[INFO] cloning repository https://github.com/DavidWittman/cryptopals-rust [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/DavidWittman/cryptopals-rust" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FDavidWittman%2Fcryptopals-rust", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FDavidWittman%2Fcryptopals-rust'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] a06d25414126732558ce17ce9233d61ff1f5b061 [INFO] testing DavidWittman/cryptopals-rust against 1.60.0 for beta-1.61-1 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FDavidWittman%2Fcryptopals-rust" "/workspace/builds/worker-9/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-9/source'... [INFO] [stderr] done. [INFO] validating manifest of git repo https://github.com/DavidWittman/cryptopals-rust on toolchain 1.60.0 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+1.60.0" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/DavidWittman/cryptopals-rust [INFO] finished tweaking git repo https://github.com/DavidWittman/cryptopals-rust [INFO] tweaked toml for git repo https://github.com/DavidWittman/cryptopals-rust written to /workspace/builds/worker-9/source/Cargo.toml [INFO] crate git repo https://github.com/DavidWittman/cryptopals-rust already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+1.60.0" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-9/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-9/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:eaef2f80f755933c374d2ae5edccceec0c1312ceb8a4e0b6404e8ab76561e1e5" "/opt/rustwide/cargo-home/bin/cargo" "+1.60.0" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 314e809ddb52fafb93a6d3d8c0ae5a130a6b81b69e9fdb885fec275e72b3ff78 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "314e809ddb52fafb93a6d3d8c0ae5a130a6b81b69e9fdb885fec275e72b3ff78", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "314e809ddb52fafb93a6d3d8c0ae5a130a6b81b69e9fdb885fec275e72b3ff78", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "314e809ddb52fafb93a6d3d8c0ae5a130a6b81b69e9fdb885fec275e72b3ff78", kill_on_drop: false }` [INFO] [stdout] 314e809ddb52fafb93a6d3d8c0ae5a130a6b81b69e9fdb885fec275e72b3ff78 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-9/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-9/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:eaef2f80f755933c374d2ae5edccceec0c1312ceb8a4e0b6404e8ab76561e1e5" "/opt/rustwide/cargo-home/bin/cargo" "+1.60.0" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] fd9fee4afc55afb74de4e6ee1d3dc2f7261ac0c7a898937291bb8f8dc0cfe18a [INFO] running `Command { std: "docker" "start" "-a" "fd9fee4afc55afb74de4e6ee1d3dc2f7261ac0c7a898937291bb8f8dc0cfe18a", kill_on_drop: false }` [INFO] [stderr] Compiling cc v1.0.70 [INFO] [stderr] Compiling openssl v0.10.36 [INFO] [stderr] Compiling openssl-sys v0.9.66 [INFO] [stderr] Compiling cryptopals-rust v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused variable: `cipher` [INFO] [stdout] --> src/set2/ch10.rs:25:16 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_cipher` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/set2/ch10.rs:25:33 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `iv` [INFO] [stdout] --> src/set2/ch10.rs:25:48 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^ help: if this is intentional, prefix it with an underscore: `_iv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 3 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 16.46s [INFO] running `Command { std: "docker" "inspect" "fd9fee4afc55afb74de4e6ee1d3dc2f7261ac0c7a898937291bb8f8dc0cfe18a", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "fd9fee4afc55afb74de4e6ee1d3dc2f7261ac0c7a898937291bb8f8dc0cfe18a", kill_on_drop: false }` [INFO] [stdout] fd9fee4afc55afb74de4e6ee1d3dc2f7261ac0c7a898937291bb8f8dc0cfe18a [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-9/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-9/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:eaef2f80f755933c374d2ae5edccceec0c1312ceb8a4e0b6404e8ab76561e1e5" "/opt/rustwide/cargo-home/bin/cargo" "+1.60.0" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 8f61fdcd1b58b724ea7d6407f9d8ac5aa0b85a3890aa8821cb63b2386860dfdf [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "8f61fdcd1b58b724ea7d6407f9d8ac5aa0b85a3890aa8821cb63b2386860dfdf", kill_on_drop: false }` [INFO] [stderr] Compiling cryptopals-rust v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused variable: `cipher` [INFO] [stdout] --> src/set2/ch10.rs:25:16 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_cipher` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/set2/ch10.rs:25:33 