From 71c08423cf2aea30c4a4d06fa8f69ebb286fb050 Mon Sep 17 00:00:00 2001 From: Christian Grothoff Date: Wed, 13 Oct 2021 15:51:22 +0200 Subject: -more logging --- doc/system-documentation/thesis.bbl | 148 +++++++++++---------------------- doc/system-documentation/thesis.pdf | Bin 859824 -> 858783 bytes src/include/anastasis.h | 6 +- src/lib/anastasis_recovery.c | 6 +- src/stasis/plugin_anastasis_postgres.c | 21 +++-- 5 files changed, 67 insertions(+), 114 deletions(-) diff --git a/doc/system-documentation/thesis.bbl b/doc/system-documentation/thesis.bbl index efd9b6e..b30324b 100644 --- a/doc/system-documentation/thesis.bbl +++ b/doc/system-documentation/thesis.bbl @@ -22,7 +22,7 @@ \entry{jerome2015}{article}{} \name{author}{4}{}{% {{hash=e042fd1cbe6bde0a3c8d7e8074ded97f}{% - family={J{é}r{ô}me}, + family={Jérôme}, familyi={J\bibinitperiod}, given={Brugger}, giveni={B\bibinitperiod}}}% @@ -52,10 +52,10 @@ \strng{authornamehash}{7c1cd3857fa434fc3f5603bf8f77898f} \strng{authorfullhash}{2a4edbd7fe20c9aeda5b1dfcb9ebb082} \field{sortinit}{1} - \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba} + \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} \field{labelnamesource}{author} \field{labeltitlesource}{title} - \field{title}{AHV-Nummer als einheitlicher, organisations{ü}bergreifender Personenidentifikator} + \field{title}{AHV-Nummer als einheitlicher, organisationsübergreifender Personenidentifikator} \field{year}{2015} \endentry \entry{garfinkel1995}{book}{} @@ -76,7 +76,7 @@ \strng{authornamehash}{f7ae1c1e91c1c29835e2ff7e98908fa7} \strng{authorfullhash}{f7ae1c1e91c1c29835e2ff7e98908fa7} \field{sortinit}{2} - \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed} + \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{PGP: pretty good privacy} @@ -87,7 +87,7 @@ {pEp Security SA}% } \field{sortinit}{3} - \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9} + \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} \field{labeltitlesource}{title} \field{title}{Welcome to p≡p Documentation!} \field{urlday}{6} @@ -120,7 +120,7 @@ \strng{authornamehash}{881bf2fe8d7563c67a7bf0dca669ec1e} \strng{authorfullhash}{881bf2fe8d7563c67a7bf0dca669ec1e} \field{sortinit}{4} - \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4} + \field{sortinithash}{9381316451d1b9788675a07e972a12a7} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)} @@ -177,7 +177,7 @@ \strng{authornamehash}{10c7b94477775db573510e04e477a77b} \strng{authorfullhash}{40a5ec0e4490a4063bf48a5924ef1c0f} \field{sortinit}{5} - \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd} + \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)} @@ -204,7 +204,7 @@ \strng{authornamehash}{3648296958ad2ea0461fac7a13e12981} \strng{authorfullhash}{3648296958ad2ea0461fac7a13e12981} \field{sortinit}{6} - \field{sortinithash}{7851c86048328b027313775d8fbd2131} + \field{sortinithash}{b33bc299efb3c36abec520a4c896a66d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{Bitcoin: Millions of dollars of cryptocurrency 'lost' after man dies with only password} @@ -225,7 +225,7 @@ {Bitcoin}% } \field{sortinit}{7} - \field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e} + \field{sortinithash}{108d0be1b1bee9773a1173443802c0a3} \field{labeltitlesource}{title} \field{title}{BIP 32 - Hierarchical Deterministic Wallets} \field{urlday}{6} @@ -255,7 +255,7 @@ \strng{authornamehash}{b5c45c4b8deb48651c65650f0409e671} \strng{authorfullhash}{b5c45c4b8deb48651c65650f0409e671} \field{sortinit}{9} - \field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0} + \field{sortinithash}{0a5ebc79d83c96b6579069544c73c7d4} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Mobile Platforms Group Intel Corporation} @@ -285,10 +285,10 @@ \strng{authornamehash}{abb7f98446293f740b141f01ff61554d} \strng{authorfullhash}{abb7f98446293f740b141f01ff61554d} \field{sortinit}{1} - \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba} + \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} \field{labelnamesource}{author} \field{labeltitlesource}{title} - \field{journaltitle}{Foundations and Trends® in Theoretical Computer Science} + \field{journaltitle}{Foundations and Trends{®} in Theoretical Computer