• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

lightningnetwork / lnd / 12205625987

06 Dec 2024 08:23PM UTC coverage: 49.763% (-0.04%) from 49.807%
12205625987

Pull #9316

github

ziggie1984
docs: add release-notes.
Pull Request #9316: routing: fix mc blinded path behaviour.

165 of 181 new or added lines in 5 files covered. (91.16%)

238 existing lines in 28 files now uncovered.

100104 of 201163 relevant lines covered (49.76%)

2.07 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

59.73
/lnrpc/signrpc/signer_grpc.pb.go
1
// Code generated by protoc-gen-go-grpc. DO NOT EDIT.
2

3
package signrpc
4

5
import (
6
        context "context"
7
        grpc "google.golang.org/grpc"
8
        codes "google.golang.org/grpc/codes"
9
        status "google.golang.org/grpc/status"
10
)
11

12
// This is a compile-time assertion to ensure that this generated file
13
// is compatible with the grpc package it is being compiled against.
14
// Requires gRPC-Go v1.32.0 or later.
15
const _ = grpc.SupportPackageIsVersion7
16

17
// SignerClient is the client API for Signer service.
18
//
19
// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream.
20
type SignerClient interface {
21
        // SignOutputRaw is a method that can be used to generated a signature for a
22
        // set of inputs/outputs to a transaction. Each request specifies details
23
        // concerning how the outputs should be signed, which keys they should be
24
        // signed with, and also any optional tweaks. The return value is a fixed
25
        // 64-byte signature (the same format as we use on the wire in Lightning).
26
        //
27
        // If we are  unable to sign using the specified keys, then an error will be
28
        // returned.
29
        SignOutputRaw(ctx context.Context, in *SignReq, opts ...grpc.CallOption) (*SignResp, error)
30
        // ComputeInputScript generates a complete InputIndex for the passed
31
        // transaction with the signature as defined within the passed SignDescriptor.
32
        // This method should be capable of generating the proper input script for both
33
        // regular p2wkh/p2tr outputs and p2wkh outputs nested within a regular p2sh
34
        // output.
35
        //
36
        // Note that when using this method to sign inputs belonging to the wallet,
37
        // the only items of the SignDescriptor that need to be populated are pkScript
38
        // in the TxOut field, the value in that same field, and finally the input
39
        // index.
40
        ComputeInputScript(ctx context.Context, in *SignReq, opts ...grpc.CallOption) (*InputScriptResp, error)
41
        // SignMessage signs a message with the key specified in the key locator. The
42
        // returned signature is fixed-size LN wire format encoded.
43
        //
44
        // The main difference to SignMessage in the main RPC is that a specific key is
45
        // used to sign the message instead of the node identity private key.
46
        SignMessage(ctx context.Context, in *SignMessageReq, opts ...grpc.CallOption) (*SignMessageResp, error)
47
        // VerifyMessage verifies a signature over a message using the public key
48
        // provided. The signature must be fixed-size LN wire format encoded.
49
        //
50
        // The main difference to VerifyMessage in the main RPC is that the public key
51
        // used to sign the message does not have to be a node known to the network.
52
        VerifyMessage(ctx context.Context, in *VerifyMessageReq, opts ...grpc.CallOption) (*VerifyMessageResp, error)
53
        // DeriveSharedKey returns a shared secret key by performing Diffie-Hellman key
54
        // derivation between the ephemeral public key in the request and the node's
55
        // key specified in the key_desc parameter. Either a key locator or a raw
56
        // public key is expected in the key_desc, if neither is supplied, defaults to
57
        // the node's identity private key:
58
        // P_shared = privKeyNode * ephemeralPubkey
59
        // The resulting shared public key is serialized in the compressed format and
60
        // hashed with sha256, resulting in the final key length of 256bit.
61
        DeriveSharedKey(ctx context.Context, in *SharedKeyRequest, opts ...grpc.CallOption) (*SharedKeyResponse, error)
