2 ** Other public key algorithms other than RSA, DSA and ELG. To be honest,
3 its beyond me at the moment.
4 ** Use libgpgme and remove pwmd's file format (see above).
5 ** Add command line and SAVE option --sign-keyparam
6 To generate a new key-pair used for signing. This would require a
7 new inquire keyword GENKEY_SIGN.
8 ** Port to Windows and Mac
9 I don't have a machine to test a Mac build on. Windows could be
10 done, but I have no motivation.
11 ** Test TLS timeouts using FIONWRITE and SO_SNDLOWAT
12 OpenBSD and Solaris/SunOS and maybe others.
13 ** Better "target" attribute error handling in LIST.
14 Most checks are done when creating the "target" attribute and is
15 not very informative. The LIST command output is better at showing
16 the offending elements but is also harder if not impossible to implement.
18 ** Use the DBUS protocol instead of libassuan
19 Better asynchronous IO. More language bindings. Better handling of
20 large amounts of data. May be better to hack libassuan though since
21 DBUS is a binary protocol. Either will probably never happen.
22 ** Make a specification that applications should follow
23 When accessing or storing the XML elements. This way two clients
24 (one for console and another for GUI) that require the same data
25 (mail client) could use the same element paths and not duplicate
28 For example, a POP3 client would require a hostname, username,
29 password and optional port along with an SSL request (fingerprint,
30 certificate), etc. The root element of the service might have an
31 attribute "service=pop3" along with "default=1" or "active=1" (if
32 you have more than one POP3 account) so all the client needs to get
33 the pop3 server info is the type of service ("pop3" here). The
34 client would then loop through the LIST command output and search
35 for the required service attribute.
37 Using the XPATH command would be faster (especially over remote
38 connections) but it won't resolve any "target" attributes and the
39 output is raw XML which doesn't have TAB delimited elements. But
40 that could be fixed by the client.