qca/TODO

84 lines
2.5 KiB
Plaintext
Raw Normal View History

* beta6
api:
it's possible we use SecureArray in some unnecessary places
CMS::setUntrustedCertificates
Q_DISABLE_COPY on some objects
give all classes non-default ctors/dtors/copy/op=, and dpointers?
add more "getters" to the library?
don't forget to QCA_EXPORT everything
code:
cert: rfc 2818 hostname validation
keystore: complete
securelayer: complete
qcatool: configurator for pkcs11 and generic
qcatool TODOs
finish cmssigner
other:
update README/INSTALL
special thanks to Jack Lloyd
winlocal didn't work, what now?
* test1
doc:
documentation overhaul
document provider interface
document which functions might cause a synchronous asker:
pkey: sign/decrypt, or any non-KeyLoader privkey/keybundle loading
keystore: entryList (non-async), ensureAvailable, ensureAccessible
securemessage: waitForFinished
Change Doxyfile config to capture whole API, and to generate Latex manual.
code:
synchronizer: cleanup
publickey: cleanup
cert: cleanup
keystore: cleanup
securelayer: cleanup
securemessage: cleanup
add logging to qca lib and other plugins
add more asserts?
other:
regenerate botantools.diff
update the rootcerts with mozcerts
make sure the version is correct in all locations (README, etc)
* examples
create example for BigInteger
create example for OpenPGP
create example for CMS
create example for using TLS with smart cards (maybe reuse ssltest?)
fix SASL examples (client and server)
* additional unit tests (using QTestLib):
- OpenPGP
- CMS
- TLS ?
- SASL ?
- QPipe
- FileWatch / DirWatch
- Complete the pkits tests
* write plugin support
qca-botan: implement
qca-egads (or qca-egd): implement for Random support
* possibilities for the future:
emsa3Encode: implement in provider instead of qca?
OCSP
tls ocsp stapling
internally managed intermediate object storage
securemessage: algorithm selection for cms/pgp (and use SecurityLevel?)
tls: renegotiation
Key wrapping - RFC3217 and RFC3394
quoted-printable TextFilter
keygen on smart cards
keystore: symmetric keys, arbitrary app data
cert: any other fields we don't support but might be used out there
cert: support for arbitrary extensions?
cms: fine-grained control over smime attribs
convertToPublic should return a publickey rather than change itself
providers for:
Mozilla NSS
Windows CryptoAPI
Linux kernel crypto support, if the userspace API ever gets sorted out
Intel Performance Primatives library