[INFO] fetching crate crypt_guard 1.3.7... [INFO] testing crypt_guard-1.3.7 against 1.84.0 for beta-1.85-1 [INFO] extracting crate crypt_guard 1.3.7 into /workspace/builds/worker-3-tc1/source [INFO] validating manifest of crates.io crate crypt_guard 1.3.7 on toolchain 1.84.0 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+1.84.0" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate crypt_guard 1.3.7 [INFO] finished tweaking crates.io crate crypt_guard 1.3.7 [INFO] tweaked toml for crates.io crate crypt_guard 1.3.7 written to /workspace/builds/worker-3-tc1/source/Cargo.toml [INFO] crate crates.io crate crypt_guard 1.3.7 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+1.84.0" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded pqcrypto-traits v0.3.5 [INFO] [stderr] Downloaded pqcrypto-internals v0.2.7 [INFO] [stderr] Downloaded xts-mode v0.5.1 [INFO] [stderr] Downloaded crypt_guard_proc v0.2.0 [INFO] [stderr] Downloaded sudo v0.6.0 [INFO] [stderr] Downloaded gptman v1.1.2 [INFO] [stderr] Downloaded aes-gcm-siv v0.11.1 [INFO] [stderr] Downloaded generic-array v1.1.1 [INFO] [stderr] Downloaded pqcrypto-dilithium v0.5.0 [INFO] [stderr] Downloaded pqcrypto-falcon v0.3.0 [INFO] [stderr] Downloaded pqcrypto-kyber v0.8.1 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:86ea7c7af713d31e8cfdb68a6d0db50b5cf7cbeecde3d112f9f257f747318d36" "/opt/rustwide/cargo-home/bin/cargo" "+1.84.0" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 23be25d1b6fc052ad2ae9c773ee2e5e5eb5ae45071cfdad0614dd9a7f3a282d6 [INFO] running `Command { std: "docker" "start" "-a" "23be25d1b6fc052ad2ae9c773ee2e5e5eb5ae45071cfdad0614dd9a7f3a282d6", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "23be25d1b6fc052ad2ae9c773ee2e5e5eb5ae45071cfdad0614dd9a7f3a282d6", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "23be25d1b6fc052ad2ae9c773ee2e5e5eb5ae45071cfdad0614dd9a7f3a282d6", kill_on_drop: false }` [INFO] [stdout] 23be25d1b6fc052ad2ae9c773ee2e5e5eb5ae45071cfdad0614dd9a7f3a282d6 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "RUSTDOCFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:86ea7c7af713d31e8cfdb68a6d0db50b5cf7cbeecde3d112f9f257f747318d36" "/opt/rustwide/cargo-home/bin/cargo" "+1.84.0" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] f950a52575383f92e93b356d846c58eecf4c1f839f81291d003d0c452dc3d075 [INFO] running `Command { std: "docker" "start" "-a" "f950a52575383f92e93b356d846c58eecf4c1f839f81291d003d0c452dc3d075", kill_on_drop: false }` [INFO] [stderr] Compiling libc v0.2.169 [INFO] [stderr] Compiling cfg-if v1.0.0 [INFO] [stderr] Compiling typenum v1.17.0 [INFO] [stderr] Compiling version_check v0.9.5 [INFO] [stderr] Compiling shlex v1.3.0 [INFO] [stderr] Compiling proc-macro2 v1.0.92 [INFO] [stderr] Compiling unicode-ident v1.0.14 [INFO] [stderr] Compiling glob v0.3.1 [INFO] [stderr] Compiling dunce v1.0.5 [INFO] [stderr] Compiling subtle v2.6.1 [INFO] [stderr] Compiling zeroize v1.8.1 [INFO] [stderr] Compiling cpufeatures v0.2.16 [INFO] [stderr] Compiling crossbeam-utils v0.8.21 [INFO] [stderr] Compiling bitflags v2.6.0 [INFO] [stderr] Compiling rustix v0.38.42 [INFO] [stderr] Compiling byteorder v1.5.0 [INFO] [stderr] Compiling once_cell v1.20.2 [INFO] [stderr] Compiling rayon-core v1.12.1 [INFO] [stderr] Compiling linux-raw-sys v0.4.14 [INFO] [stderr] Compiling opaque-debug v0.3.1 [INFO] [stderr] Compiling pkg-config v0.3.31 [INFO] [stderr] Compiling autocfg v1.4.0 [INFO] [stderr] Compiling serde v1.0.216 [INFO] [stderr] Compiling thiserror v1.0.69 [INFO] [stderr] Compiling pqcrypto-traits v0.3.5 [INFO] [stderr] Compiling portable-atomic v1.10.0 [INFO] [stderr] Compiling crc-catalog v2.4.0 [INFO] [stderr] Compiling generic-array v0.14.7 [INFO] [stderr] Compiling either v1.13.0 [INFO] [stderr] Compiling unicode-width v0.2.0 [INFO] [stderr] Compiling adler2 v2.0.0 [INFO] [stderr] Compiling miniz_oxide v0.8.2 [INFO] [stderr] Compiling crc v3.2.1 [INFO] [stderr] Compiling crc32fast v1.4.2 [INFO] [stderr] Compiling crossbeam-epoch v0.9.18 [INFO] [stderr] Compiling hex v0.4.3 [INFO] [stderr] Compiling log v0.4.22 [INFO] [stderr] Compiling fastrand v2.3.0 [INFO] [stderr] Compiling number_prefix v0.4.0 [INFO] [stderr] Compiling iana-time-zone v0.1.61 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Compiling flate2 v1.0.35 [INFO] [stderr] Compiling lazy_static v1.5.0 [INFO] [stderr] Compiling jobserver v0.1.32 [INFO] [stderr] Compiling quote v1.0.38 [INFO] [stderr] Compiling crossbeam-deque v0.8.6 [INFO] [stderr] Compiling cc v1.2.6 [INFO] [stderr] Compiling syn v2.0.92 [INFO] [stderr] Compiling rayon v1.10.0 [INFO] [stderr] Compiling generic-array v1.1.1 [INFO] [stderr] Compiling chrono v0.4.39 [INFO] [stderr] Compiling block-padding v0.3.3 [INFO] [stderr] Compiling block-buffer v0.10.4 [INFO] [stderr] Compiling inout v0.1.3 [INFO] [stderr] Compiling pqcrypto-internals v0.2.7 [INFO] [stderr] Compiling lzma-sys v0.1.20 [INFO] [stderr] Compiling pqcrypto-dilithium v0.5.0 [INFO] [stderr] Compiling pqcrypto-kyber v0.8.1 [INFO] [stderr] Compiling pqcrypto-falcon v0.3.0 [INFO] [stderr] Compiling getrandom v0.2.15 [INFO] [stderr] Compiling console v0.15.10 [INFO] [stderr] Compiling filetime v0.2.25 [INFO] [stderr] Compiling nix v0.27.1 [INFO] [stderr] Compiling sudo v0.6.0 [INFO] [stderr] Compiling rand_core v0.6.4 [INFO] [stderr] Compiling indicatif v0.17.9 [INFO] [stderr] Compiling crypto-common v0.1.6 [INFO] [stderr] Compiling cipher v0.4.4 [INFO] [stderr] Compiling universal-hash v0.5.1 [INFO] [stderr] Compiling digest v0.10.7 [INFO] [stderr] Compiling aead v0.5.2 [INFO] [stderr] Compiling polyval v0.6.2 [INFO] [stderr] Compiling poly1305 v0.8.0 [INFO] [stderr] Compiling aes v0.8.4 [INFO] [stderr] Compiling chacha20 v0.9.1 [INFO] [stderr] Compiling ctr v0.9.2 [INFO] [stderr] Compiling xattr v1.3.1 [INFO] [stderr] Compiling sysinfo v0.30.13 [INFO] [stderr] Compiling aes-gcm-siv v0.11.1 [INFO] [stderr] Compiling cbc v0.1.2 [INFO] [stderr] Compiling tar v0.4.43 [INFO] [stderr] Compiling hmac v0.12.1 [INFO] [stderr] Compiling chacha20poly1305 v0.10.1 [INFO] [stderr] Compiling sha2 v0.10.8 [INFO] [stderr] Compiling xts-mode v0.5.1 [INFO] [stderr] Compiling tempfile v3.14.0 [INFO] [stderr] Compiling xz2 v0.1.7 [INFO] [stderr] Compiling zerocopy-derive v0.7.35 [INFO] [stderr] Compiling serde_derive v1.0.216 [INFO] [stderr] Compiling thiserror-impl v1.0.69 [INFO] [stderr] Compiling crypt_guard_proc v0.2.0 [INFO] [stderr] Compiling zerocopy v0.7.35 [INFO] [stderr] Compiling ppv-lite86 v0.2.20 [INFO] [stderr] Compiling rand_chacha v0.3.1 [INFO] [stderr] Compiling rand v0.8.5 [INFO] [stderr] Compiling bincode v1.3.3 [INFO] [stderr] Compiling gptman v1.1.2 [INFO] [stderr] Compiling crypt_guard v1.3.7 (/opt/rustwide/workdir) [INFO] [stdout] warning: type `AES_GCM_SIV` should have an upper camel case name [INFO] [stdout] --> src/Core/kyber/mod.rs:84:12 [INFO] [stdout] | [INFO] [stdout] 84 | pub struct AES_GCM_SIV; [INFO] [stdout] | ^^^^^^^^^^^ help: convert the identifier to upper camel case: `AesGcmSiv` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_camel_case_types)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `AES_CTR` should have an upper camel case name [INFO] [stdout] --> src/Core/kyber/mod.rs:87:12 [INFO] [stdout] | [INFO] [stdout] 87 | pub struct AES_CTR; [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesCtr` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `AES_XTS` should have an upper camel case name [INFO] [stdout] --> src/Core/kyber/mod.rs:91:12 [INFO] [stdout] | [INFO] [stdout] 91 | pub struct AES_XTS; [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesXts` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `CipherChaCha` [INFO] [stdout] --> src/Core/cipher_aes_gcm_siv.rs:8:9 [INFO] [stdout] | [INFO] [stdout] 8 | CipherChaCha, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_aes_gcm_siv.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `Aead`, `Aes256GcmSiv`, and `Nonce` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:23:12 [INFO] [stdout] | [INFO] [stdout] 23 | aead::{Aead, KeyInit}, [INFO] [stdout] | ^^^^ [INFO] [stdout] 24 | Aes256GcmSiv, Nonce, [INFO] [stdout] | ^^^^^^^^^^^^ ^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `StreamCipherSeek` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:26:44 [INFO] [stdout] | [INFO] [stdout] 26 | use aes::cipher::{KeyIvInit, StreamCipher, StreamCipherSeek, generic_array::GenericArray}; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `CipherChaCha` [INFO] [stdout] --> src/Core/cipher_aes_xts.rs:8:9 [INFO] [stdout] | [INFO] [stdout] 8 | CipherChaCha, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_aes_xts.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `RngCore` and `rngs::OsRng` [INFO] [stdout] --> src/Core/cipher_aes_xts.rs:20:12 [INFO] [stdout] | [INFO] [stdout] 20 | use rand::{RngCore, rngs::OsRng}; [INFO] [stdout] | ^^^^^^^ ^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `hex` [INFO] [stdout] --> src/Core/cipher_aes_xts.rs:21:5 [INFO] [stdout] | [INFO] [stdout] 21 | use hex; [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `CipherChaCha` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:8:9 [INFO] [stdout] | [INFO] [stdout] 8 | CipherChaCha, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `AeadCore` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:23:18 [INFO] [stdout] | [INFO] [stdout] 23 | aead::{Aead, AeadCore, KeyInit}, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherAES_GCM_SIV` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:26:12 [INFO] [stdout] | [INFO] [stdout] 26 | pub struct CipherAES_GCM_SIV { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesGcmSiv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherAES_CTR` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:39:12 [INFO] [stdout] | [INFO] [stdout] 39 | pub struct CipherAES_CTR { [INFO] [stdout] | ^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesCtr` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherAES_XTS` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:52:12 [INFO] [stdout] | [INFO] [stdout] 52 | pub struct CipherAES_XTS { [INFO] [stdout] | ^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesXts` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherChaCha_Poly` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:81:12 [INFO] [stdout] | [INFO] [stdout] 81 | pub struct CipherChaCha_Poly { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherChaChaPoly` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `AES_GCM_SIV` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:97:5 [INFO] [stdout] | [INFO] [stdout] 97 | AES_GCM_SIV, [INFO] [stdout] | ^^^^^^^^^^^ help: convert the identifier to upper camel case: `AesGcmSiv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `AES_CTR` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:98:5 [INFO] [stdout] | [INFO] [stdout] 98 | AES_CTR, [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesCtr` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `AES_XTS` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:99:5 [INFO] [stdout] | [INFO] [stdout] 99 | AES_XTS, [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesXts` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `zeroize::Zeroize` [INFO] [stdout] --> src/lib.rs:226:5 [INFO] [stdout] | [INFO] [stdout] 226 | use zeroize::Zeroize; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Mac` [INFO] [stdout] --> src/Core/KDF.rs:1:12 [INFO] [stdout] | [INFO] [stdout] 1 | use hmac::{Mac}; [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Ciphertext` [INFO] [stdout] --> src/KeyControl/mod.rs:4:64 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `SharedSecret` [INFO] [stdout] --> src/KeyControl/mod.rs:4:50 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `SecretKey` [INFO] [stdout] --> src/KeyControl/mod.rs:4:39 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `PublicKey` [INFO] [stdout] --> src/KeyControl/mod.rs:4:28 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes_gcm_siv.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KeyInit` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:23:18 [INFO] [stdout] | [INFO] [stdout] 23 | aead::{Aead, KeyInit}, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes_xts.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Write` [INFO] [stdout] --> src/Core/cipher_aes.rs:26:10 [INFO] [stdout] | [INFO] [stdout] 26 | io::{Write}, [INFO] [stdout] | ^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes.rs:9:9 [INFO] [stdout] | [INFO] [stdout] 9 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_xchacha.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Mac` [INFO] [stdout] --> src/cryptography/hmac_sign/mod.rs:3:12 [INFO] [stdout] | [INFO] [stdout] 3 | use hmac::{Mac}; [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:25:35 [INFO] [stdout] | [INFO] [stdout] 25 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:65:35 [INFO] [stdout] | [INFO] [stdout] 65 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key_encap_mechanism` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:105:14 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_key_encap_mechanism` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:105:35 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:177:35 [INFO] [stdout] | [INFO] [stdout] 177 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:216:35 [INFO] [stdout] | [INFO] [stdout] 216 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:253:35 [INFO] [stdout] | [INFO] [stdout] 253 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:25:35 [INFO] [stdout] | [INFO] [stdout] 25 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:65:35 [INFO] [stdout] | [INFO] [stdout] 65 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key_encap_mechanism` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:105:14 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_key_encap_mechanism` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:105:35 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:177:35 [INFO] [stdout] | [INFO] [stdout] 177 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:216:35 [INFO] [stdout] | [INFO] [stdout] 216 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:253:35 [INFO] [stdout] | [INFO] [stdout] 253 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:118:13 [INFO] [stdout] | [INFO] [stdout] 118 | let mut data = hmac.hmac(); [INFO] [stdout] | ----^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:129:13 [INFO] [stdout] | [INFO] [stdout] 129 | let mut ciphertext = self.infos.content()?; [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/Core/cipher_aes.rs:190:13 [INFO] [stdout] | [INFO] [stdout] 190 | let mut cipher = Aes128CbcDec::new(key, iv_arr); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unreachable pattern [INFO] [stdout] --> src/Core/cipher_xchacha.rs:157:13 [INFO] [stdout] | [INFO] [stdout] 157 | _ => Err(|e| CryptError::IOError(e)), [INFO] [stdout] | ^ no value can reach this [INFO] [stdout] | [INFO] [stdout] note: multiple earlier patterns match some of the same values [INFO] [stdout] --> src/Core/cipher_xchacha.rs:157:13 [INFO] [stdout] | [INFO] [stdout] 129 | Process::Encryption => { [INFO] [stdout] | ------------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 143 | Process::Decryption => { [INFO] [stdout] | ------------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 157 | _ => Err(|e| CryptError::IOError(e)), [INFO] [stdout] | ^ collectively making this unreachable [INFO] [stdout] = note: `#[warn(unreachable_patterns)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `encrypted_data` is never read [INFO] [stdout] --> src/Core/cipher_xchacha.rs:125:17 [INFO] [stdout] | [INFO] [stdout] 125 | let mut encrypted_data: Vec = Vec::new(); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: `#[warn(unused_assignments)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `nonce_vec` is never read [INFO] [stdout] --> src/Core/cipher_xchacha.rs:126:17 [INFO] [stdout] | [INFO] [stdout] 126 | let mut nonce_vec: Vec = Vec::new(); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unreachable pattern [INFO] [stdout] --> src/cryptography/hmac_sign/sign.rs:47:13 [INFO] [stdout] | [INFO] [stdout] 47 | _ => vec![], [INFO] [stdout] | ^ no value can reach this [INFO] [stdout] | [INFO] [stdout] note: multiple earlier patterns match some of the same values [INFO] [stdout] --> src/cryptography/hmac_sign/sign.rs:47:13 [INFO] [stdout] | [INFO] [stdout] 39 | Operation::Sign => { [INFO] [stdout] | --------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 43 | Operation::Verify => { [INFO] [stdout] | ----------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 47 | _ => vec![], [INFO] [stdout] | ^ collectively making this unreachable [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `save_ciphertext` and `generate_cbc_iv` are never used [INFO] [stdout] --> src/Core/cipher_aes.rs:110:8 [INFO] [stdout] | [INFO] [stdout] 39 | impl CipherAES { [INFO] [stdout] | -------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 110 | fn save_ciphertext(&self, _encrypted_data: &[u8]) -> Result<(), CryptError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 152 | fn generate_cbc_iv(&mut self) -> Result, CryptError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `public_key`, `secret_key`, `signed_msg`, and `signature` are never used [INFO] [stdout] --> src/cryptography/hmac_sign/mod.rs:176:8 [INFO] [stdout] | [INFO] [stdout] 168 | impl SignatureKey { [INFO] [stdout] | ----------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 176 | fn public_key(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 181 | fn secret_key(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 186 | fn signed_msg(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 191 | fn signature(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `Core` should have a snake case name [INFO] [stdout] --> src/lib.rs:196:5 [INFO] [stdout] | [INFO] [stdout] 196 | mod Core; [INFO] [stdout] | ^^^^ help: convert the identifier to snake case (notice the capitalization): `core` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_snake_case)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KeyControl` should have a snake case name [INFO] [stdout] --> src/lib.rs:200:9 [INFO] [stdout] | [INFO] [stdout] 200 | pub mod KeyControl; [INFO] [stdout] | ^^^^^^^^^^ help: convert the identifier to snake case: `key_control` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KDF` should have a snake case name [INFO] [stdout] --> src/Core/mod.rs:4:9 [INFO] [stdout] | [INFO] [stdout] 4 | pub mod KDF; [INFO] [stdout] | ^^^ help: convert the identifier to snake case: `kdf` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KeyControler` should have a snake case name [INFO] [stdout] --> src/Core/kyber/mod.rs:2:9 [INFO] [stdout] | [INFO] [stdout] 2 | pub mod KeyControler; [INFO] [stdout] | ^^^^^^^^^^^^ help: convert the identifier to snake case: `key_controler` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/Core/cipher_aes.rs:155:9 [INFO] [stdout] | [INFO] [stdout] 155 | rng.try_fill(&mut iv[..]); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] = note: `#[warn(unused_must_use)]` on by default [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 155 | let _ = rng.try_fill(&mut iv[..]); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `Ciphertext` should have a snake case name [INFO] [stdout] --> src/KeyControl/mod.rs:43:12 [INFO] [stdout] | [INFO] [stdout] 43 | pub fn Ciphertext() -> Self { [INFO] [stdout] | ^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `ciphertext` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 41.96s [INFO] running `Command { std: "docker" "inspect" "f950a52575383f92e93b356d846c58eecf4c1f839f81291d003d0c452dc3d075", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "f950a52575383f92e93b356d846c58eecf4c1f839f81291d003d0c452dc3d075", kill_on_drop: false }` [INFO] [stdout] f950a52575383f92e93b356d846c58eecf4c1f839f81291d003d0c452dc3d075 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "RUSTDOCFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:86ea7c7af713d31e8cfdb68a6d0db50b5cf7cbeecde3d112f9f257f747318d36" "/opt/rustwide/cargo-home/bin/cargo" "+1.84.0" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 94575569491fe5cdd58fa66634bd697b52ae0f3ebdfa7ac0164fd2b7a95418d6 [INFO] running `Command { std: "docker" "start" "-a" "94575569491fe5cdd58fa66634bd697b52ae0f3ebdfa7ac0164fd2b7a95418d6", kill_on_drop: false }` [INFO] [stdout] warning: type `AES_GCM_SIV` should have an upper camel case name [INFO] [stdout] --> src/Core/kyber/mod.rs:84:12 [INFO] [stdout] | [INFO] [stdout] 84 | pub struct AES_GCM_SIV; [INFO] [stdout] | ^^^^^^^^^^^ help: convert the identifier to upper camel case: `AesGcmSiv` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_camel_case_types)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `AES_CTR` should have an upper camel case name [INFO] [stdout] --> src/Core/kyber/mod.rs:87:12 [INFO] [stdout] | [INFO] [stdout] 87 | pub struct AES_CTR; [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesCtr` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `AES_XTS` should have an upper camel case name [INFO] [stdout] --> src/Core/kyber/mod.rs:91:12 [INFO] [stdout] | [INFO] [stdout] 91 | pub struct AES_XTS; [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesXts` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `CipherChaCha` [INFO] [stdout] --> src/Core/cipher_aes_gcm_siv.rs:8:9 [INFO] [stdout] | [INFO] [stdout] 8 | CipherChaCha, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_aes_gcm_siv.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `Aead`, `Aes256GcmSiv`, and `Nonce` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:23:12 [INFO] [stdout] | [INFO] [stdout] 23 | aead::{Aead, KeyInit}, [INFO] [stdout] | ^^^^ [INFO] [stdout] 24 | Aes256GcmSiv, Nonce, [INFO] [stdout] | ^^^^^^^^^^^^ ^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `StreamCipherSeek` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:26:44 [INFO] [stdout] | [INFO] [stdout] 26 | use aes::cipher::{KeyIvInit, StreamCipher, StreamCipherSeek, generic_array::GenericArray}; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `CipherChaCha` [INFO] [stdout] --> src/Core/cipher_aes_xts.rs:8:9 [INFO] [stdout] | [INFO] [stdout] 8 | CipherChaCha, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_aes_xts.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `RngCore` and `rngs::OsRng` [INFO] [stdout] --> src/Core/cipher_aes_xts.rs:20:12 [INFO] [stdout] | [INFO] [stdout] 20 | use rand::{RngCore, rngs::OsRng}; [INFO] [stdout] | ^^^^^^^ ^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `hex` [INFO] [stdout] --> src/Core/cipher_aes_xts.rs:21:5 [INFO] [stdout] | [INFO] [stdout] 21 | use hex; [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `CipherChaCha` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:8:9 [INFO] [stdout] | [INFO] [stdout] 8 | CipherChaCha, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `AeadCore` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:23:18 [INFO] [stdout] | [INFO] [stdout] 23 | aead::{Aead, AeadCore, KeyInit}, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherAES_GCM_SIV` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:26:12 [INFO] [stdout] | [INFO] [stdout] 26 | pub struct CipherAES_GCM_SIV { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesGcmSiv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherAES_CTR` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:39:12 [INFO] [stdout] | [INFO] [stdout] 39 | pub struct CipherAES_CTR { [INFO] [stdout] | ^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesCtr` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherAES_XTS` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:52:12 [INFO] [stdout] | [INFO] [stdout] 52 | pub struct CipherAES_XTS { [INFO] [stdout] | ^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesXts` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherChaCha_Poly` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:81:12 [INFO] [stdout] | [INFO] [stdout] 81 | pub struct CipherChaCha_Poly { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherChaChaPoly` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `AES_GCM_SIV` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:97:5 [INFO] [stdout] | [INFO] [stdout] 97 | AES_GCM_SIV, [INFO] [stdout] | ^^^^^^^^^^^ help: convert the identifier to upper camel case: `AesGcmSiv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `AES_CTR` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:98:5 [INFO] [stdout] | [INFO] [stdout] 98 | AES_CTR, [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesCtr` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `AES_XTS` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:99:5 [INFO] [stdout] | [INFO] [stdout] 99 | AES_XTS, [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesXts` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `zeroize::Zeroize` [INFO] [stdout] --> src/lib.rs:226:5 [INFO] [stdout] | [INFO] [stdout] 226 | use zeroize::Zeroize; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Mac` [INFO] [stdout] --> src/Core/KDF.rs:1:12 [INFO] [stdout] | [INFO] [stdout] 1 | use hmac::{Mac}; [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Ciphertext` [INFO] [stdout] --> src/KeyControl/mod.rs:4:64 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `SharedSecret` [INFO] [stdout] --> src/KeyControl/mod.rs:4:50 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `SecretKey` [INFO] [stdout] --> src/KeyControl/mod.rs:4:39 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `PublicKey` [INFO] [stdout] --> src/KeyControl/mod.rs:4:28 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes_gcm_siv.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KeyInit` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:23:18 [INFO] [stdout] | [INFO] [stdout] 23 | aead::{Aead, KeyInit}, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes_xts.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Write` [INFO] [stdout] --> src/Core/cipher_aes.rs:26:10 [INFO] [stdout] | [INFO] [stdout] 26 | io::{Write}, [INFO] [stdout] | ^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes.rs:9:9 [INFO] [stdout] | [INFO] [stdout] 9 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_xchacha.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Mac` [INFO] [stdout] --> src/cryptography/hmac_sign/mod.rs:3:12 [INFO] [stdout] | [INFO] [stdout] 3 | use hmac::{Mac}; [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:25:35 [INFO] [stdout] | [INFO] [stdout] 25 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:65:35 [INFO] [stdout] | [INFO] [stdout] 65 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key_encap_mechanism` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:105:14 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_key_encap_mechanism` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:105:35 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:177:35 [INFO] [stdout] | [INFO] [stdout] 177 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:216:35 [INFO] [stdout] | [INFO] [stdout] 216 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:253:35 [INFO] [stdout] | [INFO] [stdout] 253 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:25:35 [INFO] [stdout] | [INFO] [stdout] 25 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:65:35 [INFO] [stdout] | [INFO] [stdout] 65 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key_encap_mechanism` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:105:14 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_key_encap_mechanism` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:105:35 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:177:35 [INFO] [stdout] | [INFO] [stdout] 177 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:216:35 [INFO] [stdout] | [INFO] [stdout] 216 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:253:35 [INFO] [stdout] | [INFO] [stdout] 253 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Compiling crypt_guard v1.3.7 (/opt/rustwide/workdir) [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:118:13 [INFO] [stdout] | [INFO] [stdout] 118 | let mut data = hmac.hmac(); [INFO] [stdout] | ----^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:129:13 [INFO] [stdout] | [INFO] [stdout] 129 | let mut ciphertext = self.infos.content()?; [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/Core/cipher_aes.rs:190:13 [INFO] [stdout] | [INFO] [stdout] 190 | let mut cipher = Aes128CbcDec::new(key, iv_arr); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unreachable pattern [INFO] [stdout] --> src/Core/cipher_xchacha.rs:157:13 [INFO] [stdout] | [INFO] [stdout] 157 | _ => Err(|e| CryptError::IOError(e)), [INFO] [stdout] | ^ no value can reach this [INFO] [stdout] | [INFO] [stdout] note: multiple earlier patterns match some of the same values [INFO] [stdout] --> src/Core/cipher_xchacha.rs:157:13 [INFO] [stdout] | [INFO] [stdout] 129 | Process::Encryption => { [INFO] [stdout] | ------------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 143 | Process::Decryption => { [INFO] [stdout] | ------------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 157 | _ => Err(|e| CryptError::IOError(e)), [INFO] [stdout] | ^ collectively making this unreachable [INFO] [stdout] = note: `#[warn(unreachable_patterns)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `encrypted_data` is never read [INFO] [stdout] --> src/Core/cipher_xchacha.rs:125:17 [INFO] [stdout] | [INFO] [stdout] 125 | let mut encrypted_data: Vec = Vec::new(); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: `#[warn(unused_assignments)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `nonce_vec` is never read [INFO] [stdout] --> src/Core/cipher_xchacha.rs:126:17 [INFO] [stdout] | [INFO] [stdout] 126 | let mut nonce_vec: Vec = Vec::new(); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unreachable pattern [INFO] [stdout] --> src/cryptography/hmac_sign/sign.rs:47:13 [INFO] [stdout] | [INFO] [stdout] 47 | _ => vec![], [INFO] [stdout] | ^ no value can reach this [INFO] [stdout] | [INFO] [stdout] note: multiple earlier patterns match some of the same values [INFO] [stdout] --> src/cryptography/hmac_sign/sign.rs:47:13 [INFO] [stdout] | [INFO] [stdout] 39 | Operation::Sign => { [INFO] [stdout] | --------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 43 | Operation::Verify => { [INFO] [stdout] | ----------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 47 | _ => vec![], [INFO] [stdout] | ^ collectively making this unreachable [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `save_ciphertext` and `generate_cbc_iv` are never used [INFO] [stdout] --> src/Core/cipher_aes.rs:110:8 [INFO] [stdout] | [INFO] [stdout] 39 | impl CipherAES { [INFO] [stdout] | -------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 110 | fn save_ciphertext(&self, _encrypted_data: &[u8]) -> Result<(), CryptError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 152 | fn generate_cbc_iv(&mut self) -> Result, CryptError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `public_key`, `secret_key`, `signed_msg`, and `signature` are never used [INFO] [stdout] --> src/cryptography/hmac_sign/mod.rs:176:8 [INFO] [stdout] | [INFO] [stdout] 168 | impl SignatureKey { [INFO] [stdout] | ----------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 176 | fn public_key(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 181 | fn secret_key(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 186 | fn signed_msg(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 191 | fn signature(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `Core` should have a snake case name [INFO] [stdout] --> src/lib.rs:196:5 [INFO] [stdout] | [INFO] [stdout] 196 | mod Core; [INFO] [stdout] | ^^^^ help: convert the identifier to snake case (notice the capitalization): `core` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_snake_case)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KeyControl` should have a snake case name [INFO] [stdout] --> src/lib.rs:200:9 [INFO] [stdout] | [INFO] [stdout] 200 | pub mod KeyControl; [INFO] [stdout] | ^^^^^^^^^^ help: convert the identifier to snake case: `key_control` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KDF` should have a snake case name [INFO] [stdout] --> src/Core/mod.rs:4:9 [INFO] [stdout] | [INFO] [stdout] 4 | pub mod KDF; [INFO] [stdout] | ^^^ help: convert the identifier to snake case: `kdf` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KeyControler` should have a snake case name [INFO] [stdout] --> src/Core/kyber/mod.rs:2:9 [INFO] [stdout] | [INFO] [stdout] 2 | pub mod KeyControler; [INFO] [stdout] | ^^^^^^^^^^^^ help: convert the identifier to snake case: `key_controler` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/Core/cipher_aes.rs:155:9 [INFO] [stdout] | [INFO] [stdout] 155 | rng.try_fill(&mut iv[..]); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] = note: `#[warn(unused_must_use)]` on by default [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 155 | let _ = rng.try_fill(&mut iv[..]); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `Ciphertext` should have a snake case name [INFO] [stdout] --> src/KeyControl/mod.rs:43:12 [INFO] [stdout] | [INFO] [stdout] 43 | pub fn Ciphertext() -> Self { [INFO] [stdout] | ^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `ciphertext` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `AES_GCM_SIV` should have an upper camel case name [INFO] [stdout] --> src/Core/kyber/mod.rs:84:12 [INFO] [stdout] | [INFO] [stdout] 84 | pub struct AES_GCM_SIV; [INFO] [stdout] | ^^^^^^^^^^^ help: convert the identifier to upper camel case: `AesGcmSiv` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_camel_case_types)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `AES_CTR` should have an upper camel case name [INFO] [stdout] --> src/Core/kyber/mod.rs:87:12 [INFO] [stdout] | [INFO] [stdout] 87 | pub struct AES_CTR; [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesCtr` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `AES_XTS` should have an upper camel case name [INFO] [stdout] --> src/Core/kyber/mod.rs:91:12 [INFO] [stdout] | [INFO] [stdout] 91 | pub struct AES_XTS; [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesXts` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `CipherChaCha` [INFO] [stdout] --> src/Core/cipher_aes_gcm_siv.rs:8:9 [INFO] [stdout] | [INFO] [stdout] 8 | CipherChaCha, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_aes_gcm_siv.