-
-
Notifications
You must be signed in to change notification settings - Fork 76
decodeVerKeyDSIGN: wrong length, expected 32 bytes but got 0 #113
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hi Robin, the code looks correct to me. Could you provide the CBOR, which can help debugging? It will be great if you can also provide the code that submits the transaction cbor. |
Hey Jerry, the cbor looks like this
and the submission is simple as this
|
Thanks, this is very helpful. What I found is that the verification key in the witness of cbor is empty. echo 84a400818258207c806478ff2de0c970523870cd57f508c0634c0dd0005ef835c16ef7a9c8001800018282583900b5b7e62899719388be48d412e1384311a68e44a01633d5185b203a643a746b909de8d2e7747ccb76125b25d98d198b9950f39fd70eb335611b0000000253bf98c082583900b56bb1f70feb383207c926af89ede6934f2faca85037f3d982801e5a4b1ab3fccc016ccdebd20006fe167d4e40bd1a12f934fdc4dd7574571a0049b9c3021a0002917d031a00acb03ca100818240584056be2bf9c7c3a6f8d429bfe31febb794b6ec4ccd64139dc179f15688330105c4cb8bb886da54f3fff3b7e342d856b688396c597d226ed6ff5d2a553ecb029408f5f6 | xxd -r -p | base64 | python3 -m cbor2.tool -d | jq
[
{
"0": [
[
"|\\x80dx\\xff-\\xe0\\xc9pR8p\\xcdW\\xf5\b\\xc0cL\r\\xd0\u0000^\\xf85\\xc1n\\xf7\\xa9\\xc8\u0000\u0018",
0
]
],
"1": [
[
"\u0000\\xb5\\xb7\\xe6(\\x99q\\x93\\x88\\xbeH\\xd4\u0012\\xe18C\u0011\\xa6\\x8eD\\xa0\u00163\\xd5\u0018[ :d:tk\\x90\\x9d\\xe8\\xd2\\xe7t|\\xcbv\u0012[%ٍ\u0019\\x8b\\x99P\\xf3\\x9f\\xd7\u000e\\xb35a",
9995000000
],
[
"\u0000\\xb5k\\xb1\\xf7\u000f\\xeb82\u0007\\xc9&\\xaf\\x89\\xed\\xe6\\x93O/\\xac\\xa8P7\\xf3ق\\x80\u001eZK\u001a\\xb3\\xfc\\xcc\u0001l\\xcd\\xeb\\xd2\u0000\u0006\\xfe\u0016}N@\\xbd\u001a\u0012\\xf94\\xfd\\xc4\\xddutW",
4831683
]
],
"2": 168317,
"3": 11317308
},
{
"0": [
[
"", <-------- This is the problem
"V\\xbe+\\xf9\\xc7æ\\xf8\\xd4)\\xbf\\xe3\u001f뷔\\xb6\\xecL\\xcdd\u0013\\x9d\\xc1y\\xf1V\\x883\u0001\u0005\\xc4ˋ\\xb8\\x86\\xdaT\\xf3\\xff\\xf3\\xb7\\xe3B\\xd8V\\xb6\\x889lY}\"n\\xd6\\xff]*U>\\xcb\u0002\\x94\b"
]
]
},
true,
null
] The verification key was created and added to witness set by this line, which calls |
Calling
|
I tried using v0.6.3 and 0.7.0 by the way |
Thanks Robin. Could you try constructing the signed transaction manually like this and share the output? This will help us understand which step went wrong. ...
tx_body = builder.build(change_address=address)
signature = payment_signing_key.sign(tx_body.hash())
vk = payment_signing_key.to_verification_key()
print(vk)
vk_witnesses = [VerificationKeyWitness(vk, signature)]
print(vk_witnesses)
tx = Transaction(tx_body, TransactionWitnessSet(vkey_witnesses=vk_witnesses))
print(tx)
tx_cbor = tx.to_cbor()
print(tx_cbor) |
Thanks for your support Jerry! This is the entire printed output.
|
Thanks Robin! This cbor looks correct. If you submit this transaction, it will go through. It is still a mystery to me why |
Yeah, the tx went through. I just put |
Closing this issue as it is not reproducible now. @robinboening If you encounter this problem again, please feel free to reopen this issue. |
I am trying to make a simple transaction (lovelace only) using generated payment keys.
The tx can be built, but submitting it to Blockfrost throws this error
I can see it hast to do with the verification key and I bet I am doing something wrong. Any idea what it is? 🙇
The text was updated successfully, but these errors were encountered: