See: Description
Interface | Description |
---|---|
EncryptableItem |
Provides a uniform way to access something that can be optionally encrypted with a
KeyCrypter , yielding an EncryptedData , and
which can have a creation time associated with it. |
KeyCrypter |
A KeyCrypter can be used to encrypt and decrypt a message.
|
TrustStoreLoader |
An implementation of TrustStoreLoader handles fetching a KeyStore from the operating system, a file, etc.
|
Class | Description |
---|---|
BIP38PrivateKey |
Implementation of BIP 38
passphrase-protected private keys.
|
ChildNumber |
This is just a wrapper for the i (child number) as per BIP 32 with a boolean getter for the most significant bit
and a getter for the actual 0-based child number.
|
DeterministicHierarchy |
A DeterministicHierarchy calculates and keeps a whole tree (hierarchy) of keys originating from a single
root key.
|
DeterministicKey |
A deterministic key is a node in a
DeterministicHierarchy . |
DRMWorkaround | |
EncryptedData |
An instance of EncryptedData is a holder for an initialization vector and encrypted bytes.
|
HDKeyDerivation |
Implementation of the BIP 32
deterministic wallet child key generation algorithm.
|
HDKeyDerivation.RawKeyBytes | |
HDUtils |
Static utilities used in BIP 32 Hierarchical Deterministic Wallets (HDW).
|
KeyCrypterScrypt |
This class encrypts and decrypts byte arrays and strings using scrypt as the
key derivation function and AES for the encryption.
|
LazyECPoint |
A wrapper around ECPoint that delays decoding of the point for as long as possible.
|
LinuxSecureRandom |
A SecureRandom implementation that is able to override the standard JVM provided implementation, and which simply
serves random numbers by reading /dev/urandom.
|
MnemonicCode |
A MnemonicCode object may be used to convert between binary seed values and
lists of words per the BIP 39
specification
|
PBKDF2SHA512 |
This is a clean-room implementation of PBKDF2 using RFC 2898 as a reference.
|
TransactionSignature |
A TransactionSignature wraps an
ECKey.ECDSASignature and adds methods for handling
the additional SIGHASH mode byte that is used. |
TrustStoreLoader.DefaultTrustStoreLoader | |
TrustStoreLoader.FileTrustStoreLoader | |
X509Utils |
X509Utils provides tools for working with X.509 certificates and keystores, as used in the BIP 70 payment protocol.
|
Enum | Description |
---|---|
HDKeyDerivation.PublicDeriveMode |
Exception | Description |
---|---|
BIP38PrivateKey.BadPassphraseException | |
HDDerivationException | |
KeyCrypterException |
Exception to provide the following:
|
MnemonicException |
Exceptions thrown by the MnemonicCode module.
|
MnemonicException.MnemonicChecksumException |
Thrown when a list of MnemonicCode words fails the checksum check.
|
MnemonicException.MnemonicLengthException |
Thrown when an argument to MnemonicCode is the wrong length.
|
MnemonicException.MnemonicWordException |
Thrown when a word is encountered which is not in the MnemonicCode's word list.
|
Copyright © 2016. All rights reserved.