2 OpenSSL STATUS Last modified at
3 ______________ $Date: 1999/08/08 10:19:48 $
7 o OpenSSL 0.9.4: Under development...
8 Proposed code freeze: August, 2nd 1999
9 Proposed release date: August, 9th 1999
11 o OpenSSL 0.9.3a: Released on May 29th, 1999
12 o OpenSSL 0.9.3: Released on May 25th, 1999
13 o OpenSSL 0.9.2b: Released on March 22th, 1999
14 o OpenSSL 0.9.1c: Released on December 23th, 1998
20 o OCSP (titchenert@certco.com)
21 o getenv in ca.c and x509_def.c (jaltman@watsun.cc.columbia.edu)
25 o Steve is currently working on (in no particular order):
26 Proper (or at least usable) certificate chain verification.
27 Private key, certificate and CRL API and implementation.
28 Checking and bugfixing PKCS#7 (S/MIME code).
30 o Mark is currently working on:
31 Folding in any changes that are in the C2Net code base that were
32 not in the original SSLeay-0.9.1.b release. Plus other minor
35 o Ralf is currently working on:
36 1. Support for SSL_set_default_verify_paths(),
37 SSL_load_verify_locations(), SSL_get_cert_store() and
38 SSL_set_cert_store() functions which work like their existing
39 SSL_CTX_xxx() variants but on a per connection basis. That's needed
40 to let us provide full-featured per-URL client verification in
41 mod_ssl or Apache-SSL.
42 => It still dumps core, so I suspend this and investigate
43 again for OpenSSL 0.9.3.
44 2. The perl/ stuff to make it really work the first time ;-)
45 => I'll investigate a few more hours for OpenSSL 0.9.2
46 3. The new documentation set in POD format under doc/
47 => I'll investigate a few more hours for OpenSSL 0.9.2
48 4. More cleanups to get rid of obsolete/old/ugly files in the
49 source tree which are not really needed.
50 => Done all which were possible with my personal knowledge
52 o Ben is currently working on:
53 1. Function Prototype Thought Police issues.
54 2. Integrated documentation.
55 3. New TLS Ciphersuites.
56 4. Anything else that takes his fancy.
60 o salzr@certco.com (Rich Salz): Bug in X509_name_print
61 <29E0A6D39ABED111A36000A0C99609CA2C2BA4@macertco-srv1.ma.certco.com>
62 o $(PERL) in */Makefile.ssl
63 o "Sign the certificate?" - "n" creates empty certificate file
67 o internal_verify doesn't know about X509.v3 (basicConstraints
70 o The Makefile hierarchy and build mechanism is still not a round thing:
72 1. The config vs. Configure scripts
73 It's the same nasty situation as for Apache with APACI vs.
74 src/Configure. It confuses.
75 Suggestion: Merge Configure and config into a single configure
76 script with a Autoconf style interface ;-) and remove
77 Configure and config. Or even let us use GNU Autoconf
78 itself. Then we can avoid a lot of those platform checks
79 which are currently in Configure.
81 o Support for Shared Libraries has to be added at least
82 for the major Unix platforms. The details we can rip from the stuff
83 Ralf has done for the Apache src/Configure script. Ben wants the
84 solution to be really simple.
86 Status: Ralf will look how we can easily incorporate the
87 compiler PIC and linker DSO flags from Apache
88 into the OpenSSL Configure script.
90 o The perl/ stuff needs a major overhaul. Currently it's
91 totally obsolete. Either we clean it up and enhance it to be up-to-date
92 with the C code or we also could replace it with the really nice
93 Net::SSLeay package we can find under
94 http://www.neuronio.pt/SSLeay.pm.html. Ralf uses this package for a
95 longer time and it works fine and is a nice Perl module. Best would be
96 to convince the author to work for the OpenSSL project and create a
97 Net::OpenSSL or Crypt::OpenSSL package out of it and maintains it for
100 Status: Ralf thinks we should both contact the author of Net::SSLeay
101 and look how much effort it is to bring Eric's perl/ stuff up
105 o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER
106 structure for each cipher. This may make sense for things like DES but
107 for variable length ciphers like RC2 and RC4 it is NBG. Need a way to
108 use the EVP interface and set up the cipher parameters. The ASN1 stuff
109 is also foo wrt ciphers whose AlgorithmIdentifier has more than just
110 an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open
111 don't work unless the key length matches the fixed value (some vendors
112 use a key length decided by the size of the RSA encrypted key and expect
115 o Properly initialize the PRNG in the absence of /dev/random.
117 o ERR_error_string(..., buf) does not know how large buf is,
118 there should be ERR_error_string_n(..., buf, bufsize)