diff --git a/eth2util/enr/enr_internal_test.go b/eth2util/enr/enr_internal_test.go index c535230fc..4ef773e4e 100644 --- a/eth2util/enr/enr_internal_test.go +++ b/eth2util/enr/enr_internal_test.go @@ -16,7 +16,7 @@ import ( func TestBackwardsENR(t *testing.T) { random := rand.New(rand.NewSource(time.Now().Unix())) for range 100 { - k, err := ecdsa.GenerateKey(k1.S256(), random) + k, err := ecdsa.GenerateKey(k1.S256(), random) //nolint:staticcheck // We are using k1.S256() in tests, it's not a security issue. require.NoError(t, err) // We expect a bit more utility functions to be implemented in the k1 package in the future diff --git a/go.mod b/go.mod index ee4eee942..2a0d045f8 100644 --- a/go.mod +++ b/go.mod @@ -7,7 +7,7 @@ require ( github.com/attestantio/go-builder-client v0.7.2 github.com/attestantio/go-eth2-client v0.27.1 github.com/coinbase/kryptology v1.5.6-0.20220316191335-269410e1b06b - github.com/decred/dcrd/dcrec/secp256k1/v4 v4.4.0 + github.com/decred/dcrd/dcrec/secp256k1/v4 v4.4.1 github.com/drand/kyber v1.3.2 github.com/drand/kyber-bls12381 v0.3.4 github.com/ethereum/go-ethereum v1.17.1 diff --git a/go.sum b/go.sum index 263e4e7ae..edb36b1e3 100644 --- a/go.sum +++ b/go.sum @@ -119,8 +119,8 @@ github.com/deckarep/golang-set/v2 v2.8.0 h1:swm0rlPCmdWn9mESxKOjWk8hXSqoxOp+Zlfu github.com/deckarep/golang-set/v2 v2.8.0/go.mod h1:VAky9rY/yGXJOLEDv3OMci+7wtDpOF4IN+y82NBOac4= github.com/decred/dcrd/crypto/blake256 v1.1.0 h1:zPMNGQCm0g4QTY27fOCorQW7EryeQ/U0x++OzVrdms8= github.com/decred/dcrd/crypto/blake256 v1.1.0/go.mod h1:2OfgNZ5wDpcsFmHmCK5gZTPcCXqlm2ArzUIkw9czNJo= -github.com/decred/dcrd/dcrec/secp256k1/v4 v4.4.0 h1:NMZiJj8QnKe1LgsbDayM4UoHwbvwDRwnI3hwNaAHRnc= -github.com/decred/dcrd/dcrec/secp256k1/v4 v4.4.0/go.mod h1:ZXNYxsqcloTdSy/rNShjYzMhyjf0LaoftYK0p+A3h40= +github.com/decred/dcrd/dcrec/secp256k1/v4 v4.4.1 h1:5RVFMOWjMyRy8cARdy79nAmgYw3hK/4HUq48LQ6Wwqo= +github.com/decred/dcrd/dcrec/secp256k1/v4 v4.4.1/go.mod h1:ZXNYxsqcloTdSy/rNShjYzMhyjf0LaoftYK0p+A3h40= github.com/distribution/reference v0.6.0 h1:0IXCQ5g4/QMHHkarYzh5l+u8T3t73zM5QvfrDyIgxBk= github.com/distribution/reference v0.6.0/go.mod h1:BbU0aIcezP1/5jX/8MP0YiH4SdvB5Y4f/wlDRiLyi3E= github.com/docker/cli v29.2.0+incompatible h1:9oBd9+YM7rxjZLfyMGxjraKBKE4/nVyvVfN4qNl9XRM= diff --git a/testutil/random.go b/testutil/random.go index ac1b97baf..6ec484c81 100644 --- a/testutil/random.go +++ b/testutil/random.go @@ -1686,7 +1686,7 @@ func GenerateInsecureK1Key(t *testing.T, seed int) *k1.PrivateKey { t.Setenv("GODEBUG", "cryptocustomrand=1") // Add 1 to seed to avoid passing 0 as seed which can trigger infinite loop. - k, err := ecdsa.GenerateKey(k1.S256(), constReader(seed+1)) + k, err := ecdsa.GenerateKey(k1.S256(), constReader(seed+1)) //nolint:staticcheck // We are using k1.S256() in tests, it's not a security issue. require.NoError(t, err) //nolint:staticcheck // We are using it in tests in a safely manner in testing.