62
        // MuSig2CombineKeys (experimental!) is a stateless helper RPC that can be used
63
        // to calculate the combined MuSig2 public key from a list of all participating
64
        // signers' public keys. This RPC is completely stateless and deterministic and
65
        // does not create any signing session. It can be used to determine the Taproot
66
        // public key that should be put in an on-chain output once all public keys are
67
        // known. A signing session is only needed later when that output should be
68
        // _spent_ again.
69
        //
70
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
71
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
72
        // releases. Backward compatibility is not guaranteed!
73
        MuSig2CombineKeys(ctx context.Context, in *MuSig2CombineKeysRequest, opts ...grpc.CallOption) (*MuSig2CombineKeysResponse, error)
74
        // MuSig2CreateSession (experimental!) creates a new MuSig2 signing session
75
        // using the local key identified by the key locator. The complete list of all
76
        // public keys of all signing parties must be provided, including the public
77
        // key of the local signing key. If nonces of other parties are already known,
78
        // they can be submitted as well to reduce the number of RPC calls necessary
79
        // later on.
80
        //
81
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
82
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
83
        // releases. Backward compatibility is not guaranteed!
84
        MuSig2CreateSession(ctx context.Context, in *MuSig2SessionRequest, opts ...grpc.CallOption) (*MuSig2SessionResponse, error)
85
        // MuSig2RegisterNonces (experimental!) registers one or more public nonces of
86
        // other signing participants for a session identified by its ID. This RPC can
87
        // be called multiple times until all nonces are registered.
88
        //
89
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
90
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
91
        // releases. Backward compatibility is not guaranteed!
92
        MuSig2RegisterNonces(ctx context.Context, in *MuSig2RegisterNoncesRequest, opts ...grpc.CallOption) (*MuSig2RegisterNoncesResponse, error)
93
        // MuSig2Sign (experimental!) creates a partial signature using the local
94
        // signing key that was specified when the session was created. This can only
95
        // be called when all public nonces of all participants are known and have been
96
        // registered with the session. If this node isn't responsible for combining
97
        // all the partial signatures, then the cleanup flag should be set, indicating
98
        // that the session can be removed from memory once the signature was produced.
99
        //
100
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
101
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
102
        // releases. Backward compatibility is not guaranteed!
103
        MuSig2Sign(ctx context.Context, in *MuSig2SignRequest, opts ...grpc.CallOption) (*MuSig2SignResponse, error)
104
        // MuSig2CombineSig (experimental!) combines the given partial signature(s)
105
        // with the local one, if it already exists. Once a partial signature of all
106
        // participants is registered, the final signature will be combined and
107
        // returned.
108
        //
109
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
110
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
111
        // releases. Backward compatibility is not guaranteed!
112
        MuSig2CombineSig(ctx context.Context, in *MuSig2CombineSigRequest, opts ...grpc.CallOption) (*MuSig2CombineSigResponse, error)
113
        // MuSig2Cleanup (experimental!) allows a caller to clean up a session early in
114
        // cases where it's obvious that the signing session won't succeed and the
115
        // resources can be released.
116
        //
117
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
118
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
119
        // releases. Backward compatibility is not guaranteed!
120
        MuSig2Cleanup(ctx context.Context, in *MuSig2CleanupRequest, opts ...grpc.CallOption) (*MuSig2CleanupResponse, error)
121
}
122

