(1) I need to find nDeriveIterations. Is there an easy way to find it for a hex-diver like me, or do I actually have to open the DB file with a BDB library to get to it?
(2) I wish I'd thought of using the public key as the IV... that's pretty smart. I assume it is the 65-byte private key that you double-sha256, correct? Then, is it the first 16 bytes that are used for the IV? AES256 IVs are only 16 bytes...
(3) Is there any modification to the passphrase before applying X sha512 operations to it? Is there any PBKDF2 calls somewhere? (if there is, I'm not as well-prepared as I thought)
If anyone wants to simply use the work I've already done and split any appropriate bounties, I would be up for that I have a python script which currently goes through the wallet.dat file pulls out every single public key, and then grabs any plaintext private keys nearby. Of course, they private keys are not plaintext in this situation, but I can spit out the data where I expect the keys to be. Then using CLI input params, I can actually apply the X sha512 operations and AES256-CBC decryption, provided with X and the passphrase.
I wouldn't mind doing this anyway, because I had planned on creating a wallet-conversion/import tool for Armory, but figured it was too much of a hassle. Maybe now is a good time to deal with it
Hi! I saw your this post on the bitcontalk. I have a question, do not tell me how to find nDeriveIterations in the wallet.dat file?