@@ -89,9 +89,9 @@ module.exports = {
8989 if ( ! h_email || h_email === undefined || h_email . length !== 32 ) { // validate email hash -- expecting MD5 32 hex chars (128 bits)
9090 res . status ( 400 ) . send ( { msg : "bad h_email" } ) ; return ;
9191 }
92- const h_email_ui128 = new BigNumber ( h_email , 16 ) . toFixed ( )
92+ const h_email_ui128 = new BigNumber ( h_email , 16 ) . toFixed ( ) ;
9393
94- var scp_ac_pubkey = req . body . pubkey ;
94+ // var scp_ac_pubkey = req.body.pubkey;
9595 var Eos_ecc = require ( 'eosjs-ecc' ) ;
9696 if ( ! Eos_ecc . isValidPublic ( publicKeys . owner ) || ! Eos_ecc . isValidPublic ( publicKeys . active ) ) { // validate pubkey
9797 res . status ( 400 ) . send ( { msg : "bad pubkey" } ) ; return ;
@@ -141,7 +141,7 @@ module.exports = {
141141 } )
142142 . catch ( err2 => {
143143 console . log ( err2 ) ;
144- isCatch = true
144+ isCatch = true ;
145145 try {
146146 console . error ( "## new_account ERR 2 (" + JSON . stringify ( err2 ) + ") (exec tx) [catch object doesn't propagate reliably?]" ) ;
147147 const json_err = JSON . parse ( err2 )
@@ -222,9 +222,9 @@ module.exports = {
222222 const dec_e_email = enc . aesDecryption ( CryptoJS . MD5 ( user . owner ) . toString ( ) , config . get ( "api_enc_key_1" ) , user . e_email ) ;
223223 const dec_assets_json = enc . aesDecryption ( CryptoJS . MD5 ( e_email + user . owner ) . toString ( ) , config . get ( "api_enc_key_2" ) , user . assets_json ) ;
224224 const dec_data_json = enc . aesDecryption ( CryptoJS . MD5 ( e_email ) . toString ( ) , config . get ( "api_enc_key_3" ) , user . data_json ) ;
225- user . e_email = dec_e_email
226- user . assets_json = dec_assets_json
227- user . data_json = dec_data_json
225+ user . e_email = dec_e_email ;
226+ user . assets_json = dec_assets_json ;
227+ user . data_json = dec_data_json ;
228228
229229 // authentication
230230 if ( user . e_email !== e_email ) { // email mismatch?
0 commit comments