- From: Jim Gettys <jg@pa.dec.com>
- Date: Wed, 8 Jul 1998 09:38:30 -0700
- To: http-wg@cuckoo.hpl.hp.com
I've recieved a new report from Patrick McManus of Applied Theory Communications for a new server. Our thanks. Also, Yves Lafon and Ronald Tschalaer have finished testing Content-MD5 in Jigsaw, and they interoperate with the Apache implementation, so that is also off the "hit list". Yves Lafon has also finished his testing of Warning, which also gives us the second proxy implementation for Warning needed. Below is the remaining features needed for testing. This list is a bit pessimistic, as a some features have no proxy related functions and the report below calls out anything that does not have two implementations for clients, servers and proxies. Updates to data greatfully accepted.... Lets see if we can cancel our meeting in Chicago by getting everything tested by then, so we won't need to have the discussion on what to drop from the specs. - Jim Gettys Clients Servers Proxies Feature 2t 3y 7n 2- 4t 2y 12n 0- 1t 1y 6n 0- H 10.2.3 202 Accepted 1t 3y 8n 2- 3t 2y 13n 0- 1t 1y 6n 0- H 10.2.4 203 Non-Authoritative Information 1t 3y 8n 2- 3t 1y 14n 0- 1t 1y 6n 0- H 10.2.6 205 Reset Content 2t 3y 8n 1- 2t 4y 12n 0- 0t 2y 6n 0- H 10.3.1 300 Multiple Choices 3t 5y 6n 0- 2t 4y 12n 0- 0t 3y 5n 0- H 10.3.4 303 See Other 2t 4y 7n 1- 3t 1y 14n 0- 1t 1y 6n 0- H 10.4.11 410 Gone 2t 4y 7n 1- 2t 2y 14n 0- 1t 1y 6n 0- H 10.4.15 414 Request-URI Too Long 1t 5y 7n 1- 3t 5y 10n 0- 1t 3y 4n 0- H 13.3.3 Weak entity tags 3t 3y 8n 0- 2t 2y 14n 0- 1t 1y 6n 0- H 14.39 TE 3t 2y 9n 0- 1t 2y 15n 0- 0t 2y 6n 0- H 14.40 Trailer 2t 0y 12n 0- 4t 5y 9n 0- 1t 0y 7n 0- A 3.2.1 WWW-Authenticate Digest 1t 0y 13n 0- 2t 1y 15n 0- 0t 0y 8n 0- A 3.2.1 qop-options auth 1t 0y 13n 0- 1t 0y 17n 0- 0t 0y 8n 0- A 3.2.1 qop-options auth-int 2t 0y 12n 0- 4t 5y 9n 0- 1t 0y 7n 0- A 3.2.2 Authorization Digest 1t 0y 13n 0- 2t 1y 15n 0- 0t 0y 8n 0- A 3.2.2 request qop auth 1t 0y 13n 0- 1t 0y 17n 0- 0t 0y 8n 0- A 3.2.2 request qop auth-int 2t 0y 12n 0- 3t 2y 13n 0- 1t 0y 7n 0- A 3.2.3 Authentication-Info Digest 1t 0y 13n 0- 1t 2y 15n 0- 0t 0y 8n 0- A 3.2.3 response qop auth 1t 0y 13n 0- 1t 0y 17n 0- 0t 0y 8n 0- A 3.2.3 response qop auth-int 2t 0y 12n 0- 1t 1y 12n 4- 1t 0y 7n 0- A 4.2 Proxy-Authenticate Digest 0t 1y 13n 0- 0t 0y 14n 4- 0t 0y 8n 0- A 4.2 Proxy qop-options auth 0t 1y 13n 0- 0t 0y 14n 4- 0t 0y 8n 0- A 4.2 Proxy qop-options auth-int 2t 0y 12n 0- 1t 1y 12n 4- 1t 0y 7n 0- A 4.2 Proxy Authorization Digest 0t 1y 13n 0- 0t 0y 14n 4- 0t 0y 8n 0- A 4.2 Proxy request qop auth 0t 1y 13n 0- 0t 0y 14n 4- 0t 0y 8n 0- A 4.2 Proxy request qop auth-int 1t 1y 12n 0- 1t 0y 13n 4- 1t 0y 7n 0- A 4.2 Proxy Authentication-Info Digest 0t 1y 13n 0- 0t 0y 14n 4- 0t 0y 8n 0- A 4.2 Proxy response qop auth 0t 1y 13n 0- 0t 0y 14n 4- 0t 0y 8n 0- A 4.2 Proxy response qop auth-int -- Jim Gettys Digital Industry Standards and Consortia Compaq Computer Corporation Visting Scientist, World Wide Web Consortium, M.I.T. http://www.w3.org/People/Gettys/ jg@w3.org, jg@pa.dec.com
Received on Wednesday, 8 July 1998 11:34:42 UTC