-*- outline -*-
-* IMPORTANT
-Check that openpty and pty.h are available and build symcryptrun only
-then. Run shred on the temporary files.
-
-
* src/base64
** Make parsing more robust
Currently we don't cope with overlong lines in the best way.
* sm/certchain.c
** When a certificate chain was sucessfully verified, make ephemeral certs used in this chain permanent.
-** figure out how to auto retrieve a key by serialno+issuer.
- Dirmngr is currently not able to parse more than the CN.
-* sm/certlist.c
-** ocspSigning usage is not fully implemented
- We should review the entire CRL and OCSP validation system.
- Okay. This has been fixed in dirmngr when running it in system
- daemon mode.
* sm/decrypt.c
** replace leading zero in integer hack by a cleaner solution
** mark all unimplemented commands and options.
** Print a hint when MD2 is the cause for a problem.
** Implement --default-key
-** Using --export-secret-key-p12 with a non-pth agent
- This leads to a lockup because gpgsm is still accessing the agent
- while gpg-protect-tool wants to pop up the pinentry. Solution is
- to release the connection. This is not trivial, thus we are going
- to do that while changing gpgsm to allow concurrent operations.
** support the anyPolicy semantic
** Check that we are really following the verification procedures in rfc3280.
+** Implement a --card-status command.
+ This is useful to check whether a card is supported at all.
+
* sm/keydb.c
** Check file permissions
** Remove the inter-module dependencies between gpgsm and keybox
** Add an source_of_key field
-* agent/gpg-agent.c
-** A SIGHUP should also restart the scdaemon
- But do this only after all connections terminated. As of now we
- only send a RESET.
-** Watch the child process if not invoked as a daemon
- and terminate after the child has terminated
-
* agent/command.c
** Make sure that secure memory is used where appropriate
** Don't use stdio to return results.
** Support DSA
-* agent/divert-scd.c
- Remove the agent_reset_scd kludge.
-
* Move pkcs-1 encoding into libgcrypt.
* Use a MAC to protect sensitive files.
* sm/export.c
** Return an error code or a status info per user ID.
+* scd/tlv.c
+ The parse_sexp fucntion should not go into this file. Check whether
+ we can change all S-expression handling code to make use of this
+ function.
+
+* scd
+** Application context vs. reader slot
+ We have 2 concurrent method of tracking whether a read is in use:
+ Using the session_list in command.c and the lock_table in app.c. IT
+ would be better to do this just at one place. First we need to see
+ how we can support cards with multiple applications.
+
* tests
** Makefile.am
We use printf(1) to setup the library path, this is not portable.
** Explain how to setup a root CA key as trusted
** Explain how trustlist.txt might be managed.
** Write a script to generate man pages from texi.
-
-* Requirements by the BSI
-** Support authorityKeyIdentifier.keyIdentifier
- This needs support in libksba/src/cert.c as well as in sm/*.c.
- Need test certs as well. Same goes for CRL authorityKeyIdentifier.
+ In progress (yatm)
* Windows port
** No card status notifications.
-* [scdaemon] release the card after use so that gpg 1.4 is abale to access it
+* sm/
+** --include-certs is as of now still a dummy command line option