tx · GRmJzUeJaKWAhzHJURquWzgAm4is4PS1K61aEhcjUbiF
3MwugYAiToQJAofPPWTosLaNqb6dT3w6Wm1: -0.01400000 Waves
2019.12.05 18:08 [795591] smart account 3MwugYAiToQJAofPPWTosLaNqb6dT3w6Wm1 > SELF 0.00000000 Waves
{
"type": 13,
"id": "GRmJzUeJaKWAhzHJURquWzgAm4is4PS1K61aEhcjUbiF",
"fee": 1400000,
"feeAssetId": null,
"timestamp": 1575558524899,
"version": 1,
"sender": "3MwugYAiToQJAofPPWTosLaNqb6dT3w6Wm1",
"senderPublicKey": "7Cth3vi3QxBv1kwYSqPKPwp2tiddiotbKz9KHPE3SLJ9",
"proofs": [
"5XwRq42i6ZfBVMjoTidzo3wa76KKduG75wTd4aCtMy5udC6uWQDTsk84yDtrRSizwU82Q4b2a72ytjjBoZDyeL3Z"
],
"script": "base64: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",
"chainId": 84,
"height": 795591,
"spentComplexity": 0
}
View: original | compacted
Prev: 5SmXKqy6MgDQydsd3kNHsi8G9AzJDQJ5GscwY1rRyrZu
Next: FWRZYiEZjTd1ubZmM6BP79HUuRohw8acTG5akrNY4Pvh
Diff:
Old | New | | Differences |
---|
4 | 4 | | case t: TransferTransaction => |
---|
5 | 5 | | let passwordHash = "c788cd1aa394b03ef75a74ed724aa55656f67b73401b5e222fae361c9c16f70e" |
---|
6 | 6 | | let passSecret = toBase16String(sha256(tx.proofs[1])) |
---|
7 | | - | if ((passwordHash == passSecret)) |
---|
8 | | - | then true |
---|
9 | | - | else throw(passSecret) |
---|
| 7 | + | if (isDefined(passSecret)) |
---|
| 8 | + | then if (if ((passwordHash == passSecret)) |
---|
| 9 | + | then sigVerify(tx.bodyBytes, tx.proofs[0], tx.senderPublicKey) |
---|
| 10 | + | else false) |
---|
| 11 | + | then true |
---|
| 12 | + | else throw(passSecret) |
---|
| 13 | + | else throw("Password is required") |
---|
10 | 14 | | case _ => |
---|
11 | 15 | | sigVerify(tx.bodyBytes, tx.proofs[0], tx.senderPublicKey) |
---|
12 | 16 | | } |
---|
Full:
Old | New | | Differences |
---|
1 | 1 | | {-# STDLIB_VERSION 3 #-} |
---|
2 | 2 | | {-# CONTENT_TYPE EXPRESSION #-} |
---|
3 | 3 | | match tx { |
---|
4 | 4 | | case t: TransferTransaction => |
---|
5 | 5 | | let passwordHash = "c788cd1aa394b03ef75a74ed724aa55656f67b73401b5e222fae361c9c16f70e" |
---|
6 | 6 | | let passSecret = toBase16String(sha256(tx.proofs[1])) |
---|
7 | | - | if ((passwordHash == passSecret)) |
---|
8 | | - | then true |
---|
9 | | - | else throw(passSecret) |
---|
| 7 | + | if (isDefined(passSecret)) |
---|
| 8 | + | then if (if ((passwordHash == passSecret)) |
---|
| 9 | + | then sigVerify(tx.bodyBytes, tx.proofs[0], tx.senderPublicKey) |
---|
| 10 | + | else false) |
---|
| 11 | + | then true |
---|
| 12 | + | else throw(passSecret) |
---|
| 13 | + | else throw("Password is required") |
---|
10 | 14 | | case _ => |
---|
11 | 15 | | sigVerify(tx.bodyBytes, tx.proofs[0], tx.senderPublicKey) |
---|
12 | 16 | | } |
---|