@@ -46,7 +46,7 @@ use crate::sync::{RwLock, RwLockReadGuard, Mutex, MutexGuard};
46
46
use crate :: types:: features:: { InitFeatures , NodeFeatures } ;
47
47
use core:: ops:: Deref ;
48
48
use core:: sync:: atomic:: { AtomicUsize , Ordering } ;
49
- use bitcoin:: secp256k1:: { PublicKey , SecretKey } ;
49
+ use bitcoin:: secp256k1:: PublicKey ;
50
50
51
51
/// `Persist` defines behavior for persisting channel monitors: this could mean
52
52
/// writing once to disk, and/or uploading to one or more backup services.
@@ -257,7 +257,7 @@ pub struct ChainMonitor<ChannelSigner: EcdsaChannelSigner, C: Deref, T: Deref, F
257
257
event_notifier : Notifier ,
258
258
pending_send_only_events : Mutex < Vec < MessageSendEvent > > ,
259
259
260
- our_peerstorage_encryption_key : SecretKey ,
260
+ our_peerstorage_encryption_key : [ u8 ; 32 ] ,
261
261
}
262
262
263
263
impl < ChannelSigner : EcdsaChannelSigner , C : Deref , T : Deref , F : Deref , L : Deref , P : Deref > ChainMonitor < ChannelSigner , C , T , F , L , P >
@@ -399,7 +399,7 @@ where C::Target: chain::Filter,
399
399
/// **Important**: This key should not be set arbitrarily or changed after initialization. The same key
400
400
/// is obtained by the `ChannelManager` through `KeyMananger` to decrypt peer backups.
401
401
/// Using an inconsistent or incorrect key will result in the inability to decrypt previously encrypted backups.
402
- pub fn new ( chain_source : Option < C > , broadcaster : T , logger : L , feeest : F , persister : P , our_peerstorage_encryption_key : SecretKey ) -> Self {
402
+ pub fn new ( chain_source : Option < C > , broadcaster : T , logger : L , feeest : F , persister : P , our_peerstorage_encryption_key : [ u8 ; 32 ] ) -> Self {
403
403
Self {
404
404
monitors : RwLock :: new ( new_hash_map ( ) ) ,
405
405
chain_source,
@@ -696,10 +696,10 @@ where C::Target: chain::Filter,
696
696
fn send_peer_storage ( & self , their_node_id : PublicKey ) {
697
697
// TODO: Serialize `ChannelMonitor`s inside `our_peer_storage`.
698
698
699
- let encrypted_data = OurPeerStorage :: create_from_data ( self . our_peerstorage_encryption_key , Vec :: new ( ) ) ;
699
+ let our_peer_storage = OurPeerStorage :: create_from_data ( self . our_peerstorage_encryption_key , Vec :: new ( ) ) ;
700
700
log_debug ! ( self . logger, "Sending Peer Storage from chainmonitor" ) ;
701
701
self . pending_send_only_events . lock ( ) . unwrap ( ) . push ( MessageSendEvent :: SendPeerStorage { node_id : their_node_id,
702
- msg : msgs:: PeerStorage { data : encrypted_data } } )
702
+ msg : msgs:: PeerStorage { data : our_peer_storage . encrypted_data ( ) } } )
703
703
}
704
704
}
705
705
0 commit comments