tx · FWRZYiEZjTd1ubZmM6BP79HUuRohw8acTG5akrNY4Pvh

3MwugYAiToQJAofPPWTosLaNqb6dT3w6Wm1:  -0.01400000 Waves

2019.12.05 18:10 [795594] smart account 3MwugYAiToQJAofPPWTosLaNqb6dT3w6Wm1 > SELF 0.00000000 Waves

{ "type": 13, "id": "FWRZYiEZjTd1ubZmM6BP79HUuRohw8acTG5akrNY4Pvh", "fee": 1400000, "feeAssetId": null, "timestamp": 1575558668822, "version": 1, "sender": "3MwugYAiToQJAofPPWTosLaNqb6dT3w6Wm1", "senderPublicKey": "7Cth3vi3QxBv1kwYSqPKPwp2tiddiotbKz9KHPE3SLJ9", "proofs": [ "4CfQe1p4JmpagHVi6RFibbCerrVHuRferZ2eDAWoQt3Zj7qc1GbeLuAZrggXn4xRNgCTiihxmpACvx2qQ4Yhx4q4" ], "script": "base64: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", "chainId": 84, "height": 795594, "spentComplexity": 0 } View: original | compacted Prev: GRmJzUeJaKWAhzHJURquWzgAm4is4PS1K61aEhcjUbiF Next: none Diff:
OldNewDifferences
55 let passwordHash = "c788cd1aa394b03ef75a74ed724aa55656f67b73401b5e222fae361c9c16f70e"
66 let passSecret = toBase16String(sha256(tx.proofs[1]))
77 if (isDefined(passSecret))
8- then if (if ((passwordHash == passSecret))
9- then sigVerify(tx.bodyBytes, tx.proofs[0], tx.senderPublicKey)
10- else false)
8+ then if ((passwordHash == passSecret))
119 then true
1210 else throw(passSecret)
1311 else throw("Password is required")
Full:
OldNewDifferences
11 {-# STDLIB_VERSION 3 #-}
22 {-# CONTENT_TYPE EXPRESSION #-}
33 match tx {
44 case t: TransferTransaction =>
55 let passwordHash = "c788cd1aa394b03ef75a74ed724aa55656f67b73401b5e222fae361c9c16f70e"
66 let passSecret = toBase16String(sha256(tx.proofs[1]))
77 if (isDefined(passSecret))
8- then if (if ((passwordHash == passSecret))
9- then sigVerify(tx.bodyBytes, tx.proofs[0], tx.senderPublicKey)
10- else false)
8+ then if ((passwordHash == passSecret))
119 then true
1210 else throw(passSecret)
1311 else throw("Password is required")
1412 case _ =>
1513 sigVerify(tx.bodyBytes, tx.proofs[0], tx.senderPublicKey)
1614 }

github/deemru/w8io/873ac7e 
18.45 ms