[INFO] fetching crate sodium-sys 0.0.4... [INFO] testing sodium-sys-0.0.4 against beta-2020-06-03 for beta-1.45-1 [INFO] extracting crate sodium-sys 0.0.4 into /workspace/builds/worker-1/source [INFO] validating manifest of crates.io crate sodium-sys 0.0.4 on toolchain beta-2020-06-03 [INFO] running `"/workspace/cargo-home/bin/cargo" "+beta-2020-06-03" "read-manifest" "--manifest-path" "Cargo.toml"` [INFO] started tweaking crates.io crate sodium-sys 0.0.4 [INFO] finished tweaking crates.io crate sodium-sys 0.0.4 [INFO] tweaked toml for crates.io crate sodium-sys 0.0.4 written to /workspace/builds/worker-1/source/Cargo.toml [INFO] running `"/workspace/cargo-home/bin/cargo" "+beta-2020-06-03" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update"` [INFO] running `"/workspace/cargo-home/bin/cargo" "+beta-2020-06-03" "fetch" "--locked" "--manifest-path" "Cargo.toml"` [INFO] running `"docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2020-06-03" "build" "--frozen"` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] 69d598975af191a87716e29094ec5f200e89cc3f4de9219686d316199707c821 [INFO] running `"docker" "start" "-a" "69d598975af191a87716e29094ec5f200e89cc3f4de9219686d316199707c821"` [INFO] [stderr] sudo: setrlimit(RLIMIT_CORE): Operation not permitted [INFO] [stderr] Compiling sodium-sys v0.0.4 (/opt/rustwide/workdir) [INFO] [stderr] warning: use of deprecated item 'try': use the `?` operator instead [INFO] [stderr] --> src/crypto/utils/secmem.rs:119:12 [INFO] [stderr] | [INFO] [stderr] 119 | Ok(try!(str::from_utf8(slice)).to_string()) [INFO] [stderr] | ^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'try': use the `?` operator instead [INFO] [stderr] --> src/crypto/utils/version.rs:16:12 [INFO] [stderr] | [INFO] [stderr] 16 | Ok(try!(str::from_utf8(slice))) [INFO] [stderr] | ^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:88:5 [INFO] [stderr] | [INFO] [stderr] 88 | uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:89:5 [INFO] [stderr] | [INFO] [stderr] 89 | uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:90:5 [INFO] [stderr] | [INFO] [stderr] 90 | uint64_t [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:104:53 [INFO] [stderr] | [INFO] [stderr] 104 | fn crypto_pwhash_scryptsalsa208sha256(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:106:58 [INFO] [stderr] | [INFO] [stderr] 106 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:111:57 [INFO] [stderr] | [INFO] [stderr] 111 | fn crypto_pwhash_scryptsalsa208sha256_str(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:112:62 [INFO] [stderr] | [INFO] [stderr] 112 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:116:67 [INFO] [stderr] | [INFO] [stderr] 116 | fn crypto_pwhash_scryptsalsa208sha256_str_verify(str_: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:117:69 [INFO] [stderr] | [INFO] [stderr] 117 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:120:61 [INFO] [stderr] | [INFO] [stderr] 120 | fn crypto_pwhash_scryptsalsa208sha256_ll(passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:122:59 [INFO] [stderr] | [INFO] [stderr] 122 | ... salt: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:124:49 [INFO] [stderr] | [INFO] [stderr] 124 | ... N: uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:125:49 [INFO] [stderr] | [INFO] [stderr] 125 | ... r: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:126:49 [INFO] [stderr] | [INFO] [stderr] 126 | ... p: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:127:56 [INFO] [stderr] | [INFO] [stderr] 127 | ... buf: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:342:58 [INFO] [stderr] | [INFO] [stderr] 342 | ... n as uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:343:58 [INFO] [stderr] | [INFO] [stderr] 343 | ... r as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:344:58 [INFO] [stderr] | [INFO] [stderr] 344 | ... p as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:2:28 [INFO] [stderr] | [INFO] [stderr] 2 | use libc::{c_void, size_t, uint32_t}; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:6:32 [INFO] [stderr] | [INFO] [stderr] 6 | fn randombytes_random() -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:41 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:54 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:22:20 [INFO] [stderr] | [INFO] [stderr] 22 | pub fn random() -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:29 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:42 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:62:13 [INFO] [stderr] | [INFO] [stderr] 62 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_mut)]` on by default [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:63:13 [INFO] [stderr] | [INFO] [stderr] 63 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:120:13 [INFO] [stderr] | [INFO] [stderr] 120 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:121:13 [INFO] [stderr] | [INFO] [stderr] 121 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:150:13 [INFO] [stderr] | [INFO] [stderr] 150 | let mut nsk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:151:13 [INFO] [stderr] | [INFO] [stderr] 151 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:243:13 [INFO] [stderr] | [INFO] [stderr] 243 | let mut ssk = secmem::malloc(BEFORENMBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:172:9 [INFO] [stderr] | [INFO] [stderr] 172 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:246:9 [INFO] [stderr] | [INFO] [stderr] 246 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:311:9 [INFO] [stderr] | [INFO] [stderr] 311 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:312:9 [INFO] [stderr] | [INFO] [stderr] 312 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:387:9 [INFO] [stderr] | [INFO] [stderr] 387 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:453:9 [INFO] [stderr] | [INFO] [stderr] 453 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:524:9 [INFO] [stderr] | [INFO] [stderr] 524 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:587:9 [INFO] [stderr] | [INFO] [stderr] 587 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:588:9 [INFO] [stderr] | [INFO] [stderr] 588 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:662:9 [INFO] [stderr] | [INFO] [stderr] 662 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:726:9 [INFO] [stderr] | [INFO] [stderr] 726 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:736:9 [INFO] [stderr] | [INFO] [stderr] 736 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:810:9 [INFO] [stderr] | [INFO] [stderr] 810 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:874:9 [INFO] [stderr] | [INFO] [stderr] 874 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:884:9 [INFO] [stderr] | [INFO] [stderr] 884 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:954:9 [INFO] [stderr] | [INFO] [stderr] 954 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:71:9 [INFO] [stderr] | [INFO] [stderr] 71 | let mut ciphertext = secmem::malloc(SEALBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:125:9 [INFO] [stderr] | [INFO] [stderr] 125 | let mut message = secmem::malloc(ciphertext.len() - SEALBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:72:9 [INFO] [stderr] | [INFO] [stderr] 72 | let mut signedmessage = secmem::malloc(BYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:121:9 [INFO] [stderr] | [INFO] [stderr] 121 | let mut message = secmem::malloc(signedmessage.len() - BYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:168:9 [INFO] [stderr] | [INFO] [stderr] 168 | let mut signature = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:58:13 [INFO] [stderr] | [INFO] [stderr] 58 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:59:13 [INFO] [stderr] | [INFO] [stderr] 59 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:116:13 [INFO] [stderr] | [INFO] [stderr] 116 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:117:13 [INFO] [stderr] | [INFO] [stderr] 117 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:201:13 [INFO] [stderr] | [INFO] [stderr] 201 | let mut seed = secmem::malloc(SEEDBYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:218:13 [INFO] [stderr] | [INFO] [stderr] 218 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/generichash.rs:126:9 [INFO] [stderr] | [INFO] [stderr] 126 | let mut hash = secmem::malloc(outlen); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:190:9 [INFO] [stderr] | [INFO] [stderr] 190 | let mut key = secmem::malloc(keylen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:258:9 [INFO] [stderr] | [INFO] [stderr] 258 | let mut out = secmem::malloc(STRBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:332:9 [INFO] [stderr] | [INFO] [stderr] 332 | let mut out = secmem::malloc(outlen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut out = secmem::malloc(SHA256_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:261:9 [INFO] [stderr] | [INFO] [stderr] 261 | let mut out = secmem::malloc(SHA512_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/shorthash.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut hash = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:152:9 [INFO] [stderr] | [INFO] [stderr] 152 | let mut ciphertext = secmem::malloc(ABYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:203:9 [INFO] [stderr] | [INFO] [stderr] 203 | let mut message = secmem::malloc(ciphertext.len() - ABYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/auth.rs:62:9 [INFO] [stderr] | [INFO] [stderr] 62 | let mut output = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:99:9 [INFO] [stderr] | [INFO] [stderr] 99 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:162:9 [INFO] [stderr] | [INFO] [stderr] 162 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:216:9 [INFO] [stderr] | [INFO] [stderr] 216 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:217:9 [INFO] [stderr] | [INFO] [stderr] 217 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:280:9 [INFO] [stderr] | [INFO] [stderr] 280 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:335:9 [INFO] [stderr] | [INFO] [stderr] 335 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:345:9 [INFO] [stderr] | [INFO] [stderr] 345 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:406:9 [INFO] [stderr] | [INFO] [stderr] 406 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:286:17 [INFO] [stderr] | [INFO] [stderr] 286 | let mut output = secmem::malloc(HMACSHA256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:301:17 [INFO] [stderr] | [INFO] [stderr] 301 | let mut output = secmem::malloc(HMACSHA512_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:316:17 [INFO] [stderr] | [INFO] [stderr] 316 | let mut output = secmem::malloc(HMACSHA512256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:112:9 [INFO] [stderr] | [INFO] [stderr] 112 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:191:9 [INFO] [stderr] | [INFO] [stderr] 191 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: 84 warnings emitted [INFO] [stderr] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 1.68s [INFO] running `"docker" "inspect" "69d598975af191a87716e29094ec5f200e89cc3f4de9219686d316199707c821"` [INFO] running `"docker" "rm" "-f" "69d598975af191a87716e29094ec5f200e89cc3f4de9219686d316199707c821"` [INFO] [stdout] 69d598975af191a87716e29094ec5f200e89cc3f4de9219686d316199707c821 [INFO] running `"docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2020-06-03" "test" "--frozen" "--no-run"` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] 2a93b379f6401617dd99892c53928ca8ef7c80200c70f33c4368632314a99f78 [INFO] running `"docker" "start" "-a" "2a93b379f6401617dd99892c53928ca8ef7c80200c70f33c4368632314a99f78"` [INFO] [stderr] sudo: setrlimit(RLIMIT_CORE): Operation not permitted [INFO] [stderr] Compiling winapi-build v0.1.1 [INFO] [stderr] Compiling winapi v0.2.8 [INFO] [stderr] Compiling utf8-ranges v0.1.3 [INFO] [stderr] Compiling regex-syntax v0.3.9 [INFO] [stderr] Compiling memchr v0.1.11 [INFO] [stderr] warning: use of deprecated item 'try': use the `?` operator instead [INFO] [stderr] --> src/crypto/utils/secmem.rs:119:12 [INFO] [stderr] | [INFO] [stderr] 119 | Ok(try!(str::from_utf8(slice)).to_string()) [INFO] [stderr] | ^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'try': use the `?` operator instead [INFO] [stderr] --> src/crypto/utils/version.rs:16:12 [INFO] [stderr] | [INFO] [stderr] 16 | Ok(try!(str::from_utf8(slice))) [INFO] [stderr] | ^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:88:5 [INFO] [stderr] | [INFO] [stderr] 88 | uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:89:5 [INFO] [stderr] | [INFO] [stderr] 89 | uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:90:5 [INFO] [stderr] | [INFO] [stderr] 90 | uint64_t [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:104:53 [INFO] [stderr] | [INFO] [stderr] 104 | fn crypto_pwhash_scryptsalsa208sha256(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:106:58 [INFO] [stderr] | [INFO] [stderr] 106 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:111:57 [INFO] [stderr] | [INFO] [stderr] 111 | fn crypto_pwhash_scryptsalsa208sha256_str(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:112:62 [INFO] [stderr] | [INFO] [stderr] 112 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:116:67 [INFO] [stderr] | [INFO] [stderr] 116 | fn crypto_pwhash_scryptsalsa208sha256_str_verify(str_: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:117:69 [INFO] [stderr] | [INFO] [stderr] 117 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:120:61 [INFO] [stderr] | [INFO] [stderr] 120 | fn crypto_pwhash_scryptsalsa208sha256_ll(passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:122:59 [INFO] [stderr] | [INFO] [stderr] 122 | ... salt: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:124:49 [INFO] [stderr] | [INFO] [stderr] 124 | ... N: uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:125:49 [INFO] [stderr] | [INFO] [stderr] 125 | ... r: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:126:49 [INFO] [stderr] | [INFO] [stderr] 126 | ... p: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:127:56 [INFO] [stderr] | [INFO] [stderr] 127 | ... buf: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:342:58 [INFO] [stderr] | [INFO] [stderr] 342 | ... n as uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:343:58 [INFO] [stderr] | [INFO] [stderr] 343 | ... r as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:344:58 [INFO] [stderr] | [INFO] [stderr] 344 | ... p as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:2:28 [INFO] [stderr] | [INFO] [stderr] 2 | use libc::{c_void, size_t, uint32_t}; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:6:32 [INFO] [stderr] | [INFO] [stderr] 6 | fn randombytes_random() -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:41 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:54 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:22:20 [INFO] [stderr] | [INFO] [stderr] 22 | pub fn random() -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:29 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:42 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:62:13 [INFO] [stderr] | [INFO] [stderr] 62 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_mut)]` on by default [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:63:13 [INFO] [stderr] | [INFO] [stderr] 63 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:120:13 [INFO] [stderr] | [INFO] [stderr] 120 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:121:13 [INFO] [stderr] | [INFO] [stderr] 121 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:150:13 [INFO] [stderr] | [INFO] [stderr] 150 | let mut nsk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:151:13 [INFO] [stderr] | [INFO] [stderr] 151 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:243:13 [INFO] [stderr] | [INFO] [stderr] 243 | let mut ssk = secmem::malloc(BEFORENMBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:172:9 [INFO] [stderr] | [INFO] [stderr] 172 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:246:9 [INFO] [stderr] | [INFO] [stderr] 246 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:311:9 [INFO] [stderr] | [INFO] [stderr] 311 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:312:9 [INFO] [stderr] | [INFO] [stderr] 312 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:387:9 [INFO] [stderr] | [INFO] [stderr] 387 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:453:9 [INFO] [stderr] | [INFO] [stderr] 453 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:524:9 [INFO] [stderr] | [INFO] [stderr] 524 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:587:9 [INFO] [stderr] | [INFO] [stderr] 587 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:588:9 [INFO] [stderr] | [INFO] [stderr] 588 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:662:9 [INFO] [stderr] | [INFO] [stderr] 662 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:726:9 [INFO] [stderr] | [INFO] [stderr] 726 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:736:9 [INFO] [stderr] | [INFO] [stderr] 736 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:810:9 [INFO] [stderr] | [INFO] [stderr] 810 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:874:9 [INFO] [stderr] | [INFO] [stderr] 874 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:884:9 [INFO] [stderr] | [INFO] [stderr] 884 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:954:9 [INFO] [stderr] | [INFO] [stderr] 954 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:71:9 [INFO] [stderr] | [INFO] [stderr] 71 | let mut ciphertext = secmem::malloc(SEALBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:125:9 [INFO] [stderr] | [INFO] [stderr] 125 | let mut message = secmem::malloc(ciphertext.len() - SEALBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:72:9 [INFO] [stderr] | [INFO] [stderr] 72 | let mut signedmessage = secmem::malloc(BYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:121:9 [INFO] [stderr] | [INFO] [stderr] 121 | let mut message = secmem::malloc(signedmessage.len() - BYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:168:9 [INFO] [stderr] | [INFO] [stderr] 168 | let mut signature = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:58:13 [INFO] [stderr] | [INFO] [stderr] 58 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:59:13 [INFO] [stderr] | [INFO] [stderr] 59 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:116:13 [INFO] [stderr] | [INFO] [stderr] 116 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:117:13 [INFO] [stderr] | [INFO] [stderr] 117 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:201:13 [INFO] [stderr] | [INFO] [stderr] 201 | let mut seed = secmem::malloc(SEEDBYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:218:13 [INFO] [stderr] | [INFO] [stderr] 218 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/generichash.rs:126:9 [INFO] [stderr] | [INFO] [stderr] 126 | let mut hash = secmem::malloc(outlen); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:190:9 [INFO] [stderr] | [INFO] [stderr] 190 | let mut key = secmem::malloc(keylen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:258:9 [INFO] [stderr] | [INFO] [stderr] 258 | let mut out = secmem::malloc(STRBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:332:9 [INFO] [stderr] | [INFO] [stderr] 332 | let mut out = secmem::malloc(outlen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut out = secmem::malloc(SHA256_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:261:9 [INFO] [stderr] | [INFO] [stderr] 261 | let mut out = secmem::malloc(SHA512_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/shorthash.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut hash = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:152:9 [INFO] [stderr] | [INFO] [stderr] 152 | let mut ciphertext = secmem::malloc(ABYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:203:9 [INFO] [stderr] | [INFO] [stderr] 203 | let mut message = secmem::malloc(ciphertext.len() - ABYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/auth.rs:62:9 [INFO] [stderr] | [INFO] [stderr] 62 | let mut output = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:99:9 [INFO] [stderr] | [INFO] [stderr] 99 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:162:9 [INFO] [stderr] | [INFO] [stderr] 162 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:216:9 [INFO] [stderr] | [INFO] [stderr] 216 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:217:9 [INFO] [stderr] | [INFO] [stderr] 217 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:280:9 [INFO] [stderr] | [INFO] [stderr] 280 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:335:9 [INFO] [stderr] | [INFO] [stderr] 335 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:345:9 [INFO] [stderr] | [INFO] [stderr] 345 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:406:9 [INFO] [stderr] | [INFO] [stderr] 406 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:286:17 [INFO] [stderr] | [INFO] [stderr] 286 | let mut output = secmem::malloc(HMACSHA256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:301:17 [INFO] [stderr] | [INFO] [stderr] 301 | let mut output = secmem::malloc(HMACSHA512_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:316:17 [INFO] [stderr] | [INFO] [stderr] 316 | let mut output = secmem::malloc(HMACSHA512256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:112:9 [INFO] [stderr] | [INFO] [stderr] 112 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:191:9 [INFO] [stderr] | [INFO] [stderr] 191 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: 84 warnings emitted [INFO] [stderr] [INFO] [stderr] Compiling aho-corasick v0.5.3 [INFO] [stderr] Compiling kernel32-sys v0.2.2 [INFO] [stderr] Compiling thread-id v2.0.0 [INFO] [stderr] Compiling thread_local v0.2.7 [INFO] [stderr] Compiling regex v0.1.80 [INFO] [stderr] Compiling sodium-sys v0.0.4 (/opt/rustwide/workdir) [INFO] [stderr] warning: use of deprecated item 'try': use the `?` operator instead [INFO] [stderr] --> src/crypto/utils/secmem.rs:119:12 [INFO] [stderr] | [INFO] [stderr] 119 | Ok(try!(str::from_utf8(slice)).to_string()) [INFO] [stderr] | ^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'try': use the `?` operator instead [INFO] [stderr] --> src/crypto/utils/version.rs:16:12 [INFO] [stderr] | [INFO] [stderr] 16 | Ok(try!(str::from_utf8(slice))) [INFO] [stderr] | ^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'std::sync::ONCE_INIT': the `new` function is now preferred [INFO] [stderr] --> tests/lib.rs:5:22 [INFO] [stderr] | [INFO] [stderr] 5 | use std::sync::{Once,ONCE_INIT}; [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'std::sync::ONCE_INIT': the `new` function is now preferred [INFO] [stderr] --> tests/lib.rs:7:22 [INFO] [stderr] | [INFO] [stderr] 7 | static START: Once = ONCE_INIT; [INFO] [stderr] | ^^^^^^^^^ help: replace the use of the deprecated item: `Once::new()` [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:88:5 [INFO] [stderr] | [INFO] [stderr] 88 | uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:89:5 [INFO] [stderr] | [INFO] [stderr] 89 | uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:90:5 [INFO] [stderr] | [INFO] [stderr] 90 | uint64_t [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:104:53 [INFO] [stderr] | [INFO] [stderr] 104 | fn crypto_pwhash_scryptsalsa208sha256(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:106:58 [INFO] [stderr] | [INFO] [stderr] 106 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:111:57 [INFO] [stderr] | [INFO] [stderr] 111 | fn crypto_pwhash_scryptsalsa208sha256_str(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:112:62 [INFO] [stderr] | [INFO] [stderr] 112 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:116:67 [INFO] [stderr] | [INFO] [stderr] 116 | fn crypto_pwhash_scryptsalsa208sha256_str_verify(str_: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:117:69 [INFO] [stderr] | [INFO] [stderr] 117 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:120:61 [INFO] [stderr] | [INFO] [stderr] 120 | fn crypto_pwhash_scryptsalsa208sha256_ll(passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:122:59 [INFO] [stderr] | [INFO] [stderr] 122 | ... salt: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:124:49 [INFO] [stderr] | [INFO] [stderr] 124 | ... N: uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:125:49 [INFO] [stderr] | [INFO] [stderr] 125 | ... r: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:126:49 [INFO] [stderr] | [INFO] [stderr] 126 | ... p: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:127:56 [INFO] [stderr] | [INFO] [stderr] 127 | ... buf: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:342:58 [INFO] [stderr] | [INFO] [stderr] 342 | ... n as uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:343:58 [INFO] [stderr] | [INFO] [stderr] 343 | ... r as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:344:58 [INFO] [stderr] | [INFO] [stderr] 344 | ... p as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:2:28 [INFO] [stderr] | [INFO] [stderr] 2 | use libc::{c_void, size_t, uint32_t}; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:6:32 [INFO] [stderr] | [INFO] [stderr] 6 | fn randombytes_random() -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:41 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:54 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:22:20 [INFO] [stderr] | [INFO] [stderr] 22 | pub fn random() -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:29 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:42 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:62:13 [INFO] [stderr] | [INFO] [stderr] 62 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_mut)]` on by default [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:63:13 [INFO] [stderr] | [INFO] [stderr] 63 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:120:13 [INFO] [stderr] | [INFO] [stderr] 120 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:121:13 [INFO] [stderr] | [INFO] [stderr] 121 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:150:13 [INFO] [stderr] | [INFO] [stderr] 150 | let mut nsk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:151:13 [INFO] [stderr] | [INFO] [stderr] 151 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:243:13 [INFO] [stderr] | [INFO] [stderr] 243 | let mut ssk = secmem::malloc(BEFORENMBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:172:9 [INFO] [stderr] | [INFO] [stderr] 172 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:246:9 [INFO] [stderr] | [INFO] [stderr] 246 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:311:9 [INFO] [stderr] | [INFO] [stderr] 311 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:312:9 [INFO] [stderr] | [INFO] [stderr] 312 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:387:9 [INFO] [stderr] | [INFO] [stderr] 387 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:453:9 [INFO] [stderr] | [INFO] [stderr] 453 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:524:9 [INFO] [stderr] | [INFO] [stderr] 524 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:587:9 [INFO] [stderr] | [INFO] [stderr] 587 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:588:9 [INFO] [stderr] | [INFO] [stderr] 588 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:662:9 [INFO] [stderr] | [INFO] [stderr] 662 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:726:9 [INFO] [stderr] | [INFO] [stderr] 726 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:736:9 [INFO] [stderr] | [INFO] [stderr] 736 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:810:9 [INFO] [stderr] | [INFO] [stderr] 810 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:874:9 [INFO] [stderr] | [INFO] [stderr] 874 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:884:9 [INFO] [stderr] | [INFO] [stderr] 884 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:954:9 [INFO] [stderr] | [INFO] [stderr] 954 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:71:9 [INFO] [stderr] | [INFO] [stderr] 71 | let mut ciphertext = secmem::malloc(SEALBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:125:9 [INFO] [stderr] | [INFO] [stderr] 125 | let mut message = secmem::malloc(ciphertext.len() - SEALBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:72:9 [INFO] [stderr] | [INFO] [stderr] 72 | let mut signedmessage = secmem::malloc(BYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:121:9 [INFO] [stderr] | [INFO] [stderr] 121 | let mut message = secmem::malloc(signedmessage.len() - BYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:168:9 [INFO] [stderr] | [INFO] [stderr] 168 | let mut signature = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:58:13 [INFO] [stderr] | [INFO] [stderr] 58 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:59:13 [INFO] [stderr] | [INFO] [stderr] 59 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:116:13 [INFO] [stderr] | [INFO] [stderr] 116 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:117:13 [INFO] [stderr] | [INFO] [stderr] 117 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:201:13 [INFO] [stderr] | [INFO] [stderr] 201 | let mut seed = secmem::malloc(SEEDBYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:218:13 [INFO] [stderr] | [INFO] [stderr] 218 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/generichash.rs:126:9 [INFO] [stderr] | [INFO] [stderr] 126 | let mut hash = secmem::malloc(outlen); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:190:9 [INFO] [stderr] | [INFO] [stderr] 190 | let mut key = secmem::malloc(keylen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:258:9 [INFO] [stderr] | [INFO] [stderr] 258 | let mut out = secmem::malloc(STRBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:332:9 [INFO] [stderr] | [INFO] [stderr] 332 | let mut out = secmem::malloc(outlen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut out = secmem::malloc(SHA256_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:261:9 [INFO] [stderr] | [INFO] [stderr] 261 | let mut out = secmem::malloc(SHA512_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/shorthash.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut hash = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:152:9 [INFO] [stderr] | [INFO] [stderr] 152 | let mut ciphertext = secmem::malloc(ABYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:203:9 [INFO] [stderr] | [INFO] [stderr] 203 | let mut message = secmem::malloc(ciphertext.len() - ABYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/auth.rs:62:9 [INFO] [stderr] | [INFO] [stderr] 62 | let mut output = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:99:9 [INFO] [stderr] | [INFO] [stderr] 99 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:162:9 [INFO] [stderr] | [INFO] [stderr] 162 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:216:9 [INFO] [stderr] | [INFO] [stderr] 216 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:217:9 [INFO] [stderr] | [INFO] [stderr] 217 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:280:9 [INFO] [stderr] | [INFO] [stderr] 280 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:335:9 [INFO] [stderr] | [INFO] [stderr] 335 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:345:9 [INFO] [stderr] | [INFO] [stderr] 345 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:406:9 [INFO] [stderr] | [INFO] [stderr] 406 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:286:17 [INFO] [stderr] | [INFO] [stderr] 286 | let mut output = secmem::malloc(HMACSHA256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:301:17 [INFO] [stderr] | [INFO] [stderr] 301 | let mut output = secmem::malloc(HMACSHA512_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:316:17 [INFO] [stderr] | [INFO] [stderr] 316 | let mut output = secmem::malloc(HMACSHA512256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:112:9 [INFO] [stderr] | [INFO] [stderr] 112 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:191:9 [INFO] [stderr] | [INFO] [stderr] 191 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: 84 warnings emitted [INFO] [stderr] [INFO] [stderr] warning: 2 warnings emitted [INFO] [stderr] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 10.34s [INFO] running `"docker" "inspect" "2a93b379f6401617dd99892c53928ca8ef7c80200c70f33c4368632314a99f78"` [INFO] running `"docker" "rm" "-f" "2a93b379f6401617dd99892c53928ca8ef7c80200c70f33c4368632314a99f78"` [INFO] [stdout] 2a93b379f6401617dd99892c53928ca8ef7c80200c70f33c4368632314a99f78 [INFO] running `"docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2020-06-03" "test" "--frozen"` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] 2abeec13b881c380f94a4ee7a3ad4b900161f8826d00fd9047f946f9cf965085 [INFO] running `"docker" "start" "-a" "2abeec13b881c380f94a4ee7a3ad4b900161f8826d00fd9047f946f9cf965085"` [INFO] [stderr] sudo: setrlimit(RLIMIT_CORE): Operation not permitted [INFO] [stderr] warning: use of deprecated item 'try': use the `?` operator instead [INFO] [stderr] --> src/crypto/utils/secmem.rs:119:12 [INFO] [stderr] | [INFO] [stderr] 119 | Ok(try!(str::from_utf8(slice)).to_string()) [INFO] [stderr] | ^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'try': use the `?` operator instead [INFO] [stderr] --> src/crypto/utils/version.rs:16:12 [INFO] [stderr] | [INFO] [stderr] 16 | Ok(try!(str::from_utf8(slice))) [INFO] [stderr] | ^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:88:5 [INFO] [stderr] | [INFO] [stderr] 88 | uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:89:5 [INFO] [stderr] | [INFO] [stderr] 89 | uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:90:5 [INFO] [stderr] | [INFO] [stderr] 90 | uint64_t [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:104:53 [INFO] [stderr] | [INFO] [stderr] 104 | fn crypto_pwhash_scryptsalsa208sha256(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:106:58 [INFO] [stderr] | [INFO] [stderr] 106 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:111:57 [INFO] [stderr] | [INFO] [stderr] 111 | fn crypto_pwhash_scryptsalsa208sha256_str(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:112:62 [INFO] [stderr] | [INFO] [stderr] 112 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:116:67 [INFO] [stderr] | [INFO] [stderr] 116 | fn crypto_pwhash_scryptsalsa208sha256_str_verify(str_: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:117:69 [INFO] [stderr] | [INFO] [stderr] 117 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:120:61 [INFO] [stderr] | [INFO] [stderr] 120 | fn crypto_pwhash_scryptsalsa208sha256_ll(passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:122:59 [INFO] [stderr] | [INFO] [stderr] 122 | ... salt: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:124:49 [INFO] [stderr] | [INFO] [stderr] 124 | ... N: uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:125:49 [INFO] [stderr] | [INFO] [stderr] 125 | ... r: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:126:49 [INFO] [stderr] | [INFO] [stderr] 126 | ... p: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:127:56 [INFO] [stderr] | [INFO] [stderr] 127 | ... buf: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:342:58 [INFO] [stderr] | [INFO] [stderr] 342 | ... n as uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:343:58 [INFO] [stderr] | [INFO] [stderr] 343 | ... r as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:344:58 [INFO] [stderr] | [INFO] [stderr] 344 | ... p as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:2:28 [INFO] [stderr] | [INFO] [stderr] 2 | use libc::{c_void, size_t, uint32_t}; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:6:32 [INFO] [stderr] | [INFO] [stderr] 6 | fn randombytes_random() -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:41 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:54 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:22:20 [INFO] [stderr] | [INFO] [stderr] 22 | pub fn random() -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:29 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:42 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:62:13 [INFO] [stderr] | [INFO] [stderr] 62 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_mut)]` on by default [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:63:13 [INFO] [stderr] | [INFO] [stderr] 63 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:120:13 [INFO] [stderr] | [INFO] [stderr] 120 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:121:13 [INFO] [stderr] | [INFO] [stderr] 121 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:150:13 [INFO] [stderr] | [INFO] [stderr] 150 | let mut nsk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:151:13 [INFO] [stderr] | [INFO] [stderr] 151 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:243:13 [INFO] [stderr] | [INFO] [stderr] 243 | let mut ssk = secmem::malloc(BEFORENMBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:172:9 [INFO] [stderr] | [INFO] [stderr] 172 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:246:9 [INFO] [stderr] | [INFO] [stderr] 246 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:311:9 [INFO] [stderr] | [INFO] [stderr] 311 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:312:9 [INFO] [stderr] | [INFO] [stderr] 312 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:387:9 [INFO] [stderr] | [INFO] [stderr] 387 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:453:9 [INFO] [stderr] | [INFO] [stderr] 453 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:524:9 [INFO] [stderr] | [INFO] [stderr] 524 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:587:9 [INFO] [stderr] | [INFO] [stderr] 587 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:588:9 [INFO] [stderr] | [INFO] [stderr] 588 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:662:9 [INFO] [stderr] | [INFO] [stderr] 662 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:726:9 [INFO] [stderr] | [INFO] [stderr] 726 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:736:9 [INFO] [stderr] | [INFO] [stderr] 736 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:810:9 [INFO] [stderr] | [INFO] [stderr] 810 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:874:9 [INFO] [stderr] | [INFO] [stderr] 874 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:884:9 [INFO] [stderr] | [INFO] [stderr] 884 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:954:9 [INFO] [stderr] | [INFO] [stderr] 954 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:71:9 [INFO] [stderr] | [INFO] [stderr] 71 | let mut ciphertext = secmem::malloc(SEALBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:125:9 [INFO] [stderr] | [INFO] [stderr] 125 | let mut message = secmem::malloc(ciphertext.len() - SEALBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:72:9 [INFO] [stderr] | [INFO] [stderr] 72 | let mut signedmessage = secmem::malloc(BYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:121:9 [INFO] [stderr] | [INFO] [stderr] 121 | let mut message = secmem::malloc(signedmessage.len() - BYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:168:9 [INFO] [stderr] | [INFO] [stderr] 168 | let mut signature = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:58:13 [INFO] [stderr] | [INFO] [stderr] 58 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:59:13 [INFO] [stderr] | [INFO] [stderr] 59 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:116:13 [INFO] [stderr] | [INFO] [stderr] 116 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:117:13 [INFO] [stderr] | [INFO] [stderr] 117 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:201:13 [INFO] [stderr] | [INFO] [stderr] 201 | let mut seed = secmem::malloc(SEEDBYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:218:13 [INFO] [stderr] | [INFO] [stderr] 218 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/generichash.rs:126:9 [INFO] [stderr] | [INFO] [stderr] 126 | let mut hash = secmem::malloc(outlen); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:190:9 [INFO] [stderr] | [INFO] [stderr] 190 | let mut key = secmem::malloc(keylen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:258:9 [INFO] [stderr] | [INFO] [stderr] 258 | let mut out = secmem::malloc(STRBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:332:9 [INFO] [stderr] | [INFO] [stderr] 332 | let mut out = secmem::malloc(outlen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut out = secmem::malloc(SHA256_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:261:9 [INFO] [stderr] | [INFO] [stderr] 261 | let mut out = secmem::malloc(SHA512_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/shorthash.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut hash = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:152:9 [INFO] [stderr] | [INFO] [stderr] 152 | let mut ciphertext = secmem::malloc(ABYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:203:9 [INFO] [stderr] | [INFO] [stderr] 203 | let mut message = secmem::malloc(ciphertext.len() - ABYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/auth.rs:62:9 [INFO] [stderr] | [INFO] [stderr] 62 | let mut output = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:99:9 [INFO] [stderr] | [INFO] [stderr] 99 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:162:9 [INFO] [stderr] | [INFO] [stderr] 162 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:216:9 [INFO] [stderr] | [INFO] [stderr] 216 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:217:9 [INFO] [stderr] | [INFO] [stderr] 217 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:280:9 [INFO] [stderr] | [INFO] [stderr] 280 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:335:9 [INFO] [stderr] | [INFO] [stderr] 335 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:345:9 [INFO] [stderr] | [INFO] [stderr] 345 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:406:9 [INFO] [stderr] | [INFO] [stderr] 406 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:286:17 [INFO] [stderr] | [INFO] [stderr] 286 | let mut output = secmem::malloc(HMACSHA256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:301:17 [INFO] [stderr] | [INFO] [stderr] 301 | let mut output = secmem::malloc(HMACSHA512_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:316:17 [INFO] [stderr] | [INFO] [stderr] 316 | let mut output = secmem::malloc(HMACSHA512256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:112:9 [INFO] [stderr] | [INFO] [stderr] 112 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:191:9 [INFO] [stderr] | [INFO] [stderr] 191 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: 84 warnings emitted [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'std::sync::ONCE_INIT': the `new` function is now preferred [INFO] [stderr] --> tests/lib.rs:5:22 [INFO] [stderr] | [INFO] [stderr] 5 | use std::sync::{Once,ONCE_INIT}; [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'std::sync::ONCE_INIT': the `new` function is now preferred [INFO] [stderr] --> tests/lib.rs:7:22 [INFO] [stderr] | [INFO] [stderr] 7 | static START: Once = ONCE_INIT; [INFO] [stderr] | ^^^^^^^^^ help: replace the use of the deprecated item: `Once::new()` [INFO] [stderr] [INFO] [stderr] warning: 2 warnings emitted [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'try': use the `?` operator instead [INFO] [stderr] --> src/crypto/utils/secmem.rs:119:12 [INFO] [stderr] | [INFO] [stderr] 119 | Ok(try!(str::from_utf8(slice)).to_string()) [INFO] [stderr] | ^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'try': use the `?` operator instead [INFO] [stderr] --> src/crypto/utils/version.rs:16:12 [INFO] [stderr] | [INFO] [stderr] 16 | Ok(try!(str::from_utf8(slice))) [INFO] [stderr] | ^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:88:5 [INFO] [stderr] | [INFO] [stderr] 88 | uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:89:5 [INFO] [stderr] | [INFO] [stderr] 89 | uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:90:5 [INFO] [stderr] | [INFO] [stderr] 90 | uint64_t [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:104:53 [INFO] [stderr] | [INFO] [stderr] 104 | fn crypto_pwhash_scryptsalsa208sha256(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:106:58 [INFO] [stderr] | [INFO] [stderr] 106 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:111:57 [INFO] [stderr] | [INFO] [stderr] 111 | fn crypto_pwhash_scryptsalsa208sha256_str(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:112:62 [INFO] [stderr] | [INFO] [stderr] 112 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:116:67 [INFO] [stderr] | [INFO] [stderr] 116 | fn crypto_pwhash_scryptsalsa208sha256_str_verify(str_: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:117:69 [INFO] [stderr] | [INFO] [stderr] 117 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:120:61 [INFO] [stderr] | [INFO] [stderr] 120 | fn crypto_pwhash_scryptsalsa208sha256_ll(passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:122:59 [INFO] [stderr] | [INFO] [stderr] 122 | ... salt: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:124:49 [INFO] [stderr] | [INFO] [stderr] 124 | ... N: uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:125:49 [INFO] [stderr] | [INFO] [stderr] 125 | ... r: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:126:49 [INFO] [stderr] | [INFO] [stderr] 126 | ... p: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:127:56 [INFO] [stderr] | [INFO] [stderr] 127 | ... buf: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:342:58 [INFO] [stderr] | [INFO] [stderr] 342 | ... n as uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:343:58 [INFO] [stderr] | [INFO] [stderr] 343 | ... r as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:344:58 [INFO] [stderr] | [INFO] [stderr] 344 | ... p as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:2:28 [INFO] [stderr] | [INFO] [stderr] 2 | use libc::{c_void, size_t, uint32_t}; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:6:32 [INFO] [stderr] | [INFO] [stderr] 6 | fn randombytes_random() -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:41 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:54 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:22:20 [INFO] [stderr] | [INFO] [stderr] 22 | pub fn random() -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:29 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:42 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:62:13 [INFO] [stderr] | [INFO] [stderr] 62 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_mut)]` on by default [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:63:13 [INFO] [stderr] | [INFO] [stderr] 63 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:120:13 [INFO] [stderr] | [INFO] [stderr] 120 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:121:13 [INFO] [stderr] | [INFO] [stderr] 121 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:150:13 [INFO] [stderr] | [INFO] [stderr] 150 | let mut nsk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:151:13 [INFO] [stderr] | [INFO] [stderr] 151 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:243:13 [INFO] [stderr] | [INFO] [stderr] 243 | let mut ssk = secmem::malloc(BEFORENMBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:172:9 [INFO] [stderr] | [INFO] [stderr] 172 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:246:9 [INFO] [stderr] | [INFO] [stderr] 246 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:311:9 [INFO] [stderr] | [INFO] [stderr] 311 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:312:9 [INFO] [stderr] | [INFO] [stderr] 312 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:387:9 [INFO] [stderr] | [INFO] [stderr] 387 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:453:9 [INFO] [stderr] | [INFO] [stderr] 453 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:524:9 [INFO] [stderr] | [INFO] [stderr] 524 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:587:9 [INFO] [stderr] | [INFO] [stderr] 587 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:588:9 [INFO] [stderr] | [INFO] [stderr] 588 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:662:9 [INFO] [stderr] | [INFO] [stderr] 662 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:726:9 [INFO] [stderr] | [INFO] [stderr] 726 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:736:9 [INFO] [stderr] | [INFO] [stderr] 736 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:810:9 [INFO] [stderr] | [INFO] [stderr] 810 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:874:9 [INFO] [stderr] | [INFO] [stderr] 874 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:884:9 [INFO] [stderr] | [INFO] [stderr] 884 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:954:9 [INFO] [stderr] | [INFO] [stderr] 954 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:71:9 [INFO] [stderr] | [INFO] [stderr] 71 | let mut ciphertext = secmem::malloc(SEALBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:125:9 [INFO] [stderr] | [INFO] [stderr] 125 | let mut message = secmem::malloc(ciphertext.len() - SEALBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:72:9 [INFO] [stderr] | [INFO] [stderr] 72 | let mut signedmessage = secmem::malloc(BYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:121:9 [INFO] [stderr] | [INFO] [stderr] 121 | let mut message = secmem::malloc(signedmessage.len() - BYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:168:9 [INFO] [stderr] | [INFO] [stderr] 168 | let mut signature = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:58:13 [INFO] [stderr] | [INFO] [stderr] 58 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:59:13 [INFO] [stderr] | [INFO] [stderr] 59 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:116:13 [INFO] [stderr] | [INFO] [stderr] 116 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:117:13 [INFO] [stderr] | [INFO] [stderr] 117 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:201:13 [INFO] [stderr] | [INFO] [stderr] 201 | let mut seed = secmem::malloc(SEEDBYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:218:13 [INFO] [stderr] | [INFO] [stderr] 218 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/generichash.rs:126:9 [INFO] [stderr] | [INFO] [stderr] 126 | let mut hash = secmem::malloc(outlen); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:190:9 [INFO] [stderr] | [INFO] [stderr] 190 | let mut key = secmem::malloc(keylen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:258:9 [INFO] [stderr] | [INFO] [stderr] 258 | let mut out = secmem::malloc(STRBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:332:9 [INFO] [stderr] | [INFO] [stderr] 332 | let mut out = secmem::malloc(outlen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut out = secmem::malloc(SHA256_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:261:9 [INFO] [stderr] | [INFO] [stderr] 261 | let mut out = secmem::malloc(SHA512_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/shorthash.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut hash = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:152:9 [INFO] [stderr] | [INFO] [stderr] 152 | let mut ciphertext = secmem::malloc(ABYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:203:9 [INFO] [stderr] | [INFO] [stderr] 203 | let mut message = secmem::malloc(ciphertext.len() - ABYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/auth.rs:62:9 [INFO] [stderr] | [INFO] [stderr] 62 | let mut output = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:99:9 [INFO] [stderr] | [INFO] [stderr] 99 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:162:9 [INFO] [stderr] | [INFO] [stderr] 162 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:216:9 [INFO] [stderr] | [INFO] [stderr] 216 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:217:9 [INFO] [stderr] | [INFO] [stderr] 217 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:280:9 [INFO] [stderr] | [INFO] [stderr] 280 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:335:9 [INFO] [stderr] | [INFO] [stderr] 335 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:345:9 [INFO] [stderr] | [INFO] [stderr] 345 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:406:9 [INFO] [stderr] | [INFO] [stderr] 406 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:286:17 [INFO] [stderr] | [INFO] [stderr] 286 | let mut output = secmem::malloc(HMACSHA256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:301:17 [INFO] [stderr] | [INFO] [stderr] 301 | let mut output = secmem::malloc(HMACSHA512_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:316:17 [INFO] [stderr] | [INFO] [stderr] 316 | let mut output = secmem::malloc(HMACSHA512256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:112:9 [INFO] [stderr] | [INFO] [stderr] 112 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:191:9 [INFO] [stderr] | [INFO] [stderr] 191 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: 84 warnings emitted [INFO] [stderr] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.04s [INFO] [stderr] Running /opt/rustwide/target/debug/deps/sodium_sys-63a81009968def4e [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out [INFO] [stdout] [INFO] [stderr] Running /opt/rustwide/target/debug/deps/lib-fb1f03d5dd95d843 [INFO] [stdout] [INFO] [stdout] running 87 tests [INFO] [stdout] test crypto::asymmetrickey::auth_keypair::keypair_seed ... ok [INFO] [stdout] test crypto::asymmetrickey::auth_keypair::keypair ... ok [INFO] [stdout] test crypto::asymmetrickey::authenc::open_nacl_with_ssk ... ok [INFO] [stdout] test crypto::asymmetrickey::auth_keypair::keypair_derivepk ... ok [INFO] [stdout] test crypto::asymmetrickey::authenc::open_detached_with_ssk ... ok [INFO] [stdout] test crypto::asymmetrickey::authenc::seal_nacl_with_ssk ... ok [INFO] [stdout] test crypto::asymmetrickey::sign::sign ... ok [INFO] [stdout] test crypto::asymmetrickey::sign::sign_detached ... ok [INFO] [stdout] test crypto::asymmetrickey::sign_keypair::keypair ... ok [INFO] [stdout] test crypto::asymmetrickey::sealbox::seal_and_open ... ok [INFO] [stdout] test crypto::asymmetrickey::sign::open ... ok [INFO] [stdout] test crypto::asymmetrickey::authenc::seal_with_ssk ... ok [INFO] [stdout] test crypto::asymmetrickey::sign::open_detached ... ok [INFO] [stdout] test crypto::hash::generichash::hash_key_max_size ... ok [INFO] [stdout] test crypto::hash::generichash::hash_key_min_size ... ok [INFO] [stdout] test crypto::asymmetrickey::sign_keypair::keypair_get_seed ... ok [INFO] [stdout] test crypto::asymmetrickey::sign_keypair::keypair_seed ... ok [INFO] [stdout] test crypto::hash::generichash::hash_key_no_size ... ok [INFO] [stdout] test crypto::hash::generichash::hash_no_key_max_size ... ok [INFO] [stdout] test crypto::hash::generichash::hash_no_key_min_size ... ok [INFO] [stdout] test crypto::hash::generichash::hash_no_key_no_size ... ok [INFO] [stdout] test crypto::hash::generichash::finalize ... ok [INFO] [stdout] test crypto::hash::generichash::state_size ... ok [INFO] [stdout] test crypto::hash::generichash::update ... ok [INFO] [stdout] test crypto::asymmetrickey::authenc::open_with_ssk ... ok [INFO] [stdout] test crypto::asymmetrickey::authenc::seal_detached_with_ssk ... ok [INFO] [stdout] test crypto::asymmetrickey::sign_keypair::keypair_get_pk ... ok [INFO] [stderr] error: test failed, to rerun pass '--test lib' [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `/opt/rustwide/target/debug/deps/lib-fb1f03d5dd95d843` (signal: 9, SIGKILL: kill) [INFO] running `"docker" "inspect" "2abeec13b881c380f94a4ee7a3ad4b900161f8826d00fd9047f946f9cf965085"` [INFO] running `"docker" "rm" "-f" "2abeec13b881c380f94a4ee7a3ad4b900161f8826d00fd9047f946f9cf965085"` [INFO] [stdout] 2abeec13b881c380f94a4ee7a3ad4b900161f8826d00fd9047f946f9cf965085