| Package | Description |
|---|---|
| org.bitcoinj.core |
The core package contains classes for network messages like
Block and
Transaction, peer connectivity via PeerGroup,
and block chain management. |
| org.bitcoinj.crypto |
The crypto package contains classes that work with key derivation algorithms like scrypt (passwords to AES keys),
BIP 32 hierarchies (chains of keys from a root seed), X.509 utilities for the payment protocol and other general
cryptography tasks.
|
| org.bitcoinj.protocols.channels |
Micropayment channels allow for rapid tiny payments to be made to a third party once a channel has been set up, using
some of the advanced features of the Bitcoin protocol.
|
| org.bitcoinj.protocols.payments |
The BIP70 payment protocol wraps Bitcoin transactions and adds various useful features like memos, refund addresses
and authentication.
|
| org.bitcoinj.script |
Classes for working with and executing Bitcoin script programs, as embedded in inputs and outputs.
|
| org.bitcoinj.signers |
Transaction signers know how to calculate signatures over transactions in different contexts, for example, using
local private keys or fetching them from remote servers.
|
| org.bitcoinj.wallet |
Classes that support the
Wallet, which knows how to find and save transactions relevant to
a set of keys or scripts, calculate balances, and spend money: the wallet has many features and can be extended
in various ways, please refer to the website for documentation on how to use it. |
| Class and Description |
|---|
| EncryptableItem
Provides a uniform way to access something that can be optionally encrypted with a
KeyCrypter, yielding an EncryptedData, and
which can have a creation time associated with it. |
| EncryptedData
An instance of EncryptedData is a holder for an initialization vector and encrypted bytes.
|
| KeyCrypter
A KeyCrypter can be used to encrypt and decrypt a message.
|
| KeyCrypterException
Exception to provide the following:
|
| LazyECPoint
A wrapper around ECPoint that delays decoding of the point for as long as possible.
|
| TransactionSignature
A TransactionSignature wraps an
ECKey.ECDSASignature and adds methods for handling
the additional SIGHASH mode byte that is used. |
| Class and Description |
|---|
| BIP38PrivateKey
Implementation of BIP 38
passphrase-protected private keys.
|
| BIP38PrivateKey.BadPassphraseException |
| ChildNumber
This is just a wrapper for the i (child number) as per BIP 32 with a boolean getter for the most significant bit
and a getter for the actual 0-based child number.
|
| DeterministicKey
A deterministic key is a node in a
DeterministicHierarchy. |
| EncryptableItem
Provides a uniform way to access something that can be optionally encrypted with a
KeyCrypter, yielding an EncryptedData, and
which can have a creation time associated with it. |
| EncryptedData
An instance of EncryptedData is a holder for an initialization vector and encrypted bytes.
|
| HDDerivationException |
| HDKeyDerivation.PublicDeriveMode |
| HDKeyDerivation.RawKeyBytes |
| KeyCrypter
A KeyCrypter can be used to encrypt and decrypt a message.
|
| KeyCrypterException
Exception to provide the following:
|
| LazyECPoint
A wrapper around ECPoint that delays decoding of the point for as long as possible.
|
| MnemonicCode
A MnemonicCode object may be used to convert between binary seed values and
lists of words per the BIP 39
specification
|
| MnemonicException
Exceptions thrown by the MnemonicCode module.
|
| MnemonicException.MnemonicChecksumException
Thrown when a list of MnemonicCode words fails the checksum check.
|
| MnemonicException.MnemonicLengthException
Thrown when an argument to MnemonicCode is the wrong length.
|
| MnemonicException.MnemonicWordException
Thrown when a word is encountered which is not in the MnemonicCode's word list.
|
| TransactionSignature
A TransactionSignature wraps an
ECKey.ECDSASignature and adds methods for handling
the additional SIGHASH mode byte that is used. |
| TrustStoreLoader
An implementation of TrustStoreLoader handles fetching a KeyStore from the operating system, a file, etc.
|
| Class and Description |
|---|
| TransactionSignature
A TransactionSignature wraps an
ECKey.ECDSASignature and adds methods for handling
the additional SIGHASH mode byte that is used. |
| Class and Description |
|---|
| TrustStoreLoader
An implementation of TrustStoreLoader handles fetching a KeyStore from the operating system, a file, etc.
|
| Class and Description |
|---|
| TransactionSignature
A TransactionSignature wraps an
ECKey.ECDSASignature and adds methods for handling
the additional SIGHASH mode byte that is used. |
| Class and Description |
|---|
| ChildNumber
This is just a wrapper for the i (child number) as per BIP 32 with a boolean getter for the most significant bit
and a getter for the actual 0-based child number.
|
| Class and Description |
|---|
| ChildNumber
This is just a wrapper for the i (child number) as per BIP 32 with a boolean getter for the most significant bit
and a getter for the actual 0-based child number.
|
| DeterministicKey
A deterministic key is a node in a
DeterministicHierarchy. |
| EncryptableItem
Provides a uniform way to access something that can be optionally encrypted with a
KeyCrypter, yielding an EncryptedData, and
which can have a creation time associated with it. |
| EncryptedData
An instance of EncryptedData is a holder for an initialization vector and encrypted bytes.
|
| KeyCrypter
A KeyCrypter can be used to encrypt and decrypt a message.
|
| MnemonicException
Exceptions thrown by the MnemonicCode module.
|
Copyright © 2018. All rights reserved.