-snip-
Are you sure you are using the correct s and z in the second equation? You say you have k, and you should only have one r value if k is being reused, so it should simply be a case of taking s
2 and z
2 and using them to calculate the second private key.