github.com/decred/dcrlnd@v0.7.6/lnrpc/signrpc/signer.pb.go (about) 1 // Code generated by protoc-gen-go. DO NOT EDIT. 2 // versions: 3 // protoc-gen-go v1.31.0 4 // protoc v3.4.0 5 // source: signrpc/signer.proto 6 7 package signrpc 8 9 import ( 10 context "context" 11 grpc "google.golang.org/grpc" 12 codes "google.golang.org/grpc/codes" 13 status "google.golang.org/grpc/status" 14 protoreflect "google.golang.org/protobuf/reflect/protoreflect" 15 protoimpl "google.golang.org/protobuf/runtime/protoimpl" 16 reflect "reflect" 17 sync "sync" 18 ) 19 20 const ( 21 // Verify that this generated code is sufficiently up-to-date. 22 _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) 23 // Verify that runtime/protoimpl is sufficiently up-to-date. 24 _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) 25 ) 26 27 type KeyLocator struct { 28 state protoimpl.MessageState 29 sizeCache protoimpl.SizeCache 30 unknownFields protoimpl.UnknownFields 31 32 // The family of key being identified. 33 KeyFamily int32 `protobuf:"varint,1,opt,name=key_family,json=keyFamily,proto3" json:"key_family,omitempty"` 34 // The precise index of the key being identified. 35 KeyIndex int32 `protobuf:"varint,2,opt,name=key_index,json=keyIndex,proto3" json:"key_index,omitempty"` 36 } 37 38 func (x *KeyLocator) Reset() { 39 *x = KeyLocator{} 40 if protoimpl.UnsafeEnabled { 41 mi := &file_signrpc_signer_proto_msgTypes[0] 42 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 43 ms.StoreMessageInfo(mi) 44 } 45 } 46 47 func (x *KeyLocator) String() string { 48 return protoimpl.X.MessageStringOf(x) 49 } 50 51 func (*KeyLocator) ProtoMessage() {} 52 53 func (x *KeyLocator) ProtoReflect() protoreflect.Message { 54 mi := &file_signrpc_signer_proto_msgTypes[0] 55 if protoimpl.UnsafeEnabled && x != nil { 56 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 57 if ms.LoadMessageInfo() == nil { 58 ms.StoreMessageInfo(mi) 59 } 60 return ms 61 } 62 return mi.MessageOf(x) 63 } 64 65 // Deprecated: Use KeyLocator.ProtoReflect.Descriptor instead. 66 func (*KeyLocator) Descriptor() ([]byte, []int) { 67 return file_signrpc_signer_proto_rawDescGZIP(), []int{0} 68 } 69 70 func (x *KeyLocator) GetKeyFamily() int32 { 71 if x != nil { 72 return x.KeyFamily 73 } 74 return 0 75 } 76 77 func (x *KeyLocator) GetKeyIndex() int32 { 78 if x != nil { 79 return x.KeyIndex 80 } 81 return 0 82 } 83 84 type KeyDescriptor struct { 85 state protoimpl.MessageState 86 sizeCache protoimpl.SizeCache 87 unknownFields protoimpl.UnknownFields 88 89 // The raw bytes of the public key in the key pair being identified. Either 90 // this or the KeyLocator must be specified. 91 RawKeyBytes []byte `protobuf:"bytes,1,opt,name=raw_key_bytes,json=rawKeyBytes,proto3" json:"raw_key_bytes,omitempty"` 92 // The key locator that identifies which private key to use for signing. 93 // Either this or the raw bytes of the target public key must be specified. 94 KeyLoc *KeyLocator `protobuf:"bytes,2,opt,name=key_loc,json=keyLoc,proto3" json:"key_loc,omitempty"` 95 } 96 97 func (x *KeyDescriptor) Reset() { 98 *x = KeyDescriptor{} 99 if protoimpl.UnsafeEnabled { 100 mi := &file_signrpc_signer_proto_msgTypes[1] 101 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 102 ms.StoreMessageInfo(mi) 103 } 104 } 105 106 func (x *KeyDescriptor) String() string { 107 return protoimpl.X.MessageStringOf(x) 108 } 109 110 func (*KeyDescriptor) ProtoMessage() {} 111 112 func (x *KeyDescriptor) ProtoReflect() protoreflect.Message { 113 mi := &file_signrpc_signer_proto_msgTypes[1] 114 if protoimpl.UnsafeEnabled && x != nil { 115 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 116 if ms.LoadMessageInfo() == nil { 117 ms.StoreMessageInfo(mi) 118 } 119 return ms 120 } 121 return mi.MessageOf(x) 122 } 123 124 // Deprecated: Use KeyDescriptor.ProtoReflect.Descriptor instead. 125 func (*KeyDescriptor) Descriptor() ([]byte, []int) { 126 return file_signrpc_signer_proto_rawDescGZIP(), []int{1} 127 } 128 129 func (x *KeyDescriptor) GetRawKeyBytes() []byte { 130 if x != nil { 131 return x.RawKeyBytes 132 } 133 return nil 134 } 135 136 func (x *KeyDescriptor) GetKeyLoc() *KeyLocator { 137 if x != nil { 138 return x.KeyLoc 139 } 140 return nil 141 } 142 143 type TxOut struct { 144 state protoimpl.MessageState 145 sizeCache protoimpl.SizeCache 146 unknownFields protoimpl.UnknownFields 147 148 // The value of the output being spent. 149 Value int64 `protobuf:"varint,1,opt,name=value,proto3" json:"value,omitempty"` 150 // The script of the output being spent. 151 PkScript []byte `protobuf:"bytes,2,opt,name=pk_script,json=pkScript,proto3" json:"pk_script,omitempty"` 152 } 153 154 func (x *TxOut) Reset() { 155 *x = TxOut{} 156 if protoimpl.UnsafeEnabled { 157 mi := &file_signrpc_signer_proto_msgTypes[2] 158 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 159 ms.StoreMessageInfo(mi) 160 } 161 } 162 163 func (x *TxOut) String() string { 164 return protoimpl.X.MessageStringOf(x) 165 } 166 167 func (*TxOut) ProtoMessage() {} 168 169 func (x *TxOut) ProtoReflect() protoreflect.Message { 170 mi := &file_signrpc_signer_proto_msgTypes[2] 171 if protoimpl.UnsafeEnabled && x != nil { 172 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 173 if ms.LoadMessageInfo() == nil { 174 ms.StoreMessageInfo(mi) 175 } 176 return ms 177 } 178 return mi.MessageOf(x) 179 } 180 181 // Deprecated: Use TxOut.ProtoReflect.Descriptor instead. 182 func (*TxOut) Descriptor() ([]byte, []int) { 183 return file_signrpc_signer_proto_rawDescGZIP(), []int{2} 184 } 185 186 func (x *TxOut) GetValue() int64 { 187 if x != nil { 188 return x.Value 189 } 190 return 0 191 } 192 193 func (x *TxOut) GetPkScript() []byte { 194 if x != nil { 195 return x.PkScript 196 } 197 return nil 198 } 199 200 type SignDescriptor struct { 201 state protoimpl.MessageState 202 sizeCache protoimpl.SizeCache 203 unknownFields protoimpl.UnknownFields 204 205 // A descriptor that precisely describes *which* key to use for signing. This 206 // may provide the raw public key directly, or require the Signer to re-derive 207 // the key according to the populated derivation path. 208 // 209 // Note that if the key descriptor was obtained through walletrpc.DeriveKey, 210 // then the key locator MUST always be provided, since the derived keys are not 211 // persisted unlike with DeriveNextKey. 212 KeyDesc *KeyDescriptor `protobuf:"bytes,1,opt,name=key_desc,json=keyDesc,proto3" json:"key_desc,omitempty"` 213 // A scalar value that will be added to the private key corresponding to the 214 // above public key to obtain the private key to be used to sign this input. 215 // This value is typically derived via the following computation: 216 // 217 // derivedKey = privkey + sha256(perCommitmentPoint || pubKey) mod N 218 SingleTweak []byte `protobuf:"bytes,2,opt,name=single_tweak,json=singleTweak,proto3" json:"single_tweak,omitempty"` 219 // A private key that will be used in combination with its corresponding 220 // private key to derive the private key that is to be used to sign the target 221 // input. Within the Lightning protocol, this value is typically the 222 // commitment secret from a previously revoked commitment transaction. This 223 // value is in combination with two hash values, and the original private key 224 // to derive the private key to be used when signing. 225 // 226 // k = (privKey*sha256(pubKey || tweakPub) + 227 // tweakPriv*sha256(tweakPub || pubKey)) mod N 228 DoubleTweak []byte `protobuf:"bytes,3,opt,name=double_tweak,json=doubleTweak,proto3" json:"double_tweak,omitempty"` 229 // The full script required to properly redeem the output. This field will 230 // only be populated if a p2wsh or a p2sh output is being signed. 