@@ -281,16 +281,16 @@ TEST(SCALE, MultiProofTest) {
281281 EXPECT_EQ (memcmp (tx_obj.schema .chain_hash .ptr , expected_hash, CX_SHA256_SIZE), 0 ) << " Chain hash mismatch" ;
282282}
283283
284- TEST (SCALE, Fuzzer ) {
285- parser_context_t ctx = {0 };
286- parser_tx_t tx_obj = {0 };
287- parser_error_t err;
288- uint8_t buffer[12000 ];
289- auto bufferLen = parseHexString (buffer, sizeof (buffer), " 0a " );
284+ // TEST(SCALE, test_parser_impl ) {
285+ // parser_context_t ctx = {0};
286+ // parser_tx_t tx_obj = {0};
287+ // parser_error_t err;
288+ // uint8_t buffer[12000];
289+ // auto bufferLen = parseHexString(buffer, sizeof(buffer), "000000000000000002000000000000000000000000008181818181818181818581818181818181818181818183818181818a8181816c5f02007060000081818181e70000ff00818181818181818100000000000000000093939393939393939393939393939393939393939393939393939393939393939393939393939393939393139393939393939393939393939300000d8181 ");
290290
291- ctx.buffer .ptr = buffer;
292- ctx.buffer .len = bufferLen;
291+ // ctx.buffer.ptr = buffer;
292+ // ctx.buffer.len = bufferLen;
293293
294- // err = parser_parse(&ctx, ctx. buffer.ptr, ctx.buffer.len , &tx_obj);
295- // EXPECT_EQ(err, parser_ok) << parser_getErrorDescription(err);
296- }
294+ // err = parser_parse(&ctx, buffer, bufferLen , &tx_obj);
295+ // EXPECT_EQ(err, parser_ok) << parser_getErrorDescription(err);
296+ // }
0 commit comments