2 OpenSSL STATUS Last modified at
3 ______________ $Date: 2000/02/27 19:58:16 $
7 o OpenSSL 0.9.5: Under development...
8 0.9.5-beta1 was available.
9 Debian GNU/Linux 2.1 - test passed
10 Mingw32 egcs 1.1.2 - test passed
11 FreeBSD 3.0-RELEASE - test passed
12 FreeBSD 3.2-RELEASE - test passed
13 solaris-sparcv9-cc - test passed
14 solaris-sparcv9-gcc - test passed
15 hpux-parisc-gcc - test passed
16 AIX 4.3 (aix-cc) - test passed
18 0.9.5beta2 is available.
19 hpux-parisc-cc - test passed
20 hpux-parisc-gcc (gcc 2.7.1) - test passed
21 hpux-parisc-gcc (gcc 2.8.0) - test passed
22 AIX 4.3 (aix-cc) - test passed
23 FreeBSD 3.0-RELEASE - test passed
24 OpenVMS V7.1/Alpha - test passed
25 OpenVMS V7.2-1/Alpha - test passed
26 OpenVMS V7.2/VAX - test failed (is corrected)
27 OpenVMS V7.1/VAX - test failed (is corrected)
28 solaris-sparcv9-cc - test passed
29 irix-mips3-cc - test passed
30 irix64-mips4-cc - test passed
31 Rhapsody (MacOS X) - test passed
32 solaris64-sparcv9-cc - test passed
33 linux-alpha+bwx-ccc - test passed
34 linux-alpha-gcc (gcc 2.95.1) - test passed
35 Proposed release time: Monday, February 28th 2000
36 o OpenSSL 0.9.4: Released on August 09th, 1999
37 o OpenSSL 0.9.3a: Released on May 29th, 1999
38 o OpenSSL 0.9.3: Released on May 25th, 1999
39 o OpenSSL 0.9.2b: Released on March 22th, 1999
40 o OpenSSL 0.9.1c: Released on December 23th, 1998
46 o shared libraries <behnke@trustcenter.de>
47 o CA.pl patch (Damien Miller)
51 o Steve is currently working on (in no particular order):
52 Proper (or at least usable) certificate chain verification.
53 Private key, certificate and CRL API and implementation.
54 Developing and bugfixing PKCS#7 (S/MIME code).
55 Various X509 issues: character sets, certificate request extensions.
56 Documentation for the openssl utility.
60 o non-blocking socket on AIX
61 o $(PERL) in */Makefile.ssl
62 o "Sign the certificate?" - "n" creates empty certificate file
66 o internal_verify doesn't know about X509.v3 (basicConstraints
69 o The Makefile hierarchy and build mechanism is still not a round thing:
71 1. The config vs. Configure scripts
72 It's the same nasty situation as for Apache with APACI vs.
73 src/Configure. It confuses.
74 Suggestion: Merge Configure and config into a single configure
75 script with a Autoconf style interface ;-) and remove
76 Configure and config. Or even let us use GNU Autoconf
77 itself. Then we can avoid a lot of those platform checks
78 which are currently in Configure.
80 o Support for Shared Libraries has to be added at least
81 for the major Unix platforms. The details we can rip from the stuff
82 Ralf has done for the Apache src/Configure script. Ben wants the
83 solution to be really simple.
85 Status: Ralf will look how we can easily incorporate the
86 compiler PIC and linker DSO flags from Apache
87 into the OpenSSL Configure script.
89 Ulf: +1 for using GNU autoconf and libtool (but not automake,
90 which apparently is not flexible enough to generate
94 o The perl/ stuff needs a major overhaul. Currently it's
95 totally obsolete. Either we clean it up and enhance it to be up-to-date
96 with the C code or we also could replace it with the really nice
97 Net::SSLeay package we can find under
98 http://www.neuronio.pt/SSLeay.pm.html. Ralf uses this package for a
99 longer time and it works fine and is a nice Perl module. Best would be
100 to convince the author to work for the OpenSSL project and create a
101 Net::OpenSSL or Crypt::OpenSSL package out of it and maintains it for
104 Status: Ralf thinks we should both contact the author of Net::SSLeay
105 and look how much effort it is to bring Eric's perl/ stuff up
109 o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER
110 structure for each cipher. This may make sense for things like DES but
111 for variable length ciphers like RC2 and RC4 it is NBG. Need a way to
112 use the EVP interface and set up the cipher parameters. The ASN1 stuff
113 is also foo wrt ciphers whose AlgorithmIdentifier has more than just
114 an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open
115 don't work unless the key length matches the fixed value (some vendors
116 use a key length decided by the size of the RSA encrypted key and expect
119 o ERR_error_string(..., buf) does not know how large buf is,
120 there should be ERR_error_string_n(..., buf, bufsize)