04:01:26 First time 04:01:35 I restarted monerod and the issue went away 04:01:47 Just wanted to post it in case it was useful 16:58:40 how do I derivate the public address and the view key from the spend key? 16:59:24 the public address is a combination of the public view and spend keys 17:00:05 https://www.getmonero.org/resources/moneropedia/address.html 17:03:02 Private view key is normally generated from the private spend key (although 3rd-party wallets can do it differently) 17:04:12 oh heck, so I need to arrive on the address first derivate the public spend key, secret view key -> public view key to generate a wallet. then I can also directly generate the wallet by myself :/ 17:06:06 iirc the private spend key is randomly generated, and the private view key is made by keccak 256 hashing the private spend key 10000 times 17:06:18 then you can derive the public keys from the private keys 17:06:45 I want to have the outcome compatible with monero-gui/cli/rpc and feather, my challenge is now to get from the secret spend key I created from polyseed to the complete wallet or to the correct seed phrase, I assumed wrongly that the key provided to monero.seed.Seed (in monero-python) is equal to the secret spend key, but isn't :S 17:07:31 view secret key is just a keccak(spend secret key), if you create it with Monero CLI/GUI 17:07:41 so it's just a keccak hash 17:07:56 and sc_reduce32 17:08:18 sc_reduce is from ed25519? 17:09:06 yes, it's from src/crypto/crypto-ops.c 17:09:44 hehe, there I have also still an issu open, because monero.seed.Seed a randomly generated seed, then restored wallet with monero-rpc leads to another seed phrase but the same wallet.... 17:12:32 so it's polyseed -> secret_spend_key -> ed25519.sc_reduce(keccak(secret_spend_key, rounds)) -> secret_view_key. 17:13:27 then I need to get from both the public keys, the private keys are ed25519? 17:13:52 and rounds = 1 or 10000? 17:14:00 1 round of keccak 17:14:37 Private keys are ed25519 17:14:46 will look first in src/crypto/crypto-ops.c before I make more unnecesarry questions... sorry, I'm a bit accelerated 17:15:24 thank you very much sech1 :) 17:46:23 vthor here's the original python reference implementation: https://ed25519.cr.yp.to/python/ed25519.py 17:49:21 Another good resource: https://getmonero.dev/cryptography/asymmetric/edwards25519.html 17:58:42 recanmen thank you, but it's shipped whith monero-python 18:03:20 and I could create now everything by hand, but now it seems feather does something else then claimed :/ will see there, something doesn't add up.