Replying to Avatar Dr. Hax

Ok, I feel like I am going bonkers with these implementations of key derivatation. Perviously, I thought I found a bugg in bitcoinlib (python library from pypi)...

nostr:nevent1qqs2f2ny4a53v62f2r0x89r9lp8kwy2n6e9qnwst8yt5t3w5s6l6crsppamhxue69uhkummnw3ezumt0d5pzp5cw4x82vh5487g6hylkkv82284n83gxlp75nasq5yu6auq249g3qvzqqqqqqyyy3gfa

Now I am finding that not only does that implementation fail to match what is in BIP32, but it also doesn't match bip32.org nor https://guggero.github.io/cryptography-toolkit/#!/hd-wallet

I've tried using m/0/1/2 across all of these and none of the implementations match each other, nor BIP32's test cases!

I tried m/0/0/0 on all the tools that supprt that path (it's not in the test cases from BIP32) and nothing matched.

And even m/0 doesn't match in the tools that support that.

Everyone agrees on the depth 0 values (derivation "m"), including the chain key.

WTF is going on here? Can someone just go to these two websites, paste in the test cases from BIP32 and tell me if any of them match?

If they do, can you please tell me exactly what steps you took. Give instructions to me like the only thing I know how to do with a computer is go to webpages and copy and paste.

Click read more to see my call for help on that previous post. I realized it was easy to glaze over the button when I saw it on my timeline in Amethyst.

nostr:nevent1qqspzzcqvz0x4utc5qaknhf8nuqf2nsw55yualt490y365w52y5clgqpp4mhxue69uhkummn9ekx7mqzyrfsa2vw5e0f20u34wfldvcw550tx0zsd7raf8mqpgfe4mcq4223zqcyqqqqqqgz50tat

Reply to this note

Please Login to reply.

Discussion

This is an exciting saga 🤔🫡