[INFO] fetching crate sodium-sys 0.0.4... [INFO] testing sodium-sys-0.0.4 against beta-2022-02-22 for beta-1.60-1 [INFO] extracting crate sodium-sys 0.0.4 into /workspace/builds/worker-18/source [INFO] validating manifest of crates.io crate sodium-sys 0.0.4 on toolchain beta-2022-02-22 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+beta-2022-02-22" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate sodium-sys 0.0.4 [INFO] finished tweaking crates.io crate sodium-sys 0.0.4 [INFO] tweaked toml for crates.io crate sodium-sys 0.0.4 written to /workspace/builds/worker-18/source/Cargo.toml [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+beta-2022-02-22" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+beta-2022-02-22" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-18/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-18/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:0cd99ca24d8e8c98e67c542213511d985b8778b5bdcbb160e038429496686047" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2022-02-22" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 16e8b66c832a536b1ec4bd5c1c9c9722555c146672ba3fa0567a163fdd994d1f [INFO] running `Command { std: "docker" "start" "-a" "16e8b66c832a536b1ec4bd5c1c9c9722555c146672ba3fa0567a163fdd994d1f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "16e8b66c832a536b1ec4bd5c1c9c9722555c146672ba3fa0567a163fdd994d1f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "16e8b66c832a536b1ec4bd5c1c9c9722555c146672ba3fa0567a163fdd994d1f", kill_on_drop: false }` [INFO] [stdout] 16e8b66c832a536b1ec4bd5c1c9c9722555c146672ba3fa0567a163fdd994d1f [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-18/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-18/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:0cd99ca24d8e8c98e67c542213511d985b8778b5bdcbb160e038429496686047" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2022-02-22" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] f199cb194818a14daf93f181ab3496627b15f7f27c7910651d5b658daa3255c6 [INFO] running `Command { std: "docker" "start" "-a" "f199cb194818a14daf93f181ab3496627b15f7f27c7910651d5b658daa3255c6", kill_on_drop: false }` [INFO] [stderr] Compiling libc v0.2.119 [INFO] [stderr] Compiling pkg-config v0.3.24 [INFO] [stderr] Compiling sodium-sys v0.0.4 (/opt/rustwide/workdir) [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/crypto/utils/secmem.rs:119:12 [INFO] [stdout] | [INFO] [stdout] 119 | Ok(try!(str::from_utf8(slice)).to_string()) [INFO] [stdout] | ^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/crypto/utils/version.rs:16:12 [INFO] [stdout] | [INFO] [stdout] 16 | Ok(try!(str::from_utf8(slice))) [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:88:5 [INFO] [stdout] | [INFO] [stdout] 88 | uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:89:5 [INFO] [stdout] | [INFO] [stdout] 89 | uint32_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint64_t`: Use u64 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:90:5 [INFO] [stdout] | [INFO] [stdout] 90 | uint64_t [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint64_t`: Use u64 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:342:58 [INFO] [stdout] | [INFO] [stdout] 342 | ... n as uint64_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:343:58 [INFO] [stdout] | [INFO] [stdout] 343 | ... r as uint32_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:344:58 [INFO] [stdout] | [INFO] [stdout] 344 | ... p as uint32_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:104:53 [INFO] [stdout] | [INFO] [stdout] 104 | fn crypto_pwhash_scryptsalsa208sha256(out: *mut uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:106:58 [INFO] [stdout] | [INFO] [stdout] 106 | ... passwd: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:111:57 [INFO] [stdout] | [INFO] [stdout] 111 | fn crypto_pwhash_scryptsalsa208sha256_str(out: *mut uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:112:62 [INFO] [stdout] | [INFO] [stdout] 112 | ... passwd: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:116:67 [INFO] [stdout] | [INFO] [stdout] 116 | fn crypto_pwhash_scryptsalsa208sha256_str_verify(str_: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:117:69 [INFO] [stdout] | [INFO] [stdout] 117 | ... passwd: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:120:61 [INFO] [stdout] | [INFO] [stdout] 120 | fn crypto_pwhash_scryptsalsa208sha256_ll(passwd: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:122:59 [INFO] [stdout] | [INFO] [stdout] 122 | ... salt: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint64_t`: Use u64 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:124:49 [INFO] [stdout] | [INFO] [stdout] 124 | ... N: uint64_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:125:49 [INFO] [stdout] | [INFO] [stdout] 125 | ... r: uint32_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:126:49 [INFO] [stdout] | [INFO] [stdout] 126 | ... p: uint32_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:127:56 [INFO] [stdout] | [INFO] [stdout] 127 | ... buf: *mut uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:2:28 [INFO] [stdout] | [INFO] [stdout] 2 | use libc::{c_void, size_t, uint32_t}; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:22:20 [INFO] [stdout] | [INFO] [stdout] 22 | pub fn random() -> uint32_t { [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:42:29 [INFO] [stdout] | [INFO] [stdout] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:42:42 [INFO] [stdout] | [INFO] [stdout] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:6:32 [INFO] [stdout] | [INFO] [stdout] 6 | fn randombytes_random() -> uint32_t; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:7:41 [INFO] [stdout] | [INFO] [stdout] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:7:54 [INFO] [stdout] | [INFO] [stdout] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:62:13 [INFO] [stdout] | [INFO] [stdout] 62 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:63:13 [INFO] [stdout] | [INFO] [stdout] 63 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:120:13 [INFO] [stdout] | [INFO] [stdout] 120 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:121:13 [INFO] [stdout] | [INFO] [stdout] 121 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:150:13 [INFO] [stdout] | [INFO] [stdout] 150 | let mut nsk = secmem::malloc(SECRETKEYBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:151:13 [INFO] [stdout] | [INFO] [stdout] 151 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:243:13 [INFO] [stdout] | [INFO] [stdout] 243 | let mut ssk = secmem::malloc(BEFORENMBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:172:9 [INFO] [stdout] | [INFO] [stdout] 172 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:246:9 [INFO] [stdout] | [INFO] [stdout] 246 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:311:9 [INFO] [stdout] | [INFO] [stdout] 311 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:312:9 [INFO] [stdout] | [INFO] [stdout] 312 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:387:9 [INFO] [stdout] | [INFO] [stdout] 387 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:453:9 [INFO] [stdout] | [INFO] [stdout] 453 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:524:9 [INFO] [stdout] | [INFO] [stdout] 524 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:587:9 [INFO] [stdout] | [INFO] [stdout] 587 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:588:9 [INFO] [stdout] | [INFO] [stdout] 588 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:662:9 [INFO] [stdout] | [INFO] [stdout] 662 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:726:9 [INFO] [stdout] | [INFO] [stdout] 726 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:736:9 [INFO] [stdout] | [INFO] [stdout] 736 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:810:9 [INFO] [stdout] | [INFO] [stdout] 810 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:874:9 [INFO] [stdout] | [INFO] [stdout] 874 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:884:9 [INFO] [stdout] | [INFO] [stdout] 884 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:954:9 [INFO] [stdout] | [INFO] [stdout] 954 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sealbox.rs:71:9 [INFO] [stdout] | [INFO] [stdout] 71 | let mut ciphertext = secmem::malloc(SEALBYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sealbox.rs:125:9 [INFO] [stdout] | [INFO] [stdout] 125 | let mut message = secmem::malloc(ciphertext.len() - SEALBYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign.rs:72:9 [INFO] [stdout] | [INFO] [stdout] 72 | let mut signedmessage = secmem::malloc(BYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign.rs:121:9 [INFO] [stdout] | [INFO] [stdout] 121 | let mut message = secmem::malloc(signedmessage.len() - BYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign.rs:168:9 [INFO] [stdout] | [INFO] [stdout] 168 | let mut signature = secmem::malloc(BYTES); [INFO] [stdout] | ----^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:58:13 [INFO] [stdout] | [INFO] [stdout] 58 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:59:13 [INFO] [stdout] | [INFO] [stdout] 59 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:116:13 [INFO] [stdout] | [INFO] [stdout] 116 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:117:13 [INFO] [stdout] | [INFO] [stdout] 117 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:201:13 [INFO] [stdout] | [INFO] [stdout] 201 | let mut seed = secmem::malloc(SEEDBYTES); [INFO] [stdout] | ----^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:218:13 [INFO] [stdout] | [INFO] [stdout] 218 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/generichash.rs:126:9 [INFO] [stdout] | [INFO] [stdout] 126 | let mut hash = secmem::malloc(outlen); [INFO] [stdout] | ----^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/passhash.rs:190:9 [INFO] [stdout] | [INFO] [stdout] 190 | let mut key = secmem::malloc(keylen); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/passhash.rs:258:9 [INFO] [stdout] | [INFO] [stdout] 258 | let mut out = secmem::malloc(STRBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/passhash.rs:332:9 [INFO] [stdout] | [INFO] [stdout] 332 | let mut out = secmem::malloc(outlen); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/sha2.rs:60:9 [INFO] [stdout] | [INFO] [stdout] 60 | let mut out = secmem::malloc(SHA256_BYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/sha2.rs:261:9 [INFO] [stdout] | [INFO] [stdout] 261 | let mut out = secmem::malloc(SHA512_BYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/shorthash.rs:60:9 [INFO] [stdout] | [INFO] [stdout] 60 | let mut hash = secmem::malloc(BYTES); [INFO] [stdout] | ----^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/aead.rs:152:9 [INFO] [stdout] | [INFO] [stdout] 152 | let mut ciphertext = secmem::malloc(ABYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/aead.rs:203:9 [INFO] [stdout] | [INFO] [stdout] 203 | let mut message = secmem::malloc(ciphertext.len() - ABYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/auth.rs:62:9 [INFO] [stdout] | [INFO] [stdout] 62 | let mut output = secmem::malloc(BYTES); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:99:9 [INFO] [stdout] | [INFO] [stdout] 99 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:162:9 [INFO] [stdout] | [INFO] [stdout] 162 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:216:9 [INFO] [stdout] | [INFO] [stdout] 216 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:217:9 [INFO] [stdout] | [INFO] [stdout] 217 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:280:9 [INFO] [stdout] | [INFO] [stdout] 280 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:335:9 [INFO] [stdout] | [INFO] [stdout] 335 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:345:9 [INFO] [stdout] | [INFO] [stdout] 345 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:406:9 [INFO] [stdout] | [INFO] [stdout] 406 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/hmacsha2.rs:286:17 [INFO] [stdout] | [INFO] [stdout] 286 | let mut output = secmem::malloc(HMACSHA256_BYTES); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/hmacsha2.rs:301:17 [INFO] [stdout] | [INFO] [stdout] 301 | let mut output = secmem::malloc(HMACSHA512_BYTES); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/hmacsha2.rs:316:17 [INFO] [stdout] | [INFO] [stdout] 316 | let mut output = secmem::malloc(HMACSHA512256_BYTES); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/utils/secmem.rs:112:9 [INFO] [stdout] | [INFO] [stdout] 112 | let mut buf = &mut bufvec[..]; [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/utils/secmem.rs:191:9 [INFO] [stdout] | [INFO] [stdout] 191 | let mut buf = &mut bufvec[..]; [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 84 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 1.75s [INFO] running `Command { std: "docker" "inspect" "f199cb194818a14daf93f181ab3496627b15f7f27c7910651d5b658daa3255c6", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "f199cb194818a14daf93f181ab3496627b15f7f27c7910651d5b658daa3255c6", kill_on_drop: false }` [INFO] [stdout] f199cb194818a14daf93f181ab3496627b15f7f27c7910651d5b658daa3255c6 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-18/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-18/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:0cd99ca24d8e8c98e67c542213511d985b8778b5bdcbb160e038429496686047" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2022-02-22" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 834da282cf50c792cf9f040a2bb3b7cba7558a94969eb36324969f3360b8ca34 [INFO] running `Command { std: "docker" "start" "-a" "834da282cf50c792cf9f040a2bb3b7cba7558a94969eb36324969f3360b8ca34", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Compiling winapi-build v0.1.1 [INFO] [stderr] Compiling winapi v0.2.8 [INFO] [stderr] Compiling utf8-ranges v0.1.3 [INFO] [stderr] Compiling regex-syntax v0.3.9 [INFO] [stderr] Compiling memchr v0.1.11 [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/crypto/utils/secmem.rs:119:12 [INFO] [stdout] | [INFO] [stdout] 119 | Ok(try!(str::from_utf8(slice)).to_string()) [INFO] [stdout] | ^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/crypto/utils/version.rs:16:12 [INFO] [stdout] | [INFO] [stdout] 16 | Ok(try!(str::from_utf8(slice))) [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:88:5 [INFO] [stdout] | [INFO] [stdout] 88 | uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:89:5 [INFO] [stdout] | [INFO] [stdout] 89 | uint32_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint64_t`: Use u64 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:90:5 [INFO] [stdout] | [INFO] [stdout] 90 | uint64_t [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint64_t`: Use u64 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:342:58 [INFO] [stdout] | [INFO] [stdout] 342 | ... n as uint64_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:343:58 [INFO] [stdout] | [INFO] [stdout] 343 | ... r as uint32_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:344:58 [INFO] [stdout] | [INFO] [stdout] 344 | ... p as uint32_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:104:53 [INFO] [stdout] | [INFO] [stdout] 104 | fn crypto_pwhash_scryptsalsa208sha256(out: *mut uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:106:58 [INFO] [stdout] | [INFO] [stdout] 106 | ... passwd: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:111:57 [INFO] [stdout] | [INFO] [stdout] 111 | fn crypto_pwhash_scryptsalsa208sha256_str(out: *mut uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:112:62 [INFO] [stdout] | [INFO] [stdout] 112 | ... passwd: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:116:67 [INFO] [stdout] | [INFO] [stdout] 116 | fn crypto_pwhash_scryptsalsa208sha256_str_verify(str_: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:117:69 [INFO] [stdout] | [INFO] [stdout] 117 | ... passwd: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:120:61 [INFO] [stdout] | [INFO] [stdout] 120 | fn crypto_pwhash_scryptsalsa208sha256_ll(passwd: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:122:59 [INFO] [stdout] | [INFO] [stdout] 122 | ... salt: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint64_t`: Use u64 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:124:49 [INFO] [stdout] | [INFO] [stdout] 124 | ... N: uint64_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:125:49 [INFO] [stdout] | [INFO] [stdout] 125 | ... r: uint32_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:126:49 [INFO] [stdout] | [INFO] [stdout] 126 | ... p: uint32_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:127:56 [INFO] [stdout] | [INFO] [stdout] 127 | ... buf: *mut uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:2:28 [INFO] [stdout] | [INFO] [stdout] 2 | use libc::{c_void, size_t, uint32_t}; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:22:20 [INFO] [stdout] | [INFO] [stdout] 22 | pub fn random() -> uint32_t { [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:42:29 [INFO] [stdout] | [INFO] [stdout] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:42:42 [INFO] [stdout] | [INFO] [stdout] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:6:32 [INFO] [stdout] | [INFO] [stdout] 6 | fn randombytes_random() -> uint32_t; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:7:41 [INFO] [stdout] | [INFO] [stdout] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:7:54 [INFO] [stdout] | [INFO] [stdout] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:62:13 [INFO] [stdout] | [INFO] [stdout] 62 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:63:13 [INFO] [stdout] | [INFO] [stdout] 63 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:120:13 [INFO] [stdout] | [INFO] [stdout] 120 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:121:13 [INFO] [stdout] | [INFO] [stdout] 121 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:150:13 [INFO] [stdout] | [INFO] [stdout] 150 | let mut nsk = secmem::malloc(SECRETKEYBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:151:13 [INFO] [stdout] | [INFO] [stdout] 151 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:243:13 [INFO] [stdout] | [INFO] [stdout] 243 | let mut ssk = secmem::malloc(BEFORENMBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:172:9 [INFO] [stdout] | [INFO] [stdout] 172 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:246:9 [INFO] [stdout] | [INFO] [stdout] 246 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:311:9 [INFO] [stdout] | [INFO] [stdout] 311 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:312:9 [INFO] [stdout] | [INFO] [stdout] 312 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:387:9 [INFO] [stdout] | [INFO] [stdout] 387 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:453:9 [INFO] [stdout] | [INFO] [stdout] 453 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:524:9 [INFO] [stdout] | [INFO] [stdout] 524 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:587:9 [INFO] [stdout] | [INFO] [stdout] 587 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:588:9 [INFO] [stdout] | [INFO] [stdout] 588 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:662:9 [INFO] [stdout] | [INFO] [stdout] 662 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:726:9 [INFO] [stdout] | [INFO] [stdout] 726 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:736:9 [INFO] [stdout] | [INFO] [stdout] 736 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:810:9 [INFO] [stdout] | [INFO] [stdout] 810 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:874:9 [INFO] [stdout] | [INFO] [stdout] 874 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:884:9 [INFO] [stdout] | [INFO] [stdout] 884 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:954:9 [INFO] [stdout] | [INFO] [stdout] 954 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sealbox.rs:71:9 [INFO] [stdout] | [INFO] [stdout] 71 | let mut ciphertext = secmem::malloc(SEALBYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sealbox.rs:125:9 [INFO] [stdout] | [INFO] [stdout] 125 | let mut message = secmem::malloc(ciphertext.len() - SEALBYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign.rs:72:9 [INFO] [stdout] | [INFO] [stdout] 72 | let mut signedmessage = secmem::malloc(BYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign.rs:121:9 [INFO] [stdout] | [INFO] [stdout] 121 | let mut message = secmem::malloc(signedmessage.len() - BYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign.rs:168:9 [INFO] [stdout] | [INFO] [stdout] 168 | let mut signature = secmem::malloc(BYTES); [INFO] [stdout] | ----^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:58:13 [INFO] [stdout] | [INFO] [stdout] 58 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:59:13 [INFO] [stdout] | [INFO] [stdout] 59 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:116:13 [INFO] [stdout] | [INFO] [stdout] 116 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:117:13 [INFO] [stdout] | [INFO] [stdout] 117 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:201:13 [INFO] [stdout] | [INFO] [stdout] 201 | let mut seed = secmem::malloc(SEEDBYTES); [INFO] [stdout] | ----^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:218:13 [INFO] [stdout] | [INFO] [stdout] 218 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/generichash.rs:126:9 [INFO] [stdout] | [INFO] [stdout] 126 | let mut hash = secmem::malloc(outlen); [INFO] [stdout] | ----^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/passhash.rs:190:9 [INFO] [stdout] | [INFO] [stdout] 190 | let mut key = secmem::malloc(keylen); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/passhash.rs:258:9 [INFO] [stdout] | [INFO] [stdout] 258 | let mut out = secmem::malloc(STRBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/passhash.rs:332:9 [INFO] [stdout] | [INFO] [stdout] 332 | let mut out = secmem::malloc(outlen); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/sha2.rs:60:9 [INFO] [stdout] | [INFO] [stdout] 60 | let mut out = secmem::malloc(SHA256_BYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/sha2.rs:261:9 [INFO] [stdout] | [INFO] [stdout] 261 | let mut out = secmem::malloc(SHA512_BYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/shorthash.rs:60:9 [INFO] [stdout] | [INFO] [stdout] 60 | let mut hash = secmem::malloc(BYTES); [INFO] [stdout] | ----^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/aead.rs:152:9 [INFO] [stdout] | [INFO] [stdout] 152 | let mut ciphertext = secmem::malloc(ABYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/aead.rs:203:9 [INFO] [stdout] | [INFO] [stdout] 203 | let mut message = secmem::malloc(ciphertext.len() - ABYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/auth.rs:62:9 [INFO] [stdout] | [INFO] [stdout] 62 | let mut output = secmem::malloc(BYTES); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:99:9 [INFO] [stdout] | [INFO] [stdout] 99 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:162:9 [INFO] [stdout] | [INFO] [stdout] 162 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:216:9 [INFO] [stdout] | [INFO] [stdout] 216 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:217:9 [INFO] [stdout] | [INFO] [stdout] 217 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:280:9 [INFO] [stdout] | [INFO] [stdout] 280 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:335:9 [INFO] [stdout] | [INFO] [stdout] 335 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:345:9 [INFO] [stdout] | [INFO] [stdout] 345 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:406:9 [INFO] [stdout] | [INFO] [stdout] 406 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/hmacsha2.rs:286:17 [INFO] [stdout] | [INFO] [stdout] 286 | let mut output = secmem::malloc(HMACSHA256_BYTES); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/hmacsha2.rs:301:17 [INFO] [stdout] | [INFO] [stdout] 301 | let mut output = secmem::malloc(HMACSHA512_BYTES); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/hmacsha2.rs:316:17 [INFO] [stdout] | [INFO] [stdout] 316 | let mut output = secmem::malloc(HMACSHA512256_BYTES); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/utils/secmem.rs:112:9 [INFO] [stdout] | [INFO] [stdout] 112 | let mut buf = &mut bufvec[..]; [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/utils/secmem.rs:191:9 [INFO] [stdout] | [INFO] [stdout] 191 | let mut buf = &mut bufvec[..]; [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 84 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Compiling aho-corasick v0.5.3 [INFO] [stderr] Compiling kernel32-sys v0.2.2 [INFO] [stderr] Compiling thread-id v2.0.0 [INFO] [stderr] Compiling thread_local v0.2.7 [INFO] [stderr] Compiling regex v0.1.80 [INFO] [stderr] Compiling sodium-sys v0.0.4 (/opt/rustwide/workdir) [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/crypto/utils/secmem.rs:119:12 [INFO] [stdout] | [INFO] [stdout] 119 | Ok(try!