github.com/decred/dcrlnd@v0.7.6/lnrpc/signrpc/signer.pb.gw.go (about) 1 // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. 2 // source: signrpc/signer.proto 3 4 /* 5 Package signrpc is a reverse proxy. 6 7 It translates gRPC into RESTful JSON APIs. 8 */ 9 package signrpc 10 11 import ( 12 "context" 13 "io" 14 "net/http" 15 16 "github.com/grpc-ecosystem/grpc-gateway/v2/runtime" 17 "github.com/grpc-ecosystem/grpc-gateway/v2/utilities" 18 "google.golang.org/grpc" 19 "google.golang.org/grpc/codes" 20 "google.golang.org/grpc/grpclog" 21 "google.golang.org/grpc/metadata" 22 "google.golang.org/grpc/status" 23 "google.golang.org/protobuf/proto" 24 ) 25 26 // Suppress "imported and not used" errors 27 var _ codes.Code 28 var _ io.Reader 29 var _ status.Status 30 var _ = runtime.String 31 var _ = utilities.NewDoubleArray 32 var _ = metadata.Join 33 34 func request_Signer_SignOutputRaw_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 35 var protoReq SignReq 36 var metadata runtime.ServerMetadata 37 38 newReader, berr := utilities.IOReaderFactory(req.Body) 39 if berr != nil { 40 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 41 } 42 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 43 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 44 } 45 46 msg, err := client.SignOutputRaw(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 47 return msg, metadata, err 48 49 } 50 51 func local_request_Signer_SignOutputRaw_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 52 var protoReq SignReq 53 var metadata runtime.ServerMetadata 54 55 newReader, berr := utilities.IOReaderFactory(req.Body) 56 if berr != nil { 57 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 58 } 59 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 60 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 61 } 62 63 msg, err := server.SignOutputRaw(ctx, &protoReq) 64 return msg, metadata, err 65 66 } 67 68 func request_Signer_ComputeInputScript_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 69 var protoReq SignReq 70 var metadata runtime.ServerMetadata 71 72 newReader, berr := utilities.IOReaderFactory(req.Body) 73 if berr != nil { 74 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 75 } 76 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 77 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 78 } 79 80 msg, err := client.ComputeInputScript(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 81 return msg, metadata, err 82 83 } 84 85 func local_request_Signer_ComputeInputScript_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 86 var protoReq SignReq 87 var metadata runtime.ServerMetadata 88 89 newReader, berr := utilities.IOReaderFactory(req.Body) 90 if berr != nil { 91 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 92 } 93 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 94 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 95 } 96 97 msg, err := server.ComputeInputScript(ctx, &protoReq) 98 return msg, metadata, err 99 100 } 101 102 func request_Signer_SignMessage_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 103 var protoReq SignMessageReq 104 var metadata runtime.ServerMetadata 105 106 newReader, berr := utilities.IOReaderFactory(req.Body) 107 if berr != nil { 108 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 109 } 110 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 111 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 112 } 113 114 msg, err := client.SignMessage(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 115 return msg, metadata, err 116 117 } 118 119 func local_request_Signer_SignMessage_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 120 var protoReq SignMessageReq 121 var metadata runtime.ServerMetadata 122 123 newReader, berr := utilities.IOReaderFactory(req.Body) 124 if berr != nil { 125 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 126 } 127 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 128 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 129 } 130 131 msg, err := server.SignMessage(ctx, &protoReq) 132 return msg, metadata, err 133 134 } 135 136 func request_Signer_VerifyMessage_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 137 var protoReq VerifyMessageReq 138 var metadata runtime.ServerMetadata 139 140 newReader, berr := utilities.IOReaderFactory(req.Body) 141 if berr != nil { 142 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 143 } 144 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 145 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 146 } 147 148 msg, err := client.VerifyMessage(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 149 return msg, metadata, err 150 151 } 152 153 func local_request_Signer_VerifyMessage_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 154 var protoReq VerifyMessageReq 155 var metadata runtime.ServerMetadata 156 157 newReader, berr := utilities.IOReaderFactory(req.Body) 158 if berr != nil { 159 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 160 } 161 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 162 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 163 } 164 165 msg, err := server.VerifyMessage(ctx, &protoReq) 166 return msg, metadata, err 167 168 } 169 170 func request_Signer_DeriveSharedKey_0(ctx context.Context, marshaler runtime.Marshaler, client SignerClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 171 var protoReq SharedKeyRequest 172 var metadata runtime.ServerMetadata 173 174 newReader, berr := utilities.IOReaderFactory(req.Body) 175 if berr != nil { 176 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 177 } 178 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 179 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 180 } 181 182 msg, err := client.DeriveSharedKey(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) 183 return msg, metadata, err 184 185 } 186 187 func local_request_Signer_DeriveSharedKey_0(ctx context.Context, marshaler runtime.Marshaler, server SignerServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { 188 var protoReq SharedKeyRequest 189 var metadata runtime.ServerMetadata 190 191 newReader, berr := utilities.IOReaderFactory(req.Body) 192 if berr != nil { 193 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) 194 } 195 if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { 196 return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) 197 } 198 199 msg, err := server.DeriveSharedKey(ctx, &protoReq) 200 return msg, metadata, err 201 202 } 203 204 // RegisterSignerHandlerServer registers the http handlers for service Signer to "mux". 