Package | Description |
---|---|
org.bitcoinj.core |
The core package contains classes for network messages like
Block and
Transaction , peer connectivity via PeerGroup ,
and block chain management. |
org.bitcoinj.crypto |
The crypto package contains classes that work with key derivation algorithms like scrypt (passwords to AES keys),
BIP 32 hierarchies (chains of keys from a root seed), X.509 utilities for the payment protocol and other general
cryptography tasks.
|
org.bitcoinj.protocols.channels |
Micropayment channels allow for rapid tiny payments to be made to a third party once a channel has been set up, using
some of the advanced features of the Bitcoin protocol.
|
org.bitcoinj.protocols.payments |
The BIP70 payment protocol wraps Bitcoin transactions and adds various useful features like memos, refund addresses
and authentication.
|
org.bitcoinj.script |
Classes for working with and executing Bitcoin script programs, as embedded in inputs and outputs.
|
org.bitcoinj.signers |
Transaction signers know how to calculate signatures over transactions in different contexts, for example, using
local private keys or fetching them from remote servers.
|
org.bitcoinj.wallet |
Classes that support the
Wallet , which knows how to find and save transactions relevant to
a set of keys or scripts, calculate balances, and spend money: the wallet has many features and can be extended
in various ways, please refer to the website for documentation on how to use it. |
Class and Description |
---|
EncryptableItem
Provides a uniform way to access something that can be optionally encrypted with a
KeyCrypter , yielding an EncryptedData , and
which can have a creation time associated with it. |
EncryptedData
An instance of EncryptedData is a holder for an initialization vector and encrypted bytes.
|
KeyCrypter
A KeyCrypter can be used to encrypt and decrypt a message.
|
KeyCrypterException
Exception to provide the following:
|
LazyECPoint
A wrapper around ECPoint that delays decoding of the point for as long as possible.
|
TransactionSignature
A TransactionSignature wraps an
ECKey.ECDSASignature and adds methods for handling
the additional SIGHASH mode byte that is used. |
Class and Description |
---|
BIP38PrivateKey
Implementation of BIP 38
passphrase-protected private keys.
|
BIP38PrivateKey.BadPassphraseException |
ChildNumber
This is just a wrapper for the i (child number) as per BIP 32 with a boolean getter for the most significant bit
and a getter for the actual 0-based child number.
|
DeterministicKey
A deterministic key is a node in a
DeterministicHierarchy . |
EncryptableItem
Provides a uniform way to access something that can be optionally encrypted with a
KeyCrypter , yielding an EncryptedData , and
which can have a creation time associated with it. |
EncryptedData
An instance of EncryptedData is a holder for an initialization vector and encrypted bytes.
|
HDDerivationException |
HDKeyDerivation.PublicDeriveMode |
HDKeyDerivation.RawKeyBytes |
KeyCrypter
A KeyCrypter can be used to encrypt and decrypt a message.
|
KeyCrypterException
Exception to provide the following:
|
LazyECPoint
A wrapper around ECPoint that delays decoding of the point for as long as possible.
|
MnemonicCode
A MnemonicCode object may be used to convert between binary seed values and
lists of words per the BIP 39
specification
|
MnemonicException
Exceptions thrown by the MnemonicCode module.
|
MnemonicException.MnemonicChecksumException
Thrown when a list of MnemonicCode words fails the checksum check.
|
MnemonicException.MnemonicLengthException
Thrown when an argument to MnemonicCode is the wrong length.
|
MnemonicException.MnemonicWordException
Thrown when a word is encountered which is not in the MnemonicCode's word list.
|
TransactionSignature
A TransactionSignature wraps an
ECKey.ECDSASignature and adds methods for handling
the additional SIGHASH mode byte that is used. |
TrustStoreLoader
An implementation of TrustStoreLoader handles fetching a KeyStore from the operating system, a file, etc.
|
Class and Description |
---|
TransactionSignature
A TransactionSignature wraps an
ECKey.ECDSASignature and adds methods for handling
the additional SIGHASH mode byte that is used. |
Class and Description |
---|
TrustStoreLoader
An implementation of TrustStoreLoader handles fetching a KeyStore from the operating system, a file, etc.
|
Class and Description |
---|
TransactionSignature
A TransactionSignature wraps an
ECKey.ECDSASignature and adds methods for handling
the additional SIGHASH mode byte that is used. |
Class and Description |
---|
ChildNumber
This is just a wrapper for the i (child number) as per BIP 32 with a boolean getter for the most significant bit
and a getter for the actual 0-based child number.
|
Class and Description |
---|
ChildNumber
This is just a wrapper for the i (child number) as per BIP 32 with a boolean getter for the most significant bit
and a getter for the actual 0-based child number.
|
DeterministicKey
A deterministic key is a node in a
DeterministicHierarchy . |
EncryptableItem
Provides a uniform way to access something that can be optionally encrypted with a
KeyCrypter , yielding an EncryptedData , and
which can have a creation time associated with it. |
EncryptedData
An instance of EncryptedData is a holder for an initialization vector and encrypted bytes.
|
KeyCrypter
A KeyCrypter can be used to encrypt and decrypt a message.
|
MnemonicException
Exceptions thrown by the MnemonicCode module.
|
Copyright © 2016. All rights reserved.