(str::from_utf8(slice)).to_string()) [INFO] [stdout] | ^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/crypto/utils/version.rs:16:12 [INFO] [stdout] | [INFO] [stdout] 16 | Ok(try!(str::from_utf8(slice))) [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated constant `std::sync::ONCE_INIT`: the `new` function is now preferred [INFO] [stdout] --> tests/lib.rs:5:22 [INFO] [stdout] | [INFO] [stdout] 5 | use std::sync::{Once,ONCE_INIT}; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated constant `std::sync::ONCE_INIT`: the `new` function is now preferred [INFO] [stdout] --> tests/lib.rs:7:22 [INFO] [stdout] | [INFO] [stdout] 7 | static START: Once = ONCE_INIT; [INFO] [stdout] | ^^^^^^^^^ help: replace the use of the deprecated constant: `Once::new()` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:88:5 [INFO] [stdout] | [INFO] [stdout] 88 | uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:89:5 [INFO] [stdout] | [INFO] [stdout] 89 | uint32_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint64_t`: Use u64 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:90:5 [INFO] [stdout] | [INFO] [stdout] 90 | uint64_t [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint64_t`: Use u64 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:342:58 [INFO] [stdout] | [INFO] [stdout] 342 | ... n as uint64_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:343:58 [INFO] [stdout] | [INFO] [stdout] 343 | ... r as uint32_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:344:58 [INFO] [stdout] | [INFO] [stdout] 344 | ... p as uint32_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:104:53 [INFO] [stdout] | [INFO] [stdout] 104 | fn crypto_pwhash_scryptsalsa208sha256(out: *mut uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:106:58 [INFO] [stdout] | [INFO] [stdout] 106 | ... passwd: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:111:57 [INFO] [stdout] | [INFO] [stdout] 111 | fn crypto_pwhash_scryptsalsa208sha256_str(out: *mut uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:112:62 [INFO] [stdout] | [INFO] [stdout] 112 | ... passwd: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:116:67 [INFO] [stdout] | [INFO] [stdout] 116 | fn crypto_pwhash_scryptsalsa208sha256_str_verify(str_: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:117:69 [INFO] [stdout] | [INFO] [stdout] 117 | ... passwd: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:120:61 [INFO] [stdout] | [INFO] [stdout] 120 | fn crypto_pwhash_scryptsalsa208sha256_ll(passwd: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:122:59 [INFO] [stdout] | [INFO] [stdout] 122 | ... salt: *const uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint64_t`: Use u64 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:124:49 [INFO] [stdout] | [INFO] [stdout] 124 | ... N: uint64_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:125:49 [INFO] [stdout] | [INFO] [stdout] 125 | ... r: uint32_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:126:49 [INFO] [stdout] | [INFO] [stdout] 126 | ... p: uint32_t, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stdout] --> src/crypto/hash/passhash.rs:127:56 [INFO] [stdout] | [INFO] [stdout] 127 | ... buf: *mut uint8_t, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:2:28 [INFO] [stdout] | [INFO] [stdout] 2 | use libc::{c_void, size_t, uint32_t}; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:22:20 [INFO] [stdout] | [INFO] [stdout] 22 | pub fn random() -> uint32_t { [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:42:29 [INFO] [stdout] | [INFO] [stdout] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:42:42 [INFO] [stdout] | [INFO] [stdout] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:6:32 [INFO] [stdout] | [INFO] [stdout] 6 | fn randombytes_random() -> uint32_t; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:7:41 [INFO] [stdout] | [INFO] [stdout] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stdout] --> src/crypto/utils/randombytes.rs:7:54 [INFO] [stdout] | [INFO] [stdout] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:62:13 [INFO] [stdout] | [INFO] [stdout] 62 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:63:13 [INFO] [stdout] | [INFO] [stdout] 63 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:120:13 [INFO] [stdout] | [INFO] [stdout] 120 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:121:13 [INFO] [stdout] | [INFO] [stdout] 121 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:150:13 [INFO] [stdout] | [INFO] [stdout] 150 | let mut nsk = secmem::malloc(SECRETKEYBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:151:13 [INFO] [stdout] | [INFO] [stdout] 151 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/auth_keypair.rs:243:13 [INFO] [stdout] | [INFO] [stdout] 243 | let mut ssk = secmem::malloc(BEFORENMBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:172:9 [INFO] [stdout] | [INFO] [stdout] 172 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:246:9 [INFO] [stdout] | [INFO] [stdout] 246 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:311:9 [INFO] [stdout] | [INFO] [stdout] 311 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:312:9 [INFO] [stdout] | [INFO] [stdout] 312 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:387:9 [INFO] [stdout] | [INFO] [stdout] 387 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:453:9 [INFO] [stdout] | [INFO] [stdout] 453 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:524:9 [INFO] [stdout] | [INFO] [stdout] 524 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:587:9 [INFO] [stdout] | [INFO] [stdout] 587 