Skip to content

Commit 9cde57e

Browse files
committed
Remove channel_value_satoshis from SignerProvider
Now that channel_value_satoshis has been moved to ChannelTransactionParameters, it no longer needs to be used when deriving a signer. This is a breaking API change, though InMemorySigner did not make use of channel_value_satoshis when being derived.
1 parent 88bcf88 commit 9cde57e

File tree

10 files changed

+45
-109
lines changed

10 files changed

+45
-109
lines changed

fuzz/src/chanmon_consistency.rs

+2-7
Original file line numberDiff line numberDiff line change
@@ -354,16 +354,12 @@ impl SignerProvider for KeyProvider {
354354
#[cfg(taproot)]
355355
type TaprootSigner = TestChannelSigner;
356356

357-
fn generate_channel_keys_id(
358-
&self, _inbound: bool, _channel_value_satoshis: u64, _user_channel_id: u128,
359-
) -> [u8; 32] {
357+
fn generate_channel_keys_id(&self, _inbound: bool, _user_channel_id: u128) -> [u8; 32] {
360358
let id = self.rand_bytes_id.fetch_add(1, atomic::Ordering::Relaxed) as u8;
361359
[id; 32]
362360
}
363361

364-
fn derive_channel_signer(
365-
&self, channel_value_satoshis: u64, channel_keys_id: [u8; 32],
366-
) -> Self::EcdsaSigner {
362+
fn derive_channel_signer(&self, channel_keys_id: [u8; 32]) -> Self::EcdsaSigner {
367363
let secp_ctx = Secp256k1::signing_only();
368364
let id = channel_keys_id[0];
369365
#[rustfmt::skip]
@@ -375,7 +371,6 @@ impl SignerProvider for KeyProvider {
375371
SecretKey::from_slice(&[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 7, self.node_secret[31]]).unwrap(),
376372
SecretKey::from_slice(&[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 8, self.node_secret[31]]).unwrap(),
377373
[id, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 9, self.node_secret[31]],
378-
channel_value_satoshis,
379374
channel_keys_id,
380375
channel_keys_id,
381376
);

fuzz/src/full_stack.rs

+2-8
Original file line numberDiff line numberDiff line change
@@ -426,19 +426,15 @@ impl SignerProvider for KeyProvider {
426426
#[cfg(taproot)]
427427
type TaprootSigner = TestChannelSigner;
428428

429-
fn generate_channel_keys_id(
430-
&self, inbound: bool, _channel_value_satoshis: u64, _user_channel_id: u128,
431-
) -> [u8; 32] {
429+
fn generate_channel_keys_id(&self, inbound: bool, _user_channel_id: u128) -> [u8; 32] {
432430
let ctr = self.counter.fetch_add(1, Ordering::Relaxed) as u8;
433431
self.signer_state
434432
.borrow_mut()
435433
.insert(ctr, (inbound, Arc::new(Mutex::new(EnforcementState::new()))));
436434
[ctr; 32]
437435
}
438436

439-
fn derive_channel_signer(
440-
&self, channel_value_satoshis: u64, channel_keys_id: [u8; 32],
441-
) -> Self::EcdsaSigner {
437+
fn derive_channel_signer(&self, channel_keys_id: [u8; 32]) -> Self::EcdsaSigner {
442438
let secp_ctx = Secp256k1::signing_only();
443439
let ctr = channel_keys_id[0];
444440
let (inbound, state) = self.signer_state.borrow().get(&ctr).unwrap().clone();
@@ -475,7 +471,6 @@ impl SignerProvider for KeyProvider {
475471
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
476472
0, 0, 0, 0, 0, 6, ctr,
477473
],
478-
channel_value_satoshis,
479474
channel_keys_id,
480475
channel_keys_id,
481476
)
@@ -511,7 +506,6 @@ impl SignerProvider for KeyProvider {
511506
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
512507
0, 0, 0, 0, 0, 12, ctr,
513508
],
514-
channel_value_satoshis,
515509
channel_keys_id,
516510
channel_keys_id,
517511
)

fuzz/src/onion_message.rs

+2-6
Original file line numberDiff line numberDiff line change
@@ -253,15 +253,11 @@ impl SignerProvider for KeyProvider {
253253
#[cfg(taproot)]
254254
type TaprootSigner = TestChannelSigner;
255255

256-
fn generate_channel_keys_id(
257-
&self, _inbound: bool, _channel_value_satoshis: u64, _user_channel_id: u128,
258-
) -> [u8; 32] {
256+
fn generate_channel_keys_id(&self, _inbound: bool, _user_channel_id: u128) -> [u8; 32] {
259257
unreachable!()
260258
}
261259

262-
fn derive_channel_signer(
263-
&self, _channel_value_satoshis: u64, _channel_keys_id: [u8; 32],
264-
) -> Self::EcdsaSigner {
260+
fn derive_channel_signer(&self, _channel_keys_id: [u8; 32]) -> Self::EcdsaSigner {
265261
unreachable!()
266262
}
267263

lightning/src/chain/channelmonitor.rs

-2
Original file line numberDiff line numberDiff line change
@@ -5401,7 +5401,6 @@ mod tests {
54015401
SecretKey::from_slice(&[41; 32]).unwrap(),
54025402
SecretKey::from_slice(&[41; 32]).unwrap(),
54035403
[41; 32],
5404-
0,
54055404
[0; 32],
54065405
[0; 32],
54075406
);
@@ -5654,7 +5653,6 @@ mod tests {
56545653
SecretKey::from_slice(&[41; 32]).unwrap(),
56555654
SecretKey::from_slice(&[41; 32]).unwrap(),
56565655
[41; 32],
5657-
0,
56585656
[0; 32],
56595657
[0; 32],
56605658
);

lightning/src/chain/onchaintx.rs

+1-2
Original file line numberDiff line numberDiff line change
@@ -383,7 +383,7 @@ impl<'a, 'b, ES: EntropySource, SP: SignerProvider> ReadableArgs<(&'a ES, &'b SP
383383
bytes_read += bytes_to_read;
384384
}
385385

386-
let signer = signer_provider.derive_channel_signer(channel_value_satoshis, channel_keys_id);
386+
let signer = signer_provider.derive_channel_signer(channel_keys_id);
387387

388388
let pending_claim_requests_len: u64 = Readable::read(reader)?;
389389
let mut pending_claim_requests = hash_map_with_capacity(cmp::min(pending_claim_requests_len as usize, MAX_ALLOC_SIZE / 128));
@@ -1314,7 +1314,6 @@ mod tests {
13141314
SecretKey::from_slice(&[41; 32]).unwrap(),
13151315
SecretKey::from_slice(&[41; 32]).unwrap(),
13161316
[41; 32],
1317-
0,
13181317
[0; 32],
13191318
[0; 32],
13201319
);

lightning/src/events/bump_transaction.rs

+1-4
Original file line numberDiff line numberDiff line change
@@ -97,10 +97,7 @@ impl AnchorDescriptor {
9797
where
9898
SP::Target: SignerProvider<EcdsaSigner= S>
9999
{
100-
signer_provider.derive_channel_signer(
101-
self.channel_derivation_parameters.value_satoshis,
102-
self.channel_derivation_parameters.keys_id,
103-
)
100+
signer_provider.derive_channel_signer(self.channel_derivation_parameters.keys_id)
104101
}
105102
}
106103

lightning/src/ln/chan_utils.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -1944,8 +1944,8 @@ mod tests {
19441944
let seed = [42; 32];
19451945
let network = Network::Testnet;
19461946
let keys_provider = test_utils::TestKeysInterface::new(&seed, network);
1947-
let signer = keys_provider.derive_channel_signer(3000, keys_provider.generate_channel_keys_id(false, 1_000_000, 0));
1948-
let counterparty_signer = keys_provider.derive_channel_signer(3000, keys_provider.generate_channel_keys_id(true, 1_000_000, 1));
1947+
let signer = keys_provider.derive_channel_signer(keys_provider.generate_channel_keys_id(false, 0));
1948+
let counterparty_signer = keys_provider.derive_channel_signer(keys_provider.generate_channel_keys_id(true, 1));
19491949
let delayed_payment_base = &signer.pubkeys().delayed_payment_basepoint;
19501950
let per_commitment_secret = SecretKey::from_slice(&<Vec<u8>>::from_hex("1f1e1d1c1b1a191817161514131211100f0e0d0c0b0a09080706050403020100").unwrap()[..]).unwrap();
19511951
let per_commitment_point = PublicKey::from_secret_key(&secp_ctx, &per_commitment_secret);