205 // UnaryRPC :call SignerServer directly. 206 // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906. 207 // Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterSignerHandlerFromEndpoint instead. 208 func RegisterSignerHandlerServer(ctx context.Context, mux *runtime.ServeMux, server SignerServer) error { 209 210 mux.Handle("POST", pattern_Signer_SignOutputRaw_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 211 ctx, cancel := context.WithCancel(req.Context()) 212 defer cancel() 213 var stream runtime.ServerTransportStream 214 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 215 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 216 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/SignOutputRaw", runtime.WithHTTPPathPattern("/v2/signer/signraw")) 217 if err != nil { 218 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 219 return 220 } 221 resp, md, err := local_request_Signer_SignOutputRaw_0(rctx, inboundMarshaler, server, req, pathParams) 222 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 223 ctx = runtime.NewServerMetadataContext(ctx, md) 224 if err != nil { 225 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 226 return 227 } 228 229 forward_Signer_SignOutputRaw_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 230 231 }) 232 233 mux.Handle("POST", pattern_Signer_ComputeInputScript_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 234 ctx, cancel := context.WithCancel(req.Context()) 235 defer cancel() 236 var stream runtime.ServerTransportStream 237 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 238 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 239 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/ComputeInputScript", runtime.WithHTTPPathPattern("/v2/signer/inputscript")) 240 if err != nil { 241 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 242 return 243 } 244 resp, md, err := local_request_Signer_ComputeInputScript_0(rctx, inboundMarshaler, server, req, pathParams) 245 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 246 ctx = runtime.NewServerMetadataContext(ctx, md) 247 if err != nil { 248 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 249 return 250 } 251 252 forward_Signer_ComputeInputScript_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 253 254 }) 255 256 mux.Handle("POST", pattern_Signer_SignMessage_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 257 ctx, cancel := context.WithCancel(req.Context()) 258 defer cancel() 259 var stream runtime.ServerTransportStream 260 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 261 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 262 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/SignMessage", runtime.WithHTTPPathPattern("/v2/signer/signmessage")) 263 if err != nil { 264 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 265 return 266 } 267 resp, md, err := local_request_Signer_SignMessage_0(rctx, inboundMarshaler, server, req, pathParams) 268 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 269 ctx = runtime.NewServerMetadataContext(ctx, md) 270 if err != nil { 271 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 272 return 273 } 274 275 forward_Signer_SignMessage_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 276 277 }) 278 279 mux.Handle("POST", pattern_Signer_VerifyMessage_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 280 ctx, cancel := context.WithCancel(req.Context()) 281 defer cancel() 282 var stream runtime.ServerTransportStream 283 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 284 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 285 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/VerifyMessage", runtime.WithHTTPPathPattern("/v2/signer/verifymessage")) 286 if err != nil { 287 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 288 return 289 } 290 resp, md, err := local_request_Signer_VerifyMessage_0(rctx, inboundMarshaler, server, req, pathParams) 291 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 292 ctx = runtime.NewServerMetadataContext(ctx, md) 293 if err != nil { 294 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 295 return 296 } 297 298 forward_Signer_VerifyMessage_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 299 300 }) 301 302 mux.Handle("POST", pattern_Signer_DeriveSharedKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 303 ctx, cancel := context.WithCancel(req.Context()) 304 defer cancel() 305 var stream runtime.ServerTransportStream 306 ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) 307 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 308 rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/signrpc.Signer/DeriveSharedKey", runtime.WithHTTPPathPattern("/v2/signer/sharedkey")) 309 if err != nil { 310 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 311 return 312 } 313 resp, md, err := local_request_Signer_DeriveSharedKey_0(rctx, inboundMarshaler, server, req, pathParams) 314 md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) 315 ctx = runtime.NewServerMetadataContext(ctx, md) 316 if err != nil { 317 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 318 return 319 } 320 321 forward_Signer_DeriveSharedKey_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 322 323 }) 324 325 return nil 326 } 327 328 // RegisterSignerHandlerFromEndpoint is same as RegisterSignerHandler but 329 // automatically dials to "endpoint" and closes the connection when "ctx" gets done. 330 func RegisterSignerHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { 331 conn, err := grpc.Dial(endpoint, opts...) 332 if err != nil { 333 return err 334 } 335 defer func() { 336 if err != nil { 337 if cerr := conn.Close(); cerr != nil { 338 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 339 } 340 return 341 } 342 go func() { 343 <-ctx.Done() 344 if cerr := conn.Close(); cerr != nil { 345 grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) 346 } 347 }() 348 }() 349 350 return RegisterSignerHandler(ctx, mux, conn) 351 } 352 353 // RegisterSignerHandler registers the http handlers for service Signer to "mux". 