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:588:9 [INFO] [stdout] | [INFO] [stdout] 588 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:662:9 [INFO] [stdout] | [INFO] [stdout] 662 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:726:9 [INFO] [stdout] | [INFO] [stdout] 726 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:736:9 [INFO] [stdout] | [INFO] [stdout] 736 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:810:9 [INFO] [stdout] | [INFO] [stdout] 810 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:874:9 [INFO] [stdout] | [INFO] [stdout] 874 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:884:9 [INFO] [stdout] | [INFO] [stdout] 884 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/authenc.rs:954:9 [INFO] [stdout] | [INFO] [stdout] 954 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sealbox.rs:71:9 [INFO] [stdout] | [INFO] [stdout] 71 | let mut ciphertext = secmem::malloc(SEALBYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sealbox.rs:125:9 [INFO] [stdout] | [INFO] [stdout] 125 | let mut message = secmem::malloc(ciphertext.len() - SEALBYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign.rs:72:9 [INFO] [stdout] | [INFO] [stdout] 72 | let mut signedmessage = secmem::malloc(BYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign.rs:121:9 [INFO] [stdout] | [INFO] [stdout] 121 | let mut message = secmem::malloc(signedmessage.len() - BYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign.rs:168:9 [INFO] [stdout] | [INFO] [stdout] 168 | let mut signature = secmem::malloc(BYTES); [INFO] [stdout] | ----^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:58:13 [INFO] [stdout] | [INFO] [stdout] 58 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:59:13 [INFO] [stdout] | [INFO] [stdout] 59 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:116:13 [INFO] [stdout] | [INFO] [stdout] 116 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:117:13 [INFO] [stdout] | [INFO] [stdout] 117 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:201:13 [INFO] [stdout] | [INFO] [stdout] 201 | let mut seed = secmem::malloc(SEEDBYTES); [INFO] [stdout] | ----^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/asymmetrickey/sign_keypair.rs:218:13 [INFO] [stdout] | [INFO] [stdout] 218 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stdout] | ----^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/generichash.rs:126:9 [INFO] [stdout] | [INFO] [stdout] 126 | let mut hash = secmem::malloc(outlen); [INFO] [stdout] | ----^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/passhash.rs:190:9 [INFO] [stdout] | [INFO] [stdout] 190 | let mut key = secmem::malloc(keylen); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/passhash.rs:258:9 [INFO] [stdout] | [INFO] [stdout] 258 | let mut out = secmem::malloc(STRBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/passhash.rs:332:9 [INFO] [stdout] | [INFO] [stdout] 332 | let mut out = secmem::malloc(outlen); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/sha2.rs:60:9 [INFO] [stdout] | [INFO] [stdout] 60 | let mut out = secmem::malloc(SHA256_BYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/sha2.rs:261:9 [INFO] [stdout] | [INFO] [stdout] 261 | let mut out = secmem::malloc(SHA512_BYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/hash/shorthash.rs:60:9 [INFO] [stdout] | [INFO] [stdout] 60 | let mut hash = secmem::malloc(BYTES); [INFO] [stdout] | ----^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/aead.rs:152:9 [INFO] [stdout] | [INFO] [stdout] 152 | let mut ciphertext = secmem::malloc(ABYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/aead.rs:203:9 [INFO] [stdout] | [INFO] [stdout] 203 | let mut message = secmem::malloc(ciphertext.len() - ABYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/auth.rs:62:9 [INFO] [stdout] | [INFO] [stdout] 62 | let mut output = secmem::malloc(BYTES); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:99:9 [INFO] [stdout] | [INFO] [stdout] 99 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:162:9 [INFO] [stdout] | [INFO] [stdout] 162 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:216:9 [INFO] [stdout] | [INFO] [stdout] 216 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:217:9 [INFO] [stdout] | [INFO] [stdout] 217 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:280:9 [INFO] [stdout] | [INFO] [stdout] 280 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:335:9 [INFO] [stdout] | [INFO] [stdout] 335 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:345:9 [INFO] [stdout] | [INFO] [stdout] 345 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/authenc.rs:406:9 [INFO] [stdout] | [INFO] [stdout] 406 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/hmacsha2.rs:286:17 [INFO] [stdout] | [INFO] [stdout] 286 | let mut output = secmem::malloc(HMACSHA256_BYTES); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/hmacsha2.rs:301:17 [INFO] [stdout] | [INFO] [stdout] 301 | let mut output = secmem::malloc(HMACSHA512_BYTES); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/symmetrickey/hmacsha2.rs:316:17 [INFO] [stdout] | [INFO] [stdout] 316 | let mut output = secmem::malloc(HMACSHA512256_BYTES); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/utils/secmem.rs:112:9 [INFO] [stdout] | [INFO] [stdout] 112 | let mut buf = &mut bufvec[..]; [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/crypto/utils/secmem.rs:191:9 [INFO] [stdout] | [INFO] [stdout] 191 | let mut buf = &mut bufvec[..]; [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 84 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 2 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 5.27s [INFO] running `Command { std: "docker" "inspect" "834da282cf50c792cf9f040a2bb3b7cba7558a94969eb36324969f3360b8ca34", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "834da282cf50c792cf9f040a2bb3b7cba7558a94969eb36324969f3360b8ca34", kill_on_drop: false }` [INFO] [stdout] 834da282cf50c792cf9f040a2bb3b7cba7558a94969eb36324969f3360b8ca34 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-18/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-18/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:0cd99ca24d8e8c98e67c542213511d985b8778b5bdcbb160e038429496686047" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2022-02-22" "test" "--frozen", kill_on_drop: false }` [INFO] [stdout] d577ee3bcef7fbac9481308ebf706c9cd3cc338dcead84dc79e3e365a6f9031c [INFO] running `Command { std: "docker" "start" "-a" "d577ee3bcef7fbac9481308ebf706c9cd3cc338dcead84dc79e3e365a6f9031c", kill_on_drop: false }` [INFO] [stderr] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stderr] --> src/crypto/utils/secmem.rs:119:12 [INFO] [stderr] | [INFO] [stderr] 119 | Ok(try!