231 WitnessScript []byte `protobuf:"bytes,4,opt,name=witness_script,json=witnessScript,proto3" json:"witness_script,omitempty"` 232 // A description of the output being spent. The value and script MUST be 233 // provided. 234 Output *TxOut `protobuf:"bytes,5,opt,name=output,proto3" json:"output,omitempty"` 235 // The target sighash type that should be used when generating the final 236 // sighash, and signature. 237 Sighash uint32 `protobuf:"varint,7,opt,name=sighash,proto3" json:"sighash,omitempty"` 238 // The target input within the transaction that should be signed. 239 InputIndex int32 `protobuf:"varint,8,opt,name=input_index,json=inputIndex,proto3" json:"input_index,omitempty"` 240 } 241 242 func (x *SignDescriptor) Reset() { 243 *x = SignDescriptor{} 244 if protoimpl.UnsafeEnabled { 245 mi := &file_signrpc_signer_proto_msgTypes[3] 246 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 247 ms.StoreMessageInfo(mi) 248 } 249 } 250 251 func (x *SignDescriptor) String() string { 252 return protoimpl.X.MessageStringOf(x) 253 } 254 255 func (*SignDescriptor) ProtoMessage() {} 256 257 func (x *SignDescriptor) ProtoReflect() protoreflect.Message { 258 mi := &file_signrpc_signer_proto_msgTypes[3] 259 if protoimpl.UnsafeEnabled && x != nil { 260 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 261 if ms.LoadMessageInfo() == nil { 262 ms.StoreMessageInfo(mi) 263 } 264 return ms 265 } 266 return mi.MessageOf(x) 267 } 268 269 // Deprecated: Use SignDescriptor.ProtoReflect.Descriptor instead. 270 func (*SignDescriptor) Descriptor() ([]byte, []int) { 271 return file_signrpc_signer_proto_rawDescGZIP(), []int{3} 272 } 273 274 func (x *SignDescriptor) GetKeyDesc() *KeyDescriptor { 275 if x != nil { 276 return x.KeyDesc 277 } 278 return nil 279 } 280 281 func (x *SignDescriptor) GetSingleTweak() []byte { 282 if x != nil { 283 return x.SingleTweak 284 } 285 return nil 286 } 287 288 func (x *SignDescriptor) GetDoubleTweak() []byte { 289 if x != nil { 290 return x.DoubleTweak 291 } 292 return nil 293 } 294 295 func (x *SignDescriptor) GetWitnessScript() []byte { 296 if x != nil { 297 return x.WitnessScript 298 } 299 return nil 300 } 301 302 func (x *SignDescriptor) GetOutput() *TxOut { 303 if x != nil { 304 return x.Output 305 } 306 return nil 307 } 308 309 func (x *SignDescriptor) GetSighash() uint32 { 310 if x != nil { 311 return x.Sighash 312 } 313 return 0 314 } 315 316 func (x *SignDescriptor) GetInputIndex() int32 { 317 if x != nil { 318 return x.InputIndex 319 } 320 return 0 321 } 322 323 type SignReq struct { 324 state protoimpl.MessageState 325 sizeCache protoimpl.SizeCache 326 unknownFields protoimpl.UnknownFields 327 328 // The raw bytes of the transaction to be signed. 329 RawTxBytes []byte `protobuf:"bytes,1,opt,name=raw_tx_bytes,json=rawTxBytes,proto3" json:"raw_tx_bytes,omitempty"` 330 // A set of sign descriptors, for each input to be signed. 331 SignDescs []*SignDescriptor `protobuf:"bytes,2,rep,name=sign_descs,json=signDescs,proto3" json:"sign_descs,omitempty"` 332 } 333 334 func (x *SignReq) Reset() { 335 *x = SignReq{} 336 if protoimpl.UnsafeEnabled { 337 mi := &file_signrpc_signer_proto_msgTypes[4] 338 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 339 ms.StoreMessageInfo(mi) 340 } 341 } 342 343 func (x *SignReq) String() string { 344 return protoimpl.X.MessageStringOf(x) 345 } 346 347 func (*SignReq) ProtoMessage() {} 348 349 func (x *SignReq) ProtoReflect() protoreflect.Message { 350 mi := &file_signrpc_signer_proto_msgTypes[4] 351 if protoimpl.UnsafeEnabled && x != nil { 352 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 353 if ms.LoadMessageInfo() == nil { 354 ms.StoreMessageInfo(mi) 355 } 356 return ms 357 } 358 return mi.MessageOf(x) 359 } 360 361 // Deprecated: Use SignReq.ProtoReflect.Descriptor instead. 362 func (*SignReq) Descriptor() ([]byte, []int) { 363 return file_signrpc_signer_proto_rawDescGZIP(), []int{4} 364 } 365 366 func (x *SignReq) GetRawTxBytes() []byte { 367 if x != nil { 368 return x.RawTxBytes 369 } 370 return nil 371 } 372 373 func (x *SignReq) GetSignDescs() []*SignDescriptor { 374 if x != nil { 375 return x.SignDescs 376 } 377 return nil 378 } 379 380 type SignResp struct { 381 state protoimpl.MessageState 382 sizeCache protoimpl.SizeCache 383 unknownFields protoimpl.UnknownFields 384 385 // A set of signatures realized in a fixed 64-byte format ordered in ascending 386 // input order. 387 RawSigs [][]byte `protobuf:"bytes,1,rep,name=raw_sigs,json=rawSigs,proto3" json:"raw_sigs,omitempty"` 388 } 389 390 func (x *SignResp) Reset() { 391 *x = SignResp{} 392 if protoimpl.UnsafeEnabled { 393 mi := &file_signrpc_signer_proto_msgTypes[5] 394 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 395 ms.StoreMessageInfo(mi) 396 } 397 } 398 399 func (x *SignResp) String() string { 400 return protoimpl.X.MessageStringOf(x) 401 } 402 403 func (*SignResp) ProtoMessage() {} 404 405 func (x *SignResp) ProtoReflect() protoreflect.Message { 406 mi := &file_signrpc_signer_proto_msgTypes[5] 407 if protoimpl.UnsafeEnabled && x != nil { 408 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 409 if ms.LoadMessageInfo() == nil { 410 ms.StoreMessageInfo(mi) 411 } 412 return ms 413 } 414 return mi.MessageOf(x) 415 } 416 417 // Deprecated: Use SignResp.ProtoReflect.Descriptor instead. 418 func (*SignResp) Descriptor() ([]byte, []int) { 419 return file_signrpc_signer_proto_rawDescGZIP(), []int{5} 420 } 421 422 func (x *SignResp) GetRawSigs() [][]byte { 423 if x != nil { 424 return x.RawSigs 425 } 426 return nil 427 } 428 429 type InputScript struct { 430 state protoimpl.MessageState 431 sizeCache protoimpl.SizeCache 432 unknownFields protoimpl.UnknownFields 433 434 // The serializes witness stack for the specified input. 435 Witness [][]byte `protobuf:"bytes,1,rep,name=witness,proto3" json:"witness,omitempty"` 436 // The optional sig script for the specified witness that will only be set if 437 // the input specified is a nested p2sh witness program. 438 SigScript []byte `protobuf:"bytes,2,opt,name=sig_script,json=sigScript,proto3" json:"sig_script,omitempty"` 439 } 440 441 func (x *InputScript) Reset() { 442 *x = InputScript{} 443 if protoimpl.UnsafeEnabled { 444 mi := &file_signrpc_signer_proto_msgTypes[6] 445 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 446 ms.StoreMessageInfo(mi) 447 } 448 } 449 450 func (x *InputScript) String() string { 451 return protoimpl.X.MessageStringOf(x) 452 } 453 454 func (*InputScript) ProtoMessage() {} 455 456 func (x *InputScript) ProtoReflect() protoreflect.Message { 457 mi := &file_signrpc_signer_proto_msgTypes[6] 458 if protoimpl.UnsafeEnabled && x != nil { 459 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 460 if ms.LoadMessageInfo() == nil { 461 ms.StoreMessageInfo(mi) 462 } 463 return ms 464 } 465 return mi.MessageOf(x) 466 } 467 468 // Deprecated: Use InputScript.ProtoReflect.Descriptor instead. 469 func (*InputScript) Descriptor() ([]byte, []int) { 470 return file_signrpc_signer_proto_rawDescGZIP(), []int{6} 471 } 472 473 func (x *InputScript) GetWitness() [][]byte { 474 if x != nil { 475 return x.Witness 476 } 477 return nil 478 } 479 480 func (x *InputScript) GetSigScript() []byte { 481 if x != nil { 482 return x.SigScript 483 } 484 return nil 485 } 486 487 type InputScriptResp struct { 488 state protoimpl.MessageState 489 sizeCache protoimpl.SizeCache 490 unknownFields protoimpl.UnknownFields 491 492 // The set of fully valid input scripts requested. 493 InputScripts []*InputScript `protobuf:"bytes,1,rep,name=input_scripts,json=inputScripts,proto3" json:"input_scripts,omitempty"` 494 } 495 496 func (x *InputScriptResp) Reset() { 497 *x = InputScriptResp{} 498 if protoimpl.UnsafeEnabled { 499 mi := &file_signrpc_signer_proto_msgTypes[7] 500 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 501 ms.StoreMessageInfo(mi) 502 } 503 } 504 505 func (x *InputScriptResp) String() string { 506 return protoimpl.X.MessageStringOf(x) 507 } 508 509 func (*InputScriptResp) ProtoMessage() {} 510 511 func (x *InputScriptResp) ProtoReflect() protoreflect.Message { 512 mi := &file_signrpc_signer_proto_msgTypes[7] 513 if protoimpl.UnsafeEnabled && x != nil { 514 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 515 if ms.LoadMessageInfo() == nil { 516 ms.StoreMessageInfo(mi) 517 } 518 return ms 519 } 520 return mi.MessageOf(x) 521 } 522 523 // Deprecated: Use InputScriptResp.ProtoReflect.Descriptor instead. 524 func (*InputScriptResp) Descriptor() ([]byte, []int) { 525 return file_signrpc_signer_proto_rawDescGZIP(), []int{7} 526 } 527 528 func (x *InputScriptResp) GetInputScripts() []*InputScript { 529 if x != nil { 530 return x.InputScripts 531 } 532 return nil 533 } 534 535 type SignMessageReq struct { 536 state protoimpl.MessageState 537 sizeCache protoimpl.SizeCache 538 unknownFields protoimpl.UnknownFields 539 540 // The message to be signed. 541 Msg []byte `protobuf:"bytes,1,opt,name=msg,proto3" json:"msg,omitempty"` 542 // The key locator that identifies which key to use for signing. 543 KeyLoc *KeyLocator `protobuf:"bytes,2,opt,name=key_loc,json=keyLoc,proto3" json:"key_loc,omitempty"` 544 // Double-SHA256 hash instead of just the default single round. 545 DoubleHash bool `protobuf:"varint,3,opt,name=double_hash,json=doubleHash,proto3" json:"double_hash,omitempty"` 546 // Use the compact (pubkey recoverable) format instead of the raw lnwire 547 // format. 548 CompactSig bool `protobuf:"varint,4,opt,name=compact_sig,json=compactSig,proto3" json:"compact_sig,omitempty"` 549 } 550 551 func (x *SignMessageReq) Reset() { 552 *x = SignMessageReq{} 553 if protoimpl.UnsafeEnabled { 554 mi := &file_signrpc_signer_proto_msgTypes[8] 555 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 556 ms.StoreMessageInfo(mi) 557 } 558 } 559 560 func (x *SignMessageReq) String() string { 561 return protoimpl.X.MessageStringOf(x) 562 } 563 564 func (*SignMessageReq) ProtoMessage() {} 565 566 func (x *SignMessageReq) ProtoReflect() protoreflect.Message { 567 mi := &file_signrpc_signer_proto_msgTypes[8] 568 if protoimpl.UnsafeEnabled && x != nil { 569 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 570 if ms.LoadMessageInfo() == nil { 571 ms.StoreMessageInfo(mi) 572 } 573 return ms 574 } 575 return mi.MessageOf(x) 576 } 577 578 // Deprecated: Use SignMessageReq.ProtoReflect.Descriptor instead. 579 func (*SignMessageReq) Descriptor() ([]byte, []int) { 580 return file_signrpc_signer_proto_rawDescGZIP(), []int{8} 581 } 582 583 func (x *SignMessageReq) GetMsg() []byte { 584 if x != nil { 585 return x.Msg 586 } 587 return nil 588 } 589 590 func (x *SignMessageReq) GetKeyLoc() *KeyLocator { 591 if x != nil { 592 return x.KeyLoc 593 } 594 return nil 595 } 596 597 func (x *SignMessageReq) GetDoubleHash() bool { 598 if x != nil { 599 return x.DoubleHash 600 } 601 return false 602 } 603 604 func (x *SignMessageReq) GetCompactSig() bool { 605 if x != nil { 606 return x.CompactSig 607 } 608 return false 609 } 610 611 type SignMessageResp struct { 612 state protoimpl.MessageState 613 sizeCache protoimpl.SizeCache 614 unknownFields protoimpl.UnknownFields 615 616 // The signature for the given message in the fixed-size LN wire format. 617 Signature []byte `protobuf:"bytes,1,opt,name=signature,proto3" json:"signature,omitempty"` 618 } 619 620 func (x *SignMessageResp) Reset() { 621 *x = SignMessageResp{} 622 if protoimpl.UnsafeEnabled { 623 mi := &file_signrpc_signer_proto_msgTypes[9] 624 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 625 ms.StoreMessageInfo(mi) 626 } 627 } 628 629 func (x *SignMessageResp) String() string { 630 return protoimpl.X.MessageStringOf(x) 631 } 632 633 func (*SignMessageResp) ProtoMessage() {} 634 635 func (x *SignMessageResp) ProtoReflect() protoreflect.Message { 636 mi := &file_signrpc_signer_proto_msgTypes[9] 637 if protoimpl.UnsafeEnabled && x != nil { 638 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 639 if ms.LoadMessageInfo() == nil { 640 ms.StoreMessageInfo(mi) 641 } 642 return ms 643 } 644 return mi.MessageOf(x) 645 } 646 647 // Deprecated: Use SignMessageResp.ProtoReflect.Descriptor instead. 648 func (*SignMessageResp) Descriptor() ([]byte, []int) { 649 return file_signrpc_signer_proto_rawDescGZIP(), []int{9} 650 } 651 652 func (x *SignMessageResp) GetSignature() []byte { 653 if x != nil { 654 return x.Signature 655 } 656 return nil 657 } 658 659 type VerifyMessageReq struct { 660 state protoimpl.MessageState 661 sizeCache protoimpl.SizeCache 662 unknownFields protoimpl.UnknownFields 663 664 // The message over which the signature is to be verified. 665 Msg []byte `protobuf:"bytes,1,opt,name=msg,proto3" json:"msg,omitempty"` 666 // The fixed-size LN wire encoded signature to be verified over the given 667 // message. 668 Signature []byte `protobuf:"bytes,2,opt,name=signature,proto3" json:"signature,omitempty"` 669 // The public key the signature has to be valid for. 670 Pubkey []byte `protobuf:"bytes,3,opt,name=pubkey,proto3" json:"pubkey,omitempty"` 671 } 672 673 func (x *VerifyMessageReq) Reset() { 674 *x = VerifyMessageReq{} 675 if protoimpl.UnsafeEnabled { 676 mi := &file_signrpc_signer_proto_msgTypes[10] 677 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 678 ms.StoreMessageInfo(mi) 679 } 680 } 681 682 func (x *VerifyMessageReq) String() string { 683 return protoimpl.X.MessageStringOf(x) 684 } 685 686 func (*VerifyMessageReq) ProtoMessage() {} 687 688 func (x *VerifyMessageReq) ProtoReflect() protoreflect.Message { 689 mi := &file_signrpc_signer_proto_msgTypes[10] 690 if protoimpl.UnsafeEnabled && x != nil { 691 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 692 if ms.LoadMessageInfo() == nil { 693 ms.StoreMessageInfo(mi) 694 } 695 return ms 696 } 697 return mi.MessageOf(x) 698 } 699 700 // Deprecated: Use VerifyMessageReq.ProtoReflect.Descriptor instead. 701 func (*VerifyMessageReq) Descriptor() ([]byte, []int) { 702 return file_signrpc_signer_proto_rawDescGZIP(), []int{10} 703 } 704 705 func (x *VerifyMessageReq) GetMsg() []byte { 706 if x != nil { 707 return x.Msg 708 } 709 return nil 710 } 711 712 func (x *VerifyMessageReq) GetSignature() []byte { 713 if x != nil { 714 return x.Signature 715 } 716 return nil 717 } 718 719 func (x *VerifyMessageReq) GetPubkey() []byte { 720 if x != nil { 721 return x.Pubkey 722 } 723 return nil 724 } 725 726 type VerifyMessageResp struct { 727 state protoimpl.MessageState 728 sizeCache protoimpl.SizeCache 729 unknownFields protoimpl.UnknownFields 730 731 // Whether the signature was valid over the given message. 