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `Aead`, `Aes256GcmSiv`, and `Nonce` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:23:12 [INFO] [stdout] | [INFO] [stdout] 23 | aead::{Aead, KeyInit}, [INFO] [stdout] | ^^^^ [INFO] [stdout] 24 | Aes256GcmSiv, Nonce, [INFO] [stdout] | ^^^^^^^^^^^^ ^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `StreamCipherSeek` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:26:44 [INFO] [stdout] | [INFO] [stdout] 26 | use aes::cipher::{KeyIvInit, StreamCipher, StreamCipherSeek, generic_array::GenericArray}; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `CipherChaCha` [INFO] [stdout] --> src/Core/cipher_aes_xts.rs:8:9 [INFO] [stdout] | [INFO] [stdout] 8 | CipherChaCha, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_aes_xts.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `RngCore` and `rngs::OsRng` [INFO] [stdout] --> src/Core/cipher_aes_xts.rs:20:12 [INFO] [stdout] | [INFO] [stdout] 20 | use rand::{RngCore, rngs::OsRng}; [INFO] [stdout] | ^^^^^^^ ^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `hex` [INFO] [stdout] --> src/Core/cipher_aes_xts.rs:21:5 [INFO] [stdout] | [INFO] [stdout] 21 | use hex; [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `CipherChaCha` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:8:9 [INFO] [stdout] | [INFO] [stdout] 8 | CipherChaCha, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `AeadCore` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:23:18 [INFO] [stdout] | [INFO] [stdout] 23 | aead::{Aead, AeadCore, KeyInit}, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherAES_GCM_SIV` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:26:12 [INFO] [stdout] | [INFO] [stdout] 26 | pub struct CipherAES_GCM_SIV { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesGcmSiv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherAES_CTR` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:39:12 [INFO] [stdout] | [INFO] [stdout] 39 | pub struct CipherAES_CTR { [INFO] [stdout] | ^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesCtr` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherAES_XTS` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:52:12 [INFO] [stdout] | [INFO] [stdout] 52 | pub struct CipherAES_XTS { [INFO] [stdout] | ^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesXts` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherChaCha_Poly` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:81:12 [INFO] [stdout] | [INFO] [stdout] 81 | pub struct CipherChaCha_Poly { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherChaChaPoly` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `AES_GCM_SIV` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:97:5 [INFO] [stdout] | [INFO] [stdout] 97 | AES_GCM_SIV, [INFO] [stdout] | ^^^^^^^^^^^ help: convert the identifier to upper camel case: `AesGcmSiv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `AES_CTR` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:98:5 [INFO] [stdout] | [INFO] [stdout] 98 | AES_CTR, [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesCtr` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `AES_XTS` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:99:5 [INFO] [stdout] | [INFO] [stdout] 99 | AES_XTS, [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesXts` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `PathBuf` and `Path` [INFO] [stdout] --> src/tests/ArchiveTests.rs:3:17 [INFO] [stdout] | [INFO] [stdout] 3 | use std::path::{Path, PathBuf}; [INFO] [stdout] | ^^^^ ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary trailing semicolon [INFO] [stdout] --> src/lib.rs:1293:28 [INFO] [stdout] | [INFO] [stdout] 1293 | let mut key = $key;; [INFO] [stdout] | ^ help: remove this semicolon [INFO] [stdout] | [INFO] [stdout] ::: src/tests/SignatureTests.rs:12:16 [INFO] [stdout] | [INFO] [stdout] 12 | let sign = Signature!(Falcon, secret_key.to_owned(), 1024, data.clone(), Message); [INFO] [stdout] | ---------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(redundant_semicolons)]` on by default [INFO] [stdout] = note: this warning originates in the macro `Signature` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary trailing semicolon [INFO] [stdout] --> src/lib.rs:1294:36 [INFO] [stdout] | [INFO] [stdout] 1294 | let mut content = $content;; [INFO] [stdout] | ^ help: remove this semicolon [INFO] [stdout] | [INFO] [stdout] ::: src/tests/SignatureTests.rs:12:16 [INFO] [stdout] | [INFO] [stdout] 12 | let sign = Signature!(Falcon, secret_key.to_owned(), 1024, data.clone(), Message); [INFO] [stdout] | ---------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `Signature` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary trailing semicolon [INFO] [stdout] --> src/lib.rs:1305:28 [INFO] [stdout] | [INFO] [stdout] 1305 | let mut key = $key;; [INFO] [stdout] | ^ help: remove this semicolon [INFO] [stdout] | [INFO] [stdout] ::: src/tests/SignatureTests.rs:33:16 [INFO] [stdout] | [INFO] [stdout] 33 | let sign = Signature!(Falcon, secret_key.to_owned(), 1024, data.clone(), Detached); [INFO] [stdout] | ----------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `Signature` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary trailing semicolon [INFO] [stdout] --> src/lib.rs:1306:36 [INFO] [stdout] | [INFO] [stdout] 1306 | let mut content = $content;; [INFO] [stdout] | ^ help: remove this semicolon [INFO] [stdout] | [INFO] [stdout] ::: src/tests/SignatureTests.rs:33:16 [INFO] [stdout] | [INFO] [stdout] 33 | let sign = Signature!(Falcon, secret_key.to_owned(), 1024, data.clone(), Detached); [INFO] [stdout] | ----------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `Signature` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `zeroize::Zeroize` [INFO] [stdout] --> src/lib.rs:226:5 [INFO] [stdout] | [INFO] [stdout] 226 | use zeroize::Zeroize; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Mac` [INFO] [stdout] --> src/Core/KDF.rs:1:12 [INFO] [stdout] | [INFO] [stdout] 1 | use hmac::{Mac}; [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `SecretKey` [INFO] [stdout] --> src/KeyControl/mod.rs:4:39 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `PublicKey` [INFO] [stdout] --> src/KeyControl/mod.rs:4:28 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `hmac_sign` [INFO] [stdout] --> src/tests/MacroTests.rs:5:9 [INFO] [stdout] | [INFO] [stdout] 5 | hmac_sign::*, [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `SharedSecret` [INFO] [stdout] --> src/KeyControl/mod.rs:4:50 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Ciphertext` [INFO] [stdout] --> src/KeyControl/mod.rs:4:64 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes_gcm_siv.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KeyInit` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:23:18 [INFO] [stdout] | [INFO] [stdout] 23 | aead::{Aead, KeyInit}, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes_xts.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Write` [INFO] [stdout] --> src/Core/cipher_aes.rs:26:10 [INFO] [stdout] | [INFO] [stdout] 26 | io::{Write}, [INFO] [stdout] | ^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes.rs:9:9 [INFO] [stdout] | [INFO] [stdout] 9 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_xchacha.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Mac` [INFO] [stdout] --> src/cryptography/hmac_sign/mod.rs:3:12 [INFO] [stdout] | [INFO] [stdout] 3 | use hmac::{Mac}; [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `hmac_sign` [INFO] [stdout] --> src/tests/KyberKeyTests.rs:8:9 [INFO] [stdout] | [INFO] [stdout] 8 | hmac_sign::*, [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:25:35 [INFO] [stdout] | [INFO] [stdout] 25 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:65:35 [INFO] [stdout] | [INFO] [stdout] 65 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key_encap_mechanism` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:105:14 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_key_encap_mechanism` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:105:35 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:177:35 [INFO] [stdout] | [INFO] [stdout] 177 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:216:35 [INFO] [stdout] | [INFO] [stdout] 216 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:253:35 [INFO] [stdout] | [INFO] [stdout] 253 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:25:35 [INFO] [stdout] | [INFO] [stdout] 25 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:65:35 [INFO] [stdout] | [INFO] [stdout] 65 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key_encap_mechanism` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:105:14 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_key_encap_mechanism` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:105:35 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:177:35 [INFO] [stdout] | [INFO] [stdout] 177 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:216:35 [INFO] [stdout] | [INFO] [stdout] 216 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:253:35 [INFO] [stdout] | [INFO] [stdout] 253 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:118:13 [INFO] [stdout] | [INFO] [stdout] 118 | let mut data = hmac.hmac(); [INFO] [stdout] | ----^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:129:13 [INFO] [stdout] | [INFO] [stdout] 129 | let mut ciphertext = self.infos.content()?; [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/Core/cipher_aes.rs:190:13 [INFO] [stdout] | [INFO] [stdout] 190 | let mut cipher = Aes128CbcDec::new(key, iv_arr); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unreachable pattern [INFO] [stdout] --> src/Core/cipher_xchacha.rs:157:13 [INFO] [stdout] | [INFO] [stdout] 157 | _ => Err(|e| CryptError::IOError(e)), [INFO] [stdout] | ^ no value can reach this [INFO] [stdout] | [INFO] [stdout] note: multiple earlier patterns match some of the same values [INFO] [stdout] --> src/Core/cipher_xchacha.rs:157:13 [INFO] [stdout] | [INFO] [stdout] 129 | Process::Encryption => { [INFO] [stdout] | ------------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 143 | Process::Decryption => { [INFO] [stdout] | ------------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 157 | _ => Err(|e| CryptError::IOError(e)), [INFO] [stdout] | ^ collectively making this unreachable [INFO] [stdout] = note: `#[warn(unreachable_patterns)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `encrypted_data` is never read [INFO] [stdout] --> src/Core/cipher_xchacha.rs:125:17 [INFO] [stdout] | [INFO] [stdout] 125 | let mut encrypted_data: Vec = Vec::new(); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: `#[warn(unused_assignments)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `nonce_vec` is never read [INFO] [stdout] --> src/Core/cipher_xchacha.rs:126:17 [INFO] [stdout] | [INFO] [stdout] 126 | let mut nonce_vec: Vec = Vec::new(); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unreachable pattern [INFO] [stdout] --> src/cryptography/hmac_sign/sign.rs:47:13 [INFO] [stdout] | [INFO] [stdout] 47 | _ => vec![], [INFO] [stdout] | ^ no value can reach this [INFO] [stdout] | [INFO] [stdout] note: multiple earlier patterns match some of the same values [INFO] [stdout] --> src/cryptography/hmac_sign/sign.rs:47:13 [INFO] [stdout] | [INFO] [stdout] 39 | Operation::Sign => { [INFO] [stdout] | --------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 43 | Operation::Verify => { [INFO] [stdout] | ----------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 47 | _ => vec![], [INFO] [stdout] | ^ collectively making this unreachable [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/lib.rs:986:13 [INFO] [stdout] | [INFO] [stdout] 986 | let key = $key; [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] | [INFO] [stdout] ::: src/tests/KyberTests.rs:77:27 [INFO] [stdout] | [INFO] [stdout] 77 | ... = Decryption!(secret_key.to_owned(), 1024, encrypt_message.to_owned(), passphrase, cipher.to_owned(), Some(nonce.clone()), XChaCha20); [INFO] [stdout] | ----------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `Decryption` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/tests/KyberTests.rs:71:9 [INFO] [stdout] | [INFO] [stdout] 71 | let mut key = public_key; [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/lib.rs:886:13 [INFO] [stdout] | [INFO] [stdout] 886 | let key = $key; [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] | [INFO] [stdout] ::: src/tests/KyberTests.rs:199:27 [INFO] [stdout] | [INFO] [stdout] 199 | ... = Decryption!(secret_key.to_owned(), 1024, encrypt_message.to_owned(), passphrase, cipher.to_owned(), Some(nonce), AES_GCM_SIV)?; [INFO] [stdout] | ----------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `Decryption` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/lib.rs:936:13 [INFO] [stdout] | [INFO] [stdout] 936 | let key = $key; [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] | [INFO] [stdout] ::: src/tests/KyberTests.rs:380:27 [INFO] [stdout] | [INFO] [stdout] 380 | ...ge = Decryption!(secret_key.to_owned(), 1024, encrypt_message.to_owned(), passphrase, cipher.to_owned(), Some(nonce), AES_CTR)?; [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `Decryption` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/lib.rs:1042:13 [INFO] [stdout] | [INFO] [stdout] 1042 | let key = $key; [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] | [INFO] [stdout] ::: src/tests/KyberTests.rs:464:27 [INFO] [stdout] | [INFO] [stdout] 464 | ... = Decryption!(secret_key.to_owned(), 1024, encrypt_message.to_owned(), passphrase, cipher.to_owned(), Some(nonce.to_owned()), XChaCha20Poly1305... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `Decryption` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `passphrase` [INFO] [stdout] --> src/lib.rs:241:13 [INFO] [stdout] | [INFO] [stdout] 241 | let passphrase = $passphrase; [INFO] [stdout] | ^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_passphrase` [INFO] [stdout] | [INFO] [stdout] ::: src/tests/MacroTests.rs:99:37 [INFO] [stdout] | [INFO] [stdout] 99 | let (encrypt_message, cipher) = EncryptSign!(public_key.clone(), secret.clone(), message.to_owned(), "hey, how are you?").unwrap(); [INFO] [stdout] | ----------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `EncryptSign` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `passphrase` [INFO] [stdout] --> src/lib.rs:241:13 [INFO] [stdout] | [INFO] [stdout] 241 | let passphrase = $passphrase; [INFO] [stdout] | ^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_passphrase` [INFO] [stdout] | [INFO] [stdout] ::: src/tests/MacroTests.rs:112:37 [INFO] [stdout] | [INFO] [stdout] 112 | let (encrypt_message, cipher) = EncryptSign!