lightning/src/ln/channel.rs

+11-12
Original file line numberDiff line numberDiff line change
@@ -2119,7 +2119,7 @@ trait InitialRemoteCommitmentReceiver<SP: Deref> where SP::Target: SignerProvide
21192119
let funding_txo_script = funding_redeemscript.to_p2wsh();
21202120
let obscure_factor = get_commitment_transaction_number_obscure_factor(&funding.get_holder_pubkeys().payment_point, &funding.get_counterparty_pubkeys().payment_point, funding.is_outbound());
21212121
let shutdown_script = context.shutdown_scriptpubkey.clone().map(|script| script.into_inner());
2122-
let monitor_signer = signer_provider.derive_channel_signer(funding.get_value_satoshis(), context.channel_keys_id);
2122+
let monitor_signer = signer_provider.derive_channel_signer(context.channel_keys_id);
21232123
// TODO(RBF): When implementing RBF, the funding_txo passed here must only update
21242124
// ChannelMonitorImp::first_confirmed_funding_txo during channel establishment, not splicing
21252125
let channel_monitor = ChannelMonitor::new(context.secp_ctx.clone(), monitor_signer,
@@ -2407,8 +2407,8 @@ impl<SP: Deref> ChannelContext<SP> where SP::Target: SignerProvider {
24072407

24082408
let channel_value_satoshis = our_funding_satoshis.saturating_add(open_channel_fields.funding_satoshis);
24092409

2410-
let channel_keys_id = signer_provider.generate_channel_keys_id(true, channel_value_satoshis, user_id);
2411-
let holder_signer = signer_provider.derive_channel_signer(channel_value_satoshis, channel_keys_id);
2410+
let channel_keys_id = signer_provider.generate_channel_keys_id(true, user_id);
2411+
let holder_signer = signer_provider.derive_channel_signer(channel_keys_id);
24122412
let pubkeys = holder_signer.pubkeys().clone();
24132413

24142414
if config.channel_handshake_config.our_to_self_delay < BREAKDOWN_TIMEOUT {
@@ -9004,8 +9004,8 @@ impl<SP: Deref> OutboundV1Channel<SP> where SP::Target: SignerProvider {
90049004
implemention limit dust_limit_satoshis {}", holder_selected_channel_reserve_satoshis) });
90059005
}
90069006

9007-
let channel_keys_id = signer_provider.generate_channel_keys_id(false, channel_value_satoshis, user_id);
9008-
let holder_signer = signer_provider.derive_channel_signer(channel_value_satoshis, channel_keys_id);
9007+
let channel_keys_id = signer_provider.generate_channel_keys_id(false, user_id);
9008+
let holder_signer = signer_provider.derive_channel_signer(channel_keys_id);
90099009
let pubkeys = holder_signer.pubkeys().clone();
90109010

90119011
let (funding, context) = ChannelContext::new_for_outbound_channel(
@@ -9561,8 +9561,8 @@ impl<SP: Deref> PendingV2Channel<SP> where SP::Target: SignerProvider {
95619561
F::Target: FeeEstimator,
95629562
L::Target: Logger,
95639563
{
9564-
let channel_keys_id = signer_provider.generate_channel_keys_id(false, funding_satoshis, user_id);
9565-
let holder_signer = signer_provider.derive_channel_signer(funding_satoshis, channel_keys_id);
9564+
let channel_keys_id = signer_provider.generate_channel_keys_id(false, user_id);
9565+
let holder_signer = signer_provider.derive_channel_signer(channel_keys_id);
95669566
let pubkeys = holder_signer.pubkeys().clone();
95679567

95689568
let temporary_channel_id = Some(ChannelId::temporary_v2_from_revocation_basepoint(&pubkeys.revocation_basepoint));
@@ -10615,7 +10615,7 @@ impl<'a, 'b, 'c, ES: Deref, SP: Deref> ReadableArgs<(&'a ES, &'b SP, u32, &'c Ch
1061510615
});
1061610616

