~
Hands down good description on
PBKDF2 function delivered by webtricks: [if there is no passphrase] => salt ≡ 'mnemonic', [if there is passphrase ≡ 'yourpassphrase' ] => salt ≡ 'mnemonicyourpassphrase'
Hope it will help you.
Thank you !
The salt is not the seed itself. While the BIP seems to indicate that the whole mnemonic is used as a salt again, that is not the case. The salt is only "mnemonic".
Try using this:
https://stuff.birkenstab.de/pbkdf2/.
Message (password):
conduct coral enrich local script mountain remain fringe latin throw wood web
Salt:
mnemonic
Iterations:
1
Key length (dklen):
64
Generate Hash
Result (hex):
001f53a43e04c1dd4980bc65ea6f68c33124a671ce9d407b1c5c52adcbfddef3f51784f824af6c6f8cd7beb2cdad02b39638e3c77dd0fd48865573fcb73cf0df
Didn't know this website thank for sharing. Do you know what format are MESSAGE and SALT? I thought parametez need to be in binary but inside github :
export function Pbkdf2HmacSha512(password: Uint8Array, salt: Uint8Array, count: number, length: number): Uint8Array {
const hmac = new HmacSha512(password);
return pbkdf2core(hmac, salt, length, count);
}