See: Description
| Interface | Description |
|---|---|
| EncryptableItem |
Provides a uniform way to access something that can be optionally encrypted with a
KeyCrypter, yielding an EncryptedData, and
which can have a creation time associated with it. |
| KeyCrypter |
A KeyCrypter can be used to encrypt and decrypt a message.
|
| TrustStoreLoader |
An implementation of TrustStoreLoader handles fetching a KeyStore from the operating system, a file, etc.
|
| Class | Description |
|---|---|
| BIP38PrivateKey |
Implementation of BIP 38
passphrase-protected private keys.
|
| ChildNumber |
This is just a wrapper for the i (child number) as per BIP 32 with a boolean getter for the most significant bit
and a getter for the actual 0-based child number.
|
| DeterministicHierarchy |
A DeterministicHierarchy calculates and keeps a whole tree (hierarchy) of keys originating from a single
root key.
|
| DeterministicKey |
A deterministic key is a node in a
DeterministicHierarchy. |
| DRMWorkaround | |
| EncryptedData |
An instance of EncryptedData is a holder for an initialization vector and encrypted bytes.
|
| HDKeyDerivation |
Implementation of the BIP 32
deterministic wallet child key generation algorithm.
|
| HDKeyDerivation.RawKeyBytes | |
| HDUtils |
Static utilities used in BIP 32 Hierarchical Deterministic Wallets (HDW).
|
| KeyCrypterScrypt |
This class encrypts and decrypts byte arrays and strings using scrypt as the
key derivation function and AES for the encryption.
|
| LazyECPoint |
A wrapper around ECPoint that delays decoding of the point for as long as possible.
|
| LinuxSecureRandom |
A SecureRandom implementation that is able to override the standard JVM provided implementation, and which simply
serves random numbers by reading /dev/urandom.
|
| MnemonicCode |
A MnemonicCode object may be used to convert between binary seed values and
lists of words per the BIP 39
specification
|
| PBKDF2SHA512 |
This is a clean-room implementation of PBKDF2 using RFC 2898 as a reference.
|
| TransactionSignature |
A TransactionSignature wraps an
ECKey.ECDSASignature and adds methods for handling
the additional SIGHASH mode byte that is used. |
| TrustStoreLoader.DefaultTrustStoreLoader | |
| TrustStoreLoader.FileTrustStoreLoader | |
| X509Utils |
X509Utils provides tools for working with X.509 certificates and keystores, as used in the BIP 70 payment protocol.
|
| Enum | Description |
|---|---|
| HDKeyDerivation.PublicDeriveMode |
| Exception | Description |
|---|---|
| BIP38PrivateKey.BadPassphraseException | |
| HDDerivationException | |
| KeyCrypterException |
Exception to provide the following:
|
| MnemonicException |
Exceptions thrown by the MnemonicCode module.
|
| MnemonicException.MnemonicChecksumException |
Thrown when a list of MnemonicCode words fails the checksum check.
|
| MnemonicException.MnemonicLengthException |
Thrown when an argument to MnemonicCode is the wrong length.
|
| MnemonicException.MnemonicWordException |
Thrown when a word is encountered which is not in the MnemonicCode's word list.
|
Copyright © 2015. All rights reserved.