@@ -1498,8 +1498,6 @@ static struct io_plan *handle_get_per_commitment_point(struct io_conn *conn,
14981498 struct client * c ,
14991499 const u8 * msg_in )
15001500{
1501- struct secret channel_seed ;
1502- struct sha256 shaseed ;
15031501 struct pubkey per_commitment_point ;
15041502 u64 n ;
15051503 struct secret * old_secret ;
@@ -1518,32 +1516,7 @@ static struct io_plan *handle_get_per_commitment_point(struct io_conn *conn,
15181516 return bad_req_fmt (conn , c , msg_in ,
15191517 "proxy_%s error: %s" , __FUNCTION__ ,
15201518 proxy_last_message ());
1521- g_proxy_impl = PROXY_IMPL_MARSHALED ;
1522-
1523- /* FIXME - lightning-signer server only currently returns the
1524- * per_commitment_point, use the original code to compute the
1525- * old_secret for now.
1526- */
1527- get_channel_seed (& c -> id , c -> dbid , & channel_seed );
1528- if (!derive_shaseed (& channel_seed , & shaseed ))
1529- return bad_req_fmt (conn , c , msg_in , "bad derive_shaseed" );
1530-
1531- /*
1532- if (!per_commit_point(&shaseed, &per_commitment_point, n))
1533- return bad_req_fmt(conn, c, msg_in,
1534- "bad per_commit_point %"PRIu64, n);
1535- */
1536-
1537- /* FIXME - replace this with old_secret from the server */
1538- if (n >= 2 ) {
1539- old_secret = tal (tmpctx , struct secret );
1540- if (!per_commit_secret (& shaseed , old_secret , n - 2 )) {
1541- return bad_req_fmt (conn , c , msg_in ,
1542- "Cannot derive secret %" PRIu64 ,
1543- n - 2 );
1544- }
1545- } else
1546- old_secret = NULL ;
1519+ g_proxy_impl = PROXY_IMPL_COMPLETE ;
15471520
15481521 /*~ hsm_client_wire.csv marks the secret field here optional, so it only
15491522 * gets included if the parameter is non-NULL. We violate 80 columns
0 commit comments