732 Valid bool `protobuf:"varint,1,opt,name=valid,proto3" json:"valid,omitempty"` 733 } 734 735 func (x *VerifyMessageResp) Reset() { 736 *x = VerifyMessageResp{} 737 if protoimpl.UnsafeEnabled { 738 mi := &file_signrpc_signer_proto_msgTypes[11] 739 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 740 ms.StoreMessageInfo(mi) 741 } 742 } 743 744 func (x *VerifyMessageResp) String() string { 745 return protoimpl.X.MessageStringOf(x) 746 } 747 748 func (*VerifyMessageResp) ProtoMessage() {} 749 750 func (x *VerifyMessageResp) ProtoReflect() protoreflect.Message { 751 mi := &file_signrpc_signer_proto_msgTypes[11] 752 if protoimpl.UnsafeEnabled && x != nil { 753 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 754 if ms.LoadMessageInfo() == nil { 755 ms.StoreMessageInfo(mi) 756 } 757 return ms 758 } 759 return mi.MessageOf(x) 760 } 761 762 // Deprecated: Use VerifyMessageResp.ProtoReflect.Descriptor instead. 763 func (*VerifyMessageResp) Descriptor() ([]byte, []int) { 764 return file_signrpc_signer_proto_rawDescGZIP(), []int{11} 765 } 766 767 func (x *VerifyMessageResp) GetValid() bool { 768 if x != nil { 769 return x.Valid 770 } 771 return false 772 } 773 774 type SharedKeyRequest struct { 775 state protoimpl.MessageState 776 sizeCache protoimpl.SizeCache 777 unknownFields protoimpl.UnknownFields 778 779 // The ephemeral public key to use for the DH key derivation. 780 EphemeralPubkey []byte `protobuf:"bytes,1,opt,name=ephemeral_pubkey,json=ephemeralPubkey,proto3" json:"ephemeral_pubkey,omitempty"` 781 // Deprecated. The optional key locator of the local key that should be used. 782 // If this parameter is not set then the node's identity private key will be 783 // used. 784 // 785 // Deprecated: Marked as deprecated in signrpc/signer.proto. 786 KeyLoc *KeyLocator `protobuf:"bytes,2,opt,name=key_loc,json=keyLoc,proto3" json:"key_loc,omitempty"` 787 // A key descriptor describes the key used for performing ECDH. Either a key 788 // locator or a raw public key is expected, if neither is supplied, defaults to 789 // the node's identity private key. 790 KeyDesc *KeyDescriptor `protobuf:"bytes,3,opt,name=key_desc,json=keyDesc,proto3" json:"key_desc,omitempty"` 791 } 792 793 func (x *SharedKeyRequest) Reset() { 794 *x = SharedKeyRequest{} 795 if protoimpl.UnsafeEnabled { 796 mi := &file_signrpc_signer_proto_msgTypes[12] 797 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 798 ms.StoreMessageInfo(mi) 799 } 800 } 801 802 func (x *SharedKeyRequest) String() string { 803 return protoimpl.X.MessageStringOf(x) 804 } 805 806 func (*SharedKeyRequest) ProtoMessage() {} 807 808 func (x *SharedKeyRequest) ProtoReflect() protoreflect.Message { 809 mi := &file_signrpc_signer_proto_msgTypes[12] 810 if protoimpl.UnsafeEnabled && x != nil { 811 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 812 if ms.LoadMessageInfo() == nil { 813 ms.StoreMessageInfo(mi) 814 } 815 return ms 816 } 817 return mi.MessageOf(x) 818 } 819 820 // Deprecated: Use SharedKeyRequest.ProtoReflect.Descriptor instead. 821 func (*SharedKeyRequest) Descriptor() ([]byte, []int) { 822 return file_signrpc_signer_proto_rawDescGZIP(), []int{12} 823 } 824 825 func (x *SharedKeyRequest) GetEphemeralPubkey() []byte { 826 if x != nil { 827 return x.EphemeralPubkey 828 } 829 return nil 830 } 831 832 // Deprecated: Marked as deprecated in signrpc/signer.proto. 833 func (x *SharedKeyRequest) GetKeyLoc() *KeyLocator { 834 if x != nil { 835 return x.KeyLoc 836 } 837 return nil 838 } 839 840 func (x *SharedKeyRequest) GetKeyDesc() *KeyDescriptor { 841 if x != nil { 842 return x.KeyDesc 843 } 844 return nil 845 } 846 847 type SharedKeyResponse struct { 848 state protoimpl.MessageState 849 sizeCache protoimpl.SizeCache 850 unknownFields protoimpl.UnknownFields 851 852 // The shared public key, hashed with sha256. 853 SharedKey []byte `protobuf:"bytes,1,opt,name=shared_key,json=sharedKey,proto3" json:"shared_key,omitempty"` 854 } 855 856 func (x *SharedKeyResponse) Reset() { 857 *x = SharedKeyResponse{} 858 if protoimpl.UnsafeEnabled { 859 mi := &file_signrpc_signer_proto_msgTypes[13] 860 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 861 ms.StoreMessageInfo(mi) 862 } 863 } 864 865 func (x *SharedKeyResponse) String() string { 866 return protoimpl.X.MessageStringOf(x) 867 } 868 869 func (*SharedKeyResponse) ProtoMessage() {} 870 871 func (x *SharedKeyResponse) ProtoReflect() protoreflect.Message { 872 mi := &file_signrpc_signer_proto_msgTypes[13] 873 if protoimpl.UnsafeEnabled && x != nil { 874 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 875 if ms.LoadMessageInfo() == nil { 876 ms.StoreMessageInfo(mi) 877 } 878 return ms 879 } 880 return mi.MessageOf(x) 881 } 882 883 // Deprecated: Use SharedKeyResponse.ProtoReflect.Descriptor instead. 884 func (*SharedKeyResponse) Descriptor() ([]byte, []int) { 885 return file_signrpc_signer_proto_rawDescGZIP(), []int{13} 886 } 887 888 func (x *SharedKeyResponse) GetSharedKey() []byte { 889 if x != nil { 890 return x.SharedKey 891 } 892 return nil 893 } 894 895 var File_signrpc_signer_proto protoreflect.FileDescriptor 896 897 var file_signrpc_signer_proto_rawDesc = []byte{ 898 0x0a, 0x14, 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x2f, 0x73, 0x69, 0x67, 0x6e, 0x65, 0x72, 899 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x12, 0x07, 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x22, 900 0x48, 0x0a, 0x0a, 0x4b, 0x65, 0x79, 0x4c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72, 0x12, 0x1d, 0x0a, 901 0x0a, 0x6b, 0x65, 0x79, 0x5f, 0x66, 0x61, 0x6d, 0x69, 0x6c, 0x79, 0x18, 0x01, 0x20, 0x01, 0x28, 902 0x05, 0x52, 0x09, 0x6b, 0x65, 0x79, 0x46, 0x61, 0x6d, 0x69, 0x6c, 0x79, 0x12, 0x1b, 0x0a, 0x09, 903 0x6b, 0x65, 0x79, 0x5f, 0x69, 0x6e, 0x64, 0x65, 0x78, 0x18, 0x02, 0x20, 0x01, 0x28, 0x05, 0x52, 904 0x08, 0x6b, 0x65, 0x79, 0x49, 0x6e, 0x64, 0x65, 0x78, 0x22, 0x61, 0x0a, 0x0d, 0x4b, 0x65, 0x79, 905 0x44, 0x65, 0x73, 0x63, 0x72, 0x69, 0x70, 0x74, 0x6f, 0x72, 0x12, 0x22, 0x0a, 0x0d, 0x72, 0x61, 906 0x77, 0x5f, 0x6b, 0x65, 0x79, 0x5f, 0x62, 0x79, 0x74, 0x65, 0x73, 0x18, 0x01, 0x20, 0x01, 0x28, 907 0x0c, 0x52, 0x0b, 0x72, 0x61, 0x77, 0x4b, 0x65, 0x79, 0x42, 0x79, 0x74, 0x65, 0x73, 0x12, 0x2c, 908 0x0a, 0x07, 0x6b, 0x65, 0x79, 0x5f, 0x6c, 0x6f, 0x63, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 909 0x13, 0x2e, 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x2e, 0x4b, 0x65, 0x79, 0x4c, 0x6f, 0x63, 910 0x61, 0x74, 0x6f, 0x72, 0x52, 0x06, 0x6b, 0x65, 0x79, 0x4c, 0x6f, 0x63, 0x22, 0x3a, 0x0a, 0x05, 911 0x54, 0x78, 0x4f, 0x75, 0x74, 0x12, 0x14, 0x0a, 0x05, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x18, 0x01, 912 0x20, 0x01, 0x28, 0x03, 0x52, 0x05, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x12, 0x1b, 0x0a, 0x09, 0x70, 913 0x6b, 0x5f, 0x73, 0x63, 0x72, 0x69, 0x70, 0x74, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x08, 914 0x70, 0x6b, 0x53, 0x63, 0x72, 0x69, 0x70, 0x74, 0x22, 0x93, 0x02, 0x0a, 0x0e, 0x53, 0x69, 0x67, 915 0x6e, 0x44, 0x65, 0x73, 0x63, 0x72, 0x69, 0x70, 0x74, 0x6f, 0x72, 0x12, 0x31, 0x0a, 0x08, 0x6b, 916 0x65, 0x79, 0x5f, 0x64, 0x65, 0x73, 0x63, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x16, 0x2e, 917 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x2e, 0x4b, 0x65, 0x79, 0x44, 0x65, 0x73, 0x63, 0x72, 918 0x69, 0x70, 0x74, 0x6f, 0x72, 0x52, 0x07, 0x6b, 0x65, 0x79, 0x44, 0x65, 0x73, 0x63, 0x12, 0x21, 919 0x0a, 0x0c, 0x73, 0x69, 0x6e, 0x67, 0x6c, 0x65, 0x5f, 0x74, 0x77, 0x65, 0x61, 0x6b, 0x18, 0x02, 920 0x20, 0x01, 0x28, 0x0c, 0x52, 0x0b, 0x73, 0x69, 0x6e, 0x67, 0x6c, 0x65, 0x54, 0x77, 0x65, 0x61, 921 0x6b, 0x12, 0x21, 0x0a, 0x0c, 0x64, 0x6f, 0x75, 0x62, 0x6c, 0x65, 0x5f, 0x74, 0x77, 0x65, 0x61, 922 0x6b, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x0b, 0x64, 0x6f, 0x75, 0x62, 0x6c, 0x65, 0x54, 923 0x77, 0x65, 0x61, 0x6b, 0x12, 0x25, 