Science} \field{number}{1--3} \field{title}{Pseudorandomness} \field{volume}{7} @@ -314,7 +314,7 @@ \strng{authornamehash}{6535189281ff6a1012638e384823f5cf} \strng{authorfullhash}{6535189281ff6a1012638e384823f5cf} \field{sortinit}{1} - \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba} + \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{Annual International Cryptology Conference} @@ -354,7 +354,7 @@ \strng{authornamehash}{39e304099b960365cdb56b83f4c70df6} \strng{authorfullhash}{39e304099b960365cdb56b83f4c70df6} \field{sortinit}{1} - \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba} + \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{issn}{0004-5411} @@ -407,7 +407,7 @@ \strng{editornamehash}{14f9bdb855aa40873ff3dce506ed6fff} \strng{editorfullhash}{14f9bdb855aa40873ff3dce506ed6fff} \field{sortinit}{1} - \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba} + \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{abstract}{This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A brief overview is presented of the most important constructions, and some open problems are presented.} @@ -450,7 +450,7 @@ \strng{authornamehash}{4d5e3f9d17e0c0b2294603b963e91c33} \strng{authorfullhash}{4d5e3f9d17e0c0b2294603b963e91c33} \field{sortinit}{1} - \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba} + \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{International Journal of Computer Science Issues (IJCSI)} @@ -481,7 +481,7 @@ \strng{authornamehash}{79ea2c47cb704d13b6d9bcf7c199fc51} \strng{authorfullhash}{79ea2c47cb704d13b6d9bcf7c199fc51} \field{sortinit}{1} - \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba} + \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{IJCSNS International Journal of Computer Science and Network Security} @@ -520,7 +520,7 @@ \strng{authornamehash}{4b253103893adba3aada17995ac73ec0} \strng{authorfullhash}{4b253103893adba3aada17995ac73ec0} \field{sortinit}{1} - \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba} + \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{2011 Eighth International Conference on Information Technology: New Generations} @@ -554,7 +554,7 @@ \strng{authornamehash}{2527ef0685da3bdb01959cd066adc238} \strng{authorfullhash}{2527ef0685da3bdb01959cd066adc238} \field{sortinit}{2} - \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed} + \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{RSA Laboratories’ CryptoBytes} @@ -583,7 +583,7 @@ \strng{authornamehash}{088445b3855bedf4bcc9d25651eb98b2} \strng{authorfullhash}{088445b3855bedf4bcc9d25651eb98b2} \field{sortinit}{2} - \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed} + \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{Annual Cryptology Conference} @@ -610,7 +610,7 @@ \strng{authornamehash}{0afd18d7b25d23c61db1fe942ec1c236} \strng{authorfullhash}{0afd18d7b25d23c61db1fe942ec1c236} \field{sortinit}{2} - \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed} + \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{Field-programmable gate array technology} @@ -634,7 +634,7 @@ \strng{authornamehash}{093f14ec763e8df6227fd18ac8958011} \strng{authorfullhash}{093f14ec763e8df6227fd18ac8958011} \field{sortinit}{2} - \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed} + \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{month}{6} @@ -670,7 +670,7 @@ \strng{authornamehash}{037d5c3d4e3ef2dcef34dc59a05beed9} \strng{authorfullhash}{037d5c3d4e3ef2dcef34dc59a05beed9} \field{sortinit}{2} - \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed} + \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{2016 IEEE European Symposium on Security and Privacy (EuroS\&P)} @@ -694,7 +694,7 @@ \strng{authornamehash}{799c6648cb97b6ffb4e9da11a6e277ac} \strng{authorfullhash}{799c6648cb97b6ffb4e9da11a6e277ac} \field{sortinit}{2} - \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed} + \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{San Jose State University, Department of Computer Science} @@ -719,7 +719,7 @@ \strng{authornamehash}{71b77dd8ab33fe646ef25cded49e9881} \strng{authorfullhash}{71b77dd8ab33fe646ef25cded49e9881} \field{sortinit}{2} - \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed} + \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Communications