From 1dca223e7713459d0588f4ab605b7e25f23b0127 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Jo=C3=A3o=20V=C3=ADtor?= Date: Thu, 31 May 2018 11:13:14 -0300 Subject: [PATCH] fix code syntax --- docs/solidity-by-example.rst | 15 ++------------- 1 file changed, 2 insertions(+), 13 deletions(-) diff --git a/docs/solidity-by-example.rst b/docs/solidity-by-example.rst index 558f35398..3b6b4cb91 100644 --- a/docs/solidity-by-example.rst +++ b/docs/solidity-by-example.rst @@ -691,7 +691,6 @@ doing it using: var hash = web3.sha3("message to sign"); web3.personal.sign(hash, web3.eth.defaultAccount, function () {...}); -:: Remind that the prefix includes the length of the message. Hashing first means the message will always be 32 bytes long, @@ -720,7 +719,6 @@ themselves, a nonce. And our smart contract will check if that nonce is reused. // ... } -:: There's another type of replay attacks, it occurs when the owner deploy a ReceiverPays smart contract, make some payments, @@ -760,8 +758,7 @@ creates the proper signature for the `ReceiverPays` example: web3.personal.sign(hash, web3.eth.defaultAccount, callback); } - -:: + Recovering the Message Signer in Solidity ----------------------------------------- @@ -807,7 +804,6 @@ We'll use the `inline assembly