(public_key.to_owned(), secret.to_owned(), message.clone(), "hey, how are you?").unwrap(); [INFO] [stdout] | -------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `EncryptSign` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `passphrase` [INFO] [stdout] --> src/lib.rs:262:13 [INFO] [stdout] | [INFO] [stdout] 262 | let passphrase = $passphrase; [INFO] [stdout] | ^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_passphrase` [INFO] [stdout] | [INFO] [stdout] ::: src/tests/MacroTests.rs:114:27 [INFO] [stdout] | [INFO] [stdout] 114 | ...ge = DecryptOpen!(secret_key.to_owned(), public.to_owned(), encrypt_message.clone(), "hey, how are you?", cipher.to_owned()); [INFO] [stdout] | ----------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `DecryptOpen` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `save_ciphertext` and `generate_cbc_iv` are never used [INFO] [stdout] --> src/Core/cipher_aes.rs:110:8 [INFO] [stdout] | [INFO] [stdout] 39 | impl CipherAES { [INFO] [stdout] | -------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 110 | fn save_ciphertext(&self, _encrypted_data: &[u8]) -> Result<(), CryptError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 152 | fn generate_cbc_iv(&mut self) -> Result, CryptError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `public_key`, `secret_key`, `signed_msg`, and `signature` are never used [INFO] [stdout] --> src/cryptography/hmac_sign/mod.rs:176:8 [INFO] [stdout] | [INFO] [stdout] 168 | impl SignatureKey { [INFO] [stdout] | ----------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 176 | fn public_key(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 181 | fn secret_key(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 186 | fn signed_msg(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 191 | fn signature(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `read_file` is never used [INFO] [stdout] --> src/tests/KyberKeyTests.rs:92:4 [INFO] [stdout] | [INFO] [stdout] 92 | fn read_file(path: &PathBuf) -> Result, std::io::Error> { [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_message_AES_Kyber512` is never used [INFO] [stdout] --> src/tests/KyberTests.rs:641:4 [INFO] [stdout] | [INFO] [stdout] 641 | fn encrypt_message_AES_Kyber512() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `Core` should have a snake case name [INFO] [stdout] --> src/lib.rs:196:5 [INFO] [stdout] | [INFO] [stdout] 196 | mod Core; [INFO] [stdout] | ^^^^ help: convert the identifier to snake case (notice the capitalization): `core` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_snake_case)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KeyControl` should have a snake case name [INFO] [stdout] --> src/lib.rs:200:9 [INFO] [stdout] | [INFO] [stdout] 200 | pub mod KeyControl; [INFO] [stdout] | ^^^^^^^^^^ help: convert the identifier to snake case: `key_control` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KDF` should have a snake case name [INFO] [stdout] --> src/Core/mod.rs:4:9 [INFO] [stdout] | [INFO] [stdout] 4 | pub mod KDF; [INFO] [stdout] | ^^^ help: convert the identifier to snake case: `kdf` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KeyControler` should have a snake case name [INFO] [stdout] --> src/Core/kyber/mod.rs:2:9 [INFO] [stdout] | [INFO] [stdout] 2 | pub mod KeyControler; [INFO] [stdout] | ^^^^^^^^^^^^ help: convert the identifier to snake case: `key_controler` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/Core/cipher_aes.rs:155:9 [INFO] [stdout] | [INFO] [stdout] 155 | rng.try_fill(&mut iv[..]); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] = note: `#[warn(unused_must_use)]` on by default [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 155 | let _ = rng.try_fill(&mut iv[..]); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `Ciphertext` should have a snake case name [INFO] [stdout] --> src/KeyControl/mod.rs:43:12 [INFO] [stdout] | [INFO] [stdout] 43 | pub fn Ciphertext() -> Self { [INFO] [stdout] | ^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `ciphertext` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `ArchiveTests` should have a snake case name [INFO] [stdout] --> src/tests/mod.rs:6:5 [INFO] [stdout] | [INFO] [stdout] 6 | mod ArchiveTests; [INFO] [stdout] | ^^^^^^^^^^^^ help: convert the identifier to snake case: `archive_tests` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KyberKeyTests` should have a snake case name [INFO] [stdout] --> src/tests/mod.rs:9:5 [INFO] [stdout] | [INFO] [stdout] 9 | mod KyberKeyTests; [INFO] [stdout] | ^^^^^^^^^^^^^ help: convert the identifier to snake case: `kyber_key_tests` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KyberTests` should have a snake case name [INFO] [stdout] --> src/tests/mod.rs:12:5 [INFO] [stdout] | [INFO] [stdout] 12 | mod KyberTests; [INFO] [stdout] | ^^^^^^^^^^ help: convert the identifier to snake case: `kyber_tests` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `SignatureTests` should have a snake case name [INFO] [stdout] --> src/tests/mod.rs:15:5 [INFO] [stdout] | [INFO] [stdout] 15 | mod SignatureTests; [INFO] [stdout] | ^^^^^^^^^^^^^^ help: convert the identifier to snake case: `signature_tests` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `MacroTests` should have a snake case name [INFO] [stdout] --> src/tests/mod.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | mod MacroTests; [INFO] [stdout] | ^^^^^^^^^^ help: convert the identifier to snake case: `macro_tests` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing [INFO] [stdout] --> src/tests/ArchiveTests.rs:91:47 [INFO] [stdout] | [INFO] [stdout] 91 | let extraction_dir = archive_temp_dir_path.clone(); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: the type `std::path::Path` does not implement `Clone`, so calling `clone` on `&std::path::Path` copies the reference, which does not do anything and can be removed [INFO] [stdout] = note: `#[warn(noop_method_call)]` on by default [INFO] [stdout] help: remove this redundant call [INFO] [stdout] | [INFO] [stdout] 91 - let extraction_dir = archive_temp_dir_path.clone(); [INFO] [stdout] 91 + let extraction_dir = archive_temp_dir_path; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_msg_macro_AES_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:22:4 [INFO] [stdout] | [INFO] [stdout] 22 | fn encrypt_decrypt_msg_macro_AES_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_aes_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_msg_macro_AES_XTS_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:42:4 [INFO] [stdout] | [INFO] [stdout] 42 | fn encrypt_decrypt_msg_macro_AES_XTS_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_aes_xts_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_msg_macro_XChaCha20_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:64:4 [INFO] [stdout] | [INFO] [stdout] 64 | fn encrypt_decrypt_msg_macro_XChaCha20_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_xcha_cha20_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_msg_macro_AES_GCM_SIV_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:85:4 [INFO] [stdout] | [INFO] [stdout] 85 | fn encrypt_decrypt_msg_macro_AES_GCM_SIV_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_aes_gcm_siv_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_AES_GCM_SIV_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:144:4 [INFO] [stdout] | [INFO] [stdout] 144 | fn encrypt_decrypt_AES_GCM_SIV_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_aes_gcm_siv_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_AES_XTS_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:165:4 [INFO] [stdout] | [INFO] [stdout] 165 | fn encrypt_decrypt_AES_XTS_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_aes_xts_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_data_macro_AES_GCM_SIV_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:185:4 [INFO] [stdout] | [INFO] [stdout] 185 | fn encrypt_decrypt_data_macro_AES_GCM_SIV_Kyber1024() -> Result<(), Box> { // Generate key pair [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_aes_gcm_siv_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_msg_AES_XTS_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:231:4 [INFO] [stdout] | [INFO] [stdout] 231 | fn encrypt_decrypt_msg_AES_XTS_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_aes_xts_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_msg_macro_AES_CTR_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:287:4 [INFO] [stdout] | [INFO] [stdout] 287 | fn encrypt_decrypt_msg_macro_AES_CTR_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_aes_ctr_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_AES_CTR_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:346:4 [INFO] [stdout] | [INFO] [stdout] 346 | fn encrypt_decrypt_AES_CTR_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_aes_ctr_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_data_macro_AES_CTR_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:366:4 [INFO] [stdout] | [INFO] [stdout] 366 | fn encrypt_decrypt_data_macro_AES_CTR_Kyber1024() -> Result<(), Box> { // Generate key pair [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_aes_ctr_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_msg_macro_XChaCha20Poly1305_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:390:4 [INFO] [stdout] | [INFO] [stdout] 390 | fn encrypt_decrypt_msg_macro_XChaCha20Poly1305_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_xcha_cha20_poly1305_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_data_macro_XChaCha20Poly1305_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:450:4 [INFO] [stdout] | [INFO] [stdout] 450 | fn encrypt_decrypt_data_macro_XChaCha20Poly1305_Kyber1024() -> Result<(), Box> { // Generate key pair [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_xcha_cha20_poly1305_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_XChaCha20Poly1305_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:474:4 [INFO] [stdout] | [INFO] [stdout] 474 | fn encrypt_decrypt_XChaCha20Poly1305_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_xcha_cha20_poly1305_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_data_macro_AES_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:494:4 [INFO] [stdout] | [INFO] [stdout] 494 | fn encrypt_decrypt_data_macro_AES_Kyber1024() -> Result<(), Box> { // Generate key pair [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_aes_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_file_macro_AES_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:518:4 [INFO] [stdout] | [INFO] [stdout] 518 | fn encrypt_decrypt_file_macro_AES_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_file_macro_aes_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/tests/KyberTests.rs:537:5 [INFO] [stdout] | [INFO] [stdout] 537 | fs::remove_file(enc_path.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 537 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_message_AES_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:557:4 [INFO] [stdout] | [INFO] [stdout] 557 | fn encrypt_message_AES_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_data_AES_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:586:4 [INFO] [stdout] | [INFO] [stdout] 586 | fn encrypt_data_AES_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_data_aes_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_message_AES_Kyber768` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:613:4 [INFO] [stdout] | [INFO] [stdout] 613 | fn encrypt_message_AES_Kyber768() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber768` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_message_AES_Kyber512` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:641:4 [INFO] [stdout] | [INFO] [stdout] 641 | fn encrypt_message_AES_Kyber512() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber512` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_file_AES_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:670:4 [INFO] [stdout] | [INFO] [stdout] 670 | fn encrypt_file_AES_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/tests/KyberTests.rs:692:5 [INFO] [stdout] | [INFO] [stdout] 692 | fs::remove_file(enc_path.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 692 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_file_AES_Kyber768` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:714:4 [INFO] [stdout] | [INFO] [stdout] 714 | fn encrypt_file_AES_Kyber768() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber768` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/tests/KyberTests.rs:736:5 [INFO] [stdout] | [INFO] [stdout] 736 | fs::remove_file(enc_path.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 736 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_file_AES_Kyber512` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:759:4 [INFO] [stdout] | [INFO] [stdout] 759 | fn encrypt_file_AES_Kyber512() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber512` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/tests/KyberTests.rs:781:5 [INFO] [stdout] | [INFO] [stdout] 781 | fs::remove_file(enc_path.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 781 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_message_XChaCha20_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:803:4 [INFO] [stdout] | [INFO] [stdout] 803 | fn encrypt_message_XChaCha20_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_message_XChaCha20_Kyber768` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:831:4 [INFO] [stdout] | [INFO] [stdout] 831 | fn encrypt_message_XChaCha20_Kyber768() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber768` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_message_XChaCha20_Kyber512` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:859:4 [INFO] [stdout] | [INFO] [stdout] 859 | fn encrypt_message_XChaCha20_Kyber512() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber512` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_file_XChaCha20_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:887:4 [INFO] [stdout] | [INFO] [stdout] 887 | fn encrypt_file_XChaCha20_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/tests/KyberTests.rs:911:5 [INFO] [stdout] | [INFO] [stdout] 911 | fs::remove_file(enc_path.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 911 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_file_XChaCha20_Kyber768` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:933:4 [INFO] [stdout] | [INFO] [stdout] 933 | fn encrypt_file_XChaCha20_Kyber768() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber768` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/tests/KyberTests.rs:957:5 [INFO] [stdout] | [INFO] [stdout] 957 | fs::remove_file(enc_path.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 957 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_file_XChaCha20_Kyber512` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:979:4 [INFO] [stdout] | [INFO] [stdout] 979 | fn encrypt_file_XChaCha20_Kyber512() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber512` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/tests/KyberTests.rs:1003:5 [INFO] [stdout] | [INFO] [stdout] 1003 | fs::remove_file(enc_path.