test debug
[heimdal.git] / lib / hx509 / TODO
blobd3fdecc239391212d438acaf1bfabb6b4df74acc
1 $Id$
3 x501 name
4         parsing
5         comparing (ldap canonlisation rules)
7 DSA support
8 DSA2 support
10 Rewrite the pkcs11 code to support the following:
12         * Reset the pin on card change.
13         * Ref count the lock structure to make sure we have a
14           prompter when we need it.
15         * Add support for CK_TOKEN_INFO.CKF_PROTECTED_AUTHENTICATION_PATH
17 x509 policy mappings support
19 CRL delta support
21 crypto
22         make signing alg depend on signer if not given
24 Qualified statement
25         https://bugzilla.mozilla.org/show_bug.cgi?id=277797#c2
28 Signed Receipts
29         http://www.faqs.org/rfcs/rfc2634.html
30         chapter 2
32 tests
33         nist tests
34                 name constrains
35                 policy mappings
36                 http://csrc.nist.gov/pki/testing/x509paths.html
38         building path using Subject/Issuer vs SubjKeyID vs AuthKeyID
39         negative tests
40                 all checksums
41                 conditions/branches
43 pkcs7
44         handle pkcs7 support in CMS ?
46 certificate request
47         generate pkcs10 request
48                 from existing cert
49         generate CRMF request
50                 pk-init KDC/client
51                 web server/client
52                 jabber server/client 
53                 email
56 x509 issues:
58  OtherName is left unspecified, but it's used by other
59  specs. creating this hole where a application/CA can't specify
60  policy for SubjectAltName what covers whole space. For example, a
61  CA is trusted to provide authentication but not authorization.