0x0a, 0x0e, 0x77, 0x69, 0x74, 0x6e, 0x65, 0x73, 0x73, 0x5f, 924 0x73, 0x63, 0x72, 0x69, 0x70, 0x74, 0x18, 0x04, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x0d, 0x77, 0x69, 925 0x74, 0x6e, 0x65, 0x73, 0x73, 0x53, 0x63, 0x72, 0x69, 0x70, 0x74, 0x12, 0x26, 0x0a, 0x06, 0x6f, 926 0x75, 0x74, 0x70, 0x75, 0x74, 0x18, 0x05, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x0e, 0x2e, 0x73, 0x69, 927 0x67, 0x6e, 0x72, 0x70, 0x63, 0x2e, 0x54, 0x78, 0x4f, 0x75, 0x74, 0x52, 0x06, 0x6f, 0x75, 0x74, 928 0x70, 0x75, 0x74, 0x12, 0x18, 0x0a, 0x07, 0x73, 0x69, 0x67, 0x68, 0x61, 0x73, 0x68, 0x18, 0x07, 929 0x20, 0x01, 0x28, 0x0d, 0x52, 0x07, 0x73, 0x69, 0x67, 0x68, 0x61, 0x73, 0x68, 0x12, 0x1f, 0x0a, 930 0x0b, 0x69, 0x6e, 0x70, 0x75, 0x74, 0x5f, 0x69, 0x6e, 0x64, 0x65, 0x78, 0x18, 0x08, 0x20, 0x01, 931 0x28, 0x05, 0x52, 0x0a, 0x69, 0x6e, 0x70, 0x75, 0x74, 0x49, 0x6e, 0x64, 0x65, 0x78, 0x22, 0x63, 932 0x0a, 0x07, 0x53, 0x69, 0x67, 0x6e, 0x52, 0x65, 0x71, 0x12, 0x20, 0x0a, 0x0c, 0x72, 0x61, 0x77, 933 0x5f, 0x74, 0x78, 0x5f, 0x62, 0x79, 0x74, 0x65, 0x73, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 0x52, 934 0x0a, 0x72, 0x61, 0x77, 0x54, 0x78, 0x42, 0x79, 0x74, 0x65, 0x73, 0x12, 0x36, 0x0a, 0x0a, 0x73, 935 0x69, 0x67, 0x6e, 0x5f, 0x64, 0x65, 0x73, 0x63, 0x73, 0x18, 0x02, 0x20, 0x03, 0x28, 0x0b, 0x32, 936 0x17, 0x2e, 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x2e, 0x53, 0x69, 0x67, 0x6e, 0x44, 0x65, 937 0x73, 0x63, 0x72, 0x69, 0x70, 0x74, 0x6f, 0x72, 0x52, 0x09, 0x73, 0x69, 0x67, 0x6e, 0x44, 0x65, 938 0x73, 0x63, 0x73, 0x22, 0x25, 0x0a, 0x08, 0x53, 0x69, 0x67, 0x6e, 0x52, 0x65, 0x73, 0x70, 0x12, 939 0x19, 0x0a, 0x08, 0x72, 0x61, 0x77, 0x5f, 0x73, 0x69, 0x67, 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 940 0x0c, 0x52, 0x07, 0x72, 0x61, 0x77, 0x53, 0x69, 0x67, 0x73, 0x22, 0x46, 0x0a, 0x0b, 0x49, 0x6e, 941 0x70, 0x75, 0x74, 0x53, 0x63, 0x72, 0x69, 0x70, 0x74, 0x12, 0x18, 0x0a, 0x07, 0x77, 0x69, 0x74, 942 0x6e, 0x65, 0x73, 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x0c, 0x52, 0x07, 0x77, 0x69, 0x74, 0x6e, 943 0x65, 0x73, 0x73, 0x12, 0x1d, 0x0a, 0x0a, 0x73, 0x69, 0x67, 0x5f, 0x73, 0x63, 0x72, 0x69, 0x70, 944 0x74, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x09, 0x73, 0x69, 0x67, 0x53, 0x63, 0x72, 0x69, 945 0x70, 0x74, 0x22, 0x4c, 0x0a, 0x0f, 0x49, 0x6e, 0x70, 0x75, 0x74, 0x53, 0x63, 0x72, 0x69, 0x70, 946 0x74, 0x52, 0x65, 0x73, 0x70, 0x12, 0x39, 0x0a, 0x0d, 0x69, 0x6e, 0x70, 0x75, 0x74, 0x5f, 0x73, 947 0x63, 0x72, 0x69, 0x70, 0x74, 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x14, 0x2e, 0x73, 948 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x2e, 0x49, 0x6e, 0x70, 0x75, 0x74, 0x53, 0x63, 0x72, 0x69, 949 0x70, 0x74, 0x52, 0x0c, 0x69, 0x6e, 0x70, 0x75, 0x74, 0x53, 0x63, 0x72, 0x69, 0x70, 0x74, 0x73, 950 0x22, 0x92, 0x01, 0x0a, 0x0e, 0x53, 0x69, 0x67, 0x6e, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 951 0x52, 0x65, 0x71, 0x12, 0x10, 0x0a, 0x03, 0x6d, 0x73, 0x67, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 952 0x52, 0x03, 0x6d, 0x73, 0x67, 0x12, 0x2c, 0x0a, 0x07, 0x6b, 0x65, 0x79, 0x5f, 0x6c, 0x6f, 0x63, 953 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x13, 0x2e, 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 954 0x2e, 0x4b, 0x65, 0x79, 0x4c, 0x6f, 0x63, 0x61, 0x74, 0x6f, 0x72, 0x52, 0x06, 0x6b, 0x65, 0x79, 955 0x4c, 0x6f, 0x63, 0x12, 0x1f, 0x0a, 0x0b, 0x64, 0x6f, 0x75, 0x62, 0x6c, 0x65, 0x5f, 0x68, 0x61, 956 0x73, 0x68, 0x18, 0x03, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0a, 0x64, 0x6f, 0x75, 0x62, 0x6c, 0x65, 957 0x48, 0x61, 0x73, 0x68, 0x12, 0x1f, 0x0a, 0x0b, 0x63, 0x6f, 0x6d, 0x70, 0x61, 0x63, 0x74, 0x5f, 958 0x73, 0x69, 0x67, 0x18, 0x04, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0a, 0x63, 0x6f, 0x6d, 0x70, 0x61, 959 0x63, 0x74, 0x53, 0x69, 0x67, 0x22, 0x2f, 0x0a, 0x0f, 0x53, 0x69, 0x67, 0x6e, 0x4d, 0x65, 0x73, 960 0x73, 0x61, 0x67, 0x65, 0x52, 0x65, 0x73, 0x70, 0x12, 0x1c, 0x0a, 0x09, 0x73, 0x69, 0x67, 0x6e, 961 0x61, 0x74, 0x75, 0x72, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x09, 0x73, 0x69, 0x67, 962 0x6e, 0x61, 0x74, 0x75, 0x72, 0x65, 0x22, 0x5a, 0x0a, 0x10, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 963 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x52, 0x65, 0x71, 0x12, 0x10, 0x0a, 0x03, 0x6d, 0x73, 964 0x67, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x03, 0x6d, 0x73, 0x67, 0x12, 0x1c, 0x0a, 0x09, 965 0x73, 0x69, 0x67, 0x6e, 0x61, 0x74, 0x75, 0x72, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0c, 0x52, 966 0x09, 0x73, 0x69, 0x67, 0x6e, 0x61, 0x74, 0x75, 0x72, 0x65, 0x12, 0x16, 0x0a, 0x06, 0x70, 0x75, 967 0x62, 0x6b, 0x65, 0x79, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x06, 0x70, 0x75, 0x62, 0x6b, 968 0x65, 0x79, 0x22, 0x29, 0x0a, 0x11, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x4d, 0x65, 0x73, 0x73, 969 0x61, 0x67, 0x65, 0x52, 0x65, 0x73, 0x70, 0x12, 0x14, 0x0a, 0x05, 0x76, 0x61, 0x6c, 0x69, 0x64, 970 0x18, 0x01, 0x20, 0x01, 0x28, 0x08, 0x52, 0x05, 0x76, 0x61, 0x6c, 0x69, 0x64, 0x22, 0xa2, 0x01, 971 0x0a, 0x10, 0x53, 0x68, 0x61, 0x72, 0x65, 0x64, 0x4b, 0x65, 0x79, 0x52, 0x65, 0x71, 0x75, 0x65, 972 0x73, 0x74, 0x12, 0x29, 0x0a, 0x10, 0x65, 0x70, 0x68, 0x65, 0x6d, 0x65, 0x72, 0x61, 0x6c, 0x5f, 973 0x70, 0x75, 0x62, 0x6b, 0x65, 0x79, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x0f, 0x65, 0x70, 974 0x68, 0x65, 0x6d, 0x65, 0x72, 0x61, 0x6c, 0x50, 0x75, 0x62, 0x6b, 0x65, 0x79, 0x12, 0x30, 0x0a, 975 0x07, 0x6b, 0x65, 0x79, 0x5f, 0x6c, 0x6f, 0x63, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x13, 976 0x2e, 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x2e, 0x4b, 0x65, 0x79, 0x4c, 0x6f, 0x63, 0x61, 977 0x74, 0x6f, 0x72, 0x42, 0x02, 0x18, 0x01, 0x52, 0x06, 0x6b, 0x65, 0x79, 0x4c, 0x6f, 0x63, 0x12, 978 0x31, 0x0a, 0x08, 0x6b, 0x65, 0x79, 0x5f, 0x64, 0x65, 0x73, 0x63, 0x18, 0x03, 0x20, 0x01, 0x28, 979 0x0b, 0x32, 0x16, 0x2e, 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x2e, 0x4b, 0x65, 0x79, 0x44, 980 0x65, 0x73, 0x63, 0x72, 0x69, 0x70, 0x74, 0x6f, 0x72, 0x52, 0x07, 0x6b, 0x65, 0x79, 0x44, 0x65, 981 0x73, 0x63, 0x22, 0x32, 0x0a, 0x11, 0x53, 0x68, 0x61, 0x72, 0x65, 0x64, 0x4b, 0x65, 0x79, 0x52, 982 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x1d, 0x0a, 0x0a, 0x73, 0x68, 0x61, 0x72, 0x65, 983 0x64, 0x5f, 0x6b, 0x65, 0x79, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x09, 0x73, 0x68, 0x61, 984 0x72, 0x65, 0x64, 0x4b, 0x65, 0x79, 0x32, 0xd4, 0x02, 0x0a, 0x06, 0x53, 0x69, 0x67, 0x6e, 0x65, 985 0x72, 0x12, 0x34, 0x0a, 0x0d, 0x53, 0x69, 0x67, 0x6e, 0x4f, 0x75, 0x74, 0x70, 0x75, 0x74, 0x52, 986 0x61, 0x77, 0x12, 0x10, 0x2e, 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x2e, 0x53, 0x69, 0x67, 987 0x6e, 0x52, 0x65, 0x71, 0x1a, 0x11, 0x2e, 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x2e, 0x53, 988 0x69, 0x67, 0x6e, 0x52, 0x65, 0x73, 0x70, 0x12, 0x40, 0x0a, 0x12, 0x43, 0x6f, 0x6d, 0x70, 0x75, 989 0x74, 0x65, 0x49, 0x6e, 0x70, 0x75, 0x74, 0x53, 0x63, 0x72, 0x69, 0x70, 0x74, 0x12, 0x10, 0x2e, 990 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x2e, 0x53, 0x69, 0x67, 0x6e, 0x52, 0x65, 0x71, 0x1a, 991 0x18, 0x2e, 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x2e, 0x49, 0x6e, 0x70, 0x75, 0x74, 0x53, 992 0x63, 0x72, 0x69, 0x70, 0x74, 0x52, 0x65, 0x73, 0x70, 0x12, 0x40, 0x0a, 0x0b, 0x53, 0x69, 0x67, 993 0x6e, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x12, 0x17, 0x2e, 0x73, 0x69, 0x67, 0x6e, 0x72, 994 0x70, 0x63, 0x2e, 0x53, 0x69, 0x67, 0x6e, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x52, 