1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-11-11 21:48:50 +01:00
gnupg/TODO

54 lines
1.8 KiB
Plaintext
Raw Normal View History

1997-11-21 15:53:57 +01:00
1998-07-06 12:23:57 +02:00
* add option --restore-ownertrust
1998-06-29 14:30:57 +02:00
* add options: --default-signature-user, --default-encryption-user
1998-07-06 12:23:57 +02:00
* Change the formatting of log_xxxx to GNU standards
("name:filename:line: text")
* add a way to delete subkeys (in edit-keys?)
1998-06-25 12:19:08 +02:00
* make preferences work
* rewrite --list-packets or put it into another tool.
1998-06-09 17:14:06 +02:00
* add field to PKT_user_id to hold the hash context
1998-05-26 15:38:00 +02:00
* add usage arguments to get_key_byname or return a PKC_LIST with
all keys and add a selection.
1998-05-15 20:49:19 +02:00
* add readline support. Must enhance libreadline - Anyone?
1998-07-06 12:23:57 +02:00
* Burn the buffers used by fopen(), or use read(2). Does this
really make sense?
1998-05-15 20:49:19 +02:00
* enable a SIGSEGV handler while using zlib functions
1997-11-21 15:53:57 +01:00
* improve iobuf by reading more than one byte at once,
this shoud espceially done for the buffer in the chain.
1998-02-26 17:56:31 +01:00
Change the buffering to a mbuf like scheme? Need it for PSST anyway.
1998-04-02 12:30:03 +02:00
* add a way to distinguish between errors and eof in the underflow/flush
1997-11-21 15:53:57 +01:00
function of iobuf.
* add checking of armor trailers
* remove all "Fixmes"
1998-03-19 16:27:29 +01:00
1998-01-26 23:09:01 +01:00
* bug: g10/trustdb.c#build_sigrecs called to often by do_list_path
1998-01-25 19:56:33 +01:00
and remove the bad kludge. Maybe we should put all sigs into the trustdb
and mark them as valid/invalid/nopubkey, and how do we check, that
we have a self-signature -> put this stuff into a kind of directory
record, as it does not belong to the pubkey record?
1998-01-07 21:47:46 +01:00
1998-04-25 10:08:35 +02:00
* add an option to create a new user id.
1998-04-09 13:19:09 +02:00
* add an option to re-create a public key from a secret key. Think about
a backup system of only the secret part of the secret key.
1998-02-04 19:54:31 +01:00
1998-04-02 12:30:03 +02:00
* add fingerprint/keyid hashing. We need a new field in PKC to
1998-03-19 16:27:29 +01:00
flag that we may have a cached signature for this (and use the address
of PKC to lookup the hash).
1998-04-08 21:49:02 +02:00
* replace getkey.c#enum_secret_keys
1998-04-07 20:16:10 +02:00
1998-05-05 22:34:20 +02:00