1061710617
let (channel_keys_id, holder_signer) = if let Some(channel_keys_id) = channel_keys_id {
10618-
let holder_signer = signer_provider.derive_channel_signer(channel_value_satoshis, channel_keys_id);
10618+
let holder_signer = signer_provider.derive_channel_signer(channel_keys_id);
1061910619
(channel_keys_id, holder_signer)
1062010620
} else {
1062110621
return Err(DecodeError::InvalidValue);
@@ -10970,11 +10970,11 @@ mod tests {
1097010970
#[cfg(taproot)]
1097110971
type TaprootSigner = InMemorySigner;
1097210972

10973-
fn generate_channel_keys_id(&self, _inbound: bool, _channel_value_satoshis: u64, _user_channel_id: u128) -> [u8; 32] {
10973+
fn generate_channel_keys_id(&self, _inbound: bool, _user_channel_id: u128) -> [u8; 32] {
1097410974
self.signer.channel_keys_id()
1097510975
}
1097610976

10977-
fn derive_channel_signer(&self, _channel_value_satoshis: u64, _channel_keys_id: [u8; 32]) -> Self::EcdsaSigner {
10977+
fn derive_channel_signer(&self, _channel_keys_id: [u8; 32]) -> Self::EcdsaSigner {
1097810978
self.signer.clone()
1097910979
}
1098010980

@@ -11597,7 +11597,7 @@ mod tests {
1159711597
let logger : Arc<dyn Logger> = Arc::new(test_utils::TestLogger::new());
1159811598
let secp_ctx = Secp256k1::new();
1159911599

11600-
let mut signer = InMemorySigner::new(
11600+
let signer = InMemorySigner::new(
1160111601
&secp_ctx,
1160211602
SecretKey::from_slice(&<Vec<u8>>::from_hex("30ff4956bbdd3222d44cc5e8a1261dab1e07957bdac5ae88fe3261ef321f3749").unwrap()[..]).unwrap(),
1160311603
SecretKey::from_slice(&<Vec<u8>>::from_hex("0fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff").unwrap()[..]).unwrap(),
@@ -11607,7 +11607,6 @@ mod tests {
1160711607

1160811608
// These aren't set in the test vectors:
1160911609
[0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff],
11610-
10_000_000,
1161111610
[0; 32],
1161211611
[0; 32],
1161311612
);

lightning/src/sign/mod.rs

+16-48
Original file line numberDiff line numberDiff line change
@@ -709,10 +709,7 @@ impl HTLCDescriptor {
709709
where
710710
SP::Target: SignerProvider<EcdsaSigner = S>,
711711
{
712-
signer_provider.derive_channel_signer(
713-
self.channel_derivation_parameters.value_satoshis,
714-
self.channel_derivation_parameters.keys_id,
715-
)
712+
signer_provider.derive_channel_signer(self.channel_derivation_parameters.keys_id)
716713
}
717714
}
718715

@@ -949,19 +946,15 @@ pub trait SignerProvider {
949946
/// `channel_keys_id`.
950947
///
951948
/// This method must return a different value each time it is called.
952-
fn generate_channel_keys_id(
953-
&self, inbound: bool, channel_value_satoshis: u64, user_channel_id: u128,
954-
) -> [u8; 32];
949+
fn generate_channel_keys_id(&self, inbound: bool, user_channel_id: u128) -> [u8; 32];
955950

956951
/// Derives the private key material backing a `Signer`.
957952
///
958953
/// To derive a new `Signer`, a fresh `channel_keys_id` should be obtained through
959954
/// [`SignerProvider::generate_channel_keys_id`]. Otherwise, an existing `Signer` can be
960955
/// re-derived from its `channel_keys_id`, which can be obtained through its trait method
961956
/// [`ChannelSigner::channel_keys_id`].
962-
fn derive_channel_signer(
963-
&self, channel_value_satoshis: u64, channel_keys_id: [u8; 32],
964-
) -> Self::EcdsaSigner;
957+
fn derive_channel_signer(&self, channel_keys_id: [u8; 32]) -> Self::EcdsaSigner;
965958