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `iv` [INFO] [stdout] --> src/set2/ch10.rs:25:48 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^ help: if this is intentional, prefix it with an underscore: `_iv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 3 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `cipher` [INFO] [stdout] --> src/set2/ch10.rs:25:16 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_cipher` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/set2/ch10.rs:25:33 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `iv` [INFO] [stdout] --> src/set2/ch10.rs:25:48 [INFO] [stdout] | [INFO] [stdout] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stdout] | ^^ help: if this is intentional, prefix it with an underscore: `_iv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 3 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 2.67s [INFO] running `Command { std: "docker" "inspect" "8f61fdcd1b58b724ea7d6407f9d8ac5aa0b85a3890aa8821cb63b2386860dfdf", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "8f61fdcd1b58b724ea7d6407f9d8ac5aa0b85a3890aa8821cb63b2386860dfdf", kill_on_drop: false }` [INFO] [stdout] 8f61fdcd1b58b724ea7d6407f9d8ac5aa0b85a3890aa8821cb63b2386860dfdf [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-9/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-9/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:eaef2f80f755933c374d2ae5edccceec0c1312ceb8a4e0b6404e8ab76561e1e5" "/opt/rustwide/cargo-home/bin/cargo" "+1.60.0" "test" "--frozen", kill_on_drop: false }` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] 9f032e2848d7f13738eb3dc133010dc3cf8d5561a1a7c0eb779b73c5158aeb02 [INFO] running `Command { std: "docker" "start" "-a" "9f032e2848d7f13738eb3dc133010dc3cf8d5561a1a7c0eb779b73c5158aeb02", kill_on_drop: false }` [INFO] [stderr] warning: unused variable: `cipher` [INFO] [stderr] --> src/set2/ch10.rs:25:16 [INFO] [stderr] | [INFO] [stderr] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stderr] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_cipher` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `key` [INFO] [stderr] --> src/set2/ch10.rs:25:33 [INFO] [stderr] | [INFO] [stderr] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stderr] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `iv` [INFO] [stderr] --> src/set2/ch10.rs:25:48 [INFO] [stderr] | [INFO] [stderr] 25 | fn cbc_decrypt(cipher: Vec, key: &Vec, iv: Vec) -> Vec { [INFO] [stderr] | ^^ help: if this is intentional, prefix it with an underscore: `_iv` [INFO] [stderr] [INFO] [stderr] warning: `cryptopals-rust` (lib) generated 3 warnings [INFO] [stderr] warning: `cryptopals-rust` (lib test) generated 3 warnings (3 duplicates) [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.05s [INFO] [stderr] Running unittests (/opt/rustwide/target/debug/deps/cryptopals_rust-fbca0e97a86d2781) [INFO] [stdout] [INFO] [stdout] running 19 tests [INFO] [stdout] test set1::ch3::test_find_xor_byte_from_string ... ok [INFO] [stdout] test set1::ch2::test_xor_strings ... ok [INFO] [stdout] test set1::ch1::test_hex_to_b64 ... ok [INFO] [stdout] test set1::ch6::test_transpose ... ok [INFO] [stdout] test set2::ch10::test_cbc_decrypt ... ignored [INFO] [stdout] test set1::ch8::test_ecb_score ... ok [INFO] [stdout] test set1::ch6::test_read_file_base64 ... ok [INFO] [stdout] test set1::ch6::test_find_key_size ... ok [INFO] [stdout] test set1::ch6::test_chunks ... ok [INFO] [stdout] test set2::ch9::test_pkcs7_pad ... ok [INFO] [stdout] test set1::ch3::test_get_score ... ok [INFO] [stdout] test set1::ch6::test_hamming_distance ... ok [INFO] [stdout] test set1::ch5::test_repeating_key_xor ... ok [INFO] [stdout] test set1::ch3::test_xor_bytes ... ok [INFO] [stdout] test set1::ch7::test_decrypt_aes128_ecb ... ok [INFO] [stdout] test set1::ch8::test_find_ecb_in_file ... ok [INFO] [stdout] test set1::ch8::test_ecb_score_panic - should panic ... ok [INFO] [stdout] test set1::ch6::test_break_repeating_key_xor ... ok [INFO] [stdout] test set1::ch4::test_find_single_xor_in_file ... ok [INFO] [stdout] [INFO] [stdout] test result: ok. 18 passed; 0 failed; 1 ignored; 0 measured; 0 filtered out; finished in 0.68s [INFO] [stdout] [INFO] [stderr] Doc-tests cryptopals-rust [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "9f032e2848d7f13738eb3dc133010dc3cf8d5561a1a7c0eb779b73c5158aeb02", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "9f032e2848d7f13738eb3dc133010dc3cf8d5561a1a7c0eb779b73c5158aeb02", kill_on_drop: false }` [INFO] [stdout] 9f032e2848d7f13738eb3dc133010dc3cf8d5561a1a7c0eb779b73c5158aeb02