Uses of Class
net.i2p.data.PublicKey

Packages that use PublicKey
net.i2p.crypto   
net.i2p.data   
net.i2p.data.i2np   
net.i2p.router   
net.i2p.router.message   
net.i2p.router.tunnel   
 

Uses of PublicKey in net.i2p.crypto
 

Methods in net.i2p.crypto that return PublicKey
static PublicKey KeyGenerator.getPublicKey(PrivateKey priv)
          Convert a PrivateKey to its corresponding PublicKey
 PublicKey TransientSessionKeyManager.OutboundSession.getTarget()
           
 

Methods in net.i2p.crypto with parameters of type PublicKey
 SessionTag TransientSessionKeyManager.consumeNextAvailableTag(PublicKey target, SessionKey key)
          Retrieve the next available session tag for identifying the use of the given key when communicating with the target.
 SessionTag SessionKeyManager.consumeNextAvailableTag(PublicKey target, SessionKey key)
          Retrieve the next available session tag for identifying the use of the given key when communicating with the target.
 SessionKey SessionKeyManager.createSession(PublicKey target)
          Generate a new session key and associate it with the specified target.
 void TransientSessionKeyManager.createSession(PublicKey target, SessionKey key)
          Associate a new session key with the specified target.
 void SessionKeyManager.createSession(PublicKey target, SessionKey key)
          Associate a new session key with the specified target.
 byte[] ElGamalEngine.encrypt(byte[] data, PublicKey publicKey)
          encrypt the data to the public key
 byte[] DummyElGamalEngine.encrypt(byte[] data, PublicKey publicKey)
          encrypt the data to the public key
 byte[] ElGamalAESEngine.encrypt(byte[] data, PublicKey target, SessionKey key, long paddedSize)
          Encrypt the data to the target using the given key delivering no tags
 byte[] ElGamalAESEngine.encrypt(byte[] data, PublicKey target, SessionKey key, java.util.Set tagsForDelivery, long paddedSize)
          Encrypt the data to the target using the given key and deliver the specified tags
 byte[] ElGamalAESEngine.encrypt(byte[] data, PublicKey target, SessionKey key, java.util.Set tagsForDelivery, SessionTag currentTag, long paddedSize)
          Encrypt the data to the target using the given key and deliver the specified tags
 byte[] ElGamalAESEngine.encrypt(byte[] data, PublicKey target, SessionKey key, java.util.Set tagsForDelivery, SessionTag currentTag, SessionKey newKey, long paddedSize)
          Encrypt the unencrypted data to the target.
(package private)  byte[] ElGamalAESEngine.encryptExistingSession(byte[] data, PublicKey target, SessionKey key, java.util.Set tagsForDelivery, SessionTag currentTag, SessionKey newKey, long paddedSize)
          scenario 2: Begin with 32 byte session tag, which also serves as the preIV.
(package private)  byte[] ElGamalAESEngine.encryptNewSession(byte[] data, PublicKey target, SessionKey key, java.util.Set tagsForDelivery, SessionKey newKey, long paddedSize)
          scenario 1: Begin with 222 bytes, ElG encrypted, containing: - 32 byte SessionKey - 32 byte pre-IV for the AES - 158 bytes of random padding Then encrypt with AES using that session key and the first 16 bytes of the SHA256 of the pre-IV: - 2 byte integer specifying the # of session tags - that many 32 byte session tags - 4 byte integer specifying data.length - SHA256 of data - 1 byte flag that, if == 1, is followed by a new SessionKey - data - random bytes, padding the total size to greater than paddedSize with a mod 16 = 0
 void TransientSessionKeyManager.failTags(PublicKey target)
          Mark all of the tags delivered to the target up to this point as invalid, since the peer has failed to respond when they should have.
 void SessionKeyManager.failTags(PublicKey target)
          Mark all of the tags delivered to the target up to this point as invalid, since the peer has failed to respond when they should have.
 int TransientSessionKeyManager.getAvailableTags(PublicKey target, SessionKey key)
          Determine (approximately) how many available session tags for the current target have been confirmed and are available
 int SessionKeyManager.getAvailableTags(PublicKey target, SessionKey key)
          Determine (approximately) how many available session tags for the current target have been confirmed and are available
 long TransientSessionKeyManager.getAvailableTimeLeft(PublicKey target, SessionKey key)
          Determine how long the available tags will be available for before expiring, in milliseconds
 long SessionKeyManager.getAvailableTimeLeft(PublicKey target, SessionKey key)
          Determine how long the available tags will be available for before expiring, in milliseconds
 SessionKey TransientSessionKeyManager.getCurrentKey(PublicKey target)
          Retrieve the session key currently associated with encryption to the target, or null if a new session key should be generated.
 SessionKey SessionKeyManager.getCurrentKey(PublicKey target)
          Retrieve the session key currently associated with encryption to the target, or null if a new session key should be generated.
 void TransientSessionKeyManager.tagsDelivered(PublicKey target, SessionKey key, java.util.Set sessionTags)
          Take note of the fact that the given sessionTags associated with the key for encryption to the target have definitely been received at the target (aka call this method after receiving an ack to a message delivering them)
 void SessionKeyManager.tagsDelivered(PublicKey target, SessionKey key, java.util.Set sessionTags)
          Take note of the fact that the given sessionTags associated with the key for encryption to the target have definitely been received at the target (aka call this method after receiving an ack to a message delivering them)
 

