登录
首页 >  Golang >  Go问答

MetaMask Vault 解码器在 Golang 中的实现方法

来源:stackoverflow

时间:2024-02-08 21:45:22 376浏览 收藏

本篇文章主要是结合我之前面试的各种经历和实战开发中遇到的问题解决经验整理的,希望这篇《MetaMask Vault 解码器在 Golang 中的实现方法》对你有很大帮助!欢迎收藏,分享给更多的需要的朋友学习~

问题内容

我正在尝试一种解密 metamask 钱包的方法。 metamask 有自己的在线工具,提供了一种执行此操作的方法:https://metamask.github.io/vault-decryptor/

我找到了一个执行此hashdecrypt任务的python库:https://pastebin.com/ncrezjsa

我尝试在 golang 中实现此代码,但得到的结果为空。我希望有人能帮助并解释我做错了什么。

json 钱包:

{"data":"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","iv":"xpb05mbtb23xptfwxgclzq==","salt":"ggtrtywqafjgxyaj73woaka6mkjky6q779u63dklr3g="}

密码:tester123

您可以尝试在这里解密:https://metamask.github.io/vault-decryptor/

我的代码

package main

import (
    "crypto/aes"
    "crypto/cipher"
    "crypto/sha256"
    "encoding/base64"
    "encoding/json"
    "fmt"
    "golang.org/x/crypto/pbkdf2"
)

type payload struct {
    data string `json:"data"`
    salt string `json:"salt"`
    iv   string `json:"iv"`
}

var wallet = []byte(`{"data":"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","iv":"xpb05mbtb23xptfwxgclzq==","salt":"ggtrtywqafjgxyaj73woaka6mkjky6q779u63dklr3g="}`)

func main() {
    var payload payload
    json.unmarshal(wallet, &payload)

    iv, _ := base64.stdencoding.decodestring(payload.iv)
    salt, _ := base64.stdencoding.decodestring(payload.salt)
    data, _ := base64.stdencoding.decodestring(payload.data)

    // remove last 16 symbols, this was done in the hashdecrypt python library
    data = data[:len(data)-len(iv)]

    password := "tester123"

    key := pbkdf2.key([]byte(password), salt, 1000, 32, sha256.new)
    block, _ := aes.newcipher(key)

    // in metamask's vault-decryptor, the nonce (initialization vector) size is fixed at 16 bytes.
    gcm, _ := cipher.newgcmwithnoncesize(block, len(iv))
    plaintext, err := gcm.open(nil, iv, data, nil)

    fmt.println(err)
    fmt.println(plaintext)
}

结果

cipher: message authentication failed
[]

尝试了不同的变体,但没有办法解决它。希望有人能帮忙。


正确答案


哎呀!我的疏忽...

错误在这里:

key := pbkdf2.key([]byte(password), salt, 1000, 32, sha256.new)

漏掉了一个。它必须是:

key := pbkdf2.key([]byte(password), salt, 10000, 32, sha256.new)

此外,必须删除此行:

data = data[:len(data)-len(iv)]

最终工作代码

package main

import (
    "crypto/aes"
    "crypto/cipher"
    "crypto/sha256"
    "encoding/base64"
    "encoding/json"
    "fmt"
    "golang.org/x/crypto/pbkdf2"
)

type Payload struct {
    Data string `json:"data"`
    Salt string `json:"salt"`
    Iv   string `json:"iv"`
}

type Vault struct {
    Type string `json:"type"`
    Data struct {
        Mnemonic         []byte `json:"mnemonic"`
        NumberOfAccounts int    `json:"numberOfAccounts"`
        HDPath           string `json:"hdPath"`
    } `json:"data"`
}

var wallet = []byte(`{"data":"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","iv":"xPb05MBtb23xPtfWxgCLzQ==","salt":"ggTRTywqaFJGxYAj73woAkA6mkjkY6q779u63DKLr3g="}`)

func main() {
    var payload Payload
    json.Unmarshal(wallet, &payload)

    iv, _ := base64.StdEncoding.DecodeString(payload.Iv)
    salt, _ := base64.StdEncoding.DecodeString(payload.Salt)
    data, _ := base64.StdEncoding.DecodeString(payload.Data)

    password := "tester123"

    key := pbkdf2.Key([]byte(password), salt, 10000, 32, sha256.New)
    block, _ := aes.NewCipher(key)

    // In MetaMask's vault-decryptor, the nonce (initialization vector) size is fixed at 16 bytes.
    gcm, _ := cipher.NewGCMWithNonceSize(block, len(iv))
    plaintext, err := gcm.Open(nil, iv, data, nil)

    if err != nil {
        panic(err)
    }

    var vault []Vault
    json.Unmarshal(plaintext, &vault)
    fmt.Println(string(vault[0].Data.Mnemonic))
}

代码是作为示例编写的,因此错误检查已被忽略。

本篇关于《MetaMask Vault 解码器在 Golang 中的实现方法》的介绍就到此结束啦,但是学无止境,想要了解学习更多关于Golang的相关知识,请关注golang学习网公众号!

声明:本文转载于:stackoverflow 如有侵犯,请联系study_golang@163.com删除
相关阅读
更多>
最新阅读
更多>
课程推荐
更多>