123
type signerClient struct {
124
        cc grpc.ClientConnInterface
125
}
126

127
func NewSignerClient(cc grpc.ClientConnInterface) SignerClient {
4✔
128
        return &signerClient{cc}
4✔
129
}
4✔
130

131
func (c *signerClient) SignOutputRaw(ctx context.Context, in *SignReq, opts ...grpc.CallOption) (*SignResp, error) {
×
132
        out := new(SignResp)
×
133
        err := c.cc.Invoke(ctx, "/signrpc.Signer/SignOutputRaw", in, out, opts...)
×
134
        if err != nil {
×
135
                return nil, err
×
136
        }
×
137
        return out, nil
×
138
}
139

140
func (c *signerClient) ComputeInputScript(ctx context.Context, in *SignReq, opts ...grpc.CallOption) (*InputScriptResp, error) {
×
141
        out := new(InputScriptResp)
×
142
        err := c.cc.Invoke(ctx, "/signrpc.Signer/ComputeInputScript", in, out, opts...)
×
143
        if err != nil {
×
144
                return nil, err
×
145
        }
×
146
        return out, nil
×
147
}
148

149
func (c *signerClient) SignMessage(ctx context.Context, in *SignMessageReq, opts ...grpc.CallOption) (*SignMessageResp, error) {
4✔
150
        out := new(SignMessageResp)
4✔
151
        err := c.cc.Invoke(ctx, "/signrpc.Signer/SignMessage", in, out, opts...)
4✔
152
        if err != nil {
4✔
153
                return nil, err
×
154
        }
×
155
        return out, nil
4✔
156
}
157

158
func (c *signerClient) VerifyMessage(ctx context.Context, in *VerifyMessageReq, opts ...grpc.CallOption) (*VerifyMessageResp, error) {
×
159
        out := new(VerifyMessageResp)
×
160
        err := c.cc.Invoke(ctx, "/signrpc.Signer/VerifyMessage", in, out, opts...)
×
161
        if err != nil {
×
162
                return nil, err
×
163
        }
×
164
        return out, nil
×
165
}
166

167
func (c *signerClient) DeriveSharedKey(ctx context.Context, in *SharedKeyRequest, opts ...grpc.CallOption) (*SharedKeyResponse, error) {
4✔
168
        out := new(SharedKeyResponse)
4✔
169
        err := c.cc.Invoke(ctx, "/signrpc.Signer/DeriveSharedKey", in, out, opts...)
4✔
170
        if err != nil {
4✔
UNCOV
171
                return nil, err
×
UNCOV
172
        }
×
173
        return out, nil
4✔
174
}
175

176
func (c *signerClient) MuSig2CombineKeys(ctx context.Context, in *MuSig2CombineKeysRequest, opts ...grpc.CallOption) (*MuSig2CombineKeysResponse, error) {
×
177
        out := new(MuSig2CombineKeysResponse)
×
178
        err := c.cc.Invoke(ctx, "/signrpc.Signer/MuSig2CombineKeys", in, out, opts...)
×
179
        if err != nil {
×
180
                return nil, err
×
181
        }
×
182
        return out, nil
×
183
}
184

185
func (c *signerClient) MuSig2CreateSession(ctx context.Context, in *MuSig2SessionRequest, opts ...grpc.CallOption) (*MuSig2SessionResponse, error) {
4✔
186
        out := new(MuSig2SessionResponse)
4✔
187
        err := c.cc.Invoke(ctx, "/signrpc.Signer/MuSig2CreateSession", in, out, opts...)
4✔
188
        if err != nil {
4✔
189
                return nil, err
×
190
        }
×
191
        return out, nil
4✔
192
}
193

194
func (c *signerClient) MuSig2RegisterNonces(ctx context.Context, in *MuSig2RegisterNoncesRequest, opts ...grpc.CallOption) (*MuSig2RegisterNoncesResponse, error) {
4✔
195
        out := new(MuSig2RegisterNoncesResponse)
4✔
196
        err := c.cc.Invoke(ctx, "/signrpc.Signer/MuSig2RegisterNonces", in, out, opts...)
4✔
197
        if err != nil {
4✔
198
                return nil, err
×
199
        }
×
200
        return out, nil
4✔
201
}
202

203
func (c *signerClient) MuSig2Sign(ctx context.Context, in *MuSig2SignRequest, opts ...grpc.CallOption) (*MuSig2SignResponse, error) {
4✔
204
        out := new(MuSig2SignResponse)
4✔
205
        err := c.cc.Invoke(ctx, "/signrpc.Signer/MuSig2Sign", in, out, opts...)
4✔
206
        if err != nil {
8✔
207
                return nil, err
4✔
208
        }
4✔
209
        return out, nil
4✔
210
}
211

212
func (c *signerClient) MuSig2CombineSig(ctx context.Context, in *MuSig2CombineSigRequest, opts ...grpc.CallOption) (*MuSig2CombineSigResponse, error) {
4✔
213
        out := new(MuSig2CombineSigResponse)
4✔
214
        err := c.cc.Invoke(ctx, "/signrpc.Signer/MuSig2CombineSig", in, out, opts...)
4✔
215
        if err != nil {
4✔
216
                return nil, err
×
217
        }
×
218
        return out, nil
4✔
219
}
220

221
func (c *signerClient) MuSig2Cleanup(ctx context.Context, in *MuSig2CleanupRequest, opts ...grpc.CallOption) (*MuSig2CleanupResponse, error) {
4✔
222
        out := new(MuSig2CleanupResponse)
4✔
223
        err := c.cc.Invoke(ctx, "/signrpc.Signer/MuSig2Cleanup", in, out, opts...)
4✔
224
        if err != nil {
4✔
225
                return nil, err
×
226
        }
×
227
        return out, nil
4✔
228
}
229

230
// SignerServer is the server API for Signer service.
231
// All implementations must embed UnimplementedSignerServer
232
// for forward compatibility
233
type SignerServer interface {
234
        // SignOutputRaw is a method that can be used to generated a signature for a
235
        // set of inputs/outputs to a transaction. Each request specifies details
236
        // concerning how the outputs should be signed, which keys they should be
237
        // signed with, and also any optional tweaks. The return value is a fixed
238
        // 64-byte signature (the same format as we use on the wire in Lightning).
239
        //
240
        // If we are  unable to sign using the specified keys, then an error will be
241
        // returned.
242
        SignOutputRaw(context.Context, *SignReq) (*SignResp, error)
243
        // ComputeInputScript generates a complete InputIndex for the passed
244
        // transaction with the signature as defined within the passed SignDescriptor.
245
        // This method should be capable of generating the proper input script for both
246
        // regular p2wkh/p2tr outputs and p2wkh outputs nested within a regular p2sh
247
        // output.
248
        //
249
        // Note that when using this method to sign inputs belonging to the wallet,
250
        // the only items of the SignDescriptor that need to be populated are pkScript
251
        // in the TxOut field, the value in that same field, and finally the input
252
        // index.
253
        ComputeInputScript(context.Context, *SignReq) (*InputScriptResp, error)
254
        // SignMessage signs a message with the key specified in the key locator. The
255
        // returned signature is fixed-size LN wire format encoded.
256
        //
257
        // The main difference to SignMessage in the main RPC is that a specific key is
258
        // used to sign the message instead of the node identity private key.
259
        SignMessage(context.Context, *SignMessageReq) (*SignMessageResp, error)
260
        // VerifyMessage verifies a signature over a message using the public key
261
        // provided. The signature must be fixed-size LN wire format encoded.
262
        //
263
        // The main difference to VerifyMessage in the main RPC is that the public key
264
        // used to sign the message does not have to be a node known to the network.
265
        VerifyMessage(context.Context, *VerifyMessageReq) (*VerifyMessageResp, error)
266
        // DeriveSharedKey returns a shared secret key by performing Diffie-Hellman key
267
        // derivation between the ephemeral public key in the request and the node's
268
        // key specified in the key_desc parameter. Either a key locator or a raw
269
        // public key is expected in the key_desc, if neither is supplied, defaults to
270
        // the node's identity private key:
271
        // P_shared = privKeyNode * ephemeralPubkey
272
        // The resulting shared public key is serialized in the compressed format and
273
        // hashed with sha256, resulting in the final key length of 256bit.
274
        DeriveSharedKey(context.Context, *SharedKeyRequest) (*SharedKeyResponse, error)
275
        // MuSig2CombineKeys (experimental!) is a stateless helper RPC that can be used
276
        // to calculate the combined MuSig2 public key from a list of all participating
277
        // signers' public keys. This RPC is completely stateless and deterministic and
278
        // does not create any signing session. It can be used to determine the Taproot
279
        // public key that should be put in an on-chain output once all public keys are
280
        // known. A signing session is only needed later when that output should be
281
        // _spent_ again.
282
        //
283
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
284
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
285
        // releases. Backward compatibility is not guaranteed!
286
        MuSig2CombineKeys(context.Context, *MuSig2CombineKeysRequest) (*MuSig2CombineKeysResponse, error)
287
        // MuSig2CreateSession (experimental!) creates a new MuSig2 signing session
288
        // using the local key identified by the key locator. The complete list of all
289
        // public keys of all signing parties must be provided, including the public
290
        // key of the local signing key. If nonces of other parties are already known,
291
        // they can be submitted as well to reduce the number of RPC calls necessary
292
        // later on.
293
        //
294
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
295
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
296
        // releases. Backward compatibility is not guaranteed!
297
        MuSig2CreateSession(context.Context, *MuSig2SessionRequest) (*MuSig2SessionResponse, error)
298
        // MuSig2RegisterNonces (experimental!) registers one or more public nonces of
299
        // other signing participants for a session identified by its ID. This RPC can
300
        // be called multiple times until all nonces are registered.
301
        //
302
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
303
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
304
        // releases. Backward compatibility is not guaranteed!
305
        MuSig2RegisterNonces(context.Context, *MuSig2RegisterNoncesRequest) (*MuSig2RegisterNoncesResponse, error)
306
        // MuSig2Sign (experimental!) creates a partial signature using the local
307
        // signing key that was specified when the session was created. This can only
308
        // be called when all public nonces of all participants are known and have been
309
        // registered with the session. If this node isn't responsible for combining
310
        // all the partial signatures, then the cleanup flag should be set, indicating
311
        // that the session can be removed from memory once the signature was produced.
312
        //
313
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
314
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
315
        // releases. Backward compatibility is not guaranteed!
316
        MuSig2Sign(context.Context, *MuSig2SignRequest) (*MuSig2SignResponse, error)
317
        // MuSig2CombineSig (experimental!) combines the given partial signature(s)
318
        // with the local one, if it already exists. Once a partial signature of all
319
        // participants is registered, the final signature will be combined and
320
        // returned.
321
        //
322
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
323
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
324
        // releases. Backward compatibility is not guaranteed!
325
        MuSig2CombineSig(context.Context, *MuSig2CombineSigRequest) (*MuSig2CombineSigResponse, error)
326
        // MuSig2Cleanup (experimental!) allows a caller to clean up a session early in
327
        // cases where it's obvious that the signing session won't succeed and the
328
        // resources can be released.
329
        //
330
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
331
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
332
        // releases. Backward compatibility is not guaranteed!
333
        MuSig2Cleanup(context.Context, *MuSig2CleanupRequest) (*MuSig2CleanupResponse, error)
334
        mustEmbedUnimplementedSignerServer()
335
}
336

337
// UnimplementedSignerServer must be embedded to have forward compatible implementations.
338
type UnimplementedSignerServer struct {
339
}
340

341
func (UnimplementedSignerServer) SignOutputRaw(context.Context, *SignReq) (*SignResp, error) {
×
342
        return nil, status.Errorf(codes.Unimplemented, "method SignOutputRaw not implemented")
×
343
}
×
344
func (UnimplementedSignerServer) ComputeInputScript(context.Context, *SignReq) (*InputScriptResp, error) {
×
345
        return nil, status.Errorf(codes.Unimplemented, "method ComputeInputScript not implemented")
×
346
}
×
347
func (UnimplementedSignerServer) SignMessage(context.Context, *SignMessageReq) (*SignMessageResp, error) {
×
348
        return nil, status.Errorf(codes.Unimplemented, "method SignMessage not implemented")
×
349
}
×
350
func (UnimplementedSignerServer) VerifyMessage(context.Context, *VerifyMessageReq) (*VerifyMessageResp, error) {
×
351
        return nil, status.Errorf(codes.Unimplemented, "method VerifyMessage not implemented")
×
352
}
×
353
func (UnimplementedSignerServer) DeriveSharedKey(context.Context, *SharedKeyRequest) (*SharedKeyResponse, error) {
×
354
        return nil, status.Errorf(codes.Unimplemented, "method DeriveSharedKey not implemented")
×
355
}
×
356
func (UnimplementedSignerServer) MuSig2CombineKeys(context.Context, *MuSig2CombineKeysRequest) (*MuSig2CombineKeysResponse, error) {
×
357
        return nil, status.Errorf(codes.Unimplemented, "method MuSig2CombineKeys not implemented")
×
358
}
×
359
func (UnimplementedSignerServer) MuSig2CreateSession(context.Context, *MuSig2SessionRequest) (*MuSig2SessionResponse, error) {
×
360
        return nil, status.Errorf(codes.Unimplemented, "method MuSig2CreateSession not implemented")
×
361
}
×
362
func (UnimplementedSignerServer) MuSig2RegisterNonces(context.Context, *MuSig2RegisterNoncesRequest) (*MuSig2RegisterNoncesResponse, error) {
×
363
        return nil, status.Errorf(codes.Unimplemented, "method MuSig2RegisterNonces not implemented")
×
364
}
×
365
func (UnimplementedSignerServer) MuSig2Sign(context.Context, *MuSig2SignRequest) (*MuSig2SignResponse, error) {
×
366
        return nil, status.Errorf(codes.Unimplemented, "method MuSig2Sign not implemented")
×
367
}
×
368
func (UnimplementedSignerServer) MuSig2CombineSig(context.Context, *MuSig2CombineSigRequest) (*MuSig2CombineSigResponse, error) {
×
369
        return nil, status.Errorf(codes.Unimplemented, "method MuSig2CombineSig not implemented")
×
370
}
×
371
func (UnimplementedSignerServer) MuSig2Cleanup(context.Context, *MuSig2CleanupRequest) (*MuSig2CleanupResponse, error) {
×
372
        return nil, status.Errorf(codes.Unimplemented, "method MuSig2Cleanup not implemented")
×
373
}
×
374
func (UnimplementedSignerServer) mustEmbedUnimplementedSignerServer() {}
×
375

376
// UnsafeSignerServer may be embedded to opt out of forward compatibility for this service.
377
// Use of this interface is not recommended, as added methods to SignerServer will
378
// result in compilation errors.
379
type UnsafeSignerServer interface {
380
        mustEmbedUnimplementedSignerServer()
381
}
382

383
func RegisterSignerServer(s grpc.ServiceRegistrar, srv SignerServer) {
4✔
384
        s.RegisterService(&Signer_ServiceDesc, srv)
4✔
385
}
4✔
386

387
func _Signer_SignOutputRaw_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
4✔
388
        in := new(SignReq)
4✔
389
        if err := dec(in); err != nil {
4✔
390
                return nil, err
×
391
        }
×
392
        if interceptor == nil {
4✔
393
                return srv.(SignerServer).SignOutputRaw(ctx, in)
×
394
        }
×
395
        info := &grpc.UnaryServerInfo{
4✔
396
                Server:     srv,
4✔
397
                FullMethod: "/signrpc.Signer/SignOutputRaw",
4✔
398
        }
4✔
399
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
8✔
400
                return srv.(SignerServer).SignOutputRaw(ctx, req.(*SignReq))
4✔
401
        }
4✔
402
        return interceptor(ctx, in, info, handler)
4✔
403
}
404

405
func _Signer_ComputeInputScript_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
4✔
406
        in := new(SignReq)
4✔
407
        if err := dec(in); err != nil {
4✔
408
                return nil, err
×
409
        }
×
410
        if interceptor == nil {
4✔
411
                return srv.(SignerServer).ComputeInputScript(ctx, in)
×
412
        }
×
413
        info := &grpc.UnaryServerInfo{
4✔
414
                Server:     srv,
4✔
415
                FullMethod: "/signrpc.Signer/ComputeInputScript",
4✔
416
        }
4✔
417
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
8✔
418
                return srv.(SignerServer).ComputeInputScript(ctx, req.(*SignReq))
4✔
419
        }
4✔
420
        return interceptor(ctx, in, info, handler)
4✔
421
}
422

423
func _Signer_SignMessage_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
4✔
424
        in := new(SignMessageReq)
4✔
425
        if err := dec(in); err != nil {
4✔
426
                return nil, err
×
427
        }
×
428
        if interceptor == nil {
4✔
429
                return srv.(SignerServer).SignMessage(ctx, in)
×
430
        }
×
431
        info := &grpc.UnaryServerInfo{
4✔
432
                Server:     srv,
4✔
433
                FullMethod: "/signrpc.Signer/SignMessage",
4✔
434
        }
4✔
435
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
8✔
436
                return srv.(SignerServer).SignMessage(ctx, req.(*SignMessageReq))
4✔
437
        }
4✔
438
        return interceptor(ctx, in, info, handler)
4✔
439
}
440

441
func _Signer_VerifyMessage_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
4✔
442
        in := new(VerifyMessageReq)
4✔
443
        if err := dec(in); err != nil {
4✔
444
                return nil, err
×
445
        }
×
446
        if interceptor == nil {
4✔
447
                return srv.(SignerServer).VerifyMessage(ctx, in)
×
448
        }
×
449
        info := &grpc.UnaryServerInfo{
4✔
450
                Server:     srv,
4✔
451
                FullMethod: "/signrpc.Signer/VerifyMessage",
4✔
452
        }
4✔
453
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
8✔
454
                return srv.(SignerServer).VerifyMessage(ctx, req.(*VerifyMessageReq))
4✔
455
        }
4✔
456
        return interceptor(ctx, in, info, handler)
4✔
457
}
458

459
func _Signer_DeriveSharedKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
4✔
460
        in := new(SharedKeyRequest)
4✔
461
        if err := dec(in); err != nil {
4✔
462
                return nil, err
×
463
        }
×
464
        if interceptor == nil {
4✔
465
                return srv.(SignerServer).DeriveSharedKey(ctx, in)
×
466
        }
×
467
        info := &grpc.UnaryServerInfo{
4✔
468
                Server:     srv,
4✔
469
                FullMethod: "/signrpc.Signer/DeriveSharedKey",
4✔
470
        }
4✔
471
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
8✔
472
                return srv.(SignerServer).DeriveSharedKey(ctx, req.(*SharedKeyRequest))
4✔
473
        }
4✔
474
        return interceptor(ctx, in, info, handler)
4✔
475
}
476

477
func _Signer_MuSig2CombineKeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
4✔
478
        in := new(MuSig2CombineKeysRequest)
4✔
479
        if err := dec(in); err != nil {
4✔
480
                return nil, err
×
481
        }
×
482
        if interceptor == nil {
4✔
483
                return srv.(SignerServer).MuSig2CombineKeys(ctx, in)
×
484
        }
×
485
        info := &grpc.UnaryServerInfo{
4✔
486
                Server:     srv,
4✔
487
                FullMethod: "/signrpc.Signer/MuSig2CombineKeys",
4✔
488
        }
4✔
489
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
8✔
490
                return srv.(SignerServer).MuSig2CombineKeys(ctx, req.(*MuSig2CombineKeysRequest))
4✔
491
        }
4✔
492
        return interceptor(ctx, in, info, handler)
4✔
493
}
494

495
func _Signer_MuSig2CreateSession_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
4✔
496
        in := new(MuSig2SessionRequest)
4✔
497
        if err := dec(in); err != nil {
4✔
498
                return nil, err
×
499
        }
×
500
        if interceptor == nil {
4✔
501
                return srv.(SignerServer).MuSig2CreateSession(ctx, in)
×
502
        }
×
503
        info := &grpc.UnaryServerInfo{
4✔
504
                Server:     srv,
4✔
505
                FullMethod: "/signrpc.Signer/MuSig2CreateSession",
4✔
506
        }
4✔
507
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
8✔
508
                return srv.(SignerServer).MuSig2CreateSession(ctx, req.(*MuSig2SessionRequest))
4✔
509
        }
4✔
510
        return interceptor(ctx, in, info, handler)
4✔
511
}
512

513
func _Signer_MuSig2RegisterNonces_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
4✔
514
        in := new(MuSig2RegisterNoncesRequest)
4✔
515
        if err := dec(in); err != nil {
4✔
516
                return nil, err
×
517
        }
×
518
        if interceptor == nil {
4✔
519
                return srv.(SignerServer).MuSig2RegisterNonces(ctx, in)
×
520
        }
×
521
        info := &grpc.UnaryServerInfo{
4✔
522
                Server:     srv,
4✔
523
                FullMethod: "/signrpc.Signer/MuSig2RegisterNonces",
4✔
524
        }
4✔
525
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
8✔
526
                return srv.(SignerServer).MuSig2RegisterNonces(ctx, req.(*MuSig2RegisterNoncesRequest))
4✔
527
        }
4✔
528
        return interceptor(ctx, in, info, handler)
4✔
529
}
530

531
func _Signer_MuSig2Sign_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
4✔
532
        in := new(MuSig2SignRequest)
4✔
533
        if err := dec(in); err != nil {
4✔
534
                return nil, err
×
535
        }
×
536
        if interceptor == nil {
4✔
537
                return srv.(SignerServer).MuSig2Sign(ctx, in)
×
538
        }
×
539
        info := &grpc.UnaryServerInfo{
4✔
540
                Server:     srv,
4✔
541
                FullMethod: "/signrpc.Signer/MuSig2Sign",
4✔
542
        }
4✔
543
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
8✔
544
                return srv.(SignerServer).MuSig2Sign(ctx, req.(*MuSig2SignRequest))
4✔
545
        }
4✔
546
        return interceptor(ctx, in, info, handler)
4✔
547
}
548

549
func _Signer_MuSig2CombineSig_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
4✔
550
        in := new(MuSig2CombineSigRequest)
4✔
551
        if err := dec(in); err != nil {
4✔
552
                return nil, err
×
553
        }
×
554
        if interceptor == nil {
4✔
555
                return srv.(SignerServer).MuSig2CombineSig(ctx, in)
×
556
        }
×
557
        info := &grpc.UnaryServerInfo{
4✔
558
                Server:     srv,
4✔
559
                FullMethod: "/signrpc.Signer/MuSig2CombineSig",
4✔
560
        }
4✔
561
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
8✔
562
                return srv.(SignerServer).MuSig2CombineSig(ctx, req.(*MuSig2CombineSigRequest))
4✔
563
        }
4✔
564
        return interceptor(ctx, in, info, handler)
4✔
565
}
566

567
func _Signer_MuSig2Cleanup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
4✔
568
        in := new(MuSig2CleanupRequest)
4✔
569
        if err := dec(in); err != nil {
4✔
570
                return nil, err
×
571
        }
×
572
        if interceptor == nil {
4✔
573
                return srv.(SignerServer).MuSig2Cleanup(ctx, in)
×
574
        }
×
575
        info := &grpc.UnaryServerInfo{
4✔
576
                Server:     srv,
4✔
577
                FullMethod: "/signrpc.Signer/MuSig2Cleanup",
4✔
578
        }
4✔
579
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
8✔
580
                return srv.(SignerServer).MuSig2Cleanup(ctx, req.(*MuSig2CleanupRequest))
4✔
581
        }
4✔
582
        return interceptor(ctx, in, info, handler)
4✔
583
}
584

585
// Signer_ServiceDesc is the grpc.ServiceDesc for Signer service.
586
// It's only intended for direct use with grpc.RegisterService,
587
// and not to be introspected or modified (even as a copy)
588
var Signer_ServiceDesc = grpc.ServiceDesc{
589
        ServiceName: "signrpc.Signer",
590
        HandlerType: (*SignerServer)(nil),
591
        Methods: []grpc.MethodDesc{
592
                {
593
                        MethodName: "SignOutputRaw",
594
                        Handler:    _Signer_SignOutputRaw_Handler,
595
                },
596
                {
597
                        MethodName: "ComputeInputScript",
598
                        Handler:    _Signer_ComputeInputScript_Handler,
599
                },
600
                {
601
                        MethodName: "SignMessage",
602
                        Handler:    _Signer_SignMessage_Handler,
603
                },
604
                {
605
                        MethodName: "VerifyMessage",
606
                        Handler:    _Signer_VerifyMessage_Handler,
607
                },
608
                {
609
                        MethodName: "DeriveSharedKey",
610
                        Handler:    _Signer_DeriveSharedKey_Handler,
611
                },
612
                {
613
                        MethodName: "MuSig2CombineKeys",
614
                        Handler:    _Signer_MuSig2CombineKeys_Handler,
615
                },
616
                {
617
                        MethodName: "MuSig2CreateSession",
618
                        Handler:    _Signer_MuSig2CreateSession_Handler,
619
                },
620
                {
621
                        MethodName: "MuSig2RegisterNonces",
622
                        Handler:    _Signer_MuSig2RegisterNonces_Handler,
623
                },
624
                {
625
                        MethodName: "MuSig2Sign",
626
                        Handler:    _Signer_MuSig2Sign_Handler,
627
                },
628
                {
629
                        MethodName: "MuSig2CombineSig",
630
                        Handler:    _Signer_MuSig2CombineSig_Handler,
631
                },
632
                {
633
                        MethodName: "MuSig2Cleanup",
634
                        Handler:    _Signer_MuSig2Cleanup_Handler,
635
                },
636
        },
637
        Streams:  []grpc.StreamDesc{},
638
        Metadata: "signrpc/signer.proto",
639
}
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc