- fn funding_key(&self) -> &SecretKey { self.inner.funding_key() }
- fn revocation_base_key(&self) -> &SecretKey { self.inner.revocation_base_key() }
- fn payment_key(&self) -> &SecretKey { self.inner.payment_key() }
- fn delayed_payment_base_key(&self) -> &SecretKey { self.inner.delayed_payment_base_key() }
- fn htlc_base_key(&self) -> &SecretKey { self.inner.htlc_base_key() }
- fn commitment_seed(&self) -> &[u8; 32] { self.inner.commitment_seed() }
- fn pubkeys<'a>(&'a self) -> &'a ChannelPublicKeys { self.inner.pubkeys() }
-
- fn sign_remote_commitment<T: secp256k1::Signing + secp256k1::Verification>(&self, feerate_per_kw: u64, commitment_tx: &Transaction, keys: &TxCreationKeys, htlcs: &[&HTLCOutputInCommitment], to_self_delay: u16, secp_ctx: &Secp256k1<T>) -> Result<(Signature, Vec<Signature>), ()> {
+ fn get_per_commitment_point<T: secp256k1::Signing + secp256k1::Verification>(&self, idx: u64, secp_ctx: &Secp256k1<T>) -> PublicKey {
+ self.inner.get_per_commitment_point(idx, secp_ctx)
+ }
+
+ fn release_commitment_secret(&self, idx: u64) -> [u8; 32] {
+ // TODO: enforce the ChannelKeys contract - error here if we already signed this commitment
+ self.inner.release_commitment_secret(idx)
+ }
+
+ fn pubkeys(&self) -> &ChannelPublicKeys { self.inner.pubkeys() }
+ fn key_derivation_params(&self) -> (u64, u64) { self.inner.key_derivation_params() }
+
+ fn sign_remote_commitment<T: secp256k1::Signing + secp256k1::Verification>(&self, feerate_per_kw: u32, commitment_tx: &Transaction, keys: &TxCreationKeys, htlcs: &[&HTLCOutputInCommitment], to_self_delay: u16, secp_ctx: &Secp256k1<T>) -> Result<(Signature, Vec<Signature>), ()> {