Constructors in net.i2p.crypto with parameters of type PublicKey
TransientSessionKeyManager.OutboundSession(PublicKey target)
           
TransientSessionKeyManager.OutboundSession(PublicKey target, SessionKey curKey, long established, long lastUsed, java.util.List tagSets)
           
 

Uses of PublicKey in net.i2p.data
 

Methods in net.i2p.data that return PublicKey
 PublicKey LeaseSet.getEncryptionKey()
           
 PublicKey RouterIdentity.getPublicKey()
           
 PublicKey Destination.getPublicKey()
           
 PublicKey PrivateKey.toPublic()
          derives a new PublicKey object derived from the secret contents of this PrivateKey
 

Methods in net.i2p.data with parameters of type PublicKey
 void LeaseSet.setEncryptionKey(PublicKey encryptionKey)
           
 void RouterIdentity.setPublicKey(PublicKey key)
           
 void Destination.setPublicKey(PublicKey key)
           
 

Uses of PublicKey in net.i2p.data.i2np
 

Methods in net.i2p.data.i2np that return PublicKey
 PublicKey EndPointPublicKey.getKey()
           
 

Methods in net.i2p.data.i2np with parameters of type PublicKey
 void BuildRequestRecord.encryptRecord(I2PAppContext ctx, PublicKey toKey, Hash toPeer, byte[] out, int outOffset)
          Encrypt the record to the specified peer.
 void EndPointPublicKey.setKey(PublicKey key)
           
 

Uses of PublicKey in net.i2p.router
 

Methods in net.i2p.router that return PublicKey
 PublicKey KeyManager.getPublicKey()
           
 

Methods in net.i2p.router with parameters of type PublicKey
 void KeyManager.setPublicKey(PublicKey key)
          Configure the router's public key
 

Uses of PublicKey in net.i2p.router.message
 

Methods in net.i2p.router.message that return PublicKey
 PublicKey GarlicConfig.getRecipientPublicKey()
           
 

Methods in net.i2p.router.message with parameters of type PublicKey
static GarlicMessage GarlicMessageBuilder.buildMessage(RouterContext ctx, GarlicConfig config, SessionKey wrappedKey, java.util.Set wrappedTags, PublicKey target, SessionKey encryptKey, SessionTag encryptTag)
           
(package private) static GarlicMessage OutboundClientMessageJobHelper.createGarlicMessage(RouterContext ctx, long replyToken, long expiration, PublicKey recipientPK, PayloadGarlicConfig dataClove, Hash from, Destination dest, TunnelInfo replyTunnel, SessionKey wrappedKey, java.util.Set wrappedTags, boolean requireAck, LeaseSet bundledReplyLeaseSet)
          Allow the app to specify the data clove directly, which enables OutboundClientMessage to resend the same payload (including expiration and unique id) in different garlics (down different tunnels)
(package private) static GarlicMessage OutboundClientMessageJobHelper.createGarlicMessage(RouterContext ctx, long replyToken, long expiration, PublicKey recipientPK, Payload data, Hash from, Destination dest, TunnelInfo replyTunnel, SessionKey wrappedKey, java.util.Set wrappedTags, boolean requireAck, LeaseSet bundledReplyLeaseSet)
          Build a garlic message that will be delivered to the router on which the target is located.
static int GarlicMessageBuilder.estimateAvailableTags(RouterContext ctx, PublicKey key)
           
 void GarlicConfig.setRecipientPublicKey(PublicKey recipientPublicKey)
          Public key of the router to receive and process this clove.
 

Uses of PublicKey in net.i2p.router.tunnel
 

Methods in net.i2p.router.tunnel with parameters of type PublicKey
 void BuildMessageGenerator.createRecord(int recordNum, int hop, TunnelBuildMessage msg, TunnelCreatorConfig cfg, Hash replyRouter, long replyTunnel, I2PAppContext ctx, PublicKey peerKey)
          Place the asymmetrically encrypted record in the specified record slot, containing the hop's configuration (as well as the reply info, if it is an outbound endpoint)