@@ -572,7 +572,7 @@ mod fuzz_dummy {
572
572
-> c_int {
573
573
assert ! ( !cx. is_null( ) && ( * cx) . 0 as u32 & !( SECP256K1_START_NONE | SECP256K1_START_VERIFY | SECP256K1_START_SIGN ) == 0 ) ;
574
574
if secp256k1_ec_seckey_verify ( cx, sk) != 1 { return 0 ; }
575
- ptr:: copy ( tweak, sk. offset ( 16 ) , 16 ) ;
575
+ ptr:: copy ( tweak. offset ( 16 ) , sk. offset ( 16 ) , 16 ) ;
576
576
* sk. offset ( 24 ) = 0x7f ; // Ensure sk remains valid no matter what tweak was
577
577
1
578
578
}
@@ -584,8 +584,8 @@ mod fuzz_dummy {
584
584
-> c_int {
585
585
assert ! ( !cx. is_null( ) && ( * cx) . 0 as u32 & !( SECP256K1_START_NONE | SECP256K1_START_VERIFY | SECP256K1_START_SIGN ) == 0 ) ;
586
586
if test_pk_validate ( cx, pk) != 1 { return 0 ; }
587
- ptr:: copy ( tweak, ( * pk) . 0 [ 16 ..32 ] . as_mut_ptr ( ) , 16 ) ;
588
- ptr:: copy ( tweak, ( * pk) . 0 [ 16 +32 ..64 ] . as_mut_ptr ( ) , 16 ) ;
587
+ ptr:: copy ( tweak. offset ( 16 ) , ( * pk) . 0 [ 16 ..32 ] . as_mut_ptr ( ) , 16 ) ;
588
+ ptr:: copy ( tweak. offset ( 16 ) , ( * pk) . 0 [ 16 +32 ..64 ] . as_mut_ptr ( ) , 16 ) ;
589
589
( * pk) . 0 [ 24 ] = 0x7f ; // Ensure pk remains valid no matter what tweak was
590
590
( * pk) . 0 [ 24 +32 ] = 0x7f ; // Ensure pk remains valid no matter what tweak was
591
591
1
@@ -629,8 +629,8 @@ mod fuzz_dummy {
629
629
( * out) . 0 [ ( i* 32 /n) as usize ..( ( i+1 ) * 32 /n) as usize ] . copy_from_slice ( & ( * * ins. offset ( i as isize ) ) . 0 [ ( i* 32 /n) as usize ..( ( i+1 ) * 32 /n) as usize ] ) ;
630
630
}
631
631
ptr:: copy ( ( * out) . 0 [ 0 ..32 ] . as_ptr ( ) , ( * out) . 0 [ 32 ..64 ] . as_mut_ptr ( ) , 32 ) ;
632
- ( * out) . 0 [ 24 ] = 0x0d ; // pk should always be valid
633
- ( * out) . 0 [ 24 +32 ] = 0x0d ; // pk should always be valid
632
+ ( * out) . 0 [ 24 ] = 0x7f ; // pk should always be valid
633
+ ( * out) . 0 [ 24 +32 ] = 0x7f ; // pk should always be valid
634
634
test_pk_validate ( cx, out)
635
635
}
636
636
0 commit comments