aboutsummaryrefslogtreecommitdiffstats
path: root/TODO
blob: 2cf08bc5cd4bd4ea731d81e193b86667f8bc9ca8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
Hey Emacs, this is -*- outline -*- mode!

* ABI's to break:
** string representation of non-secret keys and ATTR_IS_SECRET is NULL,
   which can not be differentiated from the case that it is not
   representable.

* Allow to use GTK's main loop instead of the select stuff in
  wait.c

* add locking to the key cache?

* GpgmeKey misses GPGME_ATTR_EXPIRE attribute

* Documentation
** Add note about GPGME clearing out pointer return values.
** validity/trust
** Document gpgme.m4

* Engines
** Move code common to all engines up from gpg to engine.
** engine operations can return General Error on unknown protocol
   (it's an internal error, as select_protocol checks already).
** When server mode is implemented properly, more care has to be taken to
    release all resources on error (for example to free assuan_cmd).

* Operations
** Export status handler need much more work.
** Import should return a useful error when one happened.
** Genkey should return something more useful than General_Error.
** Factor out common code in _op_*_start functions.
** Add ATTR to return the number of subkeys or uids.
** "When returning a GpgmeKey GPGME_ATTR_COMMENT attribute, characters  
   like ":" are not un-escaped, they are returned as \x3a" Bug
   reported by Stephane Corthesy.


* Error Values
** Map ASSUAN/GpgSM ERR error values in a better way than is done now.
** Verify (and document) if Read_Error, Write_Error, Pipe_Error set errno.
** "There is an inconsistent behaviour: if we pass three times an  
   invalid (but non empty) passphrase, return code is GPGME_No_Data,
   but if we pass three times an empty (and invalid) passphrase, we
   get GPGME_No_Passphrase." Bug reported by Stephane Corthesy.

* Tests
  Write a fake gpg-agent so that we can supply known passphrases to
  gpgsm and setup the configuration files to use the agent.  Without
  this we are testing a currently running gpg-agent which is not a
  clever idea.
** t-data
*** Test gpgme_data_release_and_get_mem.
*** Test gpgme_data_rewind for invalid types.
*** Test gpgme_data_read's readable feature.

* Build suite
** Make sure everything is cleaned correctly (esp. test area).
** There is a spurious 4/10 tests failed in some conditions.
   Rebuilding from scratch works around that.

* Architecture support
** Implement posix-sema.c

Bugs reported by Stephane Corthesy:
> BTW, here's another bug: it it not possible to retrieve fingerprints  
> for subkeys

> In GpgmeRecipients, would it be possible to provide a function which  
> would return the validity assigned to a name contained in the  
> GpgmeRecipients instance?

> passphrase callback. If I use the same GpgmeContext as the one which  
> is currently asking for a passphrase, my app crashes: the r_hd in
> the  
> callback has become invalid; if I use a brand new one, the callback  
> is called recursively, when I ask to enumerate keys.