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 1003 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `test_save_Falcon1024_keys` should have a snake case name [INFO] [stdout] --> src/tests/SignatureTests.rs:50:4 [INFO] [stdout] | [INFO] [stdout] 50 | fn test_save_Falcon1024_keys() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `test_save_falcon1024_keys` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `test_save_Falcon512_keys` should have a snake case name [INFO] [stdout] --> src/tests/SignatureTests.rs:73:4 [INFO] [stdout] | [INFO] [stdout] 73 | fn test_save_Falcon512_keys() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `test_save_falcon512_keys` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `test_save_Dilithium2_keys` should have a snake case name [INFO] [stdout] --> src/tests/SignatureTests.rs:97:4 [INFO] [stdout] | [INFO] [stdout] 97 | fn test_save_Dilithium2_keys() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium2_keys` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `test_save_Dilithium3_keys` should have a snake case name [INFO] [stdout] --> src/tests/SignatureTests.rs:120:4 [INFO] [stdout] | [INFO] [stdout] 120 | fn test_save_Dilithium3_keys() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium3_keys` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `test_save_Dilithium5_keys` should have a snake case name [INFO] [stdout] --> src/tests/SignatureTests.rs:143:4 [INFO] [stdout] | [INFO] [stdout] 143 | fn test_save_Dilithium5_keys() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium5_keys` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `SignEncrypt` should have a snake case name [INFO] [stdout] --> src/tests/MacroTests.rs:95:4 [INFO] [stdout] | [INFO] [stdout] 95 | fn SignEncrypt() { [INFO] [stdout] | ^^^^^^^^^^^ help: convert the identifier to snake case: `sign_encrypt` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `SignEncrypt_DecryptOpen` should have a snake case name [INFO] [stdout] --> src/tests/MacroTests.rs:107:4 [INFO] [stdout] | [INFO] [stdout] 107 | fn SignEncrypt_DecryptOpen() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `sign_encrypt_decrypt_open` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 4.42s [INFO] running `Command { std: "docker" "inspect" "94575569491fe5cdd58fa66634bd697b52ae0f3ebdfa7ac0164fd2b7a95418d6", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "94575569491fe5cdd58fa66634bd697b52ae0f3ebdfa7ac0164fd2b7a95418d6", kill_on_drop: false }` [INFO] [stdout] 94575569491fe5cdd58fa66634bd697b52ae0f3ebdfa7ac0164fd2b7a95418d6 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "RUSTDOCFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:86ea7c7af713d31e8cfdb68a6d0db50b5cf7cbeecde3d112f9f257f747318d36" "/opt/rustwide/cargo-home/bin/cargo" "+1.84.0" "test" "--frozen", kill_on_drop: false }` [INFO] [stdout] 3a8c1c0515c97d043d80f2608f57c686b8cb24b50264676c9b8347ea0d61585a [INFO] running `Command { std: "docker" "start" "-a" "3a8c1c0515c97d043d80f2608f57c686b8cb24b50264676c9b8347ea0d61585a", kill_on_drop: false }` [INFO] [stderr] warning: type `AES_GCM_SIV` should have an upper camel case name [INFO] [stderr] --> src/Core/kyber/mod.rs:84:12 [INFO] [stderr] | [INFO] [stderr] 84 | pub struct AES_GCM_SIV; [INFO] [stderr] | ^^^^^^^^^^^ help: convert the identifier to upper camel case: `AesGcmSiv` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(non_camel_case_types)]` on by default [INFO] [stderr] [INFO] [stderr] warning: type `AES_CTR` should have an upper camel case name [INFO] [stderr] --> src/Core/kyber/mod.rs:87:12 [INFO] [stderr] | [INFO] [stderr] 87 | pub struct AES_CTR; [INFO] [stderr] | ^^^^^^^ help: convert the identifier to upper camel case: `AesCtr` [INFO] [stderr] [INFO] [stderr] warning: type `AES_XTS` should have an upper camel case name [INFO] [stderr] --> src/Core/kyber/mod.rs:91:12 [INFO] [stderr] | [INFO] [stderr] 91 | pub struct AES_XTS; [INFO] [stderr] | ^^^^^^^ help: convert the identifier to upper camel case: `AesXts` [INFO] [stderr] [INFO] [stderr] warning: unused import: `CipherChaCha` [INFO] [stderr] --> src/Core/cipher_aes_gcm_siv.rs:8:9 [INFO] [stderr] | [INFO] [stderr] 8 | CipherChaCha, [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_imports)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unused import: `fs` [INFO] [stderr] --> src/Core/cipher_aes_gcm_siv.rs:18:5 [INFO] [stderr] | [INFO] [stderr] 18 | fs [INFO] [stderr] | ^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `fs` [INFO] [stderr] --> src/Core/cipher_aes_ctr.rs:18:5 [INFO] [stderr] | [INFO] [stderr] 18 | fs [INFO] [stderr] | ^^ [INFO] [stderr] [INFO] [stderr] warning: unused imports: `Aead`, `Aes256GcmSiv`, and `Nonce` [INFO] [stderr] --> src/Core/cipher_aes_ctr.rs:23:12 [INFO] [stderr] | [INFO] [stderr] 23 | aead::{Aead, KeyInit}, [INFO] [stderr] | ^^^^ [INFO] [stderr] 24 | Aes256GcmSiv, Nonce, [INFO] [stderr] | ^^^^^^^^^^^^ ^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `StreamCipherSeek` [INFO] [stderr] --> src/Core/cipher_aes_ctr.rs:26:44 [INFO] [stderr] | [INFO] [stderr] 26 | use aes::cipher::{KeyIvInit, StreamCipher, StreamCipherSeek, generic_array::GenericArray}; [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `CipherChaCha` [INFO] [stderr] --> src/Core/cipher_aes_xts.rs:8:9 [INFO] [stderr] | [INFO] [stderr] 8 | CipherChaCha, [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `fs` [INFO] [stderr] --> src/Core/cipher_aes_xts.rs:18:5 [INFO] [stderr] | [INFO] [stderr] 18 | fs [INFO] [stderr] | ^^ [INFO] [stderr] [INFO] [stderr] warning: unused imports: `RngCore` and `rngs::OsRng` [INFO] [stderr] --> src/Core/cipher_aes_xts.rs:20:12 [INFO] [stderr] | [INFO] [stderr] 20 | use rand::{RngCore, rngs::OsRng}; [INFO] [stderr] | ^^^^^^^ ^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `hex` [INFO] [stderr] --> src/Core/cipher_aes_xts.rs:21:5 [INFO] [stderr] | [INFO] [stderr] 21 | use hex; [INFO] [stderr] | ^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `CipherChaCha` [INFO] [stderr] --> src/Core/cipher_xchacha_poly.rs:8:9 [INFO] [stderr] | [INFO] [stderr] 8 | CipherChaCha, [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `fs` [INFO] [stderr] --> src/Core/cipher_xchacha_poly.rs:18:5 [INFO] [stderr] | [INFO] [stderr] 18 | fs [INFO] [stderr] | ^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `AeadCore` [INFO] [stderr] --> src/Core/cipher_xchacha_poly.rs:23:18 [INFO] [stderr] | [INFO] [stderr] 23 | aead::{Aead, AeadCore, KeyInit}, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: type `CipherAES_GCM_SIV` should have an upper camel case name [INFO] [stderr] --> src/cryptography/mod.rs:26:12 [INFO] [stderr] | [INFO] [stderr] 26 | pub struct CipherAES_GCM_SIV { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesGcmSiv` [INFO] [stderr] [INFO] [stderr] warning: type `CipherAES_CTR` should have an upper camel case name [INFO] [stderr] --> src/cryptography/mod.rs:39:12 [INFO] [stderr] | [INFO] [stderr] 39 | pub struct CipherAES_CTR { [INFO] [stderr] | ^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesCtr` [INFO] [stderr] [INFO] [stderr] warning: type `CipherAES_XTS` should have an upper camel case name [INFO] [stderr] --> src/cryptography/mod.rs:52:12 [INFO] [stderr] | [INFO] [stderr] 52 | pub struct CipherAES_XTS { [INFO] [stderr] | ^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesXts` [INFO] [stderr] [INFO] [stderr] warning: type `CipherChaCha_Poly` should have an upper camel case name [INFO] [stderr] --> src/cryptography/mod.rs:81:12 [INFO] [stderr] | [INFO] [stderr] 81 | pub struct CipherChaCha_Poly { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherChaChaPoly` [INFO] [stderr] [INFO] [stderr] warning: variant `AES_GCM_SIV` should have an upper camel case name [INFO] [stderr] --> src/cryptography/mod.rs:97:5 [INFO] [stderr] | [INFO] [stderr] 97 | AES_GCM_SIV, [INFO] [stderr] | ^^^^^^^^^^^ help: convert the identifier to upper camel case: `AesGcmSiv` [INFO] [stderr] [INFO] [stderr] warning: variant `AES_CTR` should have an upper camel case name [INFO] [stderr] --> src/cryptography/mod.rs:98:5 [INFO] [stderr] | [INFO] [stderr] 98 | AES_CTR, [INFO] [stderr] | ^^^^^^^ help: convert the identifier to upper camel case: `AesCtr` [INFO] [stderr] [INFO] [stderr] warning: variant `AES_XTS` should have an upper camel case name [INFO] [stderr] --> src/cryptography/mod.rs:99:5 [INFO] [stderr] | [INFO] [stderr] 99 | AES_XTS, [INFO] [stderr] | ^^^^^^^ help: convert the identifier to upper camel case: `AesXts` [INFO] [stderr] [INFO] [stderr] warning: unused import: `zeroize::Zeroize` [INFO] [stderr] --> src/lib.rs:226:5 [INFO] [stderr] | [INFO] [stderr] 226 | use zeroize::Zeroize; [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `Mac` [INFO] [stderr] --> src/Core/KDF.rs:1:12 [INFO] [stderr] | [INFO] [stderr] 1 | use hmac::{Mac}; [INFO] [stderr] | ^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `Ciphertext` [INFO] [stderr] --> src/KeyControl/mod.rs:4:64 [INFO] [stderr] | [INFO] [stderr] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stderr] | ^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `SharedSecret` [INFO] [stderr] --> src/KeyControl/mod.rs:4:50 [INFO] [stderr] | [INFO] [stderr] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `SecretKey` [INFO] [stderr] --> src/KeyControl/mod.rs:4:39 [INFO] [stderr] | [INFO] [stderr] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `PublicKey` [INFO] [stderr] --> src/KeyControl/mod.rs:4:28 [INFO] [stderr] | [INFO] [stderr] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `KyberKeyFunctions` [INFO] [stderr] --> src/Core/cipher_xchacha_poly.rs:12:9 [INFO] [stderr] | [INFO] [stderr] 12 | KyberKeyFunctions, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `KyberKeyFunctions` [INFO] [stderr] --> src/Core/cipher_aes_gcm_siv.rs:12:9 [INFO] [stderr] | [INFO] [stderr] 12 | KyberKeyFunctions, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `KeyInit` [INFO] [stderr] --> src/Core/cipher_aes_ctr.rs:23:18 [INFO] [stderr] | [INFO] [stderr] 23 | aead::{Aead, KeyInit}, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `KyberKeyFunctions` [INFO] [stderr] --> src/Core/cipher_aes_ctr.rs:12:9 [INFO] [stderr] | [INFO] [stderr] 12 | KyberKeyFunctions, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `KyberKeyFunctions` [INFO] [stderr] --> src/Core/cipher_aes_xts.rs:12:9 [INFO] [stderr] | [INFO] [stderr] 12 | KyberKeyFunctions, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `Write` [INFO] [stderr] --> src/Core/cipher_aes.rs:26:10 [INFO] [stderr] | [INFO] [stderr] 26 | io::{Write}, [INFO] [stderr] | ^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `KyberKeyFunctions` [INFO] [stderr] --> src/Core/cipher_aes.rs:9:9 [INFO] [stderr] | [INFO] [stderr] 9 | KyberKeyFunctions, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `KyberKeyFunctions` [INFO] [stderr] --> src/Core/cipher_xchacha.rs:12:9 [INFO] [stderr] | [INFO] [stderr] 12 | KyberKeyFunctions, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `Mac` [INFO] [stderr] --> src/cryptography/hmac_sign/mod.rs:3:12 [INFO] [stderr] | [INFO] [stderr] 3 | use hmac::{Mac}; [INFO] [stderr] | ^^^ [INFO] [stderr] [INFO] [stderr] warning: unused variable: `kybersize` [INFO] [stderr] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:25:35 [INFO] [stderr] | [INFO] [stderr] 25 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stderr] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `kybersize` [INFO] [stderr] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:65:35 [INFO] [stderr] | [INFO] [stderr] 65 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stderr] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `key_encap_mechanism` [INFO] [stderr] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:105:14 [INFO] [stderr] | [INFO] [stderr] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_key_encap_mechanism` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `kybersize` [INFO] [stderr] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:105:35 [INFO] [stderr] | [INFO] [stderr] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stderr] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `kybersize` [INFO] [stderr] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:177:35 [INFO] [stderr] | [INFO] [stderr] 177 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stderr] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `kybersize` [INFO] [stderr] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:216:35 [INFO] [stderr] | [INFO] [stderr] 216 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stderr] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `kybersize` [INFO] [stderr] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:253:35 [INFO] [stderr] | [INFO] [stderr] 253 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stderr] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `kybersize` [INFO] [stderr] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:25:35 [INFO] [stderr] | [INFO] [stderr] 25 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stderr] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `kybersize` [INFO] [stderr] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:65:35 [INFO] [stderr] | [INFO] [stderr] 65 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stderr] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `key_encap_mechanism` [INFO] [stderr] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:105:14 [INFO] [stderr] | [INFO] [stderr] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_key_encap_mechanism` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `kybersize` [INFO] [stderr] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:105:35 [INFO] [stderr] | [INFO] [stderr] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stderr] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `kybersize` [INFO] [stderr] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:177:35 [INFO] [stderr] | [INFO] [stderr] 177 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stderr] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `kybersize` [INFO] [stderr] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:216:35 [INFO] [stderr] | [INFO] [stderr] 216 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stderr] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `kybersize` [INFO] [stderr] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:253:35 [INFO] [stderr] | [INFO] [stderr] 253 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stderr] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/Core/cipher_aes_ctr.rs:118:13 [INFO] [stderr] | [INFO] [stderr] 118 | let mut data = hmac.hmac(); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_mut)]` on by default [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/Core/cipher_aes_ctr.rs:129:13 [INFO] [stderr] | [INFO] [stderr] 129 | let mut ciphertext = self.infos.content()?; [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/Core/cipher_aes.rs:190:13 [INFO] [stderr] | [INFO] [stderr] 190 | let mut cipher = Aes128CbcDec::new(key, iv_arr); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: unreachable pattern [INFO] [stderr] --> src/Core/cipher_xchacha.rs:157:13 [INFO] [stderr] | [INFO] [stderr] 157 | _ => Err(|e| CryptError::IOError(e)), [INFO] [stderr] | ^ no value can reach this [INFO] [stderr] | [INFO] [stderr] note: multiple earlier patterns match some of the same values [INFO] [stderr] --> src/Core/cipher_xchacha.rs:157:13 [INFO] [stderr] | [INFO] [stderr] 129 | Process::Encryption => { [INFO] [stderr] | ------------------- matches some of the same values [INFO] [stderr] ... [INFO] [stderr] 143 | Process::Decryption => { [INFO] [stderr] | ------------------- matches some of the same values [INFO] [stderr] ... [INFO] [stderr] 157 | _ => Err(|e| CryptError::IOError(e)), [INFO] [stderr] | ^ collectively making this unreachable [INFO] [stderr] = note: `#[warn(unreachable_patterns)]` on by default [INFO] [stderr] [INFO] [stderr] warning: value assigned to `encrypted_data` is never read [INFO] [stderr] --> src/Core/cipher_xchacha.rs:125:17 [INFO] [stderr] | [INFO] [stderr] 125 | let mut encrypted_data: Vec = Vec::new(); [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = help: maybe it is overwritten before being read? [INFO] [stderr] = note: `#[warn(unused_assignments)]` on by default [INFO] [stderr] [INFO] [stderr] warning: value assigned to `nonce_vec` is never read [INFO] [stderr] --> src/Core/cipher_xchacha.rs:126:17 [INFO] [stderr] | [INFO] [stderr] 126 | let mut nonce_vec: Vec = Vec::new(); [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = help: maybe it is overwritten before being read? [INFO] [stderr] [INFO] [stderr] warning: unreachable pattern [INFO] [stderr] --> src/cryptography/hmac_sign/sign.rs:47:13 [INFO] [stderr] | [INFO] [stderr] 47 | _ => vec![], [INFO] [stderr] | ^ no value can reach this [INFO] [stderr] | [INFO] [stderr] note: multiple earlier patterns match some of the same values [INFO] [stderr] --> src/cryptography/hmac_sign/sign.rs:47:13 [INFO] [stderr] | [INFO] [stderr] 39 | Operation::Sign => { [INFO] [stderr] | --------------- matches some of the same values [INFO] [stderr] ... [INFO] [stderr] 43 | Operation::Verify => { [INFO] [stderr] | ----------------- matches some of the same values [INFO] [stderr] ... [INFO] [stderr] 47 | _ => vec![], [INFO] [stderr] | ^ collectively making this unreachable [INFO] [stderr] [INFO] [stderr] warning: methods `save_ciphertext` and `generate_cbc_iv` are never used [INFO] [stderr] --> src/Core/cipher_aes.rs:110:8 [INFO] [stderr] | [INFO] [stderr] 39 | impl CipherAES { [INFO] [stderr] | -------------- methods in this implementation [INFO] [stderr] ... [INFO] [stderr] 110 | fn save_ciphertext(&self, _encrypted_data: &[u8]) -> Result<(), CryptError> { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] ... [INFO] [stderr] 152 | fn generate_cbc_iv(&mut self) -> Result, CryptError> { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(dead_code)]` on by default [INFO] [stderr] [INFO] [stderr] warning: methods `public_key`, `secret_key`, `signed_msg`, and `signature` are never used [INFO] [stderr] --> src/cryptography/hmac_sign/mod.rs:176:8 [INFO] [stderr] | [INFO] [stderr] 168 | impl SignatureKey { [INFO] [stderr] | ----------------- methods in this implementation [INFO] [stderr] ... [INFO] [stderr] 176 | fn public_key(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stderr] | ^^^^^^^^^^ [INFO] [stderr] ... [INFO] [stderr] 181 | fn secret_key(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stderr] | ^^^^^^^^^^ [INFO] [stderr] ... [INFO] [stderr] 186 | fn signed_msg(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stderr] | ^^^^^^^^^^ [INFO] [stderr] ... [INFO] [stderr] 191 | fn signature(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: module `Core` should have a snake case name [INFO] [stderr] --> src/lib.rs:196:5 [INFO] [stderr] | [INFO] [stderr] 196 | mod Core; [INFO] [stderr] | ^^^^ help: convert the identifier to snake case (notice the capitalization): `core` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(non_snake_case)]` on by default [INFO] [stderr] [INFO] [stderr] warning: module `KeyControl` should have a snake case name [INFO] [stderr] --> src/lib.rs:200:9 [INFO] [stderr] | [INFO] [stderr] 200 | pub mod KeyControl; [INFO] [stderr] | ^^^^^^^^^^ help: convert the identifier to snake case: `key_control` [INFO] [stderr] [INFO] [stderr] warning: module `KDF` should have a snake case name [INFO] [stderr] --> src/Core/mod.rs:4:9 [INFO] [stderr] | [INFO] [stderr] 4 | pub mod KDF; [INFO] [stderr] | ^^^ help: convert the identifier to snake case: `kdf` [INFO] [stderr] [INFO] [stderr] warning: module `KeyControler` should have a snake case name [INFO] [stderr] --> src/Core/kyber/mod.rs:2:9 [INFO] [stderr] | [INFO] [stderr] 2 | pub mod KeyControler; [INFO] [stderr] | ^^^^^^^^^^^^ help: convert the identifier to snake case: `key_controler` [INFO] [stderr] [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/Core/cipher_aes.rs:155:9 [INFO] [stderr] | [INFO] [stderr] 155 | rng.try_fill(&mut iv[..]); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] = note: `#[warn(unused_must_use)]` on by default [INFO] [stderr] help: use `let _ = ...` to ignore the resulting value [INFO] [stderr] | [INFO] [stderr] 155 | let _ = rng.try_fill(&mut iv[..]); [INFO] [stderr] | +++++++ [INFO] [stderr] [INFO] [stderr] warning: method `Ciphertext` should have a snake case name [INFO] [stderr] --> src/KeyControl/mod.rs:43:12 [INFO] [stderr] | [INFO] [stderr] 43 | pub fn Ciphertext() -> Self { [INFO] [stderr] | ^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `ciphertext` [INFO] [stderr] [INFO] [stderr] warning: unused imports: `PathBuf` and `Path` [INFO] [stderr] --> src/tests/ArchiveTests.rs:3:17 [INFO] [stderr] | [INFO] [stderr] 3 | use std::path::{Path, PathBuf}; [INFO] [stderr] | ^^^^ ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unnecessary trailing semicolon [INFO] [stderr] --> src/lib.rs:1293:28 [INFO] [stderr] | [INFO] [stderr] 1293 | let mut key = $key;; [INFO] [stderr] | ^ help: remove this semicolon [INFO] [stderr] | [INFO] [stderr] ::: src/tests/SignatureTests.rs:12:16 [INFO] [stderr] | [INFO] [stderr] 12 | let sign = Signature!(Falcon, secret_key.to_owned(), 1024, data.clone(), Message); [INFO] [stderr] | ---------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(redundant_semicolons)]` on by default [INFO] [stderr] = note: this warning originates in the macro `Signature` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary trailing semicolon [INFO] [stderr] --> src/lib.rs:1294:36 [INFO] [stderr] | [INFO] [stderr] 1294 | let mut content = $content;; [INFO] [stderr] | ^ help: remove this semicolon [INFO] [stderr] | [INFO] [stderr] ::: src/tests/SignatureTests.rs:12:16 [INFO] [stderr] | [INFO] [stderr] 12 | let sign = Signature!(Falcon, secret_key.to_owned(), 1024, data.clone(), Message); [INFO] [stderr] | ---------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `Signature` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary trailing semicolon [INFO] [stderr] --> src/lib.rs:1305:28 [INFO] [stderr] | [INFO] [stderr] 1305 | let mut key = $key;; [INFO] [stderr] | ^ help: remove this semicolon [INFO] [stderr] | [INFO] [stderr] ::: src/tests/SignatureTests.rs:33:16 [INFO] [stderr] | [INFO] [stderr] 33 | let sign = Signature!(Falcon, secret_key.to_owned(), 1024, data.clone(), Detached); [INFO] [stderr] | ----------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `Signature` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary trailing semicolon [INFO] [stderr] --> src/lib.rs:1306:36 [INFO] [stderr] | [INFO] [stderr] 1306 | let mut content = $content;; [INFO] [stderr] | ^ help: remove this semicolon [INFO] [stderr] | [INFO] [stderr] ::: src/tests/SignatureTests.rs:33:16 [INFO] [stderr] | [INFO] [stderr] 33 | let sign = Signature!(Falcon, secret_key.to_owned(), 1024, data.clone(), Detached); [INFO] [stderr] | ----------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `Signature` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unused import: `hmac_sign` [INFO] [stderr] --> src/tests/MacroTests.rs:5:9 [INFO] [stderr] | [INFO] [stderr] 5 | hmac_sign::*, [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `hmac_sign` [INFO] [stderr] --> src/tests/KyberKeyTests.rs:8:9 [INFO] [stderr] | [INFO] [stderr] 8 | hmac_sign::*, [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused variable: `key` [INFO] [stderr] --> src/lib.rs:986:13 [INFO] [stderr] | [INFO] [stderr] 986 | let key = $key; [INFO] [stderr] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stderr] | [INFO] [stderr] ::: src/tests/KyberTests.rs:77:27 [INFO] [stderr] | [INFO] [stderr] 77 | ... = Decryption!(secret_key.to_owned(), 1024, encrypt_message.to_owned(), passphrase, cipher.to_owned(), Some(nonce.clone()), XChaCha20); [INFO] [stderr] | ----------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `Decryption` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/tests/KyberTests.rs:71:9 [INFO] [stderr] | [INFO] [stderr] 71 | let mut key = public_key; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `key` [INFO] [stderr] --> src/lib.rs:886:13 [INFO] [stderr] | [INFO] [stderr] 886 | let key = $key; [INFO] [stderr] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stderr] | [INFO] [stderr] ::: src/tests/KyberTests.rs:199:27 [INFO] [stderr] | [INFO] [stderr] 199 | ... = Decryption!(secret_key.to_owned(), 1024, encrypt_message.to_owned(), passphrase, cipher.to_owned(), Some(nonce), AES_GCM_SIV)?; [INFO] [stderr] | ----------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `Decryption` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unused variable: `key` [INFO] [stderr] --> src/lib.rs:936:13 [INFO] [stderr] | [INFO] [stderr] 936 | let key = $key; [INFO] [stderr] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stderr] | [INFO] [stderr] ::: src/tests/KyberTests.rs:380:27 [INFO] [stderr] | [INFO] [stderr] 380 | ...ge = Decryption!(secret_key.to_owned(), 1024, encrypt_message.to_owned(), passphrase, cipher.to_owned(), Some(nonce), AES_CTR)?; [INFO] [stderr] | ------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `Decryption` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unused variable: `key` [INFO] [stderr] --> src/lib.rs:1042:13 [INFO] [stderr] | [INFO] [stderr] 1042 | let key = $key; [INFO] [stderr] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stderr] | [INFO] [stderr] ::: src/tests/KyberTests.rs:464:27 [INFO] [stderr] | [INFO] [stderr] 464 | ... = Decryption!(secret_key.to_owned(), 1024, encrypt_message.to_owned(), passphrase, cipher.to_owned(), Some(nonce.to_owned()), XChaCha20Poly1305... [INFO] [stderr] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `Decryption` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unused variable: `passphrase` [INFO] [stderr] --> src/lib.rs:241:13 [INFO] [stderr] | [INFO] [stderr] 241 | let passphrase = $passphrase; [INFO] [stderr] | ^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_passphrase` [INFO] [stderr] | [INFO] [stderr] ::: src/tests/MacroTests.rs:99:37 [INFO] [stderr] | [INFO] [stderr] 99 | let (encrypt_message, cipher) = EncryptSign!(public_key.clone(), secret.clone(), message.to_owned(), "hey, how are you?").unwrap(); [INFO] [stderr] | ----------------------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `EncryptSign` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unused variable: `passphrase` [INFO] [stderr] --> src/lib.rs:241:13 [INFO] [stderr] | [INFO] [stderr] 241 | let passphrase = $passphrase; [INFO] [stderr] | ^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_passphrase` [INFO] [stderr] | [INFO] [stderr] ::: src/tests/MacroTests.rs:112:37 [INFO] [stderr] | [INFO] [stderr] 112 | let (encrypt_message, cipher) = EncryptSign!(public_key.to_owned(), secret.to_owned(), message.clone(), "hey, how are you?").unwrap(); [INFO] [stderr] | -------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `EncryptSign` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unused variable: `passphrase` [INFO] [stderr] --> src/lib.rs:262:13 [INFO] [stderr] | [INFO] [stderr] 262 | let passphrase = $passphrase; [INFO] [stderr] | ^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_passphrase` [INFO] [stderr] | [INFO] [stderr] ::: src/tests/MacroTests.rs:114:27 [INFO] [stderr] | [INFO] [stderr] 114 | ...ge = DecryptOpen!(secret_key.to_owned(), public.to_owned(), encrypt_message.clone(), "hey, how are you?", cipher.to_owned()); [INFO] [stderr] | ----------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `DecryptOpen` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: function `read_file` is never used [INFO] [stderr] --> src/tests/KyberKeyTests.rs:92:4 [INFO] [stderr] | [INFO] [stderr] 92 | fn read_file(path: &PathBuf) -> Result, std::io::Error> { [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_message_AES_Kyber512` is never used [INFO] [stderr] --> src/tests/KyberTests.rs:641:4 [INFO] [stderr] | [INFO] [stderr] 641 | fn encrypt_message_AES_Kyber512() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: module `ArchiveTests` should have a snake case name [INFO] [stderr] --> src/tests/mod.rs:6:5 [INFO] [stderr] | [INFO] [stderr] 6 | mod ArchiveTests; [INFO] [stderr] | ^^^^^^^^^^^^ help: convert the identifier to snake case: `archive_tests` [INFO] [stderr] [INFO] [stderr] warning: module `KyberKeyTests` should have a snake case name [INFO] [stderr] --> src/tests/mod.rs:9:5 [INFO] [stderr] | [INFO] [stderr] 9 | mod KyberKeyTests; [INFO] [stderr] | ^^^^^^^^^^^^^ help: convert the identifier to snake case: `kyber_key_tests` [INFO] [stderr] [INFO] [stderr] warning: module `KyberTests` should have a snake case name [INFO] [stderr] --> src/tests/mod.rs:12:5 [INFO] [stderr] | [INFO] [stderr] 12 | mod KyberTests; [INFO] [stderr] | ^^^^^^^^^^ help: convert the identifier to snake case: `kyber_tests` [INFO] [stderr] [INFO] [stderr] warning: module `SignatureTests` should have a snake case name [INFO] [stderr] --> src/tests/mod.rs:15:5 [INFO] [stderr] | [INFO] [stderr] 15 | mod SignatureTests; [INFO] [stderr] | ^^^^^^^^^^^^^^ help: convert the identifier to snake case: `signature_tests` [INFO] [stderr] [INFO] [stderr] warning: module `MacroTests` should have a snake case name [INFO] [stderr] --> src/tests/mod.rs:18:5 [INFO] [stderr] | [INFO] [stderr] 18 | mod MacroTests; [INFO] [stderr] | ^^^^^^^^^^ help: convert the identifier to snake case: `macro_tests` [INFO] [stderr] [INFO] [stderr] warning: call to `.clone()` on a reference in this situation does nothing [INFO] [stderr] --> src/tests/ArchiveTests.rs:91:47 [INFO] [stderr] | [INFO] [stderr] 91 | let extraction_dir = archive_temp_dir_path.clone(); [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: the type `std::path::Path` does not implement `Clone`, so calling `clone` on `&std::path::Path` copies the reference, which does not do anything and can be removed [INFO] [stderr] = note: `#[warn(noop_method_call)]` on by default [INFO] [stderr] help: remove this redundant call [INFO] [stderr] | [INFO] [stderr] 91 - let extraction_dir = archive_temp_dir_path.clone(); [INFO] [stderr] 91 + let extraction_dir = archive_temp_dir_path; [INFO] [stderr] | [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_msg_macro_AES_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:22:4 [INFO] [stderr] | [INFO] [stderr] 22 | fn encrypt_decrypt_msg_macro_AES_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_aes_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_msg_macro_AES_XTS_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:42:4 [INFO] [stderr] | [INFO] [stderr] 42 | fn encrypt_decrypt_msg_macro_AES_XTS_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_aes_xts_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_msg_macro_XChaCha20_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:64:4 [INFO] [stderr] | [INFO] [stderr] 64 | fn encrypt_decrypt_msg_macro_XChaCha20_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_xcha_cha20_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_msg_macro_AES_GCM_SIV_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:85:4 [INFO] [stderr] | [INFO] [stderr] 85 | fn encrypt_decrypt_msg_macro_AES_GCM_SIV_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_aes_gcm_siv_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_AES_GCM_SIV_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:144:4 [INFO] [stderr] | [INFO] [stderr] 144 | fn encrypt_decrypt_AES_GCM_SIV_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_aes_gcm_siv_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_AES_XTS_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:165:4 [INFO] [stderr] | [INFO] [stderr] 165 | fn encrypt_decrypt_AES_XTS_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_aes_xts_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_data_macro_AES_GCM_SIV_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:185:4 [INFO] [stderr] | [INFO] [stderr] 185 | fn encrypt_decrypt_data_macro_AES_GCM_SIV_Kyber1024() -> Result<(), Box> { // Generate key pair [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_aes_gcm_siv_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_msg_AES_XTS_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:231:4 [INFO] [stderr] | [INFO] [stderr] 231 | fn encrypt_decrypt_msg_AES_XTS_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_aes_xts_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_msg_macro_AES_CTR_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:287:4 [INFO] [stderr] | [INFO] [stderr] 287 | fn encrypt_decrypt_msg_macro_AES_CTR_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_aes_ctr_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_AES_CTR_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:346:4 [INFO] [stderr] | [INFO] [stderr] 346 | fn encrypt_decrypt_AES_CTR_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_aes_ctr_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_data_macro_AES_CTR_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:366:4 [INFO] [stderr] | [INFO] [stderr] 366 | fn encrypt_decrypt_data_macro_AES_CTR_Kyber1024() -> Result<(), Box> { // Generate key pair [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_aes_ctr_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_msg_macro_XChaCha20Poly1305_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:390:4 [INFO] [stderr] | [INFO] [stderr] 390 | fn encrypt_decrypt_msg_macro_XChaCha20Poly1305_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_xcha_cha20_poly1305_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_data_macro_XChaCha20Poly1305_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:450:4 [INFO] [stderr] | [INFO] [stderr] 450 | fn encrypt_decrypt_data_macro_XChaCha20Poly1305_Kyber1024() -> Result<(), Box> { // Generate key pair [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_xcha_cha20_poly1305_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_XChaCha20Poly1305_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:474:4 [INFO] [stderr] | [INFO] [stderr] 474 | fn encrypt_decrypt_XChaCha20Poly1305_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_xcha_cha20_poly1305_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_data_macro_AES_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:494:4 [INFO] [stderr] | [INFO] [stderr] 494 | fn encrypt_decrypt_data_macro_AES_Kyber1024() -> Result<(), Box> { // Generate key pair [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_aes_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_decrypt_file_macro_AES_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:518:4 [INFO] [stderr] | [INFO] [stderr] 518 | fn encrypt_decrypt_file_macro_AES_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_file_macro_aes_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/tests/KyberTests.rs:537:5 [INFO] [stderr] | [INFO] [stderr] 537 | fs::remove_file(enc_path.clone()); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] help: use `let _ = ...