|
|
@ -171,12 +171,12 @@ int32_t basilisk_bobscript(uint8_t *rmd160,uint8_t *redeemscript,int32_t *redeem |
|
|
|
*secretstartp = n + 2; |
|
|
|
if ( 1 ) |
|
|
|
{ |
|
|
|
if ( 0 && bits256_nonz(privkey) != 0 ) |
|
|
|
if ( 1 && bits256_nonz(privkey) != 0 ) |
|
|
|
{ |
|
|
|
uint8_t bufA[20],bufB[20]; |
|
|
|
revcalc_rmd160_sha256(bufA,privkey); |
|
|
|
calc_rmd160_sha256(bufB,privkey.bytes,sizeof(privkey)); |
|
|
|
if ( memcmp(bufA,secret160,sizeof(bufA)) == 0 ) |
|
|
|
/*if ( memcmp(bufA,secret160,sizeof(bufA)) == 0 )
|
|
|
|
printf("MATCHES BUFA\n"); |
|
|
|
else if ( memcmp(bufB,secret160,sizeof(bufB)) == 0 ) |
|
|
|
printf("MATCHES BUFB\n"); |
|
|
@ -186,7 +186,7 @@ int32_t basilisk_bobscript(uint8_t *rmd160,uint8_t *redeemscript,int32_t *redeem |
|
|
|
printf(" <- revcalc\n"); |
|
|
|
for (i=0; i<20; i++) |
|
|
|
printf("%02x",bufB[i]); |
|
|
|
printf(" <- calc\n"); |
|
|
|
printf(" <- calc\n");*/ |
|
|
|
memcpy(secret160,bufB,20); |
|
|
|
} |
|
|
|
n = bitcoin_secret160verify(redeemscript,n,secret160); |
|
|
|