-impl ChannelKeys for EnforcingChannelKeys {
- fn funding_key(&self) -> &SecretKey { self.inner.funding_key() }
- fn revocation_base_key(&self) -> &SecretKey { self.inner.revocation_base_key() }
- fn payment_key(&self) -> &SecretKey { self.inner.payment_key() }
- fn delayed_payment_base_key(&self) -> &SecretKey { self.inner.delayed_payment_base_key() }
- fn htlc_base_key(&self) -> &SecretKey { self.inner.htlc_base_key() }
- fn commitment_seed(&self) -> &[u8; 32] { self.inner.commitment_seed() }
- fn pubkeys<'a>(&'a self) -> &'a ChannelPublicKeys { self.inner.pubkeys() }
- fn key_derivation_params(&self) -> (u64, u64) { self.inner.key_derivation_params() }
-
- fn sign_remote_commitment<T: secp256k1::Signing + secp256k1::Verification>(&self, feerate_per_kw: u64, commitment_tx: &Transaction, keys: &TxCreationKeys, htlcs: &[&HTLCOutputInCommitment], to_self_delay: u16, secp_ctx: &Secp256k1<T>) -> Result<(Signature, Vec<Signature>), ()> {
- if commitment_tx.input.len() != 1 { panic!("lightning commitment transactions have a single input"); }
- self.check_keys(secp_ctx, keys);
- let obscured_commitment_transaction_number = (commitment_tx.lock_time & 0xffffff) as u64 | ((commitment_tx.input[0].sequence as u64 & 0xffffff) << 3*8);
+impl BaseSign for EnforcingSigner {
+ fn get_per_commitment_point(&self, idx: u64, secp_ctx: &Secp256k1<secp256k1::All>) -> PublicKey {
+ self.inner.get_per_commitment_point(idx, secp_ctx)
+ }