1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-11-10 21:38:50 +01:00
gnupg/TODO

89 lines
2.8 KiB
Plaintext
Raw Normal View History

-*- outline -*-
1998-10-18 17:21:22 +02:00
* src/base64
** Make parsing more robust
Currently we don't cope with overlong lines in the best way.
2000-10-11 19:26:49 +02:00
* sm/call-agent.c
** The protocol uses an incomplete S-expression
We should always use valid S-Exp and not just parts.
** Some code should go into import.c
** When we allow concurrent service request in gpgsm, we
might want to have an agent context for each service request
(i.e. Assuan context).
2004-01-28 17:22:25 +01:00
** There is no error report if GPG_AGENT_INFO has been set but the agent is not anymore running.
* sm/certreqgen.c
** Improve error reporting
** Do some basic checks on the supplied DNs
* sm/certchain.c
** When a certificate chain was sucessfully verified, make ephemeral certs used in this chain permanent.
** figure out how to auto retrieve a key by serialno+issuer.
Dirmngr is currently not able to parse more than the CN.
* sm/decrypt.c
** replace leading zero in integer hack by a cleaner solution
* sm/sign.c
** Don't hardcode the use of RSA.
* sm/gpgsm.c
** Support --output for all commands
** mark all unimplemented commands and options.
2003-12-23 11:23:16 +01:00
** Print a hint when MD2 is the cause for a problem.
** Implement --default-key
** Using --export-secret-key-p12 with a non-pth agent
This leads to a lockup because gpgsm is still accessing the agent
while gpg-protect-tool wants to pop up the pinentry. Solution is
to release the connection. This is not trivial, thus we are going
to do that while changing gpgsm to allow concurrent operations.
* sm/keydb.c
** Check file permissions
** Write a keybox header and check for that magic value.
** Check that all error code mapping is done.
** Remove the inter-module dependencies between gpgsm and keybox
2003-06-03 21:55:50 +02:00
** Add an source_of_key field
2002-06-29 16:15:02 +02:00
2004-01-28 17:22:25 +01:00
* agent/gpg-agent.c
** A SIGHUP should also restart the scdaemon
But do this only after all connections terminated.
As of now we only send a RESET.
2004-01-28 17:22:25 +01:00
* agent/command.c
** Make sure that secure memory is used where appropriate
2002-06-29 16:15:02 +02:00
* agent/pkdecrypt.c, agent/pksign.c
** Don't use stdio to return results.
2004-01-29 21:16:59 +01:00
* agent/divert-scd.c
Remove the agent_reset_scd kludge.
* Move pkcs-1 encoding into libgcrypt.
* Use a MAC to protect some files.
* sm/export.c
** Return an error code or a status info per user ID.
* Where is http.c, regcomp.c, srv.c, w32reg.c ?
2003-09-30 15:16:33 +02:00
* scd/sc-investigate
** Enhance with card compatibility check
2003-11-17 13:20:11 +01:00
* scd/app-openpgp
Must check that the fingerprint used is not the one of the
authentication key. Old GnuPG versions seem to encode the wrong
2003-12-23 11:23:16 +01:00
keyID.
* tests
** Makefile.am
We use printf(1) to setup the library path, this is not portable.
Furthermore LD_LIBRARY_PATH is not used on all systems. It doesn't
matter for now, because we use some GNU/*BSDish features anyway.
** Add a test to check the extkeyusage.
2003-12-23 11:23:16 +01:00