0x65, 995 0x71, 0x1a, 0x18, 0x2e, 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x2e, 0x53, 0x69, 0x67, 0x6e, 996 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x52, 0x65, 0x73, 0x70, 0x12, 0x46, 0x0a, 0x0d, 0x56, 997 0x65, 0x72, 0x69, 0x66, 0x79, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x12, 0x19, 0x2e, 0x73, 998 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x4d, 0x65, 0x73, 999 0x73, 0x61, 0x67, 0x65, 0x52, 0x65, 0x71, 0x1a, 0x1a, 0x2e, 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 1000 0x63, 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x52, 1001 0x65, 0x73, 0x70, 0x12, 0x48, 0x0a, 0x0f, 0x44, 0x65, 0x72, 0x69, 0x76, 0x65, 0x53, 0x68, 0x61, 1002 0x72, 0x65, 0x64, 0x4b, 0x65, 0x79, 0x12, 0x19, 0x2e, 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 1003 0x2e, 0x53, 0x68, 0x61, 0x72, 0x65, 0x64, 0x4b, 0x65, 0x79, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 1004 0x74, 0x1a, 0x1a, 0x2e, 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x2e, 0x53, 0x68, 0x61, 0x72, 1005 0x65, 0x64, 0x4b, 0x65, 0x79, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x42, 0x28, 0x5a, 1006 0x26, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x64, 0x65, 0x63, 0x72, 1007 0x65, 0x64, 0x2f, 0x64, 0x63, 0x72, 0x6c, 0x6e, 0x64, 0x2f, 0x6c, 0x6e, 0x72, 0x70, 0x63, 0x2f, 1008 0x73, 0x69, 0x67, 0x6e, 0x72, 0x70, 0x63, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33, 1009 } 1010 1011 var ( 1012 file_signrpc_signer_proto_rawDescOnce sync.Once 1013 file_signrpc_signer_proto_rawDescData = file_signrpc_signer_proto_rawDesc 1014 ) 1015 1016 func file_signrpc_signer_proto_rawDescGZIP() []byte { 1017 file_signrpc_signer_proto_rawDescOnce.Do(func() { 1018 file_signrpc_signer_proto_rawDescData = protoimpl.X.CompressGZIP(file_signrpc_signer_proto_rawDescData) 1019 }) 1020 return file_signrpc_signer_proto_rawDescData 1021 } 1022 1023 var file_signrpc_signer_proto_msgTypes = make([]protoimpl.MessageInfo, 14) 1024 var file_signrpc_signer_proto_goTypes = []interface{}{ 1025 (*KeyLocator)(nil), // 0: signrpc.KeyLocator 1026 (*KeyDescriptor)(nil), // 1: signrpc.KeyDescriptor 1027 (*TxOut)(nil), // 2: signrpc.TxOut 1028 (*SignDescriptor)(nil), // 3: signrpc.SignDescriptor 1029 (*SignReq)(nil), // 4: signrpc.SignReq 1030 (*SignResp)(nil), // 5: signrpc.SignResp 1031 (*InputScript)(nil), // 6: signrpc.InputScript 1032 (*InputScriptResp)(nil), // 7: signrpc.InputScriptResp 1033 (*SignMessageReq)(nil), // 8: signrpc.SignMessageReq 1034 (*SignMessageResp)(nil), // 9: signrpc.SignMessageResp 1035 (*VerifyMessageReq)(nil), // 10: signrpc.VerifyMessageReq 1036 (*VerifyMessageResp)(nil), // 11: signrpc.VerifyMessageResp 1037 (*SharedKeyRequest)(nil), // 12: signrpc.SharedKeyRequest 1038 (*SharedKeyResponse)(nil), // 13: signrpc.SharedKeyResponse 1039 } 1040 var file_signrpc_signer_proto_depIdxs = []int32{ 1041 0, // 0: signrpc.KeyDescriptor.key_loc:type_name -> signrpc.KeyLocator 1042 1, // 1: signrpc.SignDescriptor.key_desc:type_name -> signrpc.KeyDescriptor 1043 2, // 2: signrpc.SignDescriptor.output:type_name -> signrpc.TxOut 1044 3, // 3: signrpc.SignReq.sign_descs:type_name -> signrpc.SignDescriptor 1045 6, // 4: signrpc.InputScriptResp.input_scripts:type_name -> signrpc.InputScript 1046 0, // 5: signrpc.SignMessageReq.key_loc:type_name -> signrpc.KeyLocator 1047 0, // 6: signrpc.SharedKeyRequest.key_loc:type_name -> signrpc.KeyLocator 1048 1, // 7: signrpc.SharedKeyRequest.key_desc:type_name -> signrpc.KeyDescriptor 1049 4, // 8: signrpc.Signer.SignOutputRaw:input_type -> signrpc.SignReq 1050 4, // 9: signrpc.Signer.ComputeInputScript:input_type -> signrpc.SignReq 1051 8, // 10: signrpc.Signer.SignMessage:input_type -> signrpc.SignMessageReq 1052 10, // 11: signrpc.Signer.VerifyMessage:input_type -> signrpc.VerifyMessageReq 1053 12, // 12: signrpc.Signer.DeriveSharedKey:input_type -> signrpc.SharedKeyRequest 1054 5, // 13: signrpc.Signer.SignOutputRaw:output_type -> signrpc.SignResp 1055 7, // 14: signrpc.Signer.ComputeInputScript:output_type -> signrpc.InputScriptResp 1056 9, // 15: signrpc.Signer.SignMessage:output_type -> signrpc.SignMessageResp 1057 11, // 16: signrpc.Signer.VerifyMessage:output_type -> signrpc.VerifyMessageResp 1058 13, // 17: signrpc.Signer.DeriveSharedKey:output_type -> signrpc.SharedKeyResponse 1059 13, // [13:18] is the sub-list for method output_type 1060 8, // [8:13] is the sub-list for method input_type 1061 8, // [8:8] is the sub-list for extension type_name 1062 8, // [8:8] is the sub-list for extension extendee 1063 0, // [0:8] is the sub-list for field type_name 1064 } 1065 1066 func init() { file_signrpc_signer_proto_init() } 1067 func file_signrpc_signer_proto_init() { 1068 if File_signrpc_signer_proto != nil { 1069 return 1070 } 1071 if !protoimpl.UnsafeEnabled { 1072 file_signrpc_signer_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { 1073 switch v := v.(*KeyLocator); i { 1074 case 0: 1075 return &v.state 1076 case 1: 1077 return &v.sizeCache 1078 case 2: 1079 return &v.unknownFields 1080 default: 1081 return nil 1082 } 1083 } 1084 file_signrpc_signer_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { 1085 switch v := v.(*KeyDescriptor); i { 1086 case 0: 1087 return &v.state 1088 case 1: 1089 return &v.sizeCache 1090 case 2: 1091 return &v.unknownFields 1092 default: 1093 return nil 1094 } 1095 } 1096 file_signrpc_signer_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { 1097 switch v := v.(*TxOut); i { 1098 case 0: 1099 return &v.state 1100 case 1: 1101 return &v.sizeCache 1102 case 2: 1103 return &v.unknownFields 1104 default: 1105 return nil 1106 } 1107 } 1108 file_signrpc_signer_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { 1109 switch v := v.(*SignDescriptor); i { 1110 case 0: 1111 return &v.state 1112 case 1: 1113 return &v.sizeCache 1114 case 2: 1115 return &v.unknownFields 1116 default: 1117 return nil 1118 } 1119 } 1120 file_signrpc_signer_proto_msgTypes[4].Exporter = func(v interface{}, i int) interface{} { 1121 switch v := v.(*SignReq); i { 1122 case 0: 1123 return &v.state 1124 case 1: 1125 return &v.sizeCache 1126 case 2: 1127 return &v.unknownFields 1128 default: 1129 return nil 1130 } 1131 } 1132 file_signrpc_signer_proto_msgTypes[5].Exporter = func(v interface{}, i int) interface{} { 1133 switch v := v.(*SignResp); i { 1134 case 0: 1135 return &v.state 1136 case 1: 1137 return &v.sizeCache 1138 case 2: 1139 return &v.unknownFields 1140 default: 1141 return nil 1142 } 1143 } 1144 file_signrpc_signer_proto_msgTypes[6].Exporter = func(v interface{}, i int) interface{} { 1145 switch v := v.(*InputScript); i { 1146 case 0: 1147 return &v.state 1148 case 1: 1149 return &v.sizeCache 1150 case 2: 1151 return &v.unknownFields 1152 default: 1153 return nil 1154 } 1155 } 1156 file_signrpc_signer_proto_msgTypes[7].Exporter = func(v interface{}, i int) interface{} { 1157 switch v := v.(*InputScriptResp); i { 1158 case 0: 1159 return &v.state 1160 case 1: 1161 return &v.sizeCache 1162 case 2: 1163 return &v.unknownFields 1164 default: 1165 return nil 1166 } 1167 } 1168 file_signrpc_signer_proto_msgTypes[8].Exporter = func(v interface{}, i int) interface{} { 1169 switch v := v.(*SignMessageReq); i { 1170 case 0: 1171 return &v.state 1172 case 1: 1173 return &v.sizeCache 1174 case 2: 1175 return &v.unknownFields 1176 default: 1177 return nil 1178 } 1179 } 1180 file_signrpc_signer_proto_msgTypes[9].Exporter = func(v interface{}, i int) interface{} { 1181 switch v := v.