* beta6 api: it's possible we use SecureArray in some unnecessary places CMS::setUntrustedCertificates Q_DISABLE_COPY on some objects give all classes non-default ctors/dtors/copy/op=, and dpointers? add more "getters" to the library? don't forget to QCA_EXPORT everything code: cert: rfc 2818 hostname validation keystore: complete securelayer: complete qcatool: configurator for pkcs11 and generic qcatool TODOs finish cmssigner other: update README/INSTALL special thanks to Jack Lloyd winlocal didn't work, what now? * test1 doc: documentation overhaul document provider interface document which functions might cause a synchronous asker: pkey: sign/decrypt, or any non-KeyLoader privkey/keybundle loading keystore: entryList (non-async), ensureAvailable, ensureAccessible securemessage: waitForFinished Change Doxyfile config to capture whole API, and to generate Latex manual. code: synchronizer: cleanup publickey: cleanup cert: cleanup keystore: cleanup securelayer: cleanup securemessage: cleanup add logging to qca lib and other plugins add more asserts? other: regenerate botantools.diff update the rootcerts with mozcerts make sure the version is correct in all locations (README, etc) * examples create example for BigInteger create example for OpenPGP create example for CMS create example for using TLS with smart cards (maybe reuse ssltest?) fix SASL examples (client and server) * additional unit tests (using QTestLib): - OpenPGP - CMS - TLS ? - SASL ? - QPipe - FileWatch / DirWatch - Complete the pkits tests * write plugin support qca-botan: implement qca-egads (or qca-egd): implement for Random support * possibilities for the future: emsa3Encode: implement in provider instead of qca? OCSP tls ocsp stapling internally managed intermediate object storage securemessage: algorithm selection for cms/pgp (and use SecurityLevel?) tls: renegotiation Key wrapping - RFC3217 and RFC3394 quoted-printable TextFilter keygen on smart cards keystore: symmetric keys, arbitrary app data cert: any other fields we don't support but might be used out there cert: support for arbitrary extensions? cms: fine-grained control over smime attribs convertToPublic should return a publickey rather than change itself providers for: Mozilla NSS Windows CryptoAPI Linux kernel crypto support, if the userspace API ever gets sorted out Intel Performance Primatives library