ElDavoo / wa-crypt-tools

Manage WhatsApp .crypt12, .crypt14 and .crypt15 files.
GNU General Public License v3.0
588 stars 78 forks source link

Enhance documentation #76

Open CanvaChen opened 1 year ago

CanvaChen commented 1 year ago

Hi, I’m interested in your project and I want to know how to generate message public key and message private key by myself. I know that these keys are usually stored in the axolotl.db file under the path /data/data/com.whatsapp/databases/, but I want to create them from scratch. Could you please explain the format and algorithm of these keys? Thank you.

ElDavoo commented 1 year ago

This project does not to do anything with message keys and axolotl.db - although i agree that more documentation is needed

ElDavoo commented 1 year ago

Auto generating keys will also be useful for #10 so it will be done at some point

code-consensus commented 1 week ago

With regard to enhanced documentation, is it possible to add documentation on waguess ?

The main website only states "Hacky way to try decrypt backups", and running "waguess -h" just has the same description as wadecrypt (i.e. "Decrypts WhatsApp backup files encrypted with crypt12, 14 or 15").

What does this function actually do and how does one use it?

ElDavoo commented 1 week ago

What does this function actually do and how does one use it?

It does the same thing of wadecrypt, but in a more barbarian way: Takes the key and DB file "raw" and tries to guess where the key and the IV is. I left it there so if there is a new format we can't understand (but the underlying encryption stays the same) we might be good with it