(str::from_utf8(slice)).to_string()) [INFO] [stderr] | ^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stderr] [INFO] [stderr] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stderr] --> src/crypto/utils/version.rs:16:12 [INFO] [stderr] | [INFO] [stderr] 16 | Ok(try!(str::from_utf8(slice))) [INFO] [stderr] | ^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:88:5 [INFO] [stderr] | [INFO] [stderr] 88 | uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:89:5 [INFO] [stderr] | [INFO] [stderr] 89 | uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint64_t`: Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:90:5 [INFO] [stderr] | [INFO] [stderr] 90 | uint64_t [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint64_t`: Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:342:58 [INFO] [stderr] | [INFO] [stderr] 342 | ... n as uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:343:58 [INFO] [stderr] | [INFO] [stderr] 343 | ... r as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:344:58 [INFO] [stderr] | [INFO] [stderr] 344 | ... p as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:104:53 [INFO] [stderr] | [INFO] [stderr] 104 | fn crypto_pwhash_scryptsalsa208sha256(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:106:58 [INFO] [stderr] | [INFO] [stderr] 106 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:111:57 [INFO] [stderr] | [INFO] [stderr] 111 | fn crypto_pwhash_scryptsalsa208sha256_str(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:112:62 [INFO] [stderr] | [INFO] [stderr] 112 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:116:67 [INFO] [stderr] | [INFO] [stderr] 116 | fn crypto_pwhash_scryptsalsa208sha256_str_verify(str_: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:117:69 [INFO] [stderr] | [INFO] [stderr] 117 | ... passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:120:61 [INFO] [stderr] | [INFO] [stderr] 120 | fn crypto_pwhash_scryptsalsa208sha256_ll(passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:122:59 [INFO] [stderr] | [INFO] [stderr] 122 | ... salt: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint64_t`: Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:124:49 [INFO] [stderr] | [INFO] [stderr] 124 | ... N: uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:125:49 [INFO] [stderr] | [INFO] [stderr] 125 | ... r: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:126:49 [INFO] [stderr] | [INFO] [stderr] 126 | ... p: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint8_t`: Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:127:56 [INFO] [stderr] | [INFO] [stderr] 127 | ... buf: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:2:28 [INFO] [stderr] | [INFO] [stderr] 2 | use libc::{c_void, size_t, uint32_t}; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:22:20 [INFO] [stderr] | [INFO] [stderr] 22 | pub fn random() -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:29 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:42 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:6:32 [INFO] [stderr] | [INFO] [stderr] 6 | fn randombytes_random() -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:41 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated type alias `libc::uint32_t`: Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:54 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:62:13 [INFO] [stderr] | [INFO] [stderr] 62 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_mut)]` on by default [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:63:13 [INFO] [stderr] | [INFO] [stderr] 63 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:120:13 [INFO] [stderr] | [INFO] [stderr] 120 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:121:13 [INFO] [stderr] | [INFO] [stderr] 121 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:150:13 [INFO] [stderr] | [INFO] [stderr] 150 | let mut nsk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:151:13 [INFO] [stderr] | [INFO] [stderr] 151 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:243:13 [INFO] [stderr] | [INFO] [stderr] 243 | let mut ssk = secmem::malloc(BEFORENMBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:172:9 [INFO] [stderr] | [INFO] [stderr] 172 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:246:9 [INFO] [stderr] | [INFO] [stderr] 246 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:311:9 [INFO] [stderr] | [INFO] [stderr] 311 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:312:9 [INFO] [stderr] | [INFO] [stderr] 312 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:387:9 [INFO] [stderr] | [INFO] [stderr] 387 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:453:9 [INFO] [stderr] | [INFO] [stderr] 453 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:524:9 [INFO] [stderr] | [INFO] [stderr] 524 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:587:9 [INFO] [stderr] | [INFO] [stderr] 587 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:588:9 [INFO] [stderr] | [INFO] [stderr] 588 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:662:9 [INFO] [stderr] | [INFO] [stderr] 662 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:726:9 [INFO] [stderr] | [INFO] [stderr] 726 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:736:9 [INFO] [stderr] | [INFO] [stderr] 736 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:810:9 [INFO] [stderr] | [INFO] [stderr] 810 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:874:9 [INFO] [stderr] | [INFO] [stderr] 