1 If you want to contribute (implement something from the current list, or
2 anything), contact the developer's mailing list (gnutls-dev@lists.gnupg.org),
3 in order to avoid having people working on the same thing.
6 * When importing a PKCS #11 certificate, check for its issuers to generate a
7 chain (e.g. use the DN to retrieve possible signers).
8 * Improve AES assembly. AES in nettle can be improved in x86, arm and
10 * Add support for RSA-PSS. This signature algorithm is seen in some
11 passport CAs. Should be added in nettle and then in gnutls.
12 * Move ECC code to nettle.
13 - Add DTLS 1.2 support (RFC6347)
14 - Add certificate image support (see RFC3709, RFC6170)
15 - RFC 3280 compliant certificate path validation.
16 - Check path length constraints.
17 - Check keyCertSign key usages.
18 - Reject extensions in v1 certificates.
19 - Certificate chain validation improvements:
20 - Implement "correct" DN comparison (instead of memcmp).
21 - Support critical key usage KeyCertSign and cRLSign.
22 - Support path length constraints.
23 - Perform signature calculation in PKCS #11 using not plain
24 RSA but rather the combination of RSA-SHA256, RSA-SHA1 etc.
25 That will allow the usage of more secure tokens that do not
27 - Support PKCS#8 DES-MD5 (tests/enc3pkcs8.pem) encrypted keys.
28 (openssl seems to use DES-MD5 to encrypt keys by default)
29 - Add support for generating empty CRLs
30 - Document the format for the supported DN attributes.
32 - Allow setting a PKCS #11 module to gnutls_x509_trust_list_t, to verify
33 against, similarly to NSS way.
34 - Support replacing individual algorithms via a PKCS #11 module -
35 maybe use p11-kit for that.
36 - Add function to extract the signers of an openpgp key. Should
37 be similar to gnutls_x509_crt_get_dn_oid().
38 - Add function to verify an openpgp key against a plain key.
39 - Clean up name space of helper functions in library (memmem,
40 firstElement, bit_mask, ...) for platforms that libtool's
41 -export-symbols-regex doesn't work.
42 - Add Kerberos ciphersuites
43 - Exhaustive test suite, using NIST's PKI Test vectors,
44 see http://csrc.nist.gov/pki/testing/x509paths_old.html
45 and http://csrc.nist.gov/pki/testing/x509paths.html
46 - Make gnutls-cli-debug exit with better error messages if the
47 handshake fails, rather than saying that the server doesn't support
50 (+) Means high priority
51 (*) Means medium priority
52 (-) Means low priority (ie. nobody is interested to develop that)