of the ACM} @@ -749,7 +749,7 @@ \strng{authorfullhash}{ee278eaf10727ef21f15ba59cdfcb51b} \field{extraname}{1} \field{sortinit}{2} - \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed} + \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{Annual international cryptology conference} @@ -777,7 +777,7 @@ \strng{authornamehash}{618e5892290641345f357d52e5ef3c12} \strng{authorfullhash}{618e5892290641345f357d52e5ef3c12} \field{sortinit}{3} - \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9} + \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{28th Annual Symposium on Foundations of Computer Science (sfcs 1987)} @@ -805,7 +805,7 @@ \strng{authorfullhash}{ee278eaf10727ef21f15ba59cdfcb51b} \field{extraname}{2} \field{sortinit}{3} - \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9} + \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{Annual international cryptology conference} @@ -858,7 +858,7 @@ \strng{authornamehash}{45cd1a76e0cdd8946f91bead3b664768} \strng{authorfullhash}{c1db872bc8ef36ee51e0526f23769166} \field{sortinit}{3} - \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9} + \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Cryptography} @@ -899,7 +899,7 @@ \strng{authornamehash}{ce7e837cc1dbca8dddef9896de46176c} \strng{authorfullhash}{c7f2c123e1ed3b1e1ad986ca25e522b3} \field{sortinit}{3} - \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9} + \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Australian Journal of Basic and Applied Sciences} @@ -934,7 +934,7 @@ \strng{authornamehash}{daa648a2c605762c09bfaab94d0f2168} \strng{authorfullhash}{daa648a2c605762c09bfaab94d0f2168} \field{sortinit}{3} - \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9} + \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{IEEE Security \& Privacy} @@ -978,7 +978,7 @@ \strng{authornamehash}{adce78e3f1e04476f35b2b5fcb6c6262} \strng{authorfullhash}{85e8ef541ae3f71805b7382856006c85} \field{sortinit}{3} - \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9} + \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment} @@ -1015,7 +1015,7 @@ \strng{authornamehash}{5646590031d49807385b96f9f6caae4a} \strng{authorfullhash}{5646590031d49807385b96f9f6caae4a} \field{sortinit}{3} - \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9} + \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{Detection of Intrusions and Malware, and Vulnerability Assessment: 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings} @@ -1027,7 +1027,7 @@ {OWASP Foundation}% } \field{sortinit}{3} - \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9} + \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} \field{labeltitlesource}{title} \field{title}{Forgot Password Cheat Sheet} \field{urlday}{5} @@ -1072,10 +1072,10 @@ \strng{authornamehash}{46fedf156ec86b72f1439a7e282b9fee} \strng{authorfullhash}{7c1027a04280b6542245beeb85db1408} \field{sortinit}{3} - \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9} + \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} \field{labelnamesource}{author} \field{labeltitlesource}{title} - \field{title}{Wenn der Softbot menschliche Identit{ä}t best{ä}tigt. Videoident-Verfahren II: Die Technik} + \field{title}{Wenn der Softbot menschliche Identität bestätigt. Videoident-Verfahren II: Die Technik} \field{year}{2017} \endentry \entry{biometric_auth}{article}{} @@ -1101,7 +1101,7 @@ \strng{authornamehash}{db53816ca2458e8344846c9aa5b3bce3} \strng{authorfullhash}{db53816ca2458e8344846c9aa5b3bce3} \field{sortinit}{4} - \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4} + \field{sortinithash}{9381316451d1b9788675a07e972a12a7} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Security and Communication Networks} @@ -1127,7 +1127,7 @@ \strng{authornamehash}{b7a2e18f77259e34d5b676fd04412bb3} \strng{authorfullhash}{b7a2e18f77259e34d5b676fd04412bb3} \field{sortinit}{4} - \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4} + \field{sortinithash}{9381316451d1b9788675a07e972a12a7} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{CCC-Tüftler hackt Merkels Iris und von der Leyens Fingerabdruck} @@ -1148,7 +1148,7 @@ {Coinbase}% } \field{sortinit}{4} - \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4} + \field{sortinithash}{9381316451d1b9788675a07e972a12a7} \field{labeltitlesource}{title} \field{title}{Backup your encrypted private keys on Google Drive and iCloud with Coinbase Wallet} \field{urlday}{6} @@ -1186,7 +1186,7 @@ \strng{authornamehash}{e366017de179e8187fd5bb233ad210d8} \strng{authorfullhash}{e366017de179e8187fd5bb233ad210d8} \field{sortinit}{4} - \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4} + \field{sortinithash}{9381316451d1b9788675a07e972a12a7} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{Applied Approach to Privacy and Security for the Internet of Things} @@ -1207,7 +1207,7 @@ \strng{authornamehash}{9dfd0bf532dd1b08969afefcdd7188b5} \strng{authorfullhash}{9dfd0bf532dd1b08969afefcdd7188b5} \field{sortinit}{4} - \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4} + \field{sortinithash}{9381316451d1b9788675a07e972a12a7} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Black Hat USA} @@ -1235,7 +1235,7 @@ \strng{authornamehash}{b3b08047d44ad47ea9a90d61cc647064} \strng{authorfullhash}{b3b08047d44ad47ea9a90d61cc647064} \field{sortinit}{4} - \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4} + \field{sortinithash}{9381316451d1b9788675a07e972a12a7} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{Internet Research Task Force, Crypto Forum Research Group, RFC} @@ -1261,7 +1261,7 @@ \strng{authornamehash}{f2ca7c0188bc149bef92a85d32759b7b} \strng{authorfullhash}{f2ca7c0188bc149bef92a85d32759b7b} \field{sortinit}{4} - \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4} + \field{sortinithash}{9381316451d1b9788675a07e972a12a7} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Network Security} @@ -1277,7 +1277,7 @@ {Taler Systems SA}% } \field{sortinit}{5} - \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd} + \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c} \field{labeltitlesource}{title} \field{title}{GNU Taler: Features} \field{urlday}{2} @@ -1297,7 +1297,7 @@ {The PostgreSQL Global Development Group}% } \field{sortinit}{5} - \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd} + \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c} \field{labeltitlesource}{title} \field{title}{PostgreSQL: The World's Most Advanced Open Source Relational Database} \field{urlday}{2} @@ -1317,7 +1317,7 @@ {Curl}% } \field{sortinit}{5} - \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd} + \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c} \field{labeltitlesource}{title} \field{title}{libcurl - the multiprotocol file transfer library} \field{urlday}{2} @@ -1337,7 +1337,7 @@ {GNU project}% } \field{sortinit}{5} - \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd} + \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c} \field{labeltitlesource}{title} \field{title}{GNU Libmicrohttpd} \field{urlday}{2} @@ -1352,60 +1352,6 @@ \verb https://www.gnu.org/software/libmicrohttpd/? \endverb \endentry - \entry{global_data_index}{online}{} - \list{organization}{1}{% - {Dell EMC.}% - } - \field{sortinit}{5} - \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd} - \field{labeltitlesource}{title} - \field{title}{Global Data Protection Index 2018 – Key Findings} - \field{urlday}{7} - \field{urlmonth}{3} - \field{urlyear}{2020} - \field{year}{2018} - \field{urldateera}{ce} - \verb{urlraw} - \verb https://www.delltechnologies.com/content/dam/uwaem/production-design-assets/en/gdpi/assets/infographics/dell-gdpi-vb-key-findings-deck.pdf) - \endverb - \verb{url} - \verb https://www.delltechnologies.com/content/dam/uwaem/production-design-assets/en/gdpi/assets/infographics/dell-gdpi-vb-key-findings-deck.pdf) - \endverb - \endentry - \entry{forgot_my_pin}{online}{} - \name{author}{1}{}{% - {{hash=3690e6a925d190517dbba666878a6978}{% - family={Frauenfelder}, - familyi={F\bibinitperiod}, - given={Mark}, - giveni={M\bibinitperiod}}}% - } - \list{organization}{1}{% - {WIRED}% - } - \strng{namehash}{3690e6a925d190517dbba666878a6978} - \strng{fullhash}{3690e6a925d190517dbba666878a6978} - \strng{bibnamehash}{3690e6a925d190517dbba666878a6978} - \strng{authorbibnamehash}{3690e6a925d190517dbba666878a6978} - \strng{authornamehash}{3690e6a925d190517dbba666878a6978} - \strng{authorfullhash}{3690e6a925d190517dbba666878a6978} - \field{sortinit}{6} - \field{sortinithash}{7851c86048328b027313775d8fbd2131} - \field{labelnamesource}{author} - \field{labeltitlesource}{title} - \field{title}{I