874 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:884:9 [INFO] [stderr] | [INFO] [stderr] 884 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:954:9 [INFO] [stderr] | [INFO] [stderr] 954 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:71:9 [INFO] [stderr] | [INFO] [stderr] 71 | let mut ciphertext = secmem::malloc(SEALBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:125:9 [INFO] [stderr] | [INFO] [stderr] 125 | let mut message = secmem::malloc(ciphertext.len() - SEALBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:72:9 [INFO] [stderr] | [INFO] [stderr] 72 | let mut signedmessage = secmem::malloc(BYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:121:9 [INFO] [stderr] | [INFO] [stderr] 121 | let mut message = secmem::malloc(signedmessage.len() - BYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:168:9 [INFO] [stderr] | [INFO] [stderr] 168 | let mut signature = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:58:13 [INFO] [stderr] | [INFO] [stderr] 58 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:59:13 [INFO] [stderr] | [INFO] [stderr] 59 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:116:13 [INFO] [stderr] | [INFO] [stderr] 116 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:117:13 [INFO] [stderr] | [INFO] [stderr] 117 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:201:13 [INFO] [stderr] | [INFO] [stderr] 201 | let mut seed = secmem::malloc(SEEDBYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:218:13 [INFO] [stderr] | [INFO] [stderr] 218 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/generichash.rs:126:9 [INFO] [stderr] | [INFO] [stderr] 126 | let mut hash = secmem::malloc(outlen); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:190:9 [INFO] [stderr] | [INFO] [stderr] 190 | let mut key = secmem::malloc(keylen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:258:9 [INFO] [stderr] | [INFO] [stderr] 258 | let mut out = secmem::malloc(STRBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:332:9 [INFO] [stderr] | [INFO] [stderr] 332 | let mut out = secmem::malloc(outlen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut out = secmem::malloc(SHA256_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:261:9 [INFO] [stderr] | [INFO] [stderr] 261 | let mut out = secmem::malloc(SHA512_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/shorthash.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut hash = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:152:9 [INFO] [stderr] | [INFO] [stderr] 152 | let mut ciphertext = secmem::malloc(ABYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:203:9 [INFO] [stderr] | [INFO] [stderr] 203 | let mut message = secmem::malloc(ciphertext.len() - ABYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/auth.rs:62:9 [INFO] [stderr] | [INFO] [stderr] 62 | let mut output = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:99:9 [INFO] [stderr] | [INFO] [stderr] 99 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:162:9 [INFO] [stderr] | [INFO] [stderr] 162 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:216:9 [INFO] [stderr] | [INFO] [stderr] 216 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:217:9 [INFO] [stderr] | [INFO] [stderr] 217 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:280:9 [INFO] [stderr] | [INFO] [stderr] 280 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:335:9 [INFO] [stderr] | [INFO] [stderr] 335 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:345:9 [INFO] [stderr] | [INFO] [stderr] 345 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:406:9 [INFO] [stderr] | [INFO] [stderr] 406 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:286:17 [INFO] [stderr] | [INFO] [stderr] 286 | let mut output = secmem::malloc(HMACSHA256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:301:17 [INFO] [stderr] | [INFO] [stderr] 301 | let mut output = secmem::malloc(HMACSHA512_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:316:17 [INFO] [stderr] | [INFO] [stderr] 316 | let mut output = secmem::malloc(HMACSHA512256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:112:9 [INFO] [stderr] | [INFO] [stderr] 112 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:191:9 [INFO] [stderr] | [INFO] [stderr] 191 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: `sodium-sys` (lib) generated 84 warnings [INFO] [stderr] warning: use of deprecated constant `std::sync::ONCE_INIT`: the `new` function is now preferred [INFO] [stderr] --> tests/lib.rs:5:22 [INFO] [stderr] | [INFO] [stderr] 5 | use std::sync::{Once,ONCE_INIT}; [INFO] [stdout] [INFO] [stderr] | ^^^^^^^^^ [INFO] [stdout] running 0 tests [INFO] [stderr] | [INFO] [stdout] [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stderr] [INFO] [stdout] [INFO] [stderr] warning: use of deprecated constant `std::sync::ONCE_INIT`: the `new` function is now preferred [INFO] [stderr] --> tests/lib.rs:7:22 [INFO] [stderr] | [INFO] [stderr] 7 | static START: Once = ONCE_INIT; [INFO] [stderr] | ^^^^^^^^^ help: replace the use of the deprecated constant: `Once::new()` [INFO] [stderr] [INFO] [stderr] warning: `sodium-sys` (lib test) generated 84 warnings (84 duplicates) [INFO] [stderr] warning: `sodium-sys` (test "lib") generated 2 warnings [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.01s [INFO] [stderr] Running unittests (/opt/rustwide/target/debug/deps/sodium_sys-9d758d34b7fd042b) [INFO] [stderr] Running tests/lib.rs (/opt/rustwide/target/debug/deps/lib-455580b8a035854d) [INFO] [stdout] [INFO] [stdout] running 87 tests [INFO] [stderr] error: test failed, to rerun pass '--test lib' [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `/opt/rustwide/target/debug/deps/lib-455580b8a035854d` (signal: 9, SIGKILL: kill) [INFO] running `Command { std: "docker" "inspect" "d577ee3bcef7fbac9481308ebf706c9cd3cc338dcead84dc79e3e365a6f9031c", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "d577ee3bcef7fbac9481308ebf706c9cd3cc338dcead84dc79e3e365a6f9031c", kill_on_drop: false }` [INFO] [stdout] d577ee3bcef7fbac9481308ebf706c9cd3cc338dcead84dc79e3e365a6f9031c