` to ignore the resulting value [INFO] [stderr] | [INFO] [stderr] 537 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stderr] | +++++++ [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_message_AES_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:557:4 [INFO] [stderr] | [INFO] [stderr] 557 | fn encrypt_message_AES_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_data_AES_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:586:4 [INFO] [stderr] | [INFO] [stderr] 586 | fn encrypt_data_AES_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_data_aes_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_message_AES_Kyber768` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:613:4 [INFO] [stderr] | [INFO] [stderr] 613 | fn encrypt_message_AES_Kyber768() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber768` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_message_AES_Kyber512` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:641:4 [INFO] [stderr] | [INFO] [stderr] 641 | fn encrypt_message_AES_Kyber512() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber512` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_file_AES_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:670:4 [INFO] [stderr] | [INFO] [stderr] 670 | fn encrypt_file_AES_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/tests/KyberTests.rs:692:5 [INFO] [stderr] | [INFO] [stderr] 692 | fs::remove_file(enc_path.clone()); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] help: use `let _ = ...` to ignore the resulting value [INFO] [stderr] | [INFO] [stderr] 692 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stderr] | +++++++ [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_file_AES_Kyber768` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:714:4 [INFO] [stderr] | [INFO] [stderr] 714 | fn encrypt_file_AES_Kyber768() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber768` [INFO] [stderr] [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/tests/KyberTests.rs:736:5 [INFO] [stderr] | [INFO] [stderr] 736 | fs::remove_file(enc_path.clone()); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] help: use `let _ = ...` to ignore the resulting value [INFO] [stderr] | [INFO] [stderr] 736 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stderr] | +++++++ [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_file_AES_Kyber512` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:759:4 [INFO] [stderr] | [INFO] [stderr] 759 | fn encrypt_file_AES_Kyber512() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber512` [INFO] [stderr] [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/tests/KyberTests.rs:781:5 [INFO] [stderr] | [INFO] [stderr] 781 | fs::remove_file(enc_path.clone()); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] help: use `let _ = ...` to ignore the resulting value [INFO] [stderr] | [INFO] [stderr] 781 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stderr] | +++++++ [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_message_XChaCha20_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:803:4 [INFO] [stderr] | [INFO] [stderr] 803 | fn encrypt_message_XChaCha20_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_message_XChaCha20_Kyber768` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:831:4 [INFO] [stderr] | [INFO] [stderr] 831 | fn encrypt_message_XChaCha20_Kyber768() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber768` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_message_XChaCha20_Kyber512` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:859:4 [INFO] [stderr] | [INFO] [stderr] 859 | fn encrypt_message_XChaCha20_Kyber512() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber512` [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_file_XChaCha20_Kyber1024` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:887:4 [INFO] [stderr] | [INFO] [stderr] 887 | fn encrypt_file_XChaCha20_Kyber1024() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber1024` [INFO] [stderr] [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/tests/KyberTests.rs:911:5 [INFO] [stderr] | [INFO] [stderr] 911 | fs::remove_file(enc_path.clone()); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] help: use `let _ = ...` to ignore the resulting value [INFO] [stderr] | [INFO] [stderr] 911 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stderr] | +++++++ [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_file_XChaCha20_Kyber768` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:933:4 [INFO] [stderr] | [INFO] [stderr] 933 | fn encrypt_file_XChaCha20_Kyber768() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber768` [INFO] [stderr] [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/tests/KyberTests.rs:957:5 [INFO] [stderr] | [INFO] [stderr] 957 | fs::remove_file(enc_path.clone()); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] help: use `let _ = ...` to ignore the resulting value [INFO] [stderr] | [INFO] [stderr] 957 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stderr] | +++++++ [INFO] [stderr] [INFO] [stderr] warning: function `encrypt_file_XChaCha20_Kyber512` should have a snake case name [INFO] [stderr] --> src/tests/KyberTests.rs:979:4 [INFO] [stderr] | [INFO] [stderr] 979 | fn encrypt_file_XChaCha20_Kyber512() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber512` [INFO] [stderr] [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/tests/KyberTests.rs:1003:5 [INFO] [stderr] | [INFO] [stderr] 1003 | fs::remove_file(enc_path.clone()); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] help: use `let _ = ...` to ignore the resulting value [INFO] [stderr] | [INFO] [stderr] 1003 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stderr] | +++++++ [INFO] [stderr] [INFO] [stderr] warning: function `test_save_Falcon1024_keys` should have a snake case name [INFO] [stderr] --> src/tests/SignatureTests.rs:50:4 [INFO] [stderr] | [INFO] [stderr] 50 | fn test_save_Falcon1024_keys() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `test_save_falcon1024_keys` [INFO] [stderr] [INFO] [stderr] warning: function `test_save_Falcon512_keys` should have a snake case name [INFO] [stderr] --> src/tests/SignatureTests.rs:73:4 [INFO] [stderr] | [INFO] [stderr] 73 | fn test_save_Falcon512_keys() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `test_save_falcon512_keys` [INFO] [stderr] [INFO] [stderr] warning: function `test_save_Dilithium2_keys` should have a snake case name [INFO] [stderr] --> src/tests/SignatureTests.rs:97:4 [INFO] [stderr] | [INFO] [stderr] 97 | fn test_save_Dilithium2_keys() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium2_keys` [INFO] [stderr] [INFO] [stderr] warning: function `test_save_Dilithium3_keys` should have a snake case name [INFO] [stderr] --> src/tests/SignatureTests.rs:120:4 [INFO] [stderr] | [INFO] [stderr] 120 | fn test_save_Dilithium3_keys() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium3_keys` [INFO] [stderr] [INFO] [stderr] warning: function `test_save_Dilithium5_keys` should have a snake case name [INFO] [stderr] --> src/tests/SignatureTests.rs:143:4 [INFO] [stderr] | [INFO] [stderr] 143 | fn test_save_Dilithium5_keys() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium5_keys` [INFO] [stderr] [INFO] [stderr] warning: function `SignEncrypt` should have a snake case name [INFO] [stderr] --> src/tests/MacroTests.rs:95:4 [INFO] [stderr] | [INFO] [stderr] 95 | fn SignEncrypt() { [INFO] [stderr] | ^^^^^^^^^^^ help: convert the identifier to snake case: `sign_encrypt` [INFO] [stderr] [INFO] [stderr] warning: function `SignEncrypt_DecryptOpen` should have a snake case name [INFO] [stderr] --> src/tests/MacroTests.rs:107:4 [INFO] [stderr] | [INFO] [stderr] 107 | fn SignEncrypt_DecryptOpen() { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `sign_encrypt_decrypt_open` [INFO] [stderr] [INFO] [stderr] warning: `crypt_guard` (lib) generated 66 warnings (run `cargo fix --lib -p crypt_guard` to apply 16 suggestions) [INFO] [stderr] warning: `crypt_guard` (lib test) generated 132 warnings (66 duplicates) (run `cargo fix --lib -p crypt_guard --tests` to apply 3 suggestions) [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 0.14s [INFO] [stderr] Running unittests src/lib.rs (/opt/rustwide/target/debug/deps/crypt_guard-e19906143ba90c64) [INFO] [stdout] [INFO] [stdout] running 77 tests [INFO] [stdout] test tests::KyberKeyTests::begin ... ok [INFO] [stdout] test tests::ArchiveTests::test_archive_macro_without_delete ... ok [INFO] [stdout] test tests::KyberKeyTests::encap_decap_kyber768 ... ok [INFO] [stdout] test tests::ArchiveTests::test_archive_and_extract_with_delete_dir ... ok [INFO] [stdout] test tests::KyberKeyTests::encap_decap_kyber1024 ... ok [INFO] [stdout] test tests::KyberKeyTests::key_control_functionality ... ok [INFO] [stdout] test tests::ArchiveTests::test_archive_and_extract ... ok [INFO] [stdout] test tests::KyberKeyTests::encap_decap_kyber512 ... ok [INFO] [stdout] test tests::ArchiveTests::test_archive_util_archive_without_deletion ... ok [INFO] [stdout] test tests::ArchiveTests::test_archive_util_extract_with_deletion ... ok [INFO] [stdout] test tests::ArchiveTests::test_archive_util_extract_without_deletion ... ok [INFO] [stdout] test tests::KyberKeyTests::keypair_generation_kyber768 ... ok [INFO] [stdout] test tests::ArchiveTests::test_extract_macro_with_delete ... ok [INFO] [stdout] test tests::KyberKeyTests::keypair_generation_kyber512 ... ok [INFO] [stdout] test tests::KyberKeyTests::keypair_generation_kyber1024 ... ok [INFO] [stdout] test tests::ArchiveTests::test_archive_util_archive_with_deletion ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_AES_GCM_SIV_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_XChaCha20Poly1305_Kyber1024 ... ok [INFO] [stdout] test tests::ArchiveTests::test_archive_subdirectory ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_AES_XTS_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_file_macro_AES_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_msg_macro_AES_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_data_macro_AES_GCM_SIV_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_AES_CTR_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_msg_macro_AES_GCM_SIV_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_data_macro_AES_CTR_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_data_macro_XChaCha20Poly1305_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_msg_AES_XTS_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_msg_macro_AES_CTR_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_data_AES_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_msg_macro_XChaCha20_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_msg_macro_XChaCha20Poly1305_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_msg_macro_AES_XTS_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_file_XChaCha20_Kyber512 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_file_AES_Kyber512 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_decrypt_data_macro_AES_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_file_AES_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_file_XChaCha20_Kyber1024 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_message_XChaCha20_Kyber512 ... ok [INFO] [stdout] test tests::MacroTests::test_concat_and_split_key ... ok [INFO] [stdout] test tests::MacroTests::test_dilithium_keypair_3 ... ok [INFO] [stdout] test tests::MacroTests::test_dilithium_keypair_5 ... ok [INFO] [stdout] test tests::KyberKeyTests::test_key ... FAILED [INFO] [stdout] test tests::KyberTests::encrypt_message_AES_Kyber768 ... ok [INFO] [stdout] test tests::KyberKeyTests::test_key_control_safe_functionality ... FAILED [INFO] [stdout] test tests::KyberTests::encrypt_file_AES_Kyber768 ... ok [INFO] [stdout] test tests::MacroTests::test_kyber_keypair_1024 ... ok [INFO] [stdout] test tests::MacroTests::test_dilithium_keypair_2 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_file_XChaCha20_Kyber768 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_message_XChaCha20_Kyber1024 ... ok [INFO] [stdout] test tests::MacroTests::test_kyber_keypair_512 ... ok [INFO] [stdout] test tests::KyberTests::encrypt_message_XChaCha20_Kyber768 ... ok [INFO] [stdout] test tests::MacroTests::test_kyber_keypair_768 ... ok [INFO] [stdout] test tests::SignatureTests::end2 ... ok [INFO] [stdout] test tests::SignatureTests::test_dilithium3_detached_signature ... ok [INFO] [stdout] test tests::SignatureTests::test_dilithium2_detached_signature ... ok [INFO] [stdout] test tests::KyberTests::encrypt_message_AES_Kyber1024 ... ok [INFO] [stdout] test tests::SignatureTests::test_dilithium2_signature_message ... ok [INFO] [stdout] test tests::SignatureTests::test_save_Dilithium3_keys ... FAILED [INFO] [stdout] test tests::SignatureTests::test_dilithium5_detached_signature ... ok [INFO] [stdout] test tests::SignatureTests::test_save_Dilithium2_keys ... FAILED [INFO] [stdout] test tests::ze_end::end ... ok [INFO] [stdout] test tests::SignatureTests::test_save_Dilithium5_keys ... FAILED [INFO] [stdout] test tests::SignatureTests::test_dilithium5_signature_message ... ok [INFO] [stdout] test tests::SignatureTests::test_dilithium3_signature_message ... ok [INFO] [stdout] test tests::MacroTests::test_falcon_keypair_512 ... ok [INFO] [stdout] test tests::SignatureTests::test_falcon512_detached_signature ... ok [INFO] [stdout] test tests::SignatureTests::test_save_Falcon1024_keys ... FAILED [INFO] [stdout] test tests::SignatureTests::test_save_Falcon512_keys ... FAILED [INFO] [stdout] test tests::SignatureTests::test_falcon512_signature_message ... ok [INFO] [stdout] test tests::SignatureTests::test_falcon1024_detached_signature ... ok [INFO] [stdout] test tests::SignatureTests::test_falcon1024_signature_message ... ok [INFO] [stdout] test tests::SignatureTests::test_falcon1024_signature_message_macro ... ok [INFO] [stdout] test tests::MacroTests::test_falcon_keypair_1024 ... ok [INFO] [stdout] test tests::SignatureTests::test_falcon1024_signature_detached_macro ... ok [INFO] [stdout] test tests::MacroTests::SignEncrypt ... ok [INFO] [stdout] test tests::MacroTests::SignEncrypt_DecryptOpen ... ok [INFO] [stdout] [INFO] [stdout] failures: [INFO] [stdout] [INFO] [stdout] ---- tests::KyberKeyTests::test_key stdout ---- [INFO] [stdout] thread 'tests::KyberKeyTests::test_key' panicked at src/Core/kyber/KeyControler.rs:256:23: [INFO] [stdout] called `Result::unwrap()` on an `Err` value: IOError(Os { code: 2, kind: NotFound, message: "No such file or directory" }) [INFO] [stdout] stack backtrace: [INFO] [stdout] 0: 0x55a0a7d9564a - std::backtrace_rs::backtrace::libunwind::trace::hfe0e1def394da018 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/../../backtrace/src/backtrace/libunwind.rs:116:5 [INFO] [stdout] 1: 0x55a0a7d9564a - std::backtrace_rs::backtrace::trace_unsynchronized::h96fbb6d117554616 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/../../backtrace/src/backtrace/mod.rs:66:5 [INFO] [stdout] 2: 0x55a0a7d9564a - std::sys::backtrace::_print_fmt::he1169c6f8956325b [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/sys/backtrace.rs:66:9 [INFO] [stdout] 3: 0x55a0a7d9564a - ::fmt::ha4a311b32f6b4ad8 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/sys/backtrace.rs:39:26 [INFO] [stdout] 