1 If you want to contribute (implement something from the current list, or
2 anything), contact the developer's mailing list (gnutls-dev@lists.gnupg.org),
3 in order to avoid having people working on the same thing.
6 + Allow setting a list of trusted plain certificates (not CAs) in the
7 gnutls_x509_trust_list_t, to verify against.
8 * Allow setting a PKCS #11 module to gnutls_x509_trust_list_t, to verify
9 against, similarly to NSS way.
10 * Support replacing individual algorithms via a PKCS #11 module -
11 maybe use p11-kit for that.
12 * Support PKCS#8 AES and DES-MD5 (tests/enc3pkcs8.pem) encrypted keys.
13 * Implement Datagram-TLS (DTLS).
14 * Implement TLS-PSK with PKCS #11.
15 * Verify added CRLs (is it really needed?)
16 * Add support for generating empty CRLs
17 * Document the format for the supported DN attributes.
19 - Allow verifying of certificates on their reception.
20 - Add gnutls_certificate_set_openpgp_keyring()
21 function, similar to gnutls_certificate_set_openpgp_key().
22 - Add function to extract the signers of an openpgp key. Should
23 be similar to gnutls_x509_crt_get_dn_oid().
24 - Add function to verify an openpgp key against a plain key.
25 - Clean up name space of helper functions in library (memmem,
26 firstElement, bit_mask, ...) for platforms that libtool's
27 -export-symbols-regex doesn't work.
28 - Add Kerberos ciphersuites
29 - Certificate chain validation improvements:
30 - Implement "correct" DN comparison (instead of memcmp).
31 - Support critical key usage KeyCertSign and cRLSign.
32 - Support path length constraints.
33 - RFC 3280 compliant certificate path validation.
34 - Add progress handler gnutls_{dh,rsa}_params_generate2, to allow
35 application to give progress feedback to user.
36 - Support non-blocking gnutls_{dh,rsa}_params_generate2 for when there
37 is not enough entropy available.
38 - Chain verifications.
39 - Check path length constraints.
40 - Check keyCertSign key usages.
41 - Reject extensions in v1 certificates.
42 - Exhaustive test suite, using NIST's PKI Test vectors,
43 see http://csrc.nist.gov/pki/testing/x509paths_old.html
44 and http://csrc.nist.gov/pki/testing/x509paths.html
45 - Clean up certtool. Perhaps separate the different functions into
46 separate tools. Probably a rewrite is necessary.
47 - Make it possible to extract the internal state of a session, to
48 be able to execve a new process that take over the current
49 living socket (using the fcntl close-on-exec flag) and
50 continue the TLS session as well.
51 - Reduce memory footprint
52 - Inside gnutls_global_init, the library allocates about 64 kb of
53 memory in almost 4000 calls to malloc. On my desktop, there are 22
54 processes using gnutls, meaning about 1.2 MB of memory usage from
56 - Furthermore, gnutls has 24 kb of relocations in the shared
57 library. You can see this on a 2.6.16 kernel by reading
58 /proc/PID/smaps and looking for:
60 b71a5000-b71ab000 rw-p 00062000 03:01 3131118
61 /usr/lib/libgnutls.so.12.3.6
69 This means another 24 kb used by each process that makes use of
71 - Make gnutls-cli-debug exit with better error messages if the
72 handshake fails, rather than saying that the server doesn't support
74 - Make gnutls_certificate_get_ours return a zero-terminated array (or
75 add a new API that return the size of the array).
77 (+) Means high priority
78 (*) Means medium priority
79 (-) Means low priority (ie. nobody is interested to develop that)