(*SignMessageResp); i { 1182 case 0: 1183 return &v.state 1184 case 1: 1185 return &v.sizeCache 1186 case 2: 1187 return &v.unknownFields 1188 default: 1189 return nil 1190 } 1191 } 1192 file_signrpc_signer_proto_msgTypes[10].Exporter = func(v interface{}, i int) interface{} { 1193 switch v := v.(*VerifyMessageReq); i { 1194 case 0: 1195 return &v.state 1196 case 1: 1197 return &v.sizeCache 1198 case 2: 1199 return &v.unknownFields 1200 default: 1201 return nil 1202 } 1203 } 1204 file_signrpc_signer_proto_msgTypes[11].Exporter = func(v interface{}, i int) interface{} { 1205 switch v := v.(*VerifyMessageResp); i { 1206 case 0: 1207 return &v.state 1208 case 1: 1209 return &v.sizeCache 1210 case 2: 1211 return &v.unknownFields 1212 default: 1213 return nil 1214 } 1215 } 1216 file_signrpc_signer_proto_msgTypes[12].Exporter = func(v interface{}, i int) interface{} { 1217 switch v := v.(*SharedKeyRequest); i { 1218 case 0: 1219 return &v.state 1220 case 1: 1221 return &v.sizeCache 1222 case 2: 1223 return &v.unknownFields 1224 default: 1225 return nil 1226 } 1227 } 1228 file_signrpc_signer_proto_msgTypes[13].Exporter = func(v interface{}, i int) interface{} { 1229 switch v := v.(*SharedKeyResponse); i { 1230 case 0: 1231 return &v.state 1232 case 1: 1233 return &v.sizeCache 1234 case 2: 1235 return &v.unknownFields 1236 default: 1237 return nil 1238 } 1239 } 1240 } 1241 type x struct{} 1242 out := protoimpl.TypeBuilder{ 1243 File: protoimpl.DescBuilder{ 1244 GoPackagePath: reflect.TypeOf(x{}).PkgPath(), 1245 RawDescriptor: file_signrpc_signer_proto_rawDesc, 1246 NumEnums: 0, 1247 NumMessages: 14, 1248 NumExtensions: 0, 1249 NumServices: 1, 1250 }, 1251 GoTypes: file_signrpc_signer_proto_goTypes, 1252 DependencyIndexes: file_signrpc_signer_proto_depIdxs, 1253 MessageInfos: file_signrpc_signer_proto_msgTypes, 1254 }.Build() 1255 File_signrpc_signer_proto = out.File 1256 file_signrpc_signer_proto_rawDesc = nil 1257 file_signrpc_signer_proto_goTypes = nil 1258 file_signrpc_signer_proto_depIdxs = nil 1259 } 1260 1261 // Reference imports to suppress errors if they are not otherwise used. 1262 var _ context.Context 1263 var _ grpc.ClientConnInterface 1264 1265 // This is a compile-time assertion to ensure that this generated file 1266 // is compatible with the grpc package it is being compiled against. 1267 const _ = grpc.SupportPackageIsVersion6 1268 1269 // SignerClient is the client API for Signer service. 1270 // 1271 // For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. 1272 type SignerClient interface { 1273 // SignOutputRaw is a method that can be used to generated a signature for a 1274 // set of inputs/outputs to a transaction. Each request specifies details 1275 // concerning how the outputs should be signed, which keys they should be 1276 // signed with, and also any optional tweaks. The return value is a fixed 1277 // 64-byte signature (the same format as we use on the wire in Lightning). 1278 // 1279 // If we are unable to sign using the specified keys, then an error will be 1280 // returned. 1281 SignOutputRaw(ctx context.Context, in *SignReq, opts ...grpc.CallOption) (*SignResp, error) 1282 // ComputeInputScript generates a complete InputIndex for the passed 1283 // transaction with the signature as defined within the passed SignDescriptor. 1284 // This method should be capable of generating the proper input script for 1285 // both regular p2wkh output and p2wkh outputs nested within a regular p2sh 1286 // output. 1287 // 1288 // Note that when using this method to sign inputs belonging to the wallet, 1289 // the only items of the SignDescriptor that need to be populated are pkScript 1290 // in the TxOut field, the value in that same field, and finally the input 1291 // index. 1292 ComputeInputScript(ctx context.Context, in *SignReq, opts ...grpc.CallOption) (*InputScriptResp, error) 1293 // SignMessage signs a message with the key specified in the key locator. The 1294 // returned signature is fixed-size LN wire format encoded. 1295 // 1296 // The main difference to SignMessage in the main RPC is that a specific key is 1297 // used to sign the message instead of the node identity private key. 1298 SignMessage(ctx context.Context, in *SignMessageReq, opts ...grpc.CallOption) (*SignMessageResp, error) 1299 // VerifyMessage verifies a signature over a message using the public key 1300 // provided. The signature must be fixed-size LN wire format encoded. 1301 // 1302 // The main difference to VerifyMessage in the main RPC is that the public key 1303 // used to sign the message does not have to be a node known to the network. 1304 VerifyMessage(ctx context.Context, in *VerifyMessageReq, opts ...grpc.CallOption) (*VerifyMessageResp, error) 1305 // DeriveSharedKey returns a shared secret key by performing Diffie-Hellman key 1306 // derivation between the ephemeral public key in the request and the node's 1307 // key specified in the key_desc parameter. Either a key locator or a raw 1308 // public key is expected in the key_desc, if neither is supplied, defaults to 1309 // the node's identity private key: 1310 // P_shared = privKeyNode * ephemeralPubkey 1311 // The resulting shared public key is serialized in the compressed format and 1312 // hashed with sha256, resulting in the final key length of 256bit. 1313 DeriveSharedKey(ctx context.Context, in *SharedKeyRequest, opts ...grpc.CallOption) (*SharedKeyResponse, error) 1314 } 1315 1316 type signerClient struct { 1317 cc grpc.ClientConnInterface 1318 } 1319 1320 func NewSignerClient(cc grpc.ClientConnInterface) SignerClient { 1321 return &signerClient{cc} 1322 } 1323 1324 func (c *signerClient) SignOutputRaw(ctx context.Context, in *SignReq, opts ...grpc.CallOption) (*SignResp, error) { 1325 out := new(SignResp) 1326 err := c.cc.Invoke(ctx, "/signrpc.Signer/SignOutputRaw", in, out, opts...) 1327 if err != nil { 1328 return nil, err 1329 } 1330 return out, nil 1331 } 1332 1333 func (c *signerClient) ComputeInputScript(ctx context.Context, in *SignReq, opts ...grpc.CallOption) (*InputScriptResp, error) { 1334 out := new(InputScriptResp) 1335 err := c.cc.Invoke(ctx, "/signrpc.Signer/ComputeInputScript", in, out, opts...) 1336 if err != nil { 1337 return nil, err 1338 } 1339 return out, nil 1340 } 1341 1342 func (c *signerClient) SignMessage(ctx context.Context, in *SignMessageReq, opts ...grpc.CallOption) (*SignMessageResp, error) { 1343 out := new(SignMessageResp) 1344 err := c.cc.Invoke(ctx, "/signrpc.Signer/SignMessage", in, out, opts...) 1345 if err != nil { 1346 return nil, err 1347 } 1348 return out, nil 1349 } 1350 1351 func (c *signerClient) VerifyMessage(ctx context.Context, in *VerifyMessageReq, opts ...grpc.CallOption) (*VerifyMessageResp, error) { 1352 out := new(VerifyMessageResp) 1353 err := c.cc.Invoke(ctx, "/signrpc.Signer/VerifyMessage", in, out, opts...) 1354 if err != nil { 1355 return nil, err 1356 } 1357 return out, nil 1358 } 1359 1360 func (c *signerClient) DeriveSharedKey(ctx context.Context, in *SharedKeyRequest, opts ...grpc.CallOption) (*SharedKeyResponse, error) { 1361 out := new(SharedKeyResponse) 1362 err := c.cc.Invoke(ctx, "/signrpc.Signer/DeriveSharedKey", in, out, opts...) 1363 if err != nil { 1364 return nil, err 1365 } 1366 return out, nil 1367 } 1368 1369 // SignerServer is the server API for Signer service. 