4: 0x55a0a7dbca63 - core::fmt::rt::Argument::fmt::h8ccd2627d2418ed3 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/fmt/rt.rs:177:76 [INFO] [stdout] 5: 0x55a0a7dbca63 - core::fmt::write::h1866771663f62b81 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/fmt/mod.rs:1189:21 [INFO] [stdout] 6: 0x55a0a7d91ed3 - std::io::Write::write_fmt::h2df399c9fb8c6039 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/io/mod.rs:1884:15 [INFO] [stdout] 7: 0x55a0a7d95492 - std::sys::backtrace::BacktraceLock::print::hddd3a9918ce29aa7 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/sys/backtrace.rs:42:9 [INFO] [stdout] 8: 0x55a0a7d96acd - std::panicking::default_hook::{{closure}}::h791f75256b902d7d [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:268:22 [INFO] [stdout] 9: 0x55a0a7d968d7 - std::panicking::default_hook::h82cc572fcb0d8cd7 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:292:9 [INFO] [stdout] 10: 0x55a0a7b5b7f7 - as core::ops::function::Fn>::call::h47f4385e5c05a6bc [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/alloc/src/boxed.rs:1986:9 [INFO] [stdout] 11: 0x55a0a7b5b7f7 - test::test_main::{{closure}}::h592b6187ee9bbe51 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/test/src/lib.rs:134:21 [INFO] [stdout] 12: 0x55a0a7d97178 - as core::ops::function::Fn>::call::h80408f032954f187 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/alloc/src/boxed.rs:1986:9 [INFO] [stdout] 13: 0x55a0a7d97178 - std::panicking::rust_panic_with_hook::he21644cc2707f2c4 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:809:13 [INFO] [stdout] 14: 0x55a0a7d96f3a - std::panicking::begin_panic_handler::{{closure}}::h42f7c414fed3cad9 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:674:13 [INFO] [stdout] 15: 0x55a0a7d95b29 - std::sys::backtrace::__rust_end_short_backtrace::ha26cf5766b4e8c65 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/sys/backtrace.rs:170:18 [INFO] [stdout] 16: 0x55a0a7d96bcc - rust_begin_unwind [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:665:5 [INFO] [stdout] 17: 0x55a0a7a392e0 - core::panicking::panic_fmt::h74866b78e934b1c0 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/panicking.rs:76:14 [INFO] [stdout] 18: 0x55a0a7a39726 - core::result::unwrap_failed::h899ed7ab2ccb8159 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/result.rs:1699:5 [INFO] [stdout] 19: 0x55a0a7adc687 - core::result::Result::unwrap::hff2a6f5a7c2d8c9f [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/result.rs:1104:23 [INFO] [stdout] 20: 0x55a0a7adc687 - crypt_guard::Core::kyber::KeyControler::KeyControl::load::hc4c6bfb6c0ff885d [INFO] [stdout] at /opt/rustwide/workdir/src/Core/kyber/KeyControler.rs:256:6 [INFO] [stdout] 21: 0x55a0a7af24af - crypt_guard::tests::KyberKeyTests::test_key::hfcfdc92580a95794 [INFO] [stdout] at /opt/rustwide/workdir/src/tests/KyberKeyTests.rs:157:23 [INFO] [stdout] 22: 0x55a0a7af20d7 - crypt_guard::tests::KyberKeyTests::test_key::{{closure}}::h444476fecd5ecb25 [INFO] [stdout] at /opt/rustwide/workdir/src/tests/KyberKeyTests.rs:137:14 [INFO] [stdout] 23: 0x55a0a7b0f926 - core::ops::function::FnOnce::call_once::h2103174315cac228 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/ops/function.rs:250:5 [INFO] [stdout] 24: 0x55a0a7b603ab - core::ops::function::FnOnce::call_once::h2f54be8ccda9ff77 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/ops/function.rs:250:5 [INFO] [stdout] 25: 0x55a0a7b603ab - test::__rust_begin_short_backtrace::h505f4667df5bf10c [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/test/src/lib.rs:632:18 [INFO] [stdout] 26: 0x55a0a7b5fd08 - test::run_test_in_process::{{closure}}::h5ed3028e6069c117 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/test/src/lib.rs:655:60 [INFO] [stdout] 27: 0x55a0a7b5fd08 - as core::ops::function::FnOnce<()>>::call_once::hbf705be6aea7c287 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/panic/unwind_safe.rs:272:9 [INFO] [stdout] 28: 0x55a0a7b5fd08 - std::panicking::try::do_call::h555223a41631f02b [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:557:40 [INFO] [stdout] 29: 0x55a0a7b5fd08 - std::panicking::try::he81e496d432108c4 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:520:19 [INFO] [stdout] 30: 0x55a0a7b5fd08 - std::panic::catch_unwind::hb2ff356e76867b52 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panic.rs:358:14 [INFO] [stdout] 31: 0x55a0a7b5fd08 - test::run_test_in_process::h665bcd2e01d69f5b [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/test/src/lib.rs:655:27 [INFO] [stdout] 32: 0x55a0a7b5fd08 - test::run_test::{{closure}}::ha58fbc9c79c6786d [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/test/src/lib.rs:576:43 [INFO] [stdout] 33: 0x55a0a7b237aa - test::run_test::{{closure}}::h958602d5fcb1d647 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/test/src/lib.rs:606:41 [INFO] [stdout] 34: 0x55a0a7b237aa - std::sys::backtrace::__rust_begin_short_backtrace::h7ca2fb16f64faa0f [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/sys/backtrace.rs:154:18 [INFO] [stdout] 35: 0x55a0a7b27064 - std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}}::hebe77fbe87ddae61 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/thread/mod.rs:561:17 [INFO] [stdout] 36: 0x55a0a7b27064 - as core::ops::function::FnOnce<()>>::call_once::h5e26d6a69f85d1d6 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/panic/unwind_safe.rs:272:9 [INFO] [stdout] 37: 0x55a0a7b27064 - std::panicking::try::do_call::h9787fac579f00884 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:557:40 [INFO] [stdout] 38: 0x55a0a7b27064 - std::panicking::try::h788012b555fbd7c5 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:520:19 [INFO] [stdout] 39: 0x55a0a7b27064 - std::panic::catch_unwind::hd194f26f99a98fb5 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panic.rs:358:14 [INFO] [stdout] 40: 0x55a0a7b27064 - std::thread::Builder::spawn_unchecked_::{{closure}}::h31c0dcba34ed449c [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/thread/mod.rs:559:30 [INFO] [stdout] 41: 0x55a0a7b27064 - core::ops::function::FnOnce::call_once{{vtable.shim}}::h60302d9c688101a6 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/ops/function.rs:250:5 [INFO] [stdout] 42: 0x55a0a7d9c57b - as core::ops::function::FnOnce>::call_once::h9578f6ea1d4e1c4b [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/alloc/src/boxed.rs:1972:9 [INFO] [stdout] 43: 0x55a0a7d9c57b - as core::ops::function::FnOnce>::call_once::hf4a2f438d8019348 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/alloc/src/boxed.rs:1972:9 [INFO] [stdout] 44: 0x55a0a7d9c57b - std::sys::pal::unix::thread::Thread::new::thread_start::h14f1eb868ff90fc9 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/sys/pal/unix/thread.rs:105:17 [INFO] [stdout] 45: 0x72df08286ac3 - [INFO] [stdout] 46: 0x72df08317a04 - clone [INFO] [stdout] 47: 0x0 - [INFO] [stdout] [INFO] [stdout] ---- tests::KyberKeyTests::test_key_control_safe_functionality stdout ---- [INFO] [stdout] thread 'tests::KyberKeyTests::test_key_control_safe_functionality' panicked at src/tests/KyberKeyTests.rs:111:59: [INFO] [stdout] called `Result::unwrap()` on an `Err` value: WriteError [INFO] [stdout] stack backtrace: [INFO] [stdout] 0: 0x55a0a7d9564a - std::backtrace_rs::backtrace::libunwind::trace::hfe0e1def394da018 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/../../backtrace/src/backtrace/libunwind.rs:116:5 [INFO] [stdout] 1: 0x55a0a7d9564a - std::backtrace_rs::backtrace::trace_unsynchronized::h96fbb6d117554616 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/../../backtrace/src/backtrace/mod.rs:66:5 [INFO] [stdout] 2: 0x55a0a7d9564a - std::sys::backtrace::_print_fmt::he1169c6f8956325b [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/sys/backtrace.rs:66:9 [INFO] [stdout] 3: 0x55a0a7d9564a - ::fmt::ha4a311b32f6b4ad8 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/sys/backtrace.rs:39:26 [INFO] [stdout] 4: 0x55a0a7dbca63 - core::fmt::rt::Argument::fmt::h8ccd2627d2418ed3 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/fmt/rt.rs:177:76 [INFO] [stdout] 5: 0x55a0a7dbca63 - core::fmt::write::h1866771663f62b81 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/fmt/mod.rs:1189:21 [INFO] [stdout] 6: 0x55a0a7d91ed3 - std::io::Write::write_fmt::h2df399c9fb8c6039 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/io/mod.rs:1884:15 [INFO] [stdout] 7: 0x55a0a7d95492 - std::sys::backtrace::BacktraceLock::print::hddd3a9918ce29aa7 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/sys/backtrace.rs:42:9 [INFO] [stdout] 8: 0x55a0a7d96acd - std::panicking::default_hook::{{closure}}::h791f75256b902d7d [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:268:22 [INFO] [stdout] 9: 0x55a0a7d968d7 - std::panicking::default_hook::h82cc572fcb0d8cd7 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:292:9 [INFO] [stdout] 10: 0x55a0a7b5b7f7 - as core::ops::function::Fn>::call::h47f4385e5c05a6bc [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/alloc/src/boxed.rs:1986:9 [INFO] [stdout] 11: 0x55a0a7b5b7f7 - test::test_main::{{closure}}::h592b6187ee9bbe51 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/test/src/lib.rs:134:21 [INFO] [stdout] 12: 0x55a0a7d97178 - as core::ops::function::Fn>::call::h80408f032954f187 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/alloc/src/boxed.rs:1986:9 [INFO] [stdout] 13: 0x55a0a7d97178 - std::panicking::rust_panic_with_hook::he21644cc2707f2c4 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:809:13 [INFO] [stdout] 14: 0x55a0a7d96f3a - std::panicking::begin_panic_handler::{{closure}}::h42f7c414fed3cad9 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:674:13 [INFO] [stdout] 15: 0x55a0a7d95b29 - std::sys::backtrace::__rust_end_short_backtrace::ha26cf5766b4e8c65 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/sys/backtrace.rs:170:18 [INFO] [stdout] 16: 0x55a0a7d96bcc - rust_begin_unwind [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:665:5 [INFO] [stdout] 17: 0x55a0a7a392e0 - core::panicking::panic_fmt::h74866b78e934b1c0 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/panicking.rs:76:14 [INFO] [stdout] 18: 0x55a0a7a39726 - core::result::unwrap_failed::h899ed7ab2ccb8159 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/result.rs:1699:5 [INFO] [stdout] 19: 0x55a0a7af0edb - core::result::Result::unwrap::hd0c24e9f03ec0783 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/result.rs:1104:23 [INFO] [stdout] 20: 0x55a0a7af0edb - crypt_guard::tests::KyberKeyTests::test_key_control_safe_functionality::h379f1bf57993b6ef [INFO] [stdout] at /opt/rustwide/workdir/src/tests/KyberKeyTests.rs:111:5 [INFO] [stdout] 21: 0x55a0a7af08f7 - crypt_guard::tests::KyberKeyTests::test_key_control_safe_functionality::{{closure}}::hd189c337a51a6bda [INFO] [stdout] at /opt/rustwide/workdir/src/tests/KyberKeyTests.rs:100:45 [INFO] [stdout] 22: 0x55a0a7b0fc66 - core::ops::function::FnOnce::call_once::h4b1b2c426336472b [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/ops/function.rs:250:5 [INFO] [stdout] 23: 0x55a0a7b603ab - core::ops::function::FnOnce::call_once::h2f54be8ccda9ff77 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/ops/function.rs:250:5 [INFO] [stdout] 24: 0x55a0a7b603ab - test::__rust_begin_short_backtrace::h505f4667df5bf10c [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/test/src/lib.rs:632:18 [INFO] [stdout] 25: 0x55a0a7b5fd08 - test::run_test_in_process::{{closure}}::h5ed3028e6069c117 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/test/src/lib.rs:655:60 [INFO] [stdout] 26: 0x55a0a7b5fd08 - as core::ops::function::FnOnce<()>>::call_once::hbf705be6aea7c287 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/panic/unwind_safe.rs:272:9 [INFO] [stdout] 27: 0x55a0a7b5fd08 - std::panicking::try::do_call::h555223a41631f02b [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:557:40 [INFO] [stdout] 28: 0x55a0a7b5fd08 - std::panicking::try::he81e496d432108c4 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:520:19 [INFO] [stdout] 29: 0x55a0a7b5fd08 - std::panic::catch_unwind::hb2ff356e76867b52 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panic.rs:358:14 [INFO] [stdout] 30: 0x55a0a7b5fd08 - test::run_test_in_process::h665bcd2e01d69f5b [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/test/src/lib.rs:655:27 [INFO] [stdout] 31: 0x55a0a7b5fd08 - test::run_test::{{closure}}::ha58fbc9c79c6786d [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/test/src/lib.rs:576:43 [INFO] [stdout] 32: 0x55a0a7b237aa - test::run_test::{{closure}}::h958602d5fcb1d647 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/test/src/lib.rs:606:41 [INFO] [stdout] 33: 0x55a0a7b237aa - std::sys::backtrace::__rust_begin_short_backtrace::h7ca2fb16f64faa0f [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/sys/backtrace.rs:154:18 [INFO] [stdout] 34: 0x55a0a7b27064 - std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}}::hebe77fbe87ddae61 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/thread/mod.rs:561:17 [INFO] [stdout] 35: 0x55a0a7b27064 - as core::ops::function::FnOnce<()>>::call_once::h5e26d6a69f85d1d6 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/panic/unwind_safe.rs:272:9 [INFO] [stdout] 36: 0x55a0a7b27064 - std::panicking::try::do_call::h9787fac579f00884 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:557:40 [INFO] [stdout] 37: 0x55a0a7b27064 - std::panicking::try::h788012b555fbd7c5 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panicking.rs:520:19 [INFO] [stdout] 38: 0x55a0a7b27064 - std::panic::catch_unwind::hd194f26f99a98fb5 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/panic.rs:358:14 [INFO] [stdout] 39: 0x55a0a7b27064 - std::thread::Builder::spawn_unchecked_::{{closure}}::h31c0dcba34ed449c [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/thread/mod.rs:559:30 [INFO] [stdout] 40: 0x55a0a7b27064 - core::ops::function::FnOnce::call_once{{vtable.shim}}::h60302d9c688101a6 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/core/src/ops/function.rs:250:5 [INFO] [stdout] 41: 0x55a0a7d9c57b - as core::ops::function::FnOnce>::call_once::h9578f6ea1d4e1c4b [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/alloc/src/boxed.rs:1972:9 [INFO] [stdout] 42: 0x55a0a7d9c57b - as core::ops::function::FnOnce>::call_once::hf4a2f438d8019348 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/alloc/src/boxed.rs:1972:9 [INFO] [stdout] 43: 0x55a0a7d9c57b - std::sys::pal::unix::thread::Thread::new::thread_start::h14f1eb868ff90fc9 [INFO] [stdout] at /rustc/9fc6b43126469e3858e2fe86cafb4f0fd5068869/library/std/src/sys/pal/unix/thread.rs:105:17 [INFO] [stdout] 44: 0x72df08286ac3 - [INFO] [stdout] 45: 0x72df08317a04 - clone [INFO] [stdout] 46: 0x0 - [INFO] [stdout] [INFO] [stdout] ---- tests::SignatureTests::test_save_Dilithium3_keys stdout ---- [INFO] [stdout] Error: UnsupportedFileType("pub") [INFO] [stdout] [INFO] [stdout] ---- tests::SignatureTests::test_save_Dilithium2_keys stdout ---- [INFO] [stdout] Error: UnsupportedFileType("pub") [INFO] [stdout] [INFO] [stdout] ---- tests::SignatureTests::test_save_Dilithium5_keys stdout ---- [INFO] [stdout] Error: UnsupportedFileType("pub") [INFO] [stdout] [INFO] [stdout] ---- tests::SignatureTests::test_save_Falcon1024_keys stdout ---- [INFO] [stdout] Error: UnsupportedFileType("pub") [INFO] [stdout] [INFO] [stdout] ---- tests::SignatureTests::test_save_Falcon512_keys stdout ---- [INFO] [stdout] Error: UnsupportedFileType("pub") [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] failures: [INFO] [stdout] tests::KyberKeyTests::test_key [INFO] [stdout] tests::KyberKeyTests::test_key_control_safe_functionality [INFO] [stdout] tests::SignatureTests::test_save_Dilithium2_keys [INFO] [stdout] tests::SignatureTests::test_save_Dilithium3_keys [INFO] [stdout] tests::SignatureTests::test_save_Dilithium5_keys [INFO] [stdout] tests::SignatureTests::test_save_Falcon1024_keys [INFO] [stdout] tests::SignatureTests::test_save_Falcon512_keys [INFO] [stdout] [INFO] [stdout] test result: FAILED. 70 passed; 7 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.45s [INFO] [stdout] [INFO] [stderr] error: test failed, to rerun pass `--lib` [INFO] running `Command { std: "docker" "inspect" "3a8c1c0515c97d043d80f2608f57c686b8cb24b50264676c9b8347ea0d61585a", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "3a8c1c0515c97d043d80f2608f57c686b8cb24b50264676c9b8347ea0d61585a", kill_on_drop: false }` [INFO] [stdout] 3a8c1c0515c97d043d80f2608f57c686b8cb24b50264676c9b8347ea0d61585a