OpenSSL STATUS Last modified at
- ______________ $Date: 2000/03/25 10:14:15 $
+ ______________ $Date: 2001/03/14 07:00:57 $
DEVELOPMENT STATE
- o OpenSSL 0.9.5a: Under development...
- 0.9.5a-beta1 is available.
- sunos-gcc - failed (ssize_t)
- ultrix-gcc, ultrix-cc - failed (ssize_t)
- sco5-cc - bc fails in test
- VC-Win32 (MSVC6SP3, nasm) - failed (fixed)
- FreeBSD-elf (i686-pc-freebsd3.2)- failed (fixed)
- HPUX (hpux-parisc-cc w/ +02) - passed
- OpenBSD-x86 - passed
- solaris-sparcv9-cc - passed
- 0.9.5a-beta2 is available.
- linux-elf - passed
- linux-ppc (egcs 2.91.66) - passed
- OpenBSD-elf - passed
- FreeBSD-elf (i586-pc-freebsd3.2)- passed
- solaris-sparcv9-cc - passed
- solaris-sparcv9-gcc - passed
- Mingw32 - passed
- VMS/Alpha 7.1 w/ DEC C 5.6-003 - passed
- VMS/Alpha 7.2-1 w/ CPQ C 6.2-003- passed
- VMS/VAX 7.1 w/ DEC C 5.6-003 - passed
- AIX 4.3.3.0 w/ cc - passed
- AIX 4.3.3.0 w/ gcc (2.7.2.3?) - passed
- Irix 6.4 w/ cc - passed
- Irix 6.4 w/ gcc - passed
- Irix 6.5 w/ cc - passed
- Irix 6.5 w/ gcc - passed
- NetBSD-x86 - passed
- Unixware 7.0.1 w/ native cc - passed
- Solaris-x86 2.6 w/ gcc 2.7.2.3 - passed
- Solaris-x86 2.7 w/ gcc 2.7.2.3 - passed
- True64 Unix w/ gcc 2.7.2.3 - passed
- Win32 w/ VC++ 5 & NASM 0.98 - passed
-
- o OpenSSL 0.9.5: Released on February 28th, 2000
- o OpenSSL 0.9.4: Released on August 09th, 1999
- o OpenSSL 0.9.3a: Released on May 29th, 1999
- o OpenSSL 0.9.3: Released on May 25th, 1999
- o OpenSSL 0.9.2b: Released on March 22th, 1999
- o OpenSSL 0.9.1c: Released on December 23th, 1998
+ o OpenSSL 0.9.6a: In development...
+ Beta 1 released on March 13th, 2001
+ HP-UX 10.20 (hpux-parisc-cc) - PASSED [normal+engine]
+ HP-UX 10.20 (hpux-parisc-gcc) - PASSED [normal+engine]
+ HP-UX 11.00 32bit (hpux-parisc-gcc) - FAILED [engine]
+ "openssl speed rsa1024 -engine cswift" fails unless
+ libswift.sl is in $CWD, even if $SHLIB_PATH is defined.
+ Linux 2.2.17 SMP (linux-elf) - PASSED [normal+engine]
+ Windows (VC-WIN32) - FAILED [presumed normal]
+ Missing line in ms/32all.bat:
+ perl util\mkfiles.pl >MINFO
+ [CORRECTED]
+ In randfile.c, line 214, signed and unsigned int are mixed.
+ In s_client.c and s_server.c, RAND_status() needs to get
+ declared (#include <oenssl/rand.h>)
+ OpenVMS (any version) - FAILED [normal+engine]
+ Missing istructions in building script.
+ AIX 4.3 - FAILED [engine]
+ Needs -DDSO_DLFCN and -DHAVE_DLFCN_H to work.
+ Irix 6.5.11 - FAILED [presumed normal]
+ BN_sqr test fails.
+ o OpenSSL 0.9.6: Released on September 24th, 2000
+ o OpenSSL 0.9.5a: Released on April 1st, 2000
+ o OpenSSL 0.9.5: Released on February 28th, 2000
+ o OpenSSL 0.9.4: Released on August 09th, 1999
+ o OpenSSL 0.9.3a: Released on May 29th, 1999
+ o OpenSSL 0.9.3: Released on May 25th, 1999
+ o OpenSSL 0.9.2b: Released on March 22th, 1999
+ o OpenSSL 0.9.1c: Released on December 23th, 1998
RELEASE SHOWSTOPPERS
IN PROGRESS
o Steve is currently working on (in no particular order):
+ ASN1 code redesign, butchery, replacement.
+ EVP cipher enhancement.
Proper (or at least usable) certificate chain verification.
Private key, certificate and CRL API and implementation.
Developing and bugfixing PKCS#7 (S/MIME code).
Various X509 issues: character sets, certificate request extensions.
- Documentation for the openssl utility.
+ o Geoff and Richard are currently working on:
+ ENGINE (the new code that gives hardware support among others).
+ o Richard is currently working on:
+ UTIL (a new set of library functions to support some higher level
+ functionality that is currently missing).
+ Dynamic thread-lock support.
+ Shared library support for VMS.
NEEDS PATCH
to date.
Paul +1
- o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER
- structure for each cipher. This may make sense for things like DES but
- for variable length ciphers like RC2 and RC4 it is NBG. Need a way to
- use the EVP interface and set up the cipher parameters. The ASN1 stuff
- is also foo wrt ciphers whose AlgorithmIdentifier has more than just
- an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open
- don't work unless the key length matches the fixed value (some vendors
- use a key length decided by the size of the RSA encrypted key and expect
- RC2 to adapt).
-
- o ERR_error_string(..., buf) does not know how large buf is,
- there should be ERR_error_string_n(..., buf, bufsize)
- or similar.
-
WISHES
o