CryptoApi
Defines cryptographic methods.
Defines cryptographic methods.
Defines cryptographic methods.
Functions
Converts given private key in PEM format to its WIF format.
Converts given private key in PEM format to its WIF format.
Converts given private key in PEM format to its WIF format.
Decrypts buffer with a given key using AES.
Decrypts buffer with a given key using AES.
Decrypts buffer with a given key using AES.
Generates a new private ECC key from a password using pbkdf2. This version of the derive function has a rounds count increased to 200k. This makes using this function a safer choice, but it makes the received key different than in the original version.
Generates a new private ECC key from a password using pbkdf2. This version of the derive function has a rounds count increased to 200k. This makes using this function a safer choice, but it makes the received key different than in the original version.
Generates a new private ECC key from a password using pbkdf2. This version of the derive function has a rounds count increased to 200k. This makes using this function a safer choice, but it makes the received key different than in the original version.
Generates a new public ECC key as a pair for an existing private key.
Generates a new public ECC key as a pair for an existing private key.
Generates a new public ECC key as a pair for an existing private key.
Encrypts buffer with a given key using AES.
Encrypts buffer with a given key using AES.
Encrypts buffer with a given key using AES.
Generates a new symmetric key.
Generates a new symmetric key.
Generates a new symmetric key.
Generates a new private ECC key.
Generates a new private ECC key.
Generates a new private ECC key.
Creates a signature of data using given key.
Creates a signature of data using given key.
Validate a signature of data using given key.
Validate a signature of data using given key.
Validate a signature of data using given key.