summaryrefslogtreecommitdiff
path: root/TODO
diff options
context:
space:
mode:
authorWerner Koch <wk@gnupg.org>2006-03-14 13:13:11 +0000
committerWerner Koch <wk@gnupg.org>2006-03-14 13:13:11 +0000
commit7d2a1049d580d91fd56695594bd52ed5b0864253 (patch)
tree7789bfc75fcd3a94700397df631fa28f479f30e3 /TODO
parent0e9cbec874e6841397d5b7c2936cf491c84909a0 (diff)
downloadlibgcrypt-7d2a1049d580d91fd56695594bd52ed5b0864253.tar.gz
Use quick key generation.
Cleaned up output; i.e. take care of --verbose.
Diffstat (limited to 'TODO')
-rw-r--r--TODO17
1 files changed, 13 insertions, 4 deletions
diff --git a/TODO b/TODO
index 6d6355ff..5986ddcd 100644
--- a/TODO
+++ b/TODO
@@ -1,6 +1,6 @@
What's left to do -*- outline -*-
-* Add more tests. Even basic is very minimal.
+* Add more tests.
* udiv-qrnbd.o should get build as *.lo [HPUX]
@@ -26,9 +26,6 @@ What's left to do -*- outline -*-
with the ac interface (i.e. by using ac's `data sets') and the pk
interface could be changed to be a wrapper for the ac interface.
-* HMAC won't work with sha-512 due to the different block size. OTOH,
- I can imagine no cryptographic reason to use it.
-
* cipher/pubkey.c and pubkey implementaions.
Don't rely on the secure memory based wiping function but add an
extra wiping.
@@ -39,3 +36,15 @@ What's left to do -*- outline -*-
* Use builtin bit functions of gcc 3.4
+* Consider using a daemon to maintain he random pool
+
+ The down side of this is that we can't assume that the random das
+ has always been stored in "secure memory". And we rely on that
+ sniffing of Unix domain sockets is not possible. We can implement
+ this simply by detecting a special prefixed random seed name and
+ divert in this case to the daemon. There are several benefits with
+ such an approach: We keep the state of the RNG over invocations of
+ libgcrypt based applications, don't need time consuming
+ initialization of the pool and in case the entropy collectros need
+ to run that bunch of Unix utilities we don't waste their precious
+ results.