Actual situation: some years ago (around 2015) a friend crashed his HDD. After some yeara he asked me to help him to recover the wallet on this HDD. The friend still knows the password for the wallet. I extracted mkey and ckey!. I used pywallet.py (version 2.2 from jackjack) to recover the wallet.dat. Now I investigate that the HDD contains around 100 “ckeyA“=“hex: 63 6B 65 79 41“. As I see the pywallet.py does not use ckeyA to recover the private keys. Script pywallet.py use ckey! to find the private keys (maybe I am wrong). The thread
"link" show me that every ckeyA content public and private key. achow101 wrote about that.
Plan: I would like extend the script “pywallet.py” to include the algorithm for ckeyA. Jackjack is unfortunately offline since 2018. The fork from mikeborghi is just a copy from last version from jackjack.
My first questions are:
How is the exact structure behind ckeyA in hex notation? How are the data’s encrypted?
Here are abligatory information:
Bitcoin Client Software and Version Number: Not exactly knows (around beginning of 2015)
Operating System: Windows 7 and Linux (different versions)
System Hardware Specs: Systems with Intel CPU and a lot of diferent HDD. This is not relevant for the problem.
Description of Problem: Recovery private keys behind ckeyA
Any Related Addresses: not relevant
Any Related Transaction IDs: not relevant
Screenshot of the problem: not relevant
Log Files from the Bitcoin Client: not relevant
Thanks a lot in advice!