1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-11-10 21:38:50 +01:00
gnupg/TODO

115 lines
3.8 KiB
Plaintext
Raw Normal View History

-*- outline -*-
1998-10-18 17:21:22 +02:00
* src/base64
** Make parsing more robust
2006-10-24 16:45:34 +02:00
Currently we don't cope with overlong lines in the best way.
2006-03-21 13:48:51 +01:00
** Check that we really release the ksba reader/writer objects.
2000-10-11 19:26:49 +02:00
* sm/call-agent.c
** Some code should go into import.c
** When we allow concurrent service request in gpgsm, we
2006-10-24 16:45:34 +02:00
might want to have an agent context for each service request
(i.e. Assuan context).
* sm/certchain.c
** When a certificate chain was sucessfully verified, make ephemeral certs used in this chain permanent.
2006-03-21 10:56:47 +01:00
** Try to keep certificate references somewhere
This will help with some of our caching code. We also need to test
2006-06-20 19:21:37 +02:00
that caching; in particular "regtp_ca_chainlen".
* sm/decrypt.c
** replace leading zero in integer hack by a cleaner solution
* sm/gpgsm.c
** mark all unimplemented commands and options.
** Implement --default-key
** support the anyPolicy semantic
** Check that we are really following the verification procedures in rfc3280.
** Implement a --card-status command.
This is useful to check whether a card is supported at all.
* sm/keydb.c
** Check file permissions
** Check that all error code mapping is done.
** Remove the inter-module dependencies between gpgsm and keybox
2003-06-03 21:55:50 +02:00
** Add an source_of_key field
2002-06-29 16:15:02 +02:00
* agent/
** If we detect that a private key has been deleted
Bump the key event counter.
* agent/command.c
** Make sure that secure memory is used where appropriate
2002-06-29 16:15:02 +02:00
* agent/pkdecrypt.c, agent/pksign.c
** Don't use stdio to return results.
** Support DSA
* Move pkcs-1 encoding into libgcrypt.
* Use a MAC to protect sensitive files.
The problem here is that we need yet another key and it is unlikely
that users are willing to remember that key too. It is possible to
do this with a smartcard, though.
* sm/export.c
** Return an error code or a status info per user ID.
* scd/tlv.c
2006-10-24 16:45:34 +02:00
The parse_sexp function should not go into this file. Check whether
we can change all S-expression handling code to make use of this
function.
* scd
** Application context vs. reader slot
We have 2 concurrent method of tracking whether a read is in use:
Using the session_list in command.c and the lock_table in app.c. IT
would be better to do this just at one place. First we need to see
how we can support cards with multiple applications.
2006-03-01 12:05:47 +01:00
** Detecting a removed card works only after the ticker detected it.
2006-10-24 16:45:34 +02:00
We should check the card status in open-card to make this smoother.
Needs to be integrated with the status file update, though. It is
not a real problem because application will get a card removed
status and should the send a reset to try solving the problem.
2006-03-01 12:05:47 +01:00
** Add a test to check the extkeyusage.
* Windows port
** gpgsm's LISTKEYS does not yet work
Fix is to change everything to libestream
** Signals are not support
This means we can't reread a configuration
** No card status notifications.
* sm/
** check that we issue NO_SECKEY xxx if a -u key was not found
2006-09-22 20:15:18 +02:00
We don't. The messages returned are also wrong (recipient vs. signer).
* jnlib/
** provide jnlib_malloc and try to remove all jnlib_xmalloc.
2006-08-17 20:01:25 +02:00
* g10/
** issue a NO_SECKEY xxxx if a -u key was not found.
2006-10-18 19:19:08 +02:00
* When requiring libksba 1.0.1
** Remove the extra GPG_ERR_NO_VALUE tests
They have need added on 2006-10-18 to fix a libksba problem.
2006-10-05 13:06:42 +02:00
* When switching to libgcrypt 1.3
** scd#encode_md_for_card, g10#encode_md_value, sm@do_encode_md
Remove the extra test for a valid algorithm as libgcrypt will do it
then in gcry_md_algo_info.
** skclist.c
2006-10-05 13:06:42 +02:00
Remove the hard coded constant in random_is_faked.
** g10/ Replace DIGEST_ALGO_SHA224
We can't do that right now because it is only defined by newer
versions of libgcrypt.
2006-10-10 13:11:04 +02:00
** GCRY_MD_USER
Remove these definitions.
2006-07-27 16:18:55 +02:00
2006-08-17 20:01:25 +02:00
* Extend selinux support to other modules
2006-09-25 20:29:20 +02:00
* Remove -sat PGP2 compatibility hack