Struct lightning_signer::util::loopback::LoopbackSignerKeysInterface [−][src]
pub struct LoopbackSignerKeysInterface {
pub node_id: PublicKey,
pub signer: Arc<MultiSigner>,
}
Expand description
Adapt MySigner to KeysInterface
Fields
node_id: PublicKey
signer: Arc<MultiSigner>
Implementations
pub fn spend_spendable_outputs(
&self,
descriptors: &[&SpendableOutputDescriptor],
outputs: Vec<TxOut>,
change_destination_script: Script,
feerate_sat_per_1000_weight: u32,
secp_ctx: &Secp256k1<All>
) -> Result<Transaction, ()>
Trait Implementations
type Signer = LoopbackChannelSigner
type Signer = LoopbackChannelSigner
A type which implements Sign which will be returned by get_channel_signer.
Get node secret key (aka node_id or network_key). Read more
Get a script pubkey which we send funds to when claiming on-chain contestable outputs. Read more
Get a script pubkey which we will send funds to when closing a channel. Read more
Get a new set of Sign for per-channel secrets. These MUST be unique even if you restarted with some stale data! Read more
Gets a unique, cryptographically-secure, random 32 byte value. This is used for encrypting onion packets and for temporary channel IDs. There is no requirement that these be persisted anywhere, though they must be unique across restarts. Read more
Reads a Signer
for this KeysInterface
from the given input stream.
This is only called during deserialization of other objects which contain
Sign
-implementing objects (ie ChannelMonitor
s and ChannelManager
s).
The bytes are exactly those which <Self::Signer as Writeable>::write()
writes, and
contain no versioning scheme. You may wish to include your own version prefix and ensure
you’ve read all of the provided bytes to ensure no corruption occurred. Read more
Sign an invoice’s preimage (note that this is the preimage of the invoice, not the HTLC’s preimage). By parameterizing by the preimage instead of the hash, we allow implementors of this trait to parse the invoice and make sure they’re signing what they expect, rather than blindly signing the hash. Read more
Get secret key material as bytes for use in encrypting and decrypting inbound payment data. Read more