966959
/// Get a script pubkey which we send funds to when claiming on-chain contestable outputs.
967960
///
@@ -1014,8 +1007,6 @@ pub struct InMemorySigner {
10141007
pub commitment_seed: [u8; 32],
10151008
/// Holder public keys and basepoints.
10161009
pub(crate) holder_channel_pubkeys: ChannelPublicKeys,
1017-
/// The total value of this channel.
1018-
channel_value_satoshis: u64,
10191010
/// Key derivation parameters.
10201011
channel_keys_id: [u8; 32],
10211012
/// A source of random bytes.
@@ -1031,7 +1022,6 @@ impl PartialEq for InMemorySigner {
10311022
&& self.htlc_base_key == other.htlc_base_key
10321023
&& self.commitment_seed == other.commitment_seed
10331024
&& self.holder_channel_pubkeys == other.holder_channel_pubkeys
1034-
&& self.channel_value_satoshis == other.channel_value_satoshis
10351025
&& self.channel_keys_id == other.channel_keys_id
10361026
}
10371027
}
@@ -1046,7 +1036,6 @@ impl Clone for InMemorySigner {
10461036
htlc_base_key: self.htlc_base_key.clone(),
10471037
commitment_seed: self.commitment_seed.clone(),
10481038
holder_channel_pubkeys: self.holder_channel_pubkeys.clone(),
1049-
channel_value_satoshis: self.channel_value_satoshis,
10501039
channel_keys_id: self.channel_keys_id,
10511040
entropy_source: RandomBytes::new(self.get_secure_random_bytes()),
10521041
}
@@ -1058,8 +1047,7 @@ impl InMemorySigner {
10581047
pub fn new<C: Signing>(
10591048
secp_ctx: &Secp256k1<C>, funding_key: SecretKey, revocation_base_key: SecretKey,
10601049
payment_key: SecretKey, delayed_payment_base_key: SecretKey, htlc_base_key: SecretKey,
1061-
commitment_seed: [u8; 32], channel_value_satoshis: u64, channel_keys_id: [u8; 32],
1062-
rand_bytes_unique_start: [u8; 32],
1050+
commitment_seed: [u8; 32], channel_keys_id: [u8; 32], rand_bytes_unique_start: [u8; 32],
10631051
) -> InMemorySigner {
10641052
let holder_channel_pubkeys = InMemorySigner::make_holder_keys(
10651053
secp_ctx,
@@ -1076,7 +1064,6 @@ impl InMemorySigner {
10761064
delayed_payment_base_key,
10771065
htlc_base_key,
10781066
commitment_seed,
1079-
channel_value_satoshis,
10801067
holder_channel_pubkeys,
10811068
channel_keys_id,
10821069
entropy_source: RandomBytes::new(rand_bytes_unique_start),
@@ -1831,9 +1818,7 @@ impl KeysManager {
18311818
}
18321819

18331820
/// Derive an old [`EcdsaChannelSigner`] containing per-channel secrets based on a key derivation parameters.
1834-
pub fn derive_channel_keys(
1835-
&self, channel_value_satoshis: u64, params: &[u8; 32],
1836-
) -> InMemorySigner {
1821+
pub fn derive_channel_keys(&self, params: &[u8; 32]) -> InMemorySigner {
18371822
let chan_id = u64::from_be_bytes(params[0..8].try_into().unwrap());
18381823
let mut unique_start = Sha256::engine();
18391824
unique_start.input(params);
@@ -1885,7 +1870,6 @@ impl KeysManager {
18851870
delayed_payment_base_key,
18861871
htlc_base_key,
18871872
commitment_seed,
1888-
channel_value_satoshis,
18891873
params.clone(),
18901874
prng_seed,
18911875
)
@@ -1917,10 +1901,7 @@ impl KeysManager {
19171901
if keys_cache.is_none()
19181902
|| keys_cache.as_ref().unwrap().1 != descriptor.channel_keys_id
19191903
{
1920-
let signer = self.derive_channel_keys(
1921-
descriptor.channel_value_satoshis,
1922-
&descriptor.channel_keys_id,
1923-
);
1904+
let signer = self.derive_channel_keys(&descriptor.channel_keys_id);
19241905
keys_cache = Some((signer, descriptor.channel_keys_id));
19251906
}
19261907
let witness = keys_cache.as_ref().unwrap().0.sign_counterparty_payment_input(
@@ -1937,10 +1918,7 @@ impl KeysManager {
19371918
|| keys_cache.as_ref().unwrap().1 != descriptor.channel_keys_id
19381919
{
19391920
keys_cache = Some((
1940-
self.derive_channel_keys(
1941-
descriptor.channel_value_satoshis,
1942-
&descriptor.channel_keys_id,
1943-
),
1921+
self.derive_channel_keys(&descriptor.channel_keys_id),
19441922
descriptor.channel_keys_id,
19451923
));
19461924
}
@@ -2109,9 +2087,7 @@ impl SignerProvider for KeysManager {
21092087
#[cfg(taproot)]
21102088
type TaprootSigner = InMemorySigner;
21112089