1370 type SignerServer interface { 1371 // SignOutputRaw is a method that can be used to generated a signature for a 1372 // set of inputs/outputs to a transaction. Each request specifies details 1373 // concerning how the outputs should be signed, which keys they should be 1374 // signed with, and also any optional tweaks. The return value is a fixed 1375 // 64-byte signature (the same format as we use on the wire in Lightning). 1376 // 1377 // If we are unable to sign using the specified keys, then an error will be 1378 // returned. 1379 SignOutputRaw(context.Context, *SignReq) (*SignResp, error) 1380 // ComputeInputScript generates a complete InputIndex for the passed 1381 // transaction with the signature as defined within the passed SignDescriptor. 1382 // This method should be capable of generating the proper input script for 1383 // both regular p2wkh output and p2wkh outputs nested within a regular p2sh 1384 // output. 1385 // 1386 // Note that when using this method to sign inputs belonging to the wallet, 1387 // the only items of the SignDescriptor that need to be populated are pkScript 1388 // in the TxOut field, the value in that same field, and finally the input 1389 // index. 1390 ComputeInputScript(context.Context, *SignReq) (*InputScriptResp, error) 1391 // SignMessage signs a message with the key specified in the key locator. The 1392 // returned signature is fixed-size LN wire format encoded. 1393 // 1394 // The main difference to SignMessage in the main RPC is that a specific key is 1395 // used to sign the message instead of the node identity private key. 1396 SignMessage(context.Context, *SignMessageReq) (*SignMessageResp, error) 1397 // VerifyMessage verifies a signature over a message using the public key 1398 // provided. The signature must be fixed-size LN wire format encoded. 1399 // 1400 // The main difference to VerifyMessage in the main RPC is that the public key 1401 // used to sign the message does not have to be a node known to the network. 1402 VerifyMessage(context.Context, *VerifyMessageReq) (*VerifyMessageResp, error) 1403 // DeriveSharedKey returns a shared secret key by performing Diffie-Hellman key 1404 // derivation between the ephemeral public key in the request and the node's 1405 // key specified in the key_desc parameter. Either a key locator or a raw 1406 // public key is expected in the key_desc, if neither is supplied, defaults to 1407 // the node's identity private key: 1408 // P_shared = privKeyNode * ephemeralPubkey 1409 // The resulting shared public key is serialized in the compressed format and 1410 // hashed with sha256, resulting in the final key length of 256bit. 1411 DeriveSharedKey(context.Context, *SharedKeyRequest) (*SharedKeyResponse, error) 1412 } 1413 1414 // UnimplementedSignerServer can be embedded to have forward compatible implementations. 1415 type UnimplementedSignerServer struct { 1416 } 1417 1418 func (*UnimplementedSignerServer) SignOutputRaw(context.Context, *SignReq) (*SignResp, error) { 1419 return nil, status.Errorf(codes.Unimplemented, "method SignOutputRaw not implemented") 1420 } 1421 func (*UnimplementedSignerServer) ComputeInputScript(context.Context, *SignReq) (*InputScriptResp, error) { 1422 return nil, status.Errorf(codes.Unimplemented, "method ComputeInputScript not implemented") 1423 } 1424 func (*UnimplementedSignerServer) SignMessage(context.Context, *SignMessageReq) (*SignMessageResp, error) { 1425 return nil, status.Errorf(codes.Unimplemented, "method SignMessage not implemented") 1426 } 1427 func (*UnimplementedSignerServer) VerifyMessage(context.Context, *VerifyMessageReq) (*VerifyMessageResp, error) { 1428 return nil, status.Errorf(codes.Unimplemented, "method VerifyMessage not implemented") 1429 } 1430 func (*UnimplementedSignerServer) DeriveSharedKey(context.Context, *SharedKeyRequest) (*SharedKeyResponse, error) { 1431 return nil, status.Errorf(codes.Unimplemented, "method DeriveSharedKey not implemented") 1432 } 1433 1434 func RegisterSignerServer(s *grpc.Server, srv SignerServer) { 1435 s.RegisterService(&_Signer_serviceDesc, srv) 1436 } 1437 1438 func _Signer_SignOutputRaw_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1439 in := new(SignReq) 1440 if err := dec(in); err != nil { 1441 return nil, err 1442 } 1443 if interceptor == nil { 1444 return srv.(SignerServer).SignOutputRaw(ctx, in) 1445 } 1446 info := &grpc.UnaryServerInfo{ 1447 Server: srv, 1448 FullMethod: "/signrpc.Signer/SignOutputRaw", 1449 } 1450 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1451 return srv.(SignerServer).SignOutputRaw(ctx, req.(*SignReq)) 1452 } 1453 return interceptor(ctx, in, info, handler) 1454 } 1455 1456 func _Signer_ComputeInputScript_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1457 in := new(SignReq) 1458 if err := dec(in); err != nil { 1459 return nil, err 1460 } 1461 if interceptor == nil { 1462 return srv.(SignerServer).ComputeInputScript(ctx, in) 1463 } 1464 info := &grpc.UnaryServerInfo{ 1465 Server: srv, 1466 FullMethod: "/signrpc.Signer/ComputeInputScript", 1467 } 1468 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1469 return srv.(SignerServer).ComputeInputScript(ctx, req.(*SignReq)) 1470 } 1471 return interceptor(ctx, in, info, handler) 1472 } 1473 1474 func _Signer_SignMessage_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1475 in := new(SignMessageReq) 1476 if err := dec(in); err != nil { 1477 return nil, err 1478 } 1479 if interceptor == nil { 1480 return srv.(SignerServer).SignMessage(ctx, in) 1481 } 1482 info := &grpc.UnaryServerInfo{ 1483 Server: srv, 1484 FullMethod: "/signrpc.Signer/SignMessage", 1485 } 1486 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1487 return srv.(SignerServer).SignMessage(ctx, req.(*SignMessageReq)) 1488 } 1489 return interceptor(ctx, in, info, handler) 1490 } 1491 1492 func _Signer_VerifyMessage_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1493 in := new(VerifyMessageReq) 1494 if err := dec(in); err != nil { 1495 return nil, err 1496 } 1497 if interceptor == nil { 1498 return srv.(SignerServer).VerifyMessage(ctx, in) 1499 } 1500 info := &grpc.UnaryServerInfo{ 1501 Server: srv, 1502 FullMethod: "/signrpc.Signer/VerifyMessage", 1503 } 1504 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1505 return srv.(SignerServer).VerifyMessage(ctx, req.(*VerifyMessageReq)) 1506 } 1507 return interceptor(ctx, in, info, handler) 1508 } 1509 1510 func _Signer_DeriveSharedKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1511 in := new(SharedKeyRequest) 1512 if err := dec(in); err != nil { 1513 return nil, err 1514 } 1515 if interceptor == nil { 1516 return srv.(SignerServer).DeriveSharedKey(ctx, in) 1517 } 1518 info := &grpc.UnaryServerInfo{ 1519 Server: srv, 1520 FullMethod: "/signrpc.Signer/DeriveSharedKey", 1521 } 1522 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1523 return srv.(SignerServer).DeriveSharedKey(ctx, req.(*SharedKeyRequest)) 1524 } 1525 return interceptor(ctx, in, info, handler) 1526 } 1527 1528 var _Signer_serviceDesc = grpc.ServiceDesc{ 1529 ServiceName: "signrpc.Signer", 1530 HandlerType: (*SignerServer)(nil), 1531 Methods: []grpc.MethodDesc{ 1532 { 1533 MethodName: "SignOutputRaw", 1534 Handler: _Signer_SignOutputRaw_Handler, 1535 }, 1536 { 1537 MethodName: "ComputeInputScript", 1538 Handler: _Signer_ComputeInputScript_Handler, 1539 }, 1540 { 1541 MethodName: "SignMessage", 1542 Handler: _Signer_SignMessage_Handler, 1543 }, 1544 { 1545 MethodName: "VerifyMessage", 1546 Handler: _Signer_VerifyMessage_Handler, 1547 }, 1548 { 1549 MethodName: "DeriveSharedKey", 1550 Handler: _Signer_DeriveSharedKey_Handler, 1551 }, 1552 }, 1553 Streams: []grpc.StreamDesc{}, 1554 Metadata: "signrpc/signer.proto", 1555 }