missing). + Dynamic thread-lock support. + Shared library support for VMS. NEEDS PATCH @@ -106,20 +119,6 @@ to date. Paul +1 - o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER - structure for each cipher. This may make sense for things like DES but - for variable length ciphers like RC2 and RC4 it is NBG. Need a way to - use the EVP interface and set up the cipher parameters. The ASN1 stuff - is also foo wrt ciphers whose AlgorithmIdentifier has more than just - an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open - don't work unless the key length matches the fixed value (some vendors - use a key length decided by the size of the RSA encrypted key and expect - RC2 to adapt). - - o ERR_error_string(..., buf) does not know how large buf is, - there should be ERR_error_string_n(..., buf, bufsize) - or similar. - WISHES o