1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-12-22 10:19:57 +01:00
gnupg/TODO

36 lines
1.5 KiB
Plaintext
Raw Normal View History

1997-11-21 14:53:57 +00:00
1997-11-27 11:44:13 +00:00
* add assembler support for more CPUs. (work, but easy)
1997-11-21 14:53:57 +00:00
* improve iobuf by reading more than one byte at once,
this shoud espceially done for the buffer in the chain.
* add a way to difference between errors and eof in the underflow/flush
function of iobuf.
1997-12-09 12:46:23 +00:00
* check that all output is filtered when displayed.
1997-11-21 14:53:57 +00:00
* keyring editing
* add trust stuff
* make ttyio.c work (hide passwords etc..)
* add option file handling.
* use correct ASN values for DEK encoding
* add checking of armor trailers
* add real secure memory
* look for a way to reuse RSA signatures
1997-11-24 11:04:11 +00:00
* find a way to remove the armor filter after it
1997-11-21 14:53:57 +00:00
has detected, that the data is not armored.
1997-12-01 10:33:23 +00:00
* Use the Chinese Remainder Theorem to speed up RSA calculations.
1997-11-21 14:53:57 +00:00
* remove all "Fixmes"
* speed up the RIPE-MD-160
1997-11-24 11:04:11 +00:00
* add signal handling
1997-11-23 15:38:27 +00:00
* enable a SIGSEGV handler while using zlib functions
1997-11-21 14:53:57 +00:00
1997-12-02 19:36:53 +00:00
* PGP writes the signature and then the file, this is not
1997-12-09 12:46:23 +00:00
a good idea, we can't write such files if we take input from stdin.
1997-12-02 19:36:53 +00:00
So the solution will: accept such packet, but write
signature the corret way: first the data and then the signature[s]
this is much easier to check, also we must read the entire data
before we can check wether we have the pubkey or not. The one-pass
signature packets should be implemented to avoid this.
1997-12-09 12:46:23 +00:00
* compress does not work always!
1997-12-12 12:03:58 +00:00
* complete cipher/cast.c
* complete cipher/dsa.c
1997-12-09 12:46:23 +00:00