Conversation
|
First thing I notice, is that testnet P2SH derivation paths should probably start with |
Oh you mean both the |
|
Updated both derivation path to Newly generated tx is |
|
Same behavior here... Trying to send that same transaction through BlockCypher, I got a different error message:
|
|
Here is what I get when I decode the transaction using bitcoinlib: %BitcoinLib.Transaction{
version: 2,
id: "5868e8c8511aee786bd5fe13d61b89726c3e9fd886cef68051ed8a792894465f",
inputs: [
%BitcoinLib.Transaction.Input{
txid: "39efb7042d02341a0f6ecced6de32abedf4d78776e6a42d867550b2cebefa3fd",
vout: 0,
script_sig: [%BitcoinLib.Script.Opcodes.Data{value: <<0x30440220515d261add6bf93cdfc9f5791606f5ecb7eaeb849196e14c1da3165853651d0a02204701947402ea13b5a20521102cf064dfb3272e5cbf3e62faeebbe264c02168be01::568>>},
%BitcoinLib.Script.Opcodes.Data{value: <<0x039d109ebbb5ea0b46b993b182198209822748680696b471d1e606ef0f1e0935e5::264>>}],
sequence: 4294967293
}
],
outputs: [
%BitcoinLib.Transaction.Output{
value: 1228523,
script_pub_key: [%BitcoinLib.Script.Opcodes.Crypto.Hash160{},
%BitcoinLib.Script.Opcodes.Data{value: <<0x7c6f8d300ea90a234c3c16b82778e9db42d0f4dd::160>>},
%BitcoinLib.Script.Opcodes.BitwiseLogic.Equal{}],
invalid_script: nil,
error_message: nil
},
%BitcoinLib.Transaction.Output{
value: 1000,
script_pub_key: [%BitcoinLib.Script.Opcodes.Crypto.Hash160{},
%BitcoinLib.Script.Opcodes.Data{value: <<0xe8ef4ef62c41ee052dd1242f6e49eca376751cf2::160>>},
%BitcoinLib.Script.Opcodes.BitwiseLogic.Equal{}],
invalid_script: nil,
error_message: nil
}
],
locktime: 2404140,
segwit?: false,
coinbase?: false,
witness: []
}, ""}The locktime is a little big and the segwit flag is false with an empty witness... Will investigate more tomorrow, but let me know if you happen to find something in the meantime. I got the above result by running this in iex: Transaction.decode Binary.from_hex "0200000001fda3efeb2c0b5567d8426a6e77784ddfbe2ae36dedcc6e0f1a34022d04b7ef39000000006a4730440220515d261add6bf93cdfc9f5791606f5ecb7eaeb849196e14c1da3165853651d0a02204701947402ea13b5a20521102cf064dfb3272e5cbf3e62faeebbe264c02168be0121039d109ebbb5ea0b46b993b182198209822748680696b471d1e606ef0f1e0935e5fdffffff02ebbe12000000000017a9147c6f8d300ea90a234c3c16b82778e9db42d0f4dd87e80300000000000017a914e8ef4ef62c41ee052dd1242f6e49eca376751cf2872caf2400" |
|
Reading this post on Medium. It seems that For a valid P2SH tx
However, looks like public_key is injected instead here |
No description provided.