Forgot My PIN’: An Epic Tale of Losing \$30,000 in Bitcoin} - \field{urlday}{7} - \field{urlmonth}{3} - \field{urlyear}{2020} - \field{year}{2017} - \field{urldateera}{ce} - \verb{urlraw} - \verb https://www.wired.com/story/i-forgot-my-pin-an-epic-tale-of-losing-dollar30000-in-bitcoin/ - \endverb - \verb{url} - \verb https://www.wired.com/story/i-forgot-my-pin-an-epic-tale-of-losing-dollar30000-in-bitcoin/ - \endverb - \endentry \enddatalist \endrefsection \endinput diff --git a/doc/system-documentation/thesis.pdf b/doc/system-documentation/thesis.pdf index 4d03f5b..44f154f 100644 Binary files a/doc/system-documentation/thesis.pdf and b/doc/system-documentation/thesis.pdf differ diff --git a/src/include/anastasis.h b/src/include/anastasis.h index a950172..b13d44c 100644 --- a/src/include/anastasis.h +++ b/src/include/anastasis.h @@ -291,7 +291,7 @@ typedef void * @param af_cls closure for @a af * @return #GNUNET_OK if the challenge was successfully started */ -int +enum GNUNET_GenericReturnValue ANASTASIS_challenge_start (struct ANASTASIS_Challenge *c, const struct ANASTASIS_PaymentSecretP *psp, struct GNUNET_TIME_Relative timeout, @@ -314,7 +314,7 @@ ANASTASIS_challenge_start (struct ANASTASIS_Challenge *c, * @param af_cls closure for @a af * @return #GNUNET_OK on success */ -int +enum GNUNET_GenericReturnValue ANASTASIS_challenge_answer (struct ANASTASIS_Challenge *c, const struct ANASTASIS_PaymentSecretP *psp, struct GNUNET_TIME_Relative timeout, @@ -337,7 +337,7 @@ ANASTASIS_challenge_answer (struct ANASTASIS_Challenge *c, * @param af_cls closure for @a af * @return #GNUNET_OK on success */ -int +enum GNUNET_GenericReturnValue ANASTASIS_challenge_answer2 (struct ANASTASIS_Challenge *c, const struct ANASTASIS_PaymentSecretP *psp, struct GNUNET_TIME_Relative timeout, diff --git a/src/lib/anastasis_recovery.c b/src/lib/anastasis_recovery.c index aca9d29..70bfa36 100644 --- a/src/lib/anastasis_recovery.c +++ b/src/lib/anastasis_recovery.c @@ -470,7 +470,7 @@ ANASTASIS_challenge_get_details (struct ANASTASIS_Challenge *challenge) } -int +enum GNUNET_GenericReturnValue ANASTASIS_challenge_start (struct ANASTASIS_Challenge *c, const struct ANASTASIS_PaymentSecretP *psp, struct GNUNET_TIME_Relative timeout, @@ -508,7 +508,7 @@ ANASTASIS_challenge_start (struct ANASTASIS_Challenge *c, } -int +enum GNUNET_GenericReturnValue ANASTASIS_challenge_answer ( struct ANASTASIS_Challenge *c, const struct ANASTASIS_PaymentSecretP *psp, @@ -534,7 +534,7 @@ ANASTASIS_challenge_answer ( } -int +enum GNUNET_GenericReturnValue ANASTASIS_challenge_answer2 (struct ANASTASIS_Challenge *c, const struct ANASTASIS_PaymentSecretP *psp, struct GNUNET_TIME_Relative timeout, diff --git a/src/stasis/plugin_anastasis_postgres.c b/src/stasis/plugin_anastasis_postgres.c index b1be081..b0b8f96 100644 --- a/src/stasis/plugin_anastasis_postgres.c +++ b/src/stasis/plugin_anastasis_postgres.c @@ -646,7 +646,8 @@ begin_transaction (void *cls, }; check_connection (pg); - postgres_preflight (pg); + GNUNET_break (GNUNET_OK == + postgres_preflight (pg)); pg->transaction_name = name; if (GNUNET_OK != GNUNET_PQ_exec_statements (pg->conn, @@ -802,7 +803,8 @@ postgres_gc (void *cls, enum GNUNET_DB_QueryStatus qs; check_connection (pg); - postgres_preflight (pg); + GNUNET_break (GNUNET_OK == + postgres_preflight (pg)); qs = GNUNET_PQ_eval_prepared_non_select (pg->conn, "gc_accounts", params); @@ -843,7 +845,8 @@ postgres_store_recovery_document ( enum GNUNET_DB_QueryStatus qs; check_connection (pg); - postgres_preflight (pg); + GNUNET_break (GNUNET_OK == + postgres_preflight (pg)); for (unsigned int retry = 0; retryconn, "latest_recoverydocument_select", params, @@ -2740,7 +2746,8 @@ postgres_challenge_gc (void *cls) }; check_connection (pg); - postgres_preflight (pg); + GNUNET_break (GNUNET_OK == + postgres_preflight (pg)); return GNUNET_PQ_eval_prepared_non_select (pg->conn, "gc_challengecodes", params); -- cgit v1.2.3