354 // The handlers forward requests to the grpc endpoint over "conn". 355 func RegisterSignerHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { 356 return RegisterSignerHandlerClient(ctx, mux, NewSignerClient(conn)) 357 } 358 359 // RegisterSignerHandlerClient registers the http handlers for service Signer 360 // to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "SignerClient". 361 // Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "SignerClient" 362 // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in 363 // "SignerClient" to call the correct interceptors. 364 func RegisterSignerHandlerClient(ctx context.Context, mux *runtime.ServeMux, client SignerClient) error { 365 366 mux.Handle("POST", pattern_Signer_SignOutputRaw_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 367 ctx, cancel := context.WithCancel(req.Context()) 368 defer cancel() 369 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 370 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/SignOutputRaw", runtime.WithHTTPPathPattern("/v2/signer/signraw")) 371 if err != nil { 372 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 373 return 374 } 375 resp, md, err := request_Signer_SignOutputRaw_0(rctx, inboundMarshaler, client, req, pathParams) 376 ctx = runtime.NewServerMetadataContext(ctx, md) 377 if err != nil { 378 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 379 return 380 } 381 382 forward_Signer_SignOutputRaw_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 383 384 }) 385 386 mux.Handle("POST", pattern_Signer_ComputeInputScript_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 387 ctx, cancel := context.WithCancel(req.Context()) 388 defer cancel() 389 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 390 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/ComputeInputScript", runtime.WithHTTPPathPattern("/v2/signer/inputscript")) 391 if err != nil { 392 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 393 return 394 } 395 resp, md, err := request_Signer_ComputeInputScript_0(rctx, inboundMarshaler, client, req, pathParams) 396 ctx = runtime.NewServerMetadataContext(ctx, md) 397 if err != nil { 398 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 399 return 400 } 401 402 forward_Signer_ComputeInputScript_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 403 404 }) 405 406 mux.Handle("POST", pattern_Signer_SignMessage_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 407 ctx, cancel := context.WithCancel(req.Context()) 408 defer cancel() 409 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 410 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/SignMessage", runtime.WithHTTPPathPattern("/v2/signer/signmessage")) 411 if err != nil { 412 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 413 return 414 } 415 resp, md, err := request_Signer_SignMessage_0(rctx, inboundMarshaler, client, req, pathParams) 416 ctx = runtime.NewServerMetadataContext(ctx, md) 417 if err != nil { 418 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 419 return 420 } 421 422 forward_Signer_SignMessage_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 423 424 }) 425 426 mux.Handle("POST", pattern_Signer_VerifyMessage_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 427 ctx, cancel := context.WithCancel(req.Context()) 428 defer cancel() 429 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 430 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/VerifyMessage", runtime.WithHTTPPathPattern("/v2/signer/verifymessage")) 431 if err != nil { 432 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 433 return 434 } 435 resp, md, err := request_Signer_VerifyMessage_0(rctx, inboundMarshaler, client, req, pathParams) 436 ctx = runtime.NewServerMetadataContext(ctx, md) 437 if err != nil { 438 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 439 return 440 } 441 442 forward_Signer_VerifyMessage_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 443 444 }) 445 446 mux.Handle("POST", pattern_Signer_DeriveSharedKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { 447 ctx, cancel := context.WithCancel(req.Context()) 448 defer cancel() 449 inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) 450 rctx, err := runtime.AnnotateContext(ctx, mux, req, "/signrpc.Signer/DeriveSharedKey", runtime.WithHTTPPathPattern("/v2/signer/sharedkey")) 451 if err != nil { 452 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 453 return 454 } 455 resp, md, err := request_Signer_DeriveSharedKey_0(rctx, inboundMarshaler, client, req, pathParams) 456 ctx = runtime.NewServerMetadataContext(ctx, md) 457 if err != nil { 458 runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) 459 return 460 } 461 462 forward_Signer_DeriveSharedKey_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) 463 464 }) 465 466 return nil 467 } 468 469 var ( 470 pattern_Signer_SignOutputRaw_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "signer", "signraw"}, "")) 471 472 pattern_Signer_ComputeInputScript_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "signer", "inputscript"}, "")) 473 474 pattern_Signer_SignMessage_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "signer", "signmessage"}, "")) 475 476 pattern_Signer_VerifyMessage_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "signer", "verifymessage"}, "")) 477 478 pattern_Signer_DeriveSharedKey_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v2", "signer", "sharedkey"}, "")) 479 ) 480 481 var ( 482 forward_Signer_SignOutputRaw_0 = runtime.ForwardResponseMessage 483 484 forward_Signer_ComputeInputScript_0 = runtime.ForwardResponseMessage 485 486 forward_Signer_SignMessage_0 = runtime.ForwardResponseMessage 487 488 forward_Signer_VerifyMessage_0 = runtime.ForwardResponseMessage 489 490 forward_Signer_DeriveSharedKey_0 = runtime.ForwardResponseMessage 491 )