* calculation of marginals never yields a completely trusted key. * list-keys: change valid-days to key expiration date * disable comments but those in secret keyrings. * abgelaufene secret keys verhinder ein korrektes initialisieren der Trustdb. * import should skip all ascii armored messages headers which are not keys (some folks are mailing signed public keyblocks :-) * The critical bit of signature subpackets is not yet supported; i.e. it is ignored. * Read more records at once in tdbio.c and provide a lazy write cache. * Exportable Certification Flag is ignored * Why does OpenPGP say: The algorithm byte is included in the checksum of an encoded key, but the actual implementaion does not do this but works - According to Hal Finney, this is a bug in the specs. * fix armor problems (see mails by Brian Moore). * write a tool to extract selected keys from a file. * new menu to delete signatures and list signature in menu * commandline controlled --edit-key with assumed save. * -rdynamic auf Solaris Problem * if --libdir is used, the extensions are put in a wrong place. How does GNOME handle this or make a new option for this directory. Hmmm, I donī like to pass ot as a commandline option to cc. * Replace the SIGUSR1 stuff by semaphores to avoid loss of a signal. * add test cases for invalid data (scrambled armor or other random data) * add some sanity checks to read_keyblock, so that we are sure that the minimal requirements are met (?) * decryption of message with multiple recipients does not work. * preferences of hash algorithms are not yet used. * rewrite --list-packets or put it into another tool. * Burn the buffers used by fopen(), or use read(2). Does this really make sense? * Change the buffering to a mbuf like scheme? Need it for PSST anyway. * add checking of armor trailers * remove all "Fixmes" * Change the internal represention of keyid into a struct which can also hold the localid and extend the localid to hold information of the subkey number because two subkeys may have the same keyid. * add an option to re-create a public key from a secret key. Think about a backup system of only the secret part of the secret key. * OpenBSD has sometimes problems reading from /dev/random. * change the fake_data stuff to mpi_set_opaque * Is it okay to use gettext for the help system? * Add some stuff for DU cc * use "passphrase" instead of "pass phrase" * Use "user ID", "trustdb" and "WARNING".