tx · DB1wtjjBXzy6TnVGLjBAmMCKcLr1JSNPdZCsxKxxNSyU
3MwugYAiToQJAofPPWTosLaNqb6dT3w6Wm1: -0.01400000 Waves
2019.12.05 13:28 [795310] smart account 3MwugYAiToQJAofPPWTosLaNqb6dT3w6Wm1 > SELF 0.00000000 Waves
{
"type": 13,
"id": "DB1wtjjBXzy6TnVGLjBAmMCKcLr1JSNPdZCsxKxxNSyU",
"fee": 1400000,
"feeAssetId": null,
"timestamp": 1575541736200,
"version": 1,
"sender": "3MwugYAiToQJAofPPWTosLaNqb6dT3w6Wm1",
"senderPublicKey": "7Cth3vi3QxBv1kwYSqPKPwp2tiddiotbKz9KHPE3SLJ9",
"proofs": [
"3dZ63Zu4M6KGRir4u333miSTAzSriMF7LRZjjbZEJPcosB8gDrS8qc1WSvxaBJPaS19sTtUvc8771kGzKGFaxe45"
],
"script": "base64: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",
"chainId": 84,
"height": 795310,
"spentComplexity": 0
}
View: original | compacted
Prev: none
Next: HhL5h6sxg8996GSxo6NV6PMSWteSXWdFgYGQtuEXUqa1
Full:
Old | New | | Differences |
---|
1 | | - | # no script |
---|
| 1 | + | {-# STDLIB_VERSION 3 #-} |
---|
| 2 | + | {-# CONTENT_TYPE EXPRESSION #-} |
---|
| 3 | + | match tx { |
---|
| 4 | + | case t: TransferTransaction => |
---|
| 5 | + | let password = "c788cd1aa394b03ef75a74ed724aa55656f67b73401b5e222fae361c9c16f70e" |
---|
| 6 | + | let passSecret = toUtf8String(sha256(tx.proofs[1])) |
---|
| 7 | + | if ((password == passSecret)) |
---|
| 8 | + | then true |
---|
| 9 | + | else throw(passSecret) |
---|
| 10 | + | case _ => |
---|
| 11 | + | sigVerify(tx.bodyBytes, tx.proofs[0], tx.senderPublicKey) |
---|
| 12 | + | } |
---|