[INFO] cloning repository https://github.com/DavidWittman/cryptopals-rust [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/DavidWittman/cryptopals-rust" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FDavidWittman%2Fcryptopals-rust", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FDavidWittman%2Fcryptopals-rust'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] a06d25414126732558ce17ce9233d61ff1f5b061 [INFO] testing DavidWittman/cryptopals-rust against beta-2022-02-22 for beta-1.60-1 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FDavidWittman%2Fcryptopals-rust" "/workspace/builds/worker-6/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-6/source'... [INFO] [stderr] done. [INFO] validating manifest of git repo https://github.com/DavidWittman/cryptopals-rust on toolchain beta-2022-02-22 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+beta-2022-02-22" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/DavidWittman/cryptopals-rust [INFO] finished tweaking git repo https://github.com/DavidWittman/cryptopals-rust [INFO] tweaked toml for git repo https://github.com/DavidWittman/cryptopals-rust written to /workspace/builds/worker-6/source/Cargo.toml [INFO] crate git repo https://github.com/DavidWittman/cryptopals-rust already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+beta-2022-02-22" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:0cd99ca24d8e8c98e67c542213511d985b8778b5bdcbb160e038429496686047" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2022-02-22" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 41ed8063407903fc36fdbd66470d7260084661e0bfcc39340e923763e45e707c [INFO] running `Command { std: "docker" "start" "-a" "41ed8063407903fc36fdbd66470d7260084661e0bfcc39340e923763e45e707c", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "41ed8063407903fc36fdbd66470d7260084661e0bfcc39340e923763e45e707c", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "41ed8063407903fc36fdbd66470d7260084661e0bfcc39340e923763e45e707c", kill_on_drop: false }` [INFO] [stdout] 41ed8063407903fc36fdbd66470d7260084661e0bfcc39340e923763e45e707c [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:0cd99ca24d8e8c98e67c542213511d985b8778b5bdcbb160e038429496686047" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2022-02-22" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 642655fb2e4b68254cc52170576ff458d5ab9817190d32f10e43f414c322ece3 [INFO] running `Command { std: "docker" "start" "-a" "642655fb2e4b68254cc52170576ff458d5ab9817190d32f10e43f414c322ece3", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Compiling cc v1.0.70 [INFO] [stderr] Compiling libc v0.2.101 [INFO] [stderr] Compiling openssl v0.10.36 [INFO] [stderr] Compiling openssl-sys v0.9.66 [INFO] [stderr] Compiling cryptopals-rust v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused variable: `cipher` [INFO] [stdout] --> src/set2/ch10.rs:25:16 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_cipher` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/set2/ch10.rs:25:33 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `iv` [INFO] [stdout] --> src/set2/ch10.rs:25:48 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^ help: if this is intentional, prefix it with an underscore: `_iv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 3 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 7.65s [INFO] running `Command { std: "docker" "inspect" "642655fb2e4b68254cc52170576ff458d5ab9817190d32f10e43f414c322ece3", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "642655fb2e4b68254cc52170576ff458d5ab9817190d32f10e43f414c322ece3", kill_on_drop: false }` [INFO] [stdout] 642655fb2e4b68254cc52170576ff458d5ab9817190d32f10e43f414c322ece3 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:0cd99ca24d8e8c98e67c542213511d985b8778b5bdcbb160e038429496686047" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2022-02-22" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] bc68764ac09c1b8a771d3b30bd01d753720a38d8f8bdfd6550cf5ba8d2b2676f [INFO] running `Command { std: "docker" "start" "-a" "bc68764ac09c1b8a771d3b30bd01d753720a38d8f8bdfd6550cf5ba8d2b2676f", kill_on_drop: false }` [INFO] [stderr] Compiling cryptopals-rust v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused variable: `cipher` [INFO] [stdout] --> src/set2/ch10.rs:25:16 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_cipher` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/set2/ch10.rs:25:33 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `iv` [INFO] [stdout] --> src/set2/ch10.rs:25:48 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^ help: if this is intentional, prefix it with an underscore: `_iv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 3 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `cipher` [INFO] [stdout] --> src/set2/ch10.rs:25:16 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_cipher` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/set2/ch10.rs:25:33 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `iv` [INFO] [stdout] --> src/set2/ch10.rs:25:48 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^ help: if this is intentional, prefix it with an underscore: `_iv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 3 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 1.03s [INFO] running `Command { std: "docker" "inspect" "bc68764ac09c1b8a771d3b30bd01d753720a38d8f8bdfd6550cf5ba8d2b2676f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "bc68764ac09c1b8a771d3b30bd01d753720a38d8f8bdfd6550cf5ba8d2b2676f", kill_on_drop: false }` [INFO] [stdout] bc68764ac09c1b8a771d3b30bd01d753720a38d8f8bdfd6550cf5ba8d2b2676f [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:0cd99ca24d8e8c98e67c542213511d985b8778b5bdcbb160e038429496686047" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2022-02-22" "test" "--frozen", kill_on_drop: false }` [INFO] [stdout] 58ba4a890d0e2e7f8adbcaa9c2c2516e698398d3f56f3cc4b9e235602003ea5e [INFO] running `Command { std: "docker" "start" "-a" "58ba4a890d0e2e7f8adbcaa9c2c2516e698398d3f56f3cc4b9e235602003ea5e", kill_on_drop: false }` [INFO] [stderr] warning: unused variable: `cipher` [INFO] [stderr] --> src/set2/ch10.rs:25:16 [INFO] [stderr] | [INFO] [stderr] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stderr] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_cipher` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `key` [INFO] [stderr] --> src/set2/ch10.rs:25:33 [INFO] [stderr] | [INFO] [stderr] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stderr] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `iv` [INFO] [stderr] --> src/set2/ch10.rs:25:48 [INFO] [stderr] | [INFO] [stderr] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stderr] | ^^ help: if this is intentional, prefix it with an underscore: `_iv` [INFO] [stderr] [INFO] [stderr] warning: `cryptopals-rust` (lib) generated 3 warnings [INFO] [stderr] warning: `cryptopals-rust` (lib test) generated 3 warnings (3 duplicates) [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.03s [INFO] [stderr] Running unittests (/opt/rustwide/target/debug/deps/cryptopals_rust-e7e53bfb0742b19a) [INFO] [stdout] [INFO] [stdout] running 19 tests [INFO] [stdout] test set1::ch1::test_hex_to_b64 ... ok [INFO] [stdout] test set1::ch3::test_get_score ... ok [INFO] [stdout] test set1::ch2::test_xor_strings ... ok [INFO] [stdout] test set1::ch3::test_xor_bytes ... ok [INFO] [stdout] test set1::ch5::test_repeating_key_xor ... ok [INFO] [stdout] test set1::ch6::test_hamming_distance ... ok [INFO] [stdout] test set1::ch6::test_transpose ... ok [INFO] [stdout] test set1::ch6::test_chunks ... ok [INFO] [stdout] test set1::ch8::test_ecb_score ... ok [INFO] [stdout] test set2::ch10::test_cbc_decrypt ... ignored [INFO] [stdout] test set1::ch6::test_read_file_base64 ... ok [INFO] [stdout] test set1::ch3::test_find_xor_byte_from_string ... ok [INFO] [stdout] test set2::ch9::test_pkcs7_pad ... ok [INFO] [stdout] test set1::ch6::test_find_key_size ... ok [INFO] [stdout] test set1::ch7::test_decrypt_aes128_ecb ... ok [INFO] [stdout] test set1::ch8::test_ecb_score_panic - should panic ... ok [INFO] [stdout] test set1::ch8::test_find_ecb_in_file ... ok [INFO] [stdout] test set1::ch6::test_break_repeating_key_xor ... ok [INFO] [stdout] test set1::ch4::test_find_single_xor_in_file ... ok [INFO] [stdout] [INFO] [stdout] test result: ok. 18 passed; 0 failed; 1 ignored; 0 measured; 0 filtered out; finished in 0.27s [INFO] [stdout] [INFO] [stderr] Doc-tests cryptopals-rust [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "58ba4a890d0e2e7f8adbcaa9c2c2516e698398d3f56f3cc4b9e235602003ea5e", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "58ba4a890d0e2e7f8adbcaa9c2c2516e698398d3f56f3cc4b9e235602003ea5e", kill_on_drop: false }` [INFO] [stdout] 58ba4a890d0e2e7f8adbcaa9c2c2516e698398d3f56f3cc4b9e235602003ea5e