• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

lightningnetwork / lnd / 13408822928

19 Feb 2025 08:59AM UTC coverage: 41.123% (-17.7%) from 58.794%
13408822928

Pull #9521

github

web-flow
Merge d2f397b3c into 0e8786348
Pull Request #9521: unit: remove GOACC, use Go 1.20 native coverage functionality

92496 of 224923 relevant lines covered (41.12%)

18825.83 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

0.0
/lnrpc/signrpc/signer_grpc.pb.go
1
// Code generated by protoc-gen-go-grpc. DO NOT EDIT.
2

3
package signrpc
4

5
import (
6
        context "context"
7
        grpc "google.golang.org/grpc"
8
        codes "google.golang.org/grpc/codes"
9
        status "google.golang.org/grpc/status"
10
)
11

12
// This is a compile-time assertion to ensure that this generated file
13
// is compatible with the grpc package it is being compiled against.
14
// Requires gRPC-Go v1.32.0 or later.
15
const _ = grpc.SupportPackageIsVersion7
16

17
// SignerClient is the client API for Signer service.
18
//
19
// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream.
20
type SignerClient interface {
21
        // SignOutputRaw is a method that can be used to generated a signature for a
22
        // set of inputs/outputs to a transaction. Each request specifies details
23
        // concerning how the outputs should be signed, which keys they should be
24
        // signed with, and also any optional tweaks. The return value is a fixed
25
        // 64-byte signature (the same format as we use on the wire in Lightning).
26
        //
27
        // If we are  unable to sign using the specified keys, then an error will be
28
        // returned.
29
        SignOutputRaw(ctx context.Context, in *SignReq, opts ...grpc.CallOption) (*SignResp, error)
30
        // ComputeInputScript generates a complete InputIndex for the passed
31
        // transaction with the signature as defined within the passed SignDescriptor.
32
        // This method should be capable of generating the proper input script for both
33
        // regular p2wkh/p2tr outputs and p2wkh outputs nested within a regular p2sh
34
        // output.
35
        //
36
        // Note that when using this method to sign inputs belonging to the wallet,
37
        // the only items of the SignDescriptor that need to be populated are pkScript
38
        // in the TxOut field, the value in that same field, and finally the input
39
        // index.
40
        ComputeInputScript(ctx context.Context, in *SignReq, opts ...grpc.CallOption) (*InputScriptResp, error)
41
        // SignMessage signs a message with the key specified in the key locator. The
42
        // returned signature is fixed-size LN wire format encoded.
43
        //
44
        // The main difference to SignMessage in the main RPC is that a specific key is
45
        // used to sign the message instead of the node identity private key.
46
        SignMessage(ctx context.Context, in *SignMessageReq, opts ...grpc.CallOption) (*SignMessageResp, error)
47
        // VerifyMessage verifies a signature over a message using the public key
48
        // provided. The signature must be fixed-size LN wire format encoded.
49
        //
50
        // The main difference to VerifyMessage in the main RPC is that the public key
51
        // used to sign the message does not have to be a node known to the network.
52
        VerifyMessage(ctx context.Context, in *VerifyMessageReq, opts ...grpc.CallOption) (*VerifyMessageResp, error)
53
        // DeriveSharedKey returns a shared secret key by performing Diffie-Hellman key
54
        // derivation between the ephemeral public key in the request and the node's
55
        // key specified in the key_desc parameter. Either a key locator or a raw
56
        // public key is expected in the key_desc, if neither is supplied, defaults to
57
        // the node's identity private key:
58
        // P_shared = privKeyNode * ephemeralPubkey
59
        // The resulting shared public key is serialized in the compressed format and
60
        // hashed with sha256, resulting in the final key length of 256bit.
61
        DeriveSharedKey(ctx context.Context, in *SharedKeyRequest, opts ...grpc.CallOption) (*SharedKeyResponse, error)
62