2112-
fn generate_channel_keys_id(
2113-
&self, _inbound: bool, _channel_value_satoshis: u64, user_channel_id: u128,
2114-
) -> [u8; 32] {
2090+
fn generate_channel_keys_id(&self, _inbound: bool, user_channel_id: u128) -> [u8; 32] {
21152091
let child_idx = self.channel_child_index.fetch_add(1, Ordering::AcqRel);
21162092
// `child_idx` is the only thing guaranteed to make each channel unique without a restart
21172093
// (though `user_channel_id` should help, depending on user behavior). If it manages to
@@ -2127,10 +2103,8 @@ impl SignerProvider for KeysManager {
21272103
id
21282104
}
21292105

2130-
fn derive_channel_signer(
2131-
&self, channel_value_satoshis: u64, channel_keys_id: [u8; 32],
2132-
) -> Self::EcdsaSigner {
2133-
self.derive_channel_keys(channel_value_satoshis, &channel_keys_id)
2106+
fn derive_channel_signer(&self, channel_keys_id: [u8; 32]) -> Self::EcdsaSigner {
2107+
self.derive_channel_keys(&channel_keys_id)
21342108
}
21352109

21362110
fn get_destination_script(&self, _channel_keys_id: [u8; 32]) -> Result<ScriptBuf, ()> {
@@ -2250,16 +2224,12 @@ impl SignerProvider for PhantomKeysManager {
22502224
#[cfg(taproot)]
22512225
type TaprootSigner = InMemorySigner;
22522226

2253-
fn generate_channel_keys_id(
2254-
&self, inbound: bool, channel_value_satoshis: u64, user_channel_id: u128,
2255-
) -> [u8; 32] {
2256-
self.inner.generate_channel_keys_id(inbound, channel_value_satoshis, user_channel_id)
2227+
fn generate_channel_keys_id(&self, inbound: bool, user_channel_id: u128) -> [u8; 32] {
2228+
self.inner.generate_channel_keys_id(inbound, user_channel_id)
22572229
}
22582230

2259-
fn derive_channel_signer(
2260-
&self, channel_value_satoshis: u64, channel_keys_id: [u8; 32],
2261-
) -> Self::EcdsaSigner {
2262-
self.inner.derive_channel_signer(channel_value_satoshis, channel_keys_id)
2231+
fn derive_channel_signer(&self, channel_keys_id: [u8; 32]) -> Self::EcdsaSigner {
2232+
self.inner.derive_channel_signer(channel_keys_id)
22632233
}
22642234

22652235
fn get_destination_script(&self, channel_keys_id: [u8; 32]) -> Result<ScriptBuf, ()> {
@@ -2303,10 +2273,8 @@ impl PhantomKeysManager {
23032273
}
23042274

23052275
/// See [`KeysManager::derive_channel_keys`] for documentation on this method.
2306-
pub fn derive_channel_keys(
2307-
&self, channel_value_satoshis: u64, params: &[u8; 32],
2308-
) -> InMemorySigner {
2309-
self.inner.derive_channel_keys(channel_value_satoshis, params)
2276+
pub fn derive_channel_keys(&self, params: &[u8; 32]) -> InMemorySigner {
2277+
self.inner.derive_channel_keys(params)
23102278
}
23112279

23122280
/// Gets the "node_id" secret key used to sign gossip announcements, decode onion data, etc.

0 commit comments

Comments
 (0)