        // MuSig2CombineKeys (experimental!) is a stateless helper RPC that can be used
63
        // to calculate the combined MuSig2 public key from a list of all participating
64
        // signers' public keys. This RPC is completely stateless and deterministic and
65
        // does not create any signing session. It can be used to determine the Taproot
66
        // public key that should be put in an on-chain output once all public keys are
67
        // known. A signing session is only needed later when that output should be
68
        // _spent_ again.
69
        //
70
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
71
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
72
        // releases. Backward compatibility is not guaranteed!
73
        MuSig2CombineKeys(ctx context.Context, in *MuSig2CombineKeysRequest, opts ...grpc.CallOption) (*MuSig2CombineKeysResponse, error)
74
        // MuSig2CreateSession (experimental!) creates a new MuSig2 signing session
75
        // using the local key identified by the key locator. The complete list of all
76
        // public keys of all signing parties must be provided, including the public
77
        // key of the local signing key. If nonces of other parties are already known,
78
        // they can be submitted as well to reduce the number of RPC calls necessary
79
        // later on.
80
        //
81
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
82
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
83
        // releases. Backward compatibility is not guaranteed!
84
        MuSig2CreateSession(ctx context.Context, in *MuSig2SessionRequest, opts ...grpc.CallOption) (*MuSig2SessionResponse, error)
85
        // MuSig2RegisterNonces (experimental!) registers one or more public nonces of
86
        // other signing participants for a session identified by its ID. This RPC can
87
        // be called multiple times until all nonces are registered.
88
        //
89
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
90
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
91
        // releases. Backward compatibility is not guaranteed!
92
        MuSig2RegisterNonces(ctx context.Context, in *MuSig2RegisterNoncesRequest, opts ...grpc.CallOption) (*MuSig2RegisterNoncesResponse, error)
93
        // MuSig2Sign (experimental!) creates a partial signature using the local
94
        // signing key that was specified when the session was created. This can only
95
        // be called when all public nonces of all participants are known and have been
96
        // registered with the session. If this node isn't responsible for combining
97
        // all the partial signatures, then the cleanup flag should be set, indicating
98
        // that the session can be removed from memory once the signature was produced.
99
        //
100
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
101
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
102
        // releases. Backward compatibility is not guaranteed!
103
        MuSig2Sign(ctx context.Context, in *MuSig2SignRequest, opts ...grpc.CallOption) (*MuSig2SignResponse, error)
104
        // MuSig2CombineSig (experimental!) combines the given partial signature(s)
105
        // with the local one, if it already exists. Once a partial signature of all
106
        // participants is registered, the final signature will be combined and
107
        // returned.
108
        //
109
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
110
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
111
        // releases. Backward compatibility is not guaranteed!
112
        MuSig2CombineSig(ctx context.Context, in *MuSig2CombineSigRequest, opts ...grpc.CallOption) (*MuSig2CombineSigResponse, error)
113
        // MuSig2Cleanup (experimental!) allows a caller to clean up a session early in
114
        // cases where it's obvious that the signing session won't succeed and the
115
        // resources can be released.
116
        //
117
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
118
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
119
        // releases. Backward compatibility is not guaranteed!
120
        MuSig2Cleanup(ctx context.Context, in *MuSig2CleanupRequest, opts ...grpc.CallOption) (*MuSig2CleanupResponse, error)
121
}
122

123
type signerClient struct {
124
        cc grpc.ClientConnInterface
125
}
126

127
func NewSignerClient(cc grpc.ClientConnInterface) SignerClient {
×
128
        return &signerClient{cc}
×
129
}
×
130

131
func (c *signerClient) SignOutputRaw(ctx context.Context, in *SignReq, opts ...grpc.CallOption) (*SignResp, error) {
×
132
        out := new(SignResp)
×
133
        err := c.cc.Invoke(ctx, "/signrpc.Signer/SignOutputRaw", in, out, opts...)
×
134
        if err != nil {
×
135
                return nil, err
×
136
        }
×
137
        return out, nil
×
138
}
139

140
func (c *signerClient) ComputeInputScript(ctx context.Context, in *SignReq, opts ...grpc.CallOption) (*InputScriptResp, error) {
×
141
        out := new(InputScriptResp)
×
142
        err := c.cc.Invoke(ctx, "/signrpc.Signer/ComputeInputScript", in, out, opts...)
×
143
        if err != nil {
×
144
                return nil, err
×
145
        }
×
146
        return out, nil
×
147
}
148

149
func (c *signerClient) SignMessage(ctx context.Context, in *SignMessageReq, opts ...grpc.CallOption) (*SignMessageResp, error) {
×
150
        out := new(SignMessageResp)
×
151
        err := c.cc.Invoke(ctx, "/signrpc.Signer/SignMessage", in, out, opts...)
×
152
        if err != nil {
×
153
                return nil, err
×
154
        }
×
155
        return out, nil
×
156
}
157

158
func (c *signerClient) VerifyMessage(ctx context.Context, in *VerifyMessageReq, opts ...grpc.CallOption) (*VerifyMessageResp, error) {
×
159
        out := new(VerifyMessageResp)
×
160
        err := c.cc.Invoke(ctx, "/signrpc.Signer/VerifyMessage", in, out, opts...)
×
161
        if err != nil {
×
162
                return nil, err
×
163
        }
×
164
        return out, nil
×
165
}
166

167
func (c *signerClient) DeriveSharedKey(ctx context.Context, in *SharedKeyRequest, opts ...grpc.CallOption) (*SharedKeyResponse, error) {
×
168
        out := new(SharedKeyResponse)
×
169
        err := c.cc.Invoke(ctx, "/signrpc.Signer/DeriveSharedKey", in, out, opts...)
×
170
        if err != nil {
×
171
                return nil, err
×
172
        }
×
173
        return out, nil
×
174
}
175

176
func (c *signerClient) MuSig2CombineKeys(ctx context.Context, in *MuSig2CombineKeysRequest, opts ...grpc.CallOption) (*MuSig2CombineKeysResponse, error) {
×
177
        out := new(MuSig2CombineKeysResponse)
×
178
        err := c.cc.Invoke(ctx, "/signrpc.Signer/MuSig2CombineKeys", in, out, opts...)
×
179
        if err != nil {
×
180
                return nil, err
×
181
        }
×
182
        return out, nil
×
183
}
184

185
func (c *signerClient) MuSig2CreateSession(ctx context.Context, in *MuSig2SessionRequest, opts ...grpc.CallOption) (*MuSig2SessionResponse, error) {
×
186
        out := new(MuSig2SessionResponse)
×
187
        err := c.cc.Invoke(ctx, "/signrpc.Signer/MuSig2CreateSession", in, out, opts...)
×
188
        if err != nil {
×
189
                return nil, err
×
190
        }
×
191
        return out, nil
×
192
}
193

194
func (c *signerClient) MuSig2RegisterNonces(ctx context.Context, in *MuSig2RegisterNoncesRequest, opts ...grpc.CallOption) (*MuSig2RegisterNoncesResponse, error) {
×
195
        out := new(MuSig2RegisterNoncesResponse)
×
196
        err := c.cc.Invoke(ctx, "/signrpc.Signer/MuSig2RegisterNonces", in, out, opts...)
×
197
        if err != nil {
×
198
                return nil, err
×
199
        }
×
200
        return out, nil
×
201
}
202

203
func (c *signerClient) MuSig2Sign(ctx context.Context, in *MuSig2SignRequest, opts ...grpc.CallOption) (*MuSig2SignResponse, error) {
×
204
        out := new(MuSig2SignResponse)
×
205
        err := c.cc.Invoke(ctx, "/signrpc.Signer/MuSig2Sign", in, out, opts...)
×
206
        if err != nil {
×
207
                return nil, err
×
208
        }
×
209
        return out, nil
×
210
}
211

212
func (c *signerClient) MuSig2CombineSig(ctx context.Context, in *MuSig2CombineSigRequest, opts ...grpc.CallOption) (*MuSig2CombineSigResponse, error) {
×
213
        out := new(MuSig2CombineSigResponse)
×
214
        err := c.cc.Invoke(ctx, "/signrpc.Signer/MuSig2CombineSig", in, out, opts...)
×
215
        if err != nil {
×
216
                return nil, err
×
217
        }
×
218
        return out, nil
×
219
}
220

221
func (c *signerClient) MuSig2Cleanup(ctx context.Context, in *MuSig2CleanupRequest, opts ...grpc.CallOption) (*MuSig2CleanupResponse, error) {
×
222
        out := new(MuSig2CleanupResponse)
×
223
        err := c.cc.Invoke(ctx, "/signrpc.Signer/MuSig2Cleanup", in, out, opts...)
×
224
        if err != nil {
×
225
                return nil, err
×
226
        }
×
227
        return out, nil
×
228
}
229

230
// SignerServer is the server API for Signer service.
231
// All implementations must embed UnimplementedSignerServer
232
// for forward compatibility
233
type SignerServer interface {
234
        // SignOutputRaw is a method that can be used to generated a signature for a
235
        // set of inputs/outputs to a transaction. Each request specifies details
236
        // concerning how the outputs should be signed, which keys they should be
237
        // signed with, and also any optional tweaks. The return value is a fixed
238
        // 64-byte signature (the same format as we use on the wire in Lightning).
239
        //
240
        // If we are  unable to sign using the specified keys, then an error will be
241
        // returned.
242
        SignOutputRaw(context.Context, *SignReq) (*SignResp, error)
243
        // ComputeInputScript generates a complete InputIndex for the passed
244
        // transaction with the signature as defined within the passed SignDescriptor.
245
        // This method should be capable of generating the proper input script for both
246
        // regular p2wkh/p2tr outputs and p2wkh outputs nested within a regular p2sh
247
        // output.
248
        //
249
        // Note that when using this method to sign inputs belonging to the wallet,
250
        // the only items of the SignDescriptor that need to be populated are pkScript
251
        // in the TxOut field, the value in that same field, and finally the input
252
        // index.
253
        ComputeInputScript(context.Context, *SignReq) (*InputScriptResp, error)
254
        // SignMessage signs a message with the key specified in the key locator. The
255
        // returned signature is fixed-size LN wire format encoded.
256
        //
257
        // The main difference to SignMessage in the main RPC is that a specific key is
258
        // used to sign the message instead of the node identity private key.
259
        SignMessage(context.Context, *SignMessageReq) (*SignMessageResp, error)
260
        // VerifyMessage verifies a signature over a message using the public key
261
        // provided. The signature must be fixed-size LN wire format encoded.
262
        //
263
        // The main difference to VerifyMessage in the main RPC is that the public key
264
        // used to sign the message does not have to be a node known to the network.
265
        VerifyMessage(context.Context, *VerifyMessageReq) (*VerifyMessageResp, error)
266
        // DeriveSharedKey returns a shared secret key by performing Diffie-Hellman key
267
        // derivation between the ephemeral public key in the request and the node's
268
        // key specified in the key_desc parameter. Either a key locator or a raw
269
        // public key is expected in the key_desc, if neither is supplied, defaults to
270
        // the node's identity private key:
271
        // P_shared = privKeyNode * ephemeralPubkey
272
        // The resulting shared public key is serialized in the compressed format and
273
        // hashed with sha256, resulting in the final key length of 256bit.
274
        DeriveSharedKey(context.Context, *SharedKeyRequest) (*SharedKeyResponse, error)
275
        // MuSig2CombineKeys (experimental!) is a stateless helper RPC that can be used
276
        // to calculate the combined MuSig2 public key from a list of all participating
277
        // signers' public keys. This RPC is completely stateless and deterministic and
278
        // does not create any signing session. It can be used to determine the Taproot
279
        // public key that should be put in an on-chain output once all public keys are
280
        // known. A signing session is only needed later when that output should be
281
        // _spent_ again.
282
        //
283
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
284
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
285
        // releases. Backward compatibility is not guaranteed!
286
        MuSig2CombineKeys(context.Context, *MuSig2CombineKeysRequest) (*MuSig2CombineKeysResponse, error)
287
        // MuSig2CreateSession (experimental!) creates a new MuSig2 signing session
288
        // using the local key identified by the key locator. The complete list of all
289
        // public keys of all signing parties must be provided, including the public
290
        // key of the local signing key. If nonces of other parties are already known,
291
        // they can be submitted as well to reduce the number of RPC calls necessary
292
        // later on.
293
        //
294
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
295
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
296
        // releases. Backward compatibility is not guaranteed!
297
        MuSig2CreateSession(context.Context, *MuSig2SessionRequest) (*MuSig2SessionResponse, error)
298
        // MuSig2RegisterNonces (experimental!) registers one or more public nonces of
299
        // other signing participants for a session identified by its ID. This RPC can
300
        // be called multiple times until all nonces are registered.
301
        //
302
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
303
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
304
        // releases. Backward compatibility is not guaranteed!
305
        MuSig2RegisterNonces(context.Context, *MuSig2RegisterNoncesRequest) (*MuSig2RegisterNoncesResponse, error)
306
        // MuSig2Sign (experimental!) creates a partial signature using the local
307
        // signing key that was specified when the session was created. This can only
308
        // be called when all public nonces of all participants are known and have been
309
        // registered with the session. If this node isn't responsible for combining
310
        // all the partial signatures, then the cleanup flag should be set, indicating
311
        // that the session can be removed from memory once the signature was produced.
312
        //
313
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
314
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
315
        // releases. Backward compatibility is not guaranteed!
316
        MuSig2Sign(context.Context, *MuSig2SignRequest) (*MuSig2SignResponse, error)
317
        // MuSig2CombineSig (experimental!) combines the given partial signature(s)
318
        // with the local one, if it already exists. Once a partial signature of all
319
        // participants is registered, the final signature will be combined and
320
        // returned.
321
        //
322
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
323
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
324
        // releases. Backward compatibility is not guaranteed!
325
        MuSig2CombineSig(context.Context, *MuSig2CombineSigRequest) (*MuSig2CombineSigResponse, error)
326
        // MuSig2Cleanup (experimental!) allows a caller to clean up a session early in
327
        // cases where it's obvious that the signing session won't succeed and the
328
        // resources can be released.
329
        //
330
        // NOTE: The MuSig2 BIP is not final yet and therefore this API must be
331
        // considered to be HIGHLY EXPERIMENTAL and subject to change in upcoming
332
        // releases. Backward compatibility is not guaranteed!
333
        MuSig2Cleanup(context.Context, *MuSig2CleanupRequest) (*MuSig2CleanupResponse, error)
334
        mustEmbedUnimplementedSignerServer()
335
}
336

337
// UnimplementedSignerServer must be embedded to have forward compatible implementations.
338
type UnimplementedSignerServer struct {
339
}
340

341
func (UnimplementedSignerServer) SignOutputRaw(context.Context, *SignReq) (*SignResp, error) {
×
342
        return nil, status.Errorf(codes.Unimplemented, "method SignOutputRaw not implemented")
×
343
}
×
344
func (UnimplementedSignerServer) ComputeInputScript(context.Context, *SignReq) (*InputScriptResp, error) {
×
345
        return nil, status.Errorf(codes.Unimplemented, "method ComputeInputScript not implemented")
×
346
}
×
347
func (UnimplementedSignerServer) SignMessage(context.Context, *SignMessageReq) (*SignMessageResp, error) {
×
348
        return nil, status.Errorf(codes.Unimplemented, "method SignMessage not implemented")
×
349
}
×
350
func (UnimplementedSignerServer) VerifyMessage(context.Context, *VerifyMessageReq) (*VerifyMessageResp, error) {
×
351
        return nil, status.Errorf(codes.Unimplemented, "method VerifyMessage not implemented")
×
352
}
×
353
func (UnimplementedSignerServer) DeriveSharedKey(context.Context, *SharedKeyRequest) (*SharedKeyResponse, error) {
×
354
        return nil, status.Errorf(codes.Unimplemented, "method DeriveSharedKey not implemented")
×
355
}
×
356
func (UnimplementedSignerServer) MuSig2CombineKeys(context.Context, *MuSig2CombineKeysRequest) (*MuSig2CombineKeysResponse, error) {
×
357
        return nil, status.Errorf(codes.Unimplemented, "method MuSig2CombineKeys not implemented")
×
358
}
×
359
func (UnimplementedSignerServer) MuSig2CreateSession(context.Context, *MuSig2SessionRequest) (*MuSig2SessionResponse, error) {
×
360
        return nil, status.Errorf(codes.Unimplemented, "method MuSig2CreateSession not implemented")
×
361
}
×
362
func (UnimplementedSignerServer) MuSig2RegisterNonces(context.Context, *MuSig2RegisterNoncesRequest) (*MuSig2RegisterNoncesResponse, error) {
×
363
        return nil, status.Errorf(codes.Unimplemented, "method MuSig2RegisterNonces not implemented")
×
364
}
×
365
func (UnimplementedSignerServer) MuSig2Sign(context.Context, *MuSig2SignRequest) (*MuSig2SignResponse, error) {
×
366
        return nil, status.Errorf(codes.Unimplemented, "method MuSig2Sign not implemented")
×
367
}
×
368
func (UnimplementedSignerServer) MuSig2CombineSig(context.Context, *MuSig2CombineSigRequest) (*MuSig2CombineSigResponse, error) {
×
369
        return nil, status.Errorf(codes.Unimplemented, "method MuSig2CombineSig not implemented")
×
370
}
×
371
func (UnimplementedSignerServer) MuSig2Cleanup(context.Context, *MuSig2CleanupRequest) (*MuSig2CleanupResponse, error) {
×
372
        return nil, status.Errorf(codes.Unimplemented, "method MuSig2Cleanup not implemented")
×
373
}
×
374
func (UnimplementedSignerServer) mustEmbedUnimplementedSignerServer() {}
×
375

376
// UnsafeSignerServer may be embedded to opt out of forward compatibility for this service.
377
// Use of this interface is not recommended, as added methods to SignerServer will
378
// result in compilation errors.
379
type UnsafeSignerServer interface {
380
        mustEmbedUnimplementedSignerServer()
381
}
382

383
func RegisterSignerServer(s grpc.ServiceRegistrar, srv SignerServer) {
×
384
        s.RegisterService(&Signer_ServiceDesc, srv)
×
385
}
×
386

387
func _Signer_SignOutputRaw_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
×
388
        in := new(SignReq)
×
389
        if err := dec(in); err != nil {
×
390
                return nil, err
×
391
        }
×
392
        if interceptor == nil {
×
393
                return srv.(SignerServer).SignOutputRaw(ctx, in)
×
394
        }
×
395
        info := &grpc.UnaryServerInfo{
×
396
                Server:     srv,
×
397
                FullMethod: "/signrpc.Signer/SignOutputRaw",
×
398
        }
×
399
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
×
400
                return srv.(SignerServer).SignOutputRaw(ctx, req.(*SignReq))
×
401
        }
×
402
        return interceptor(ctx, in, info, handler)
×
403
}
404

405
func _Signer_ComputeInputScript_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
×
406
        in := new(SignReq)
×
407
        if err := dec(in); err != nil {
×
408
                return nil, err
×
409
        }
×
410
        if interceptor == nil {
×
411
                return srv.(SignerServer).ComputeInputScript(ctx, in)
×
412
        }
×
413
        info := &grpc.UnaryServerInfo{
×
414
                Server:     srv,
×
415
                FullMethod: "/signrpc.Signer/ComputeInputScript",
×
416
        }
×
417
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
×
418
                return srv.(SignerServer).ComputeInputScript(ctx, req.(*SignReq))
×
419
        }
×
420
        return interceptor(ctx, in, info, handler)
×
421
}
422

423
func _Signer_SignMessage_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
×
424
        in := new(SignMessageReq)
×
425
        if err := dec(in); err != nil {
×
426
                return nil, err
×
427
        }
×
428
        if interceptor == nil {
×
429
                return srv.(SignerServer).SignMessage(ctx, in)
×
430
        }
×
431
        info := &grpc.UnaryServerInfo{
×
432
                Server:     srv,
×
433
                FullMethod: "/signrpc.Signer/SignMessage",
×
434
        }
×
435
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
×
436
                return srv.(SignerServer).SignMessage(ctx, req.(*SignMessageReq))
×
437
        }
×
438
        return interceptor(ctx, in, info, handler)
×
439
}
440

441
func _Signer_VerifyMessage_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
×
442
        in := new(VerifyMessageReq)
×
443
        if err := dec(in); err != nil {
×
444
                return nil, err
×
445
        }
×
446
        if interceptor == nil {
×
447
                return srv.(SignerServer).VerifyMessage(ctx, in)
×
448
        }
×
449
        info := &grpc.UnaryServerInfo{
×
450
                Server:     srv,
×
451
                FullMethod: "/signrpc.Signer/VerifyMessage",
×
452
        }
×
453
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
×
454
                return srv.(SignerServer).VerifyMessage(ctx, req.(*VerifyMessageReq))
×
455
        }
×
456
        return interceptor(ctx, in, info, handler)
×
457
}
458

459
func _Signer_DeriveSharedKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
×
460
        in := new(SharedKeyRequest)
×
461
        if err := dec(in); err != nil {
×
462
                return nil, err
×
463
        }
×
464
        if interceptor == nil {
×
465
                return srv.(SignerServer).DeriveSharedKey(ctx, in)
×
466
        }
×
467
        info := &grpc.UnaryServerInfo{
×
468
                Server:     srv,
×
469
                FullMethod: "/signrpc.Signer/DeriveSharedKey",
×
470
        }
×
471
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
×
472
                return srv.(SignerServer).DeriveSharedKey(ctx, req.(*SharedKeyRequest))
×
473
        }
×
474
        return interceptor(ctx, in, info, handler)
×
475
}
476

477
func _Signer_MuSig2CombineKeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
×
478
        in := new(MuSig2CombineKeysRequest)
×
479
        if err := dec(in); err != nil {
×
480
                return nil, err
×
481
        }
×
482
        if interceptor == nil {
×
483
                return srv.(SignerServer).MuSig2CombineKeys(ctx, in)
×
484
        }
×
485
        info := &grpc.UnaryServerInfo{
×
486
                Server:     srv,
×
487
                FullMethod: "/signrpc.Signer/MuSig2CombineKeys",
×
488
        }
×
489
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
×
490
                return srv.(SignerServer).MuSig2CombineKeys(ctx, req.(*MuSig2CombineKeysRequest))
×
491
        }
×
492
        return interceptor(ctx, in, info, handler)
×
493
}
494

495
func _Signer_MuSig2CreateSession_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
×
496
        in := new(MuSig2SessionRequest)
×
497
        if err := dec(in); err != nil {
×
498
                return nil, err
×
499
        }
×
500
        if interceptor == nil {
×
501
                return srv.(SignerServer).MuSig2CreateSession(ctx, in)
×
502
        }
×
503
        info := &grpc.UnaryServerInfo{
×
504
                Server:     srv,
×
505
                FullMethod: "/signrpc.Signer/MuSig2CreateSession",
×
506
        }
×
507
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
×
508
                return srv.(SignerServer).MuSig2CreateSession(ctx, req.(*MuSig2SessionRequest))
×
509
        }
×
510
        return interceptor(ctx, in, info, handler)
×
511
}
512

513
func _Signer_MuSig2RegisterNonces_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
×
514
        in := new(MuSig2RegisterNoncesRequest)
×
515
        if err := dec(in); err != nil {
×
516
                return nil, err
×
517
        }
×
518
        if interceptor == nil {
×
519
                return srv.(SignerServer).MuSig2RegisterNonces(ctx, in)
×
520
        }
×
521
        info := &grpc.UnaryServerInfo{
×
522
                Server:     srv,
×
523
                FullMethod: "/signrpc.Signer/MuSig2RegisterNonces",
×
524
        }
×
525
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
×
526
                return srv.(SignerServer).MuSig2RegisterNonces(ctx, req.(*MuSig2RegisterNoncesRequest))
×
527
        }
×
528
        return interceptor(ctx, in, info, handler)
×
529
}
530

531
func _Signer_MuSig2Sign_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
×
532
        in := new(MuSig2SignRequest)
×
533
        if err := dec(in); err != nil {
×
534
                return nil, err
×
535
        }
×
536
        if interceptor == nil {
×
537
                return srv.(SignerServer).MuSig2Sign(ctx, in)
×
538
        }
×
539
        info := &grpc.UnaryServerInfo{
×
540
                Server:     srv,
×
541
                FullMethod: "/signrpc.Signer/MuSig2Sign",
×
542
        }
×
543
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
×
544
                return srv.(SignerServer).MuSig2Sign(ctx, req.(*MuSig2SignRequest))
×
545
        }
×
546
        return interceptor(ctx, in, info, handler)
×
547
}
548

549
func _Signer_MuSig2CombineSig_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
×
550
        in := new(MuSig2CombineSigRequest)
×
551
        if err := dec(in); err != nil {
×
552
                return nil, err
×
553
        }
×
554
        if interceptor == nil {
×
555
                return srv.(SignerServer).MuSig2CombineSig(ctx, in)
×
556
        }
×
557
        info := &grpc.UnaryServerInfo{
×
558
                Server:     srv,
×
559
                FullMethod: "/signrpc.Signer/MuSig2CombineSig",
×
560
        }
×
561
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
×
562
                return srv.(SignerServer).MuSig2CombineSig(ctx, req.(*MuSig2CombineSigRequest))
×
563
        }
×
564
        return interceptor(ctx, in, info, handler)
×
565
}
566

567
func _Signer_MuSig2Cleanup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
×
568
        in := new(MuSig2CleanupRequest)
×
569
        if err := dec(in); err != nil {
×
570
                return nil, err
×
571
        }
×
572
        if interceptor == nil {
×
573
                return srv.(SignerServer).MuSig2Cleanup(ctx, in)
×
574
        }
×
575
        info := &grpc.UnaryServerInfo{
×
576
                Server:     srv,
×
577
                FullMethod: "/signrpc.Signer/MuSig2Cleanup",
×
578
        }
×
579
        handler := func(ctx context.Context, req interface{}) (interface{}, error) {
×
580
                return srv.(SignerServer).MuSig2Cleanup(ctx, req.(*MuSig2CleanupRequest))
×
581
        }
×
582
        return interceptor(ctx, in, info, handler)
×
583
}
584

585
// Signer_ServiceDesc is the grpc.ServiceDesc for Signer service.
586
// It's only intended for direct use with grpc.RegisterService,
587
// and not to be introspected or modified (even as a copy)
588
var Signer_ServiceDesc = grpc.ServiceDesc{
589
        ServiceName: "signrpc.Signer",
590
        HandlerType: (*SignerServer)(nil),
591
        Methods: []grpc.MethodDesc{
592
                {
593
                        MethodName: "SignOutputRaw",
594
                        Handler:    _Signer_SignOutputRaw_Handler,
595
                },
596
                {
597
                        MethodName: "ComputeInputScript",
598
                        Handler:    _Signer_ComputeInputScript_Handler,
599
                },
600
                {
601
                        MethodName: "SignMessage",
602
                        Handler:    _Signer_SignMessage_Handler,
603
                },
604
                {
605
                        MethodName: "VerifyMessage",
606
                        Handler:    _Signer_VerifyMessage_Handler,
607
                },
608
                {
609
                        MethodName: "DeriveSharedKey",
610
                        Handler:    _Signer_DeriveSharedKey_Handler,
611
                },
612
                {
613
                        MethodName: "MuSig2CombineKeys",
614
                        Handler:    _Signer_MuSig2CombineKeys_Handler,
615
                },
616
                {
617
                        MethodName: "MuSig2CreateSession",
618
                        Handler:    _Signer_MuSig2CreateSession_Handler,
619
                },
620
                {
621
                        MethodName: "MuSig2RegisterNonces",
622
                        Handler:    _Signer_MuSig2RegisterNonces_Handler,
623
                },
624
                {
625
                        MethodName: "MuSig2Sign",
626
                        Handler:    _Signer_MuSig2Sign_Handler,
627
                },
628
                {
629
                        MethodName: "MuSig2CombineSig",
630
                        Handler:    _Signer_MuSig2CombineSig_Handler,
631
                },
632
                {
633
                        MethodName: "MuSig2Cleanup",
634
                        Handler:    _Signer_MuSig2Cleanup_Handler,
635
                },
636
        },
637
        Streams:  []grpc.StreamDesc{},
638
        Metadata: "signrpc/signer.proto",
639
}
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc