[INFO] fetching crate crypt_guard 1.2.9...
[INFO] testing crypt_guard-1.2.9 against master#1871252fc8bb672d40787e67404e6eaae7059369 for pr-125151
[INFO] extracting crate crypt_guard 1.2.9 into /workspace/builds/worker-7-tc1/source
[INFO] validating manifest of crates.io crate crypt_guard 1.2.9 on toolchain 1871252fc8bb672d40787e67404e6eaae7059369
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+1871252fc8bb672d40787e67404e6eaae7059369" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking crates.io crate crypt_guard 1.2.9
[INFO] finished tweaking crates.io crate crypt_guard 1.2.9
[INFO] tweaked toml for crates.io crate crypt_guard 1.2.9 written to /workspace/builds/worker-7-tc1/source/Cargo.toml
[INFO] crate crates.io crate crypt_guard 1.2.9 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+1871252fc8bb672d40787e67404e6eaae7059369" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded env v0.0.0
[INFO] [stderr]   Downloaded crypt_guard_proc v0.1.0
[INFO] [stderr]   Downloaded pqcrypto-internals v0.2.5
[INFO] [stderr]   Downloaded pqcrypto-traits v0.3.5
[INFO] [stderr]   Downloaded pqcrypto-dilithium v0.5.0
[INFO] [stderr]   Downloaded pqcrypto-falcon v0.3.0
[INFO] [stderr]   Downloaded pqcrypto-kyber v0.8.1
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:59a85a07ab18ca8720692f8e61effa1c651d9e2ca591e072c2b212bb91a6b8b5" "/opt/rustwide/cargo-home/bin/cargo" "+1871252fc8bb672d40787e67404e6eaae7059369" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 7b701b13325be665f18f4b7fcc40bcc1a37d099092689e7b707340b266ae7625
[INFO] running `Command { std: "docker" "start" "-a" "7b701b13325be665f18f4b7fcc40bcc1a37d099092689e7b707340b266ae7625", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "7b701b13325be665f18f4b7fcc40bcc1a37d099092689e7b707340b266ae7625", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "7b701b13325be665f18f4b7fcc40bcc1a37d099092689e7b707340b266ae7625", kill_on_drop: false }`
[INFO] [stdout] 7b701b13325be665f18f4b7fcc40bcc1a37d099092689e7b707340b266ae7625
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:59a85a07ab18ca8720692f8e61effa1c651d9e2ca591e072c2b212bb91a6b8b5" "/opt/rustwide/cargo-home/bin/cargo" "+1871252fc8bb672d40787e67404e6eaae7059369" "build" "--frozen" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 8e0bc20b9b8ec42b6e4ab04508b0ac6b546e8c025015ad08abe11e523febf926
[INFO] running `Command { std: "docker" "start" "-a" "8e0bc20b9b8ec42b6e4ab04508b0ac6b546e8c025015ad08abe11e523febf926", kill_on_drop: false }`
[INFO] [stderr]    Compiling libc v0.2.154
[INFO] [stderr]    Compiling once_cell v1.19.0
[INFO] [stderr]    Compiling version_check v0.9.4
[INFO] [stderr]    Compiling typenum v1.17.0
[INFO] [stderr]    Compiling cfg-if v1.0.0
[INFO] [stderr]    Compiling dunce v1.0.4
[INFO] [stderr]    Compiling glob v0.3.1
[INFO] [stderr]    Compiling proc-macro2 v1.0.81
[INFO] [stderr]    Compiling autocfg v1.2.0
[INFO] [stderr]    Compiling unicode-ident v1.0.12
[INFO] [stderr]    Compiling cpufeatures v0.2.12
[INFO] [stderr]    Compiling subtle v2.5.0
[INFO] [stderr]    Compiling pqcrypto-traits v0.3.5
[INFO] [stderr]    Compiling ppv-lite86 v0.2.17
[INFO] [stderr]    Compiling iana-time-zone v0.1.60
[INFO] [stderr]    Compiling hex v0.4.3
[INFO] [stderr]    Compiling lazy_static v1.4.0
[INFO] [stderr]    Compiling env v0.0.0
[INFO] [stderr]    Compiling generic-array v0.14.7
[INFO] [stderr]    Compiling num-traits v0.2.18
[INFO] [stderr]    Compiling quote v1.0.36
[INFO] [stderr]    Compiling syn v2.0.60
[INFO] [stderr]    Compiling jobserver v0.1.31
[INFO] [stderr]    Compiling getrandom v0.2.14
[INFO] [stderr]    Compiling rand_core v0.6.4
[INFO] [stderr]    Compiling cc v1.0.96
[INFO] [stderr]    Compiling rand_chacha v0.3.1
[INFO] [stderr]    Compiling rand v0.8.5
[INFO] [stderr]    Compiling chrono v0.4.38
[INFO] [stderr]    Compiling crypto-common v0.1.6
[INFO] [stderr]    Compiling block-buffer v0.10.4
[INFO] [stderr]    Compiling inout v0.1.3
[INFO] [stderr]    Compiling digest v0.10.7
[INFO] [stderr]    Compiling cipher v0.4.4
[INFO] [stderr]    Compiling hmac v0.12.1
[INFO] [stderr]    Compiling sha2 v0.10.8
[INFO] [stderr]    Compiling aes v0.8.4
[INFO] [stderr]    Compiling chacha20 v0.9.1
[INFO] [stderr]    Compiling pqcrypto-internals v0.2.5
[INFO] [stderr]    Compiling pqcrypto-kyber v0.8.1
[INFO] [stderr]    Compiling pqcrypto-dilithium v0.5.0
[INFO] [stderr]    Compiling pqcrypto-falcon v0.3.0
[INFO] [stderr]    Compiling crypt_guard_proc v0.1.0
[INFO] [stderr]    Compiling crypt_guard v1.2.9 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused import: `Mac`
[INFO] [stdout]  --> src/Core/KDF.rs:1:12
[INFO] [stdout]   |
[INFO] [stdout] 1 | use hmac::{Mac};
[INFO] [stdout]   |            ^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Ciphertext`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:64
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                                                ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Write`
[INFO] [stdout]   --> src/Core/cipher_aes.rs:25:10
[INFO] [stdout]    |
[INFO] [stdout] 25 |     io::{Write}, 
[INFO] [stdout]    |          ^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `KyberKeyFunctions`
[INFO] [stdout]  --> src/Core/cipher_aes.rs:9:9
[INFO] [stdout]   |
[INFO] [stdout] 9 |         KyberKeyFunctions,
[INFO] [stdout]   |         ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `KyberKeyFunctions`
[INFO] [stdout]   --> src/Core/cipher_xchacha.rs:12:9
[INFO] [stdout]    |
[INFO] [stdout] 12 |         KyberKeyFunctions,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `SharedSecret`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:50
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                                  ^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Mac`
[INFO] [stdout]  --> src/cryptography/hmac_sign/mod.rs:3:12
[INFO] [stdout]   |
[INFO] [stdout] 3 | use hmac::{Mac};
[INFO] [stdout]   |            ^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `SecretKey`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:39
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                       ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `PublicKey`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:28
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                            ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:157:13
[INFO] [stdout]     |
[INFO] [stdout] 157 |             _ => Err(|e| CryptError::IOError(e)),
[INFO] [stdout]     |             ^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unreachable_patterns)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `encrypted_data` is never read
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:125:17
[INFO] [stdout]     |
[INFO] [stdout] 125 |         let mut encrypted_data: Vec<u8> = Vec::new();
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: `#[warn(unused_assignments)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `nonce_vec` is never read
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:126:17
[INFO] [stdout]     |
[INFO] [stdout] 126 |         let mut nonce_vec: Vec<u8> = Vec::new();
[INFO] [stdout]     |                 ^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]   --> src/cryptography/hmac_sign/sign.rs:47:13
[INFO] [stdout]    |
[INFO] [stdout] 47 |             _ => vec![],
[INFO] [stdout]    |             ^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `save_ciphertext` is never used
[INFO] [stdout]    --> src/Core/cipher_aes.rs:104:8
[INFO] [stdout]     |
[INFO] [stdout] 33  | impl CipherAES {
[INFO] [stdout]     | -------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 104 |     fn save_ciphertext(&self, _encrypted_data: &[u8]) -> Result<(), CryptError> {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `public_key`, `secret_key`, `signed_msg`, and `signature` are never used
[INFO] [stdout]    --> src/cryptography/hmac_sign/mod.rs:176:8
[INFO] [stdout]     |
[INFO] [stdout] 168 | impl SignatureKey {
[INFO] [stdout]     | ----------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 176 |     fn public_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 181 |     fn secret_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 186 |     fn signed_msg(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 191 |     fn signature(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `Core` should have a snake case name
[INFO] [stdout]    --> src/lib.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 | mod Core;
[INFO] [stdout]     |     ^^^^ help: convert the identifier to snake case (notice the capitalization): `core`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(non_snake_case)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KeyControl` should have a snake case name
[INFO] [stdout]    --> src/lib.rs:172:9
[INFO] [stdout]     |
[INFO] [stdout] 172 | pub mod KeyControl;
[INFO] [stdout]     |         ^^^^^^^^^^ help: convert the identifier to snake case: `key_control`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KDF` should have a snake case name
[INFO] [stdout]  --> src/Core/mod.rs:4:9
[INFO] [stdout]   |
[INFO] [stdout] 4 | pub mod KDF;
[INFO] [stdout]   |         ^^^ help: convert the identifier to snake case: `kdf`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KeyControler` should have a snake case name
[INFO] [stdout]  --> src/Core/kyber/mod.rs:2:9
[INFO] [stdout]   |
[INFO] [stdout] 2 | pub mod KeyControler;
[INFO] [stdout]   |         ^^^^^^^^^^^^ help: convert the identifier to snake case: `key_controler`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `Ciphertext` should have a snake case name
[INFO] [stdout]   --> src/KeyControl/mod.rs:42:12
[INFO] [stdout]    |
[INFO] [stdout] 42 |     pub fn Ciphertext()  -> Self {
[INFO] [stdout]    |            ^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `ciphertext`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 20 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 17.68s
[INFO] running `Command { std: "docker" "inspect" "8e0bc20b9b8ec42b6e4ab04508b0ac6b546e8c025015ad08abe11e523febf926", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "8e0bc20b9b8ec42b6e4ab04508b0ac6b546e8c025015ad08abe11e523febf926", kill_on_drop: false }`
[INFO] [stdout] 8e0bc20b9b8ec42b6e4ab04508b0ac6b546e8c025015ad08abe11e523febf926
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:59a85a07ab18ca8720692f8e61effa1c651d9e2ca591e072c2b212bb91a6b8b5" "/opt/rustwide/cargo-home/bin/cargo" "+1871252fc8bb672d40787e67404e6eaae7059369" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] fc38519aba448607d1eac9d71b137816e74903199e0da771ec42e69ecaf11cb1
[INFO] running `Command { std: "docker" "start" "-a" "fc38519aba448607d1eac9d71b137816e74903199e0da771ec42e69ecaf11cb1", kill_on_drop: false }`
[INFO] [stderr]    Compiling rustix v0.38.34
[INFO] [stderr]    Compiling bitflags v2.5.0
[INFO] [stderr]    Compiling linux-raw-sys v0.4.13
[INFO] [stderr]    Compiling fastrand v2.1.0
[INFO] [stdout] warning: unused import: `Mac`
[INFO] [stdout]  --> src/Core/KDF.rs:1:12
[INFO] [stdout]   |
[INFO] [stdout] 1 | use hmac::{Mac};
[INFO] [stdout]   |            ^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Ciphertext`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:64
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                                                ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Write`
[INFO] [stdout]   --> src/Core/cipher_aes.rs:25:10
[INFO] [stdout]    |
[INFO] [stdout] 25 |     io::{Write}, 
[INFO] [stdout]    |          ^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `KyberKeyFunctions`
[INFO] [stdout]  --> src/Core/cipher_aes.rs:9:9
[INFO] [stdout]   |
[INFO] [stdout] 9 |         KyberKeyFunctions,
[INFO] [stdout]   |         ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `KyberKeyFunctions`
[INFO] [stdout]   --> src/Core/cipher_xchacha.rs:12:9
[INFO] [stdout]    |
[INFO] [stdout] 12 |         KyberKeyFunctions,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `SharedSecret`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:50
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                                  ^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Mac`
[INFO] [stdout]  --> src/cryptography/hmac_sign/mod.rs:3:12
[INFO] [stdout]   |
[INFO] [stdout] 3 | use hmac::{Mac};
[INFO] [stdout]   |            ^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `SecretKey`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:39
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                       ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `PublicKey`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:28
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                            ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:157:13
[INFO] [stdout]     |
[INFO] [stdout] 157 |             _ => Err(|e| CryptError::IOError(e)),
[INFO] [stdout]     |             ^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unreachable_patterns)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `encrypted_data` is never read
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:125:17
[INFO] [stdout]     |
[INFO] [stdout] 125 |         let mut encrypted_data: Vec<u8> = Vec::new();
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: `#[warn(unused_assignments)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `nonce_vec` is never read
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:126:17
[INFO] [stdout]     |
[INFO] [stdout] 126 |         let mut nonce_vec: Vec<u8> = Vec::new();
[INFO] [stdout]     |                 ^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]   --> src/cryptography/hmac_sign/sign.rs:47:13
[INFO] [stdout]    |
[INFO] [stdout] 47 |             _ => vec![],
[INFO] [stdout]    |             ^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `save_ciphertext` is never used
[INFO] [stdout]    --> src/Core/cipher_aes.rs:104:8
[INFO] [stdout]     |
[INFO] [stdout] 33  | impl CipherAES {
[INFO] [stdout]     | -------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 104 |     fn save_ciphertext(&self, _encrypted_data: &[u8]) -> Result<(), CryptError> {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `public_key`, `secret_key`, `signed_msg`, and `signature` are never used
[INFO] [stdout]    --> src/cryptography/hmac_sign/mod.rs:176:8
[INFO] [stdout]     |
[INFO] [stdout] 168 | impl SignatureKey {
[INFO] [stdout]     | ----------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 176 |     fn public_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 181 |     fn secret_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 186 |     fn signed_msg(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 191 |     fn signature(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `Core` should have a snake case name
[INFO] [stdout]    --> src/lib.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 | mod Core;
[INFO] [stdout]     |     ^^^^ help: convert the identifier to snake case (notice the capitalization): `core`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(non_snake_case)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KeyControl` should have a snake case name
[INFO] [stdout]    --> src/lib.rs:172:9
[INFO] [stdout]     |
[INFO] [stdout] 172 | pub mod KeyControl;
[INFO] [stdout]     |         ^^^^^^^^^^ help: convert the identifier to snake case: `key_control`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KDF` should have a snake case name
[INFO] [stdout]  --> src/Core/mod.rs:4:9
[INFO] [stdout]   |
[INFO] [stdout] 4 | pub mod KDF;
[INFO] [stdout]   |         ^^^ help: convert the identifier to snake case: `kdf`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KeyControler` should have a snake case name
[INFO] [stdout]  --> src/Core/kyber/mod.rs:2:9
[INFO] [stdout]   |
[INFO] [stdout] 2 | pub mod KeyControler;
[INFO] [stdout]   |         ^^^^^^^^^^^^ help: convert the identifier to snake case: `key_controler`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `Ciphertext` should have a snake case name
[INFO] [stdout]   --> src/KeyControl/mod.rs:42:12
[INFO] [stdout]    |
[INFO] [stdout] 42 |     pub fn Ciphertext()  -> Self {
[INFO] [stdout]    |            ^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `ciphertext`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 20 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]    Compiling tempfile v3.10.1
[INFO] [stderr]    Compiling crypt_guard v1.2.9 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused import: `error::*`
[INFO] [stdout]  --> examples/encrypt_aes.rs:2:22
[INFO] [stdout]   |
[INFO] [stdout] 2 | use crypt_guard::{*, error::*};
[INFO] [stdout]   |                      ^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused imports: `PathBuf`, `Path`, `Read`, `Write`, `marker::PhantomData`, `self`
[INFO] [stdout]  --> examples/encrypt_aes.rs:4:10
[INFO] [stdout]   |
[INFO] [stdout] 4 |     fs::{self, File}, 
[INFO] [stdout]   |          ^^^^
[INFO] [stdout] 5 |     marker::PhantomData,
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 6 |     path::{PathBuf, Path},
[INFO] [stdout]   |            ^^^^^^^  ^^^^
[INFO] [stdout] 7 |     io::{Read, Write},
[INFO] [stdout]   |          ^^^^  ^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused imports: `PathBuf`, `Path`, `Read`, `Write`, `marker::PhantomData`
[INFO] [stdout]  --> examples/encrypt_xchacha.rs:4:2
[INFO] [stdout]   |
[INFO] [stdout] 4 |     marker::PhantomData,
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 5 |     path::{PathBuf, Path},
[INFO] [stdout]   |            ^^^^^^^  ^^^^
[INFO] [stdout] 6 |     io::{Read, Write},
[INFO] [stdout]   |          ^^^^  ^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused imports: `Builder`, `TempDir`
[INFO] [stdout]   --> examples/encrypt_aes.rs:10:16
[INFO] [stdout]    |
[INFO] [stdout] 10 | use tempfile::{TempDir, Builder};
[INFO] [stdout]    |                ^^^^^^^  ^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused imports: `Message`, `error::*`
[INFO] [stdout]  --> examples/macro_example.rs:5:5
[INFO] [stdout]   |
[INFO] [stdout] 5 |     error::*,
[INFO] [stdout]   |     ^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 9 |     Message, 
[INFO] [stdout]   |     ^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `tmp_dir`
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:15:9
[INFO] [stdout]    |
[INFO] [stdout] 15 |     let tmp_dir = TempDir::new().map_err(|e| CryptError::from(e))?;
[INFO] [stdout]    |         ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_tmp_dir`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_variables)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `encrypt_message`
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:33:10
[INFO] [stdout]    |
[INFO] [stdout] 33 |     let (encrypt_message, cipher) = encryptor.encrypt_file(enc_path.clone(), passphrase.clone())?;
[INFO] [stdout]    |          ^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_encrypt_message`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `decrypt_message`
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:44:9
[INFO] [stdout]    |
[INFO] [stdout] 44 |     let decrypt_message = decryptor.decrypt_file(dec_path.clone(), passphrase.clone(), cipher)?;
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_decrypt_message`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]   --> examples/encrypt_aes.rs:33:9
[INFO] [stdout]    |
[INFO] [stdout] 33 |     let mut decryptor = Kyber::<Decryption, Kyber1024, File, AES>::new(secret_key, None)?;
[INFO] [stdout]    |         ----^^^^^^^^^
[INFO] [stdout]    |         |
[INFO] [stdout]    |         help: remove this `mut`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_mut)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:41:9
[INFO] [stdout]    |
[INFO] [stdout] 41 |     let mut decryptor = Kyber::<Decryption, Kyber768, File, XChaCha20>::new(secret_key, Some(nonce?.to_string()))?;
[INFO] [stdout]    |         ----^^^^^^^^^
[INFO] [stdout]    |         |
[INFO] [stdout]    |         help: remove this `mut`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_mut)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> examples/encrypt_aes.rs:26:66
[INFO] [stdout]    |
[INFO] [stdout] 26 |     let (encrypt_message, cipher) = encryptor.encrypt_msg(message.clone(), passphrase.clone())?;
[INFO] [stdout]    |                                                                  ^^^^^^^^ help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stdout]    = note: `#[warn(noop_method_call)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> examples/encrypt_aes.rs:26:86
[INFO] [stdout]    |
[INFO] [stdout] 26 |     let (encrypt_message, cipher) = encryptor.encrypt_msg(message.clone(), passphrase.clone())?;
[INFO] [stdout]    |                                                                                      ^^^^^^^^ help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> examples/encrypt_aes.rs:36:84
[INFO] [stdout]    |
[INFO] [stdout] 36 |     let decrypt_message = decryptor.decrypt_msg(encrypt_message.clone(), passphrase.clone(), cipher)?;
[INFO] [stdout]    |                                                                                    ^^^^^^^^ help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:18:34
[INFO] [stdout]    |
[INFO] [stdout] 18 |     let enc_path = tmp_dir.path().clone().join("message.txt");
[INFO] [stdout]    |                                  ^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed
[INFO] [stdout]    = note: `#[warn(noop_method_call)]` on by default
[INFO] [stdout] help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout] 18 -     let enc_path = tmp_dir.path().clone().join("message.txt");
[INFO] [stdout] 18 +     let enc_path = tmp_dir.path().join("message.txt");
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:19:34
[INFO] [stdout]    |
[INFO] [stdout] 19 |     let dec_path = tmp_dir.path().clone().join("message.txt.enc"); 
[INFO] [stdout]    |                                  ^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed
[INFO] [stdout] help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout] 19 -     let dec_path = tmp_dir.path().clone().join("message.txt.enc"); 
[INFO] [stdout] 19 +     let dec_path = tmp_dir.path().join("message.txt.enc"); 
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:33:88
[INFO] [stdout]    |
[INFO] [stdout] 33 |     let (encrypt_message, cipher) = encryptor.encrypt_file(enc_path.clone(), passphrase.clone())?;
[INFO] [stdout]    |                                                                                        ^^^^^^^^ help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:44:78
[INFO] [stdout]    |
[INFO] [stdout] 44 |     let decrypt_message = decryptor.decrypt_file(dec_path.clone(), passphrase.clone(), cipher)?;
[INFO] [stdout]    |                                                                              ^^^^^^^^ help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Mac`
[INFO] [stdout]  --> src/Core/KDF.rs:1:12
[INFO] [stdout]   |
[INFO] [stdout] 1 | use hmac::{Mac};
[INFO] [stdout]   |            ^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Write`
[INFO] [stdout]   --> src/Core/cipher_aes.rs:25:10
[INFO] [stdout]    |
[INFO] [stdout] 25 |     io::{Write}, 
[INFO] [stdout]    |          ^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `KyberKeyFunctions`
[INFO] [stdout]  --> src/Core/cipher_aes.rs:9:9
[INFO] [stdout]   |
[INFO] [stdout] 9 |         KyberKeyFunctions,
[INFO] [stdout]   |         ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `KyberKeyFunctions`
[INFO] [stdout]   --> src/Core/cipher_xchacha.rs:12:9
[INFO] [stdout]    |
[INFO] [stdout] 12 |         KyberKeyFunctions,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `hmac_sign`
[INFO] [stdout]   --> src/tests/KyberKeyTest.rs:10:9
[INFO] [stdout]    |
[INFO] [stdout] 10 |         hmac_sign::*, 
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Mac`
[INFO] [stdout]  --> src/cryptography/hmac_sign/mod.rs:3:12
[INFO] [stdout]   |
[INFO] [stdout] 3 | use hmac::{Mac};
[INFO] [stdout]   |            ^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `hmac_sign`
[INFO] [stdout]  --> src/tests/MacroTests.rs:7:9
[INFO] [stdout]   |
[INFO] [stdout] 7 |         hmac_sign::*, 
[INFO] [stdout]   |         ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `PublicKey`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:28
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                            ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `SecretKey`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:39
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                       ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `SharedSecret`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:50
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                                  ^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Ciphertext`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:64
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                                                ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 1 warning emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 7 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:157:13
[INFO] [stdout]     |
[INFO] [stdout] 157 |             _ => Err(|e| CryptError::IOError(e)),
[INFO] [stdout]     |             ^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unreachable_patterns)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `encrypted_data` is never read
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:125:17
[INFO] [stdout]     |
[INFO] [stdout] 125 |         let mut encrypted_data: Vec<u8> = Vec::new();
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: `#[warn(unused_assignments)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `nonce_vec` is never read
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:126:17
[INFO] [stdout]     |
[INFO] [stdout] 126 |         let mut nonce_vec: Vec<u8> = Vec::new();
[INFO] [stdout]     |                 ^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]   --> src/cryptography/hmac_sign/sign.rs:47:13
[INFO] [stdout]    |
[INFO] [stdout] 47 |             _ => vec![],
[INFO] [stdout]    |             ^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 9 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `save_ciphertext` is never used
[INFO] [stdout]    --> src/Core/cipher_aes.rs:104:8
[INFO] [stdout]     |
[INFO] [stdout] 33  | impl CipherAES {
[INFO] [stdout]     | -------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 104 |     fn save_ciphertext(&self, _encrypted_data: &[u8]) -> Result<(), CryptError> {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `public_key`, `secret_key`, `signed_msg`, and `signature` are never used
[INFO] [stdout]    --> src/cryptography/hmac_sign/mod.rs:176:8
[INFO] [stdout]     |
[INFO] [stdout] 168 | impl SignatureKey {
[INFO] [stdout]     | ----------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 176 |     fn public_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 181 |     fn secret_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 186 |     fn signed_msg(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 191 |     fn signature(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `read_file` is never used
[INFO] [stdout]   --> src/tests/KyberKeyTest.rs:94:4
[INFO] [stdout]    |
[INFO] [stdout] 94 | fn read_file(path: &PathBuf) -> Result<Vec<u8>, std::io::Error> {
[INFO] [stdout]    |    ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_message_AES_Kyber512` is never used
[INFO] [stdout]    --> src/tests/KyberTests.rs:184:4
[INFO] [stdout]     |
[INFO] [stdout] 184 | fn encrypt_message_AES_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `Core` should have a snake case name
[INFO] [stdout]    --> src/lib.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 | mod Core;
[INFO] [stdout]     |     ^^^^ help: convert the identifier to snake case (notice the capitalization): `core`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(non_snake_case)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KeyControl` should have a snake case name
[INFO] [stdout]    --> src/lib.rs:172:9
[INFO] [stdout]     |
[INFO] [stdout] 172 | pub mod KeyControl;
[INFO] [stdout]     |         ^^^^^^^^^^ help: convert the identifier to snake case: `key_control`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KDF` should have a snake case name
[INFO] [stdout]  --> src/Core/mod.rs:4:9
[INFO] [stdout]   |
[INFO] [stdout] 4 | pub mod KDF;
[INFO] [stdout]   |         ^^^ help: convert the identifier to snake case: `kdf`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KeyControler` should have a snake case name
[INFO] [stdout]  --> src/Core/kyber/mod.rs:2:9
[INFO] [stdout]   |
[INFO] [stdout] 2 | pub mod KeyControler;
[INFO] [stdout]   |         ^^^^^^^^^^^^ help: convert the identifier to snake case: `key_controler`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `Ciphertext` should have a snake case name
[INFO] [stdout]   --> src/KeyControl/mod.rs:42:12
[INFO] [stdout]    |
[INFO] [stdout] 42 |     pub fn Ciphertext()  -> Self {
[INFO] [stdout]    |            ^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `ciphertext`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KyberKeyTest` should have a snake case name
[INFO] [stdout]  --> src/tests/mod.rs:4:5
[INFO] [stdout]   |
[INFO] [stdout] 4 | mod KyberKeyTest;
[INFO] [stdout]   |     ^^^^^^^^^^^^ help: convert the identifier to snake case: `kyber_key_test`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KyberTests` should have a snake case name
[INFO] [stdout]  --> src/tests/mod.rs:7:5
[INFO] [stdout]   |
[INFO] [stdout] 7 | mod KyberTests;
[INFO] [stdout]   |     ^^^^^^^^^^ help: convert the identifier to snake case: `kyber_tests`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `MacroTests` should have a snake case name
[INFO] [stdout]   --> src/tests/mod.rs:10:5
[INFO] [stdout]    |
[INFO] [stdout] 10 | mod MacroTests;
[INFO] [stdout]    |     ^^^^^^^^^^ help: convert the identifier to snake case: `macro_tests`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `SignatureTests` should have a snake case name
[INFO] [stdout]   --> src/tests/mod.rs:13:5
[INFO] [stdout]    |
[INFO] [stdout] 13 | mod SignatureTests;
[INFO] [stdout]    |     ^^^^^^^^^^^^^^ help: convert the identifier to snake case: `signature_tests`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_decrypt_msg_macro_AES_Kyber1024` should have a snake case name
[INFO] [stdout]   --> src/tests/KyberTests.rs:18:4
[INFO] [stdout]    |
[INFO] [stdout] 18 | fn encrypt_decrypt_msg_macro_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_aes_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_decrypt_data_macro_AES_Kyber1024` should have a snake case name
[INFO] [stdout]   --> src/tests/KyberTests.rs:41:4
[INFO] [stdout]    |
[INFO] [stdout] 41 | fn encrypt_decrypt_data_macro_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_aes_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_decrypt_file_macro_AES_Kyber1024` should have a snake case name
[INFO] [stdout]   --> src/tests/KyberTests.rs:61:4
[INFO] [stdout]    |
[INFO] [stdout] 61 | fn encrypt_decrypt_file_macro_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_file_macro_aes_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused `std::result::Result` that must be used
[INFO] [stdout]   --> src/tests/KyberTests.rs:80:5
[INFO] [stdout]    |
[INFO] [stdout] 80 |     fs::remove_file(enc_path.clone());
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stdout]    = note: `#[warn(unused_must_use)]` on by default
[INFO] [stdout] help: use `let _ = ...` to ignore the resulting value
[INFO] [stdout]    |
[INFO] [stdout] 80 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stdout]    |     +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_message_AES_Kyber1024` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:100:4
[INFO] [stdout]     |
[INFO] [stdout] 100 | fn encrypt_message_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_data_AES_Kyber1024` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:129:4
[INFO] [stdout]     |
[INFO] [stdout] 129 | fn encrypt_data_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_data_aes_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_message_AES_Kyber768` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:156:4
[INFO] [stdout]     |
[INFO] [stdout] 156 | fn encrypt_message_AES_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber768`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_message_AES_Kyber512` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:184:4
[INFO] [stdout]     |
[INFO] [stdout] 184 | fn encrypt_message_AES_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber512`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_file_AES_Kyber1024` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:213:4
[INFO] [stdout]     |
[INFO] [stdout] 213 | fn encrypt_file_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused `std::result::Result` that must be used
[INFO] [stdout]    --> src/tests/KyberTests.rs:235:5
[INFO] [stdout]     |
[INFO] [stdout] 235 |     fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stdout] help: use `let _ = ...` to ignore the resulting value
[INFO] [stdout]     |
[INFO] [stdout] 235 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_file_AES_Kyber768` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:257:4
[INFO] [stdout]     |
[INFO] [stdout] 257 | fn encrypt_file_AES_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber768`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused `std::result::Result` that must be used
[INFO] [stdout]    --> src/tests/KyberTests.rs:279:5
[INFO] [stdout]     |
[INFO] [stdout] 279 |     fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stdout] help: use `let _ = ...` to ignore the resulting value
[INFO] [stdout]     |
[INFO] [stdout] 279 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_file_AES_Kyber512` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:302:4
[INFO] [stdout]     |
[INFO] [stdout] 302 | fn encrypt_file_AES_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber512`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused `std::result::Result` that must be used
[INFO] [stdout]    --> src/tests/KyberTests.rs:324:5
[INFO] [stdout]     |
[INFO] [stdout] 324 |     fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stdout] help: use `let _ = ...` to ignore the resulting value
[INFO] [stdout]     |
[INFO] [stdout] 324 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_message_XChaCha20_Kyber1024` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:346:4
[INFO] [stdout]     |
[INFO] [stdout] 346 | fn encrypt_message_XChaCha20_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_message_XChaCha20_Kyber768` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:374:4
[INFO] [stdout]     |
[INFO] [stdout] 374 | fn encrypt_message_XChaCha20_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber768`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_message_XChaCha20_Kyber512` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:402:4
[INFO] [stdout]     |
[INFO] [stdout] 402 | fn encrypt_message_XChaCha20_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber512`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_file_XChaCha20_Kyber1024` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:430:4
[INFO] [stdout]     |
[INFO] [stdout] 430 | fn encrypt_file_XChaCha20_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused `std::result::Result` that must be used
[INFO] [stdout]    --> src/tests/KyberTests.rs:454:5
[INFO] [stdout]     |
[INFO] [stdout] 454 |     fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stdout] help: use `let _ = ...` to ignore the resulting value
[INFO] [stdout]     |
[INFO] [stdout] 454 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_file_XChaCha20_Kyber768` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:476:4
[INFO] [stdout]     |
[INFO] [stdout] 476 | fn encrypt_file_XChaCha20_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber768`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused `std::result::Result` that must be used
[INFO] [stdout]    --> src/tests/KyberTests.rs:500:5
[INFO] [stdout]     |
[INFO] [stdout] 500 |     fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stdout] help: use `let _ = ...` to ignore the resulting value
[INFO] [stdout]     |
[INFO] [stdout] 500 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_file_XChaCha20_Kyber512` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:522:4
[INFO] [stdout]     |
[INFO] [stdout] 522 | fn encrypt_file_XChaCha20_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber512`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused `std::result::Result` that must be used
[INFO] [stdout]    --> src/tests/KyberTests.rs:546:5
[INFO] [stdout]     |
[INFO] [stdout] 546 |     fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stdout] help: use `let _ = ...` to ignore the resulting value
[INFO] [stdout]     |
[INFO] [stdout] 546 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `SignEncrypt` should have a snake case name
[INFO] [stdout]   --> src/tests/MacroTests.rs:97:4
[INFO] [stdout]    |
[INFO] [stdout] 97 | fn SignEncrypt() {
[INFO] [stdout]    |    ^^^^^^^^^^^ help: convert the identifier to snake case: `sign_encrypt`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `SignEncrypt_DecryptOpen` should have a snake case name
[INFO] [stdout]    --> src/tests/MacroTests.rs:109:4
[INFO] [stdout]     |
[INFO] [stdout] 109 | fn SignEncrypt_DecryptOpen() {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `sign_encrypt_decrypt_open`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `test_save_Falcon1024_keys` should have a snake case name
[INFO] [stdout]  --> src/tests/SignatureTests.rs:9:4
[INFO] [stdout]   |
[INFO] [stdout] 9 | fn test_save_Falcon1024_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]   |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `test_save_falcon1024_keys`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `test_save_Falcon512_keys` should have a snake case name
[INFO] [stdout]   --> src/tests/SignatureTests.rs:24:4
[INFO] [stdout]    |
[INFO] [stdout] 24 | fn test_save_Falcon512_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]    |    ^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `test_save_falcon512_keys`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `test_save_Dilithium2_keys` should have a snake case name
[INFO] [stdout]   --> src/tests/SignatureTests.rs:39:4
[INFO] [stdout]    |
[INFO] [stdout] 39 | fn test_save_Dilithium2_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium2_keys`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `test_save_Dilithium3_keys` should have a snake case name
[INFO] [stdout]   --> src/tests/SignatureTests.rs:54:4
[INFO] [stdout]    |
[INFO] [stdout] 54 | fn test_save_Dilithium3_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium3_keys`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `test_save_Dilithium5_keys` should have a snake case name
[INFO] [stdout]   --> src/tests/SignatureTests.rs:69:4
[INFO] [stdout]    |
[INFO] [stdout] 69 | fn test_save_Dilithium5_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium5_keys`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 58 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 5.68s
[INFO] running `Command { std: "docker" "inspect" "fc38519aba448607d1eac9d71b137816e74903199e0da771ec42e69ecaf11cb1", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "fc38519aba448607d1eac9d71b137816e74903199e0da771ec42e69ecaf11cb1", kill_on_drop: false }`
[INFO] [stdout] fc38519aba448607d1eac9d71b137816e74903199e0da771ec42e69ecaf11cb1
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:59a85a07ab18ca8720692f8e61effa1c651d9e2ca591e072c2b212bb91a6b8b5" "/opt/rustwide/cargo-home/bin/cargo" "+1871252fc8bb672d40787e67404e6eaae7059369" "test" "--frozen", kill_on_drop: false }`
[INFO] [stdout] 2241e0ddbae321d92b3a2a469ed92137fd81ab1f7000a2b2c98616ecead500ae
[INFO] running `Command { std: "docker" "start" "-a" "2241e0ddbae321d92b3a2a469ed92137fd81ab1f7000a2b2c98616ecead500ae", kill_on_drop: false }`
[INFO] [stderr] warning: unused import: `Mac`
[INFO] [stderr]  --> src/Core/KDF.rs:1:12
[INFO] [stderr]   |
[INFO] [stderr] 1 | use hmac::{Mac};
[INFO] [stderr]   |            ^^^
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `Ciphertext`
[INFO] [stderr]  --> src/KeyControl/mod.rs:4:64
[INFO] [stderr]   |
[INFO] [stderr] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stderr]   |                                                                ^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `Write`
[INFO] [stderr]   --> src/Core/cipher_aes.rs:25:10
[INFO] [stderr]    |
[INFO] [stderr] 25 |     io::{Write}, 
[INFO] [stderr]    |          ^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `KyberKeyFunctions`
[INFO] [stderr]  --> src/Core/cipher_aes.rs:9:9
[INFO] [stderr]   |
[INFO] [stderr] 9 |         KyberKeyFunctions,
[INFO] [stderr]   |         ^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `KyberKeyFunctions`
[INFO] [stderr]   --> src/Core/cipher_xchacha.rs:12:9
[INFO] [stderr]    |
[INFO] [stderr] 12 |         KyberKeyFunctions,
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `SharedSecret`
[INFO] [stderr]  --> src/KeyControl/mod.rs:4:50
[INFO] [stderr]   |
[INFO] [stderr] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stderr]   |                                                  ^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `Mac`
[INFO] [stderr]  --> src/cryptography/hmac_sign/mod.rs:3:12
[INFO] [stderr]   |
[INFO] [stderr] 3 | use hmac::{Mac};
[INFO] [stderr]   |            ^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `SecretKey`
[INFO] [stderr]  --> src/KeyControl/mod.rs:4:39
[INFO] [stderr]   |
[INFO] [stderr] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stderr]   |                                       ^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `PublicKey`
[INFO] [stderr]  --> src/KeyControl/mod.rs:4:28
[INFO] [stderr]   |
[INFO] [stderr] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stderr]   |                            ^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unreachable pattern
[INFO] [stderr]    --> src/Core/cipher_xchacha.rs:157:13
[INFO] [stderr]     |
[INFO] [stderr] 157 |             _ => Err(|e| CryptError::IOError(e)),
[INFO] [stderr]     |             ^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(unreachable_patterns)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: value assigned to `encrypted_data` is never read
[INFO] [stderr]    --> src/Core/cipher_xchacha.rs:125:17
[INFO] [stderr]     |
[INFO] [stderr] 125 |         let mut encrypted_data: Vec<u8> = Vec::new();
[INFO] [stderr]     |                 ^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = help: maybe it is overwritten before being read?
[INFO] [stderr]     = note: `#[warn(unused_assignments)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: value assigned to `nonce_vec` is never read
[INFO] [stderr]    --> src/Core/cipher_xchacha.rs:126:17
[INFO] [stderr]     |
[INFO] [stderr] 126 |         let mut nonce_vec: Vec<u8> = Vec::new();
[INFO] [stderr]     |                 ^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = help: maybe it is overwritten before being read?
[INFO] [stderr] 
[INFO] [stderr] warning: unreachable pattern
[INFO] [stderr]   --> src/cryptography/hmac_sign/sign.rs:47:13
[INFO] [stderr]    |
[INFO] [stderr] 47 |             _ => vec![],
[INFO] [stderr]    |             ^
[INFO] [stderr] 
[INFO] [stderr] warning: method `save_ciphertext` is never used
[INFO] [stderr]    --> src/Core/cipher_aes.rs:104:8
[INFO] [stderr]     |
[INFO] [stderr] 33  | impl CipherAES {
[INFO] [stderr]     | -------------- method in this implementation
[INFO] [stderr] ...
[INFO] [stderr] 104 |     fn save_ciphertext(&self, _encrypted_data: &[u8]) -> Result<(), CryptError> {
[INFO] [stderr]     |        ^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(dead_code)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: methods `public_key`, `secret_key`, `signed_msg`, and `signature` are never used
[INFO] [stderr]    --> src/cryptography/hmac_sign/mod.rs:176:8
[INFO] [stderr]     |
[INFO] [stderr] 168 | impl SignatureKey {
[INFO] [stderr]     | ----------------- methods in this implementation
[INFO] [stderr] ...
[INFO] [stderr] 176 |     fn public_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stderr]     |        ^^^^^^^^^^
[INFO] [stderr] ...
[INFO] [stderr] 181 |     fn secret_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stderr]     |        ^^^^^^^^^^
[INFO] [stderr] ...
[INFO] [stderr] 186 |     fn signed_msg(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stderr]     |        ^^^^^^^^^^
[INFO] [stderr] ...
[INFO] [stderr] 191 |     fn signature(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stderr]     |        ^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: module `Core` should have a snake case name
[INFO] [stderr]    --> src/lib.rs:168:5
[INFO] [stderr]     |
[INFO] [stderr] 168 | mod Core;
[INFO] [stderr]     |     ^^^^ help: convert the identifier to snake case (notice the capitalization): `core`
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(non_snake_case)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: module `KeyControl` should have a snake case name
[INFO] [stderr]    --> src/lib.rs:172:9
[INFO] [stderr]     |
[INFO] [stderr] 172 | pub mod KeyControl;
[INFO] [stderr]     |         ^^^^^^^^^^ help: convert the identifier to snake case: `key_control`
[INFO] [stderr] 
[INFO] [stderr] warning: module `KDF` should have a snake case name
[INFO] [stderr]  --> src/Core/mod.rs:4:9
[INFO] [stderr]   |
[INFO] [stderr] 4 | pub mod KDF;
[INFO] [stderr]   |         ^^^ help: convert the identifier to snake case: `kdf`
[INFO] [stderr] 
[INFO] [stderr] warning: module `KeyControler` should have a snake case name
[INFO] [stderr]  --> src/Core/kyber/mod.rs:2:9
[INFO] [stderr]   |
[INFO] [stderr] 2 | pub mod KeyControler;
[INFO] [stderr]   |         ^^^^^^^^^^^^ help: convert the identifier to snake case: `key_controler`
[INFO] [stderr] 
[INFO] [stderr] warning: method `Ciphertext` should have a snake case name
[INFO] [stderr]   --> src/KeyControl/mod.rs:42:12
[INFO] [stderr]    |
[INFO] [stderr] 42 |     pub fn Ciphertext()  -> Self {
[INFO] [stderr]    |            ^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `ciphertext`
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `hmac_sign`
[INFO] [stderr]   --> src/tests/KyberKeyTest.rs:10:9
[INFO] [stderr]    |
[INFO] [stderr] 10 |         hmac_sign::*, 
[INFO] [stderr]    |         ^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `hmac_sign`
[INFO] [stderr]  --> src/tests/MacroTests.rs:7:9
[INFO] [stderr]   |
[INFO] [stderr] 7 |         hmac_sign::*, 
[INFO] [stderr]   |         ^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: function `read_file` is never used
[INFO] [stderr]   --> src/tests/KyberKeyTest.rs:94:4
[INFO] [stderr]    |
[INFO] [stderr] 94 | fn read_file(path: &PathBuf) -> Result<Vec<u8>, std::io::Error> {
[INFO] [stderr]    |    ^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_message_AES_Kyber512` is never used
[INFO] [stderr]    --> src/tests/KyberTests.rs:184:4
[INFO] [stderr]     |
[INFO] [stderr] 184 | fn encrypt_message_AES_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: module `KyberKeyTest` should have a snake case name
[INFO] [stderr]  --> src/tests/mod.rs:4:5
[INFO] [stderr]   |
[INFO] [stderr] 4 | mod KyberKeyTest;
[INFO] [stderr]   |     ^^^^^^^^^^^^ help: convert the identifier to snake case: `kyber_key_test`
[INFO] [stderr] 
[INFO] [stderr] warning: module `KyberTests` should have a snake case name
[INFO] [stderr]  --> src/tests/mod.rs:7:5
[INFO] [stderr]   |
[INFO] [stderr] 7 | mod KyberTests;
[INFO] [stderr]   |     ^^^^^^^^^^ help: convert the identifier to snake case: `kyber_tests`
[INFO] [stderr] 
[INFO] [stderr] warning: module `MacroTests` should have a snake case name
[INFO] [stderr]   --> src/tests/mod.rs:10:5
[INFO] [stderr]    |
[INFO] [stderr] 10 | mod MacroTests;
[INFO] [stderr]    |     ^^^^^^^^^^ help: convert the identifier to snake case: `macro_tests`
[INFO] [stderr] 
[INFO] [stderr] warning: module `SignatureTests` should have a snake case name
[INFO] [stderr]   --> src/tests/mod.rs:13:5
[INFO] [stderr]    |
[INFO] [stderr] 13 | mod SignatureTests;
[INFO] [stderr]    |     ^^^^^^^^^^^^^^ help: convert the identifier to snake case: `signature_tests`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_decrypt_msg_macro_AES_Kyber1024` should have a snake case name
[INFO] [stderr]   --> src/tests/KyberTests.rs:18:4
[INFO] [stderr]    |
[INFO] [stderr] 18 | fn encrypt_decrypt_msg_macro_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_aes_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_decrypt_data_macro_AES_Kyber1024` should have a snake case name
[INFO] [stderr]   --> src/tests/KyberTests.rs:41:4
[INFO] [stderr]    |
[INFO] [stderr] 41 | fn encrypt_decrypt_data_macro_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_aes_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_decrypt_file_macro_AES_Kyber1024` should have a snake case name
[INFO] [stderr]   --> src/tests/KyberTests.rs:61:4
[INFO] [stderr]    |
[INFO] [stderr] 61 | fn encrypt_decrypt_file_macro_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_file_macro_aes_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: unused `std::result::Result` that must be used
[INFO] [stderr]   --> src/tests/KyberTests.rs:80:5
[INFO] [stderr]    |
[INFO] [stderr] 80 |     fs::remove_file(enc_path.clone());
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]    |
[INFO] [stderr]    = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stderr]    = note: `#[warn(unused_must_use)]` on by default
[INFO] [stderr] help: use `let _ = ...` to ignore the resulting value
[INFO] [stderr]    |
[INFO] [stderr] 80 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stderr]    |     +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_message_AES_Kyber1024` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:100:4
[INFO] [stderr]     |
[INFO] [stderr] 100 | fn encrypt_message_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_data_AES_Kyber1024` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:129:4
[INFO] [stderr]     |
[INFO] [stderr] 129 | fn encrypt_data_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_data_aes_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_message_AES_Kyber768` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:156:4
[INFO] [stderr]     |
[INFO] [stderr] 156 | fn encrypt_message_AES_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber768`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_message_AES_Kyber512` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:184:4
[INFO] [stderr]     |
[INFO] [stderr] 184 | fn encrypt_message_AES_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber512`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_file_AES_Kyber1024` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:213:4
[INFO] [stderr]     |
[INFO] [stderr] 213 | fn encrypt_file_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: unused `std::result::Result` that must be used
[INFO] [stderr]    --> src/tests/KyberTests.rs:235:5
[INFO] [stderr]     |
[INFO] [stderr] 235 |     fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stderr] help: use `let _ = ...` to ignore the resulting value
[INFO] [stderr]     |
[INFO] [stderr] 235 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_file_AES_Kyber768` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:257:4
[INFO] [stderr]     |
[INFO] [stderr] 257 | fn encrypt_file_AES_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber768`
[INFO] [stderr] 
[INFO] [stderr] warning: unused `std::result::Result` that must be used
[INFO] [stderr]    --> src/tests/KyberTests.rs:279:5
[INFO] [stderr]     |
[INFO] [stderr] 279 |     fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stderr] help: use `let _ = ...` to ignore the resulting value
[INFO] [stderr]     |
[INFO] [stderr] 279 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_file_AES_Kyber512` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:302:4
[INFO] [stderr]     |
[INFO] [stderr] 302 | fn encrypt_file_AES_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber512`
[INFO] [stderr] 
[INFO] [stderr] warning: unused `std::result::Result` that must be used
[INFO] [stderr]    --> src/tests/KyberTests.rs:324:5
[INFO] [stderr]     |
[INFO] [stderr] 324 |     fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stderr] help: use `let _ = ...` to ignore the resulting value
[INFO] [stderr]     |
[INFO] [stderr] 324 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_message_XChaCha20_Kyber1024` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:346:4
[INFO] [stderr]     |
[INFO] [stderr] 346 | fn encrypt_message_XChaCha20_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_message_XChaCha20_Kyber768` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:374:4
[INFO] [stderr]     |
[INFO] [stderr] 374 | fn encrypt_message_XChaCha20_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber768`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_message_XChaCha20_Kyber512` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:402:4
[INFO] [stderr]     |
[INFO] [stderr] 402 | fn encrypt_message_XChaCha20_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber512`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_file_XChaCha20_Kyber1024` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:430:4
[INFO] [stderr]     |
[INFO] [stderr] 430 | fn encrypt_file_XChaCha20_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: unused `std::result::Result` that must be used
[INFO] [stderr]    --> src/tests/KyberTests.rs:454:5
[INFO] [stderr]     |
[INFO] [stderr] 454 |     fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stderr] help: use `let _ = ...` to ignore the resulting value
[INFO] [stderr]     |
[INFO] [stderr] 454 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_file_XChaCha20_Kyber768` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:476:4
[INFO] [stderr]     |
[INFO] [stderr] 476 | fn encrypt_file_XChaCha20_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber768`
[INFO] [stderr] 
[INFO] [stderr] warning: unused `std::result::Result` that must be used
[INFO] [stderr]    --> src/tests/KyberTests.rs:500:5
[INFO] [stderr]     |
[INFO] [stderr] 500 |     fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stderr] help: use `let _ = ...` to ignore the resulting value
[INFO] [stderr]     |
[INFO] [stderr] 500 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_file_XChaCha20_Kyber512` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:522:4
[INFO] [stderr]     |
[INFO] [stderr] 522 | fn encrypt_file_XChaCha20_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber512`
[INFO] [stderr] 
[INFO] [stderr] warning: unused `std::result::Result` that must be used
[INFO] [stderr]    --> src/tests/KyberTests.rs:546:5
[INFO] [stderr]     |
[INFO] [stderr] 546 |     fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stderr] help: use `let _ = ...` to ignore the resulting value
[INFO] [stderr]     |
[INFO] [stderr] 546 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: function `SignEncrypt` should have a snake case name
[INFO] [stderr]   --> src/tests/MacroTests.rs:97:4
[INFO] [stderr]    |
[INFO] [stderr] 97 | fn SignEncrypt() {
[INFO] [stderr]    |    ^^^^^^^^^^^ help: convert the identifier to snake case: `sign_encrypt`
[INFO] [stderr] 
[INFO] [stderr] warning: function `SignEncrypt_DecryptOpen` should have a snake case name
[INFO] [stderr]    --> src/tests/MacroTests.rs:109:4
[INFO] [stderr]     |
[INFO] [stderr] 109 | fn SignEncrypt_DecryptOpen() {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `sign_encrypt_decrypt_open`
[INFO] [stderr] 
[INFO] [stderr] warning: function `test_save_Falcon1024_keys` should have a snake case name
[INFO] [stderr]  --> src/tests/SignatureTests.rs:9:4
[INFO] [stderr]   |
[INFO] [stderr] 9 | fn test_save_Falcon1024_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]   |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `test_save_falcon1024_keys`
[INFO] [stderr] 
[INFO] [stderr] warning: function `test_save_Falcon512_keys` should have a snake case name
[INFO] [stderr]   --> src/tests/SignatureTests.rs:24:4
[INFO] [stderr]    |
[INFO] [stderr] 24 | fn test_save_Falcon512_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]    |    ^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `test_save_falcon512_keys`
[INFO] [stderr] 
[INFO] [stderr] warning: function `test_save_Dilithium2_keys` should have a snake case name
[INFO] [stderr]   --> src/tests/SignatureTests.rs:39:4
[INFO] [stderr]    |
[INFO] [stderr] 39 | fn test_save_Dilithium2_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium2_keys`
[INFO] [stderr] 
[INFO] [stderr] warning: function `test_save_Dilithium3_keys` should have a snake case name
[INFO] [stderr]   --> src/tests/SignatureTests.rs:54:4
[INFO] [stderr]    |
[INFO] [stderr] 54 | fn test_save_Dilithium3_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium3_keys`
[INFO] [stderr] 
[INFO] [stderr] warning: function `test_save_Dilithium5_keys` should have a snake case name
[INFO] [stderr]   --> src/tests/SignatureTests.rs:69:4
[INFO] [stderr]    |
[INFO] [stderr] 69 | fn test_save_Dilithium5_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium5_keys`
[INFO] [stderr] 
[INFO] [stderr] warning: `crypt_guard` (lib) generated 20 warnings
[INFO] [stderr] warning: `crypt_guard` (lib test) generated 58 warnings (20 duplicates)
[INFO] [stderr] warning: unused import: `error::*`
[INFO] [stderr]  --> examples/encrypt_aes.rs:2:22
[INFO] [stderr]   |
[INFO] [stderr] 2 | use crypt_guard::{*, error::*};
[INFO] [stderr]   |                      ^^^^^^^^
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused imports: `PathBuf`, `Path`, `Read`, `Write`, `marker::PhantomData`, `self`
[INFO] [stderr]  --> examples/encrypt_aes.rs:4:10
[INFO] [stderr]   |
[INFO] [stderr] 4 |     fs::{self, File}, 
[INFO] [stderr]   |          ^^^^
[INFO] [stderr] 5 |     marker::PhantomData,
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 6 |     path::{PathBuf, Path},
[INFO] [stderr]   |            ^^^^^^^  ^^^^
[INFO] [stderr] 7 |     io::{Read, Write},
[INFO] [stderr]   |          ^^^^  ^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused imports: `Builder`, `TempDir`
[INFO] [stderr]   --> examples/encrypt_aes.rs:10:16
[INFO] [stderr]    |
[INFO] [stderr] 10 | use tempfile::{TempDir, Builder};
[INFO] [stderr]    |                ^^^^^^^  ^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]   --> examples/encrypt_aes.rs:33:9
[INFO] [stderr]    |
[INFO] [stderr] 33 |     let mut decryptor = Kyber::<Decryption, Kyber1024, File, AES>::new(secret_key, None)?;
[INFO] [stderr]    |         ----^^^^^^^^^
[INFO] [stderr]    |         |
[INFO] [stderr]    |         help: remove this `mut`
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(unused_mut)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stderr]   --> examples/encrypt_aes.rs:26:66
[INFO] [stderr]    |
[INFO] [stderr] 26 |     let (encrypt_message, cipher) = encryptor.encrypt_msg(message.clone(), passphrase.clone())?;
[INFO] [stderr]    |                                                                  ^^^^^^^^ help: remove this redundant call
[INFO] [stderr]    |
[INFO] [stderr]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stderr]    = note: `#[warn(noop_method_call)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stderr]   --> examples/encrypt_aes.rs:26:86
[INFO] [stderr]    |
[INFO] [stderr] 26 |     let (encrypt_message, cipher) = encryptor.encrypt_msg(message.clone(), passphrase.clone())?;
[INFO] [stderr]    |                                                                                      ^^^^^^^^ help: remove this redundant call
[INFO] [stderr]    |
[INFO] [stderr]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stderr] 
[INFO] [stderr] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stderr]   --> examples/encrypt_aes.rs:36:84
[INFO] [stderr]    |
[INFO] [stderr] 36 |     let decrypt_message = decryptor.decrypt_msg(encrypt_message.clone(), passphrase.clone(), cipher)?;
[INFO] [stderr]    |                                                                                    ^^^^^^^^ help: remove this redundant call
[INFO] [stderr]    |
[INFO] [stderr]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stderr] 
[INFO] [stderr] warning: unused imports: `PathBuf`, `Path`, `Read`, `Write`, `marker::PhantomData`
[INFO] [stderr]  --> examples/encrypt_xchacha.rs:4:2
[INFO] [stderr]   |
[INFO] [stderr] 4 |     marker::PhantomData,
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 5 |     path::{PathBuf, Path},
[INFO] [stderr]   |            ^^^^^^^  ^^^^
[INFO] [stderr] 6 |     io::{Read, Write},
[INFO] [stderr]   |          ^^^^  ^^^^^
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `tmp_dir`
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:15:9
[INFO] [stderr]    |
[INFO] [stderr] 15 |     let tmp_dir = TempDir::new().map_err(|e| CryptError::from(e))?;
[INFO] [stderr]    |         ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_tmp_dir`
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(unused_variables)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `encrypt_message`
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:33:10
[INFO] [stderr]    |
[INFO] [stderr] 33 |     let (encrypt_message, cipher) = encryptor.encrypt_file(enc_path.clone(), passphrase.clone())?;
[INFO] [stderr]    |          ^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_encrypt_message`
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `decrypt_message`
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:44:9
[INFO] [stderr]    |
[INFO] [stderr] 44 |     let decrypt_message = decryptor.decrypt_file(dec_path.clone(), passphrase.clone(), cipher)?;
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_decrypt_message`
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:41:9
[INFO] [stderr]    |
[INFO] [stderr] 41 |     let mut decryptor = Kyber::<Decryption, Kyber768, File, XChaCha20>::new(secret_key, Some(nonce?.to_string()))?;
[INFO] [stderr]    |         ----^^^^^^^^^
[INFO] [stderr]    |         |
[INFO] [stderr]    |         help: remove this `mut`
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(unused_mut)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:18:34
[INFO] [stderr]    |
[INFO] [stderr] 18 |     let enc_path = tmp_dir.path().clone().join("message.txt");
[INFO] [stderr]    |                                  ^^^^^^^^
[INFO] [stderr]    |
[INFO] [stderr]    = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed
[INFO] [stderr]    = note: `#[warn(noop_method_call)]` on by default
[INFO] [stderr] help: remove this redundant call
[INFO] [stderr]    |
[INFO] [stderr] 18 -     let enc_path = tmp_dir.path().clone().join("message.txt");
[INFO] [stderr] 18 +     let enc_path = tmp_dir.path().join("message.txt");
[INFO] [stderr]    |
[INFO] [stderr] 
[INFO] [stderr] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:19:34
[INFO] [stderr]    |
[INFO] [stderr] 19 |     let dec_path = tmp_dir.path().clone().join("message.txt.enc"); 
[INFO] [stderr]    |                                  ^^^^^^^^
[INFO] [stderr]    |
[INFO] [stderr]    = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed
[INFO] [stderr] help: remove this redundant call
[INFO] [stderr]    |
[INFO] [stderr] 19 -     let dec_path = tmp_dir.path().clone().join("message.txt.enc"); 
[INFO] [stderr] 19 +     let dec_path = tmp_dir.path().join("message.txt.enc"); 
[INFO] [stderr]    |
[INFO] [stderr] 
[INFO] [stderr] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:33:88
[INFO] [stderr]    |
[INFO] [stderr] 33 |     let (encrypt_message, cipher) = encryptor.encrypt_file(enc_path.clone(), passphrase.clone())?;
[INFO] [stderr]    |                                                                                        ^^^^^^^^ help: remove this redundant call
[INFO] [stderr]    |
[INFO] [stderr]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stderr] 
[INFO] [stderr] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:44:78
[INFO] [stderr]    |
[INFO] [stderr] 44 |     let decrypt_message = decryptor.decrypt_file(dec_path.clone(), passphrase.clone(), cipher)?;
[INFO] [stderr]    |                                                                              ^^^^^^^^ help: remove this redundant call
[INFO] [stderr]    |
[INFO] [stderr]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stderr] 
[INFO] [stderr] warning: unused imports: `Message`, `error::*`
[INFO] [stderr]  --> examples/macro_example.rs:5:5
[INFO] [stderr]   |
[INFO] [stderr] 5 |     error::*,
[INFO] [stderr]   |     ^^^^^^^^
[INFO] [stderr] ...
[INFO] [stderr] 9 |     Message, 
[INFO] [stderr]   |     ^^^^^^^
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: `crypt_guard` (example "encrypt_aes") generated 7 warnings (run `cargo fix --example "encrypt_aes"` to apply 7 suggestions)
[INFO] [stderr] warning: `crypt_guard` (example "encrypt_xchacha") generated 9 warnings (run `cargo fix --example "encrypt_xchacha"` to apply 6 suggestions)
[INFO] [stderr] warning: `crypt_guard` (example "macro_example") generated 1 warning (run `cargo fix --example "macro_example"` to apply 1 suggestion)
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.08s
[INFO] [stderr]      Running unittests src/lib.rs (/opt/rustwide/target/debug/deps/crypt_guard-71c2a7164a7ad10a)
[INFO] [stdout] 
[INFO] [stdout] running 53 tests
[INFO] [stdout] test tests::KyberKeyTest::begin ... ok
[INFO] [stdout] test tests::KyberKeyTest::encap_decap_kyber1024 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_file_XChaCha20_Kyber1024 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_file_AES_Kyber1024 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_file_AES_Kyber768 ... ok
[INFO] [stdout] test tests::KyberKeyTest::keypair_generation_kyber512 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_decrypt_msg_macro_AES_Kyber1024 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_message_AES_Kyber1024 ... ok
[INFO] [stdout] test tests::KyberKeyTest::keypair_generation_kyber768 ... ok
[INFO] [stdout] test tests::KyberKeyTest::keypair_generation_kyber1024 ... ok
[INFO] [stdout] test tests::KyberKeyTest::encap_decap_kyber768 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_decrypt_data_macro_AES_Kyber1024 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_decrypt_file_macro_AES_Kyber1024 ... ok
[INFO] [stdout] test tests::KyberKeyTest::key_control_functionality ... ok
[INFO] [stdout] test tests::KyberKeyTest::encap_decap_kyber512 ... ok
[INFO] [stdout] test tests::MacroTests::test_concat_and_split_key ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_file_XChaCha20_Kyber768 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_message_XChaCha20_Kyber1024 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_message_AES_Kyber768 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_message_XChaCha20_Kyber512 ... ok
[INFO] [stdout] test tests::MacroTests::test_dilithium_keypair_2 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_file_AES_Kyber512 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_file_XChaCha20_Kyber512 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_message_XChaCha20_Kyber768 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_data_AES_Kyber1024 ... ok
[INFO] [stdout] test tests::MacroTests::test_dilithium_keypair_3 ... ok
[INFO] [stdout] test tests::MacroTests::test_dilithium_keypair_5 ... ok
[INFO] [stdout] test tests::MacroTests::test_kyber_keypair_512 ... ok
[INFO] [stdout] test tests::MacroTests::test_kyber_keypair_1024 ... ok
[INFO] [stdout] test tests::SignatureTests::test_dilithium2_signature_message ... ok
[INFO] [stdout] test tests::SignatureTests::end2 ... ok
[INFO] [stdout] test tests::SignatureTests::test_dilithium3_detached_signature ... ok
[INFO] [stdout] test tests::SignatureTests::test_dilithium2_detached_signature ... ok
[INFO] [stdout] test tests::MacroTests::test_kyber_keypair_768 ... ok
[INFO] [stdout] test tests::SignatureTests::test_dilithium5_detached_signature ... ok
[INFO] [stdout] test tests::SignatureTests::test_dilithium5_signature_message ... ok
[INFO] [stdout] test tests::SignatureTests::test_save_Dilithium2_keys ... FAILED
[INFO] [stdout] test tests::SignatureTests::test_save_Dilithium5_keys ... FAILED
[INFO] [stdout] test tests::ze_end::end ... ok
[INFO] [stdout] test tests::SignatureTests::test_save_Dilithium3_keys ... FAILED
[INFO] [stdout] test tests::SignatureTests::test_dilithium3_signature_message ... ok
[INFO] [stdout] test tests::KyberKeyTest::test_key ... FAILED
[INFO] [stdout] test tests::KyberKeyTest::test_key_control_safe_functionality ... FAILED
[INFO] [stdout] test tests::MacroTests::test_falcon_keypair_512 ... ok
[INFO] [stdout] test tests::SignatureTests::test_falcon512_detached_signature ... ok
[INFO] [stdout] test tests::SignatureTests::test_save_Falcon512_keys ... FAILED
[INFO] [stdout] test tests::MacroTests::test_falcon_keypair_1024 ... ok
[INFO] [stdout] test tests::SignatureTests::test_falcon512_signature_message ... ok
[INFO] [stdout] test tests::MacroTests::SignEncrypt ... ok
[INFO] [stdout] test tests::SignatureTests::test_save_Falcon1024_keys ... FAILED
[INFO] [stdout] test tests::SignatureTests::test_falcon1024_signature_message ... ok
[INFO] [stdout] test tests::SignatureTests::test_falcon1024_detached_signature ... ok
[INFO] [stdout] test tests::MacroTests::SignEncrypt_DecryptOpen ... ok
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout] 
[INFO] [stdout] ---- tests::SignatureTests::test_save_Dilithium2_keys stdout ----
[INFO] [stdout] Error: UnsupportedFileType("pub")
[INFO] [stdout] 
[INFO] [stdout] ---- tests::SignatureTests::test_save_Dilithium5_keys stdout ----
[INFO] [stdout] Error: UnsupportedFileType("pub")
[INFO] [stdout] 
[INFO] [stdout] ---- tests::SignatureTests::test_save_Dilithium3_keys stdout ----
[INFO] [stdout] Error: UnsupportedFileType("pub")
[INFO] [stdout] 
[INFO] [stdout] ---- tests::KyberKeyTest::test_key stdout ----
[INFO] [stdout] thread 'tests::KyberKeyTest::test_key' panicked at src/Core/kyber/KeyControler.rs:256:23:
[INFO] [stdout] called `Result::unwrap()` on an `Err` value: IOError(Os { code: 2, kind: NotFound, message: "No such file or directory" })
[INFO] [stdout] stack backtrace:
[INFO] [stdout]    0:     0x556a46c76035 - std::backtrace_rs::backtrace::libunwind::trace::h59d96bdb08384354
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/../../backtrace/src/backtrace/libunwind.rs:105:5
[INFO] [stdout]    1:     0x556a46c76035 - std::backtrace_rs::backtrace::trace_unsynchronized::h9cf5becacfc93fba
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/../../backtrace/src/backtrace/mod.rs:66:5
[INFO] [stdout]    2:     0x556a46c76035 - std::sys_common::backtrace::_print_fmt::h10b76d10405dbd48
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/sys_common/backtrace.rs:68:5
[INFO] [stdout]    3:     0x556a46c76035 - <std::sys_common::backtrace::_print::DisplayBacktrace as core::fmt::Display>::fmt::h6ed9e62a156d84e4
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/sys_common/backtrace.rs:44:22
[INFO] [stdout]    4:     0x556a46c9d8eb - core::fmt::rt::Argument::fmt::h645c680983f03c9f
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/fmt/rt.rs:165:63
[INFO] [stdout]    5:     0x556a46c9d8eb - core::fmt::write::h8bcd80919a02be29
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/fmt/mod.rs:1169:21
[INFO] [stdout]    6:     0x556a46c731af - std::io::Write::write_fmt::h8d0c47c662cad79c
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/io/mod.rs:1835:15
[INFO] [stdout]    7:     0x556a46c75e0e - std::sys_common::backtrace::_print::h6306f131a28d62b0
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/sys_common/backtrace.rs:47:5
[INFO] [stdout]    8:     0x556a46c75e0e - std::sys_common::backtrace::print::h7079288e0a26dfcc
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/sys_common/backtrace.rs:34:9
[INFO] [stdout]    9:     0x556a46c77839 - std::panicking::default_hook::{{closure}}::hb063ecec81a736ba
[INFO] [stdout]   10:     0x556a46c774fe - std::panicking::default_hook::hd56ee406bf547b5c
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:295:9
[INFO] [stdout]   11:     0x556a46acb23a - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::he5eacdef44c8728f
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/alloc/src/boxed.rs:2036:9
[INFO] [stdout]   12:     0x556a46acb23a - test::test_main::{{closure}}::h0ec9aed229e79095
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/test/src/lib.rs:137:21
[INFO] [stdout]   13:     0x556a46c77e3b - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::hcbd0d80e1ad4e4f9
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/alloc/src/boxed.rs:2036:9
[INFO] [stdout]   14:     0x556a46c77e3b - std::panicking::rust_panic_with_hook::h624aa3ca42ebb8f2
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:799:13
[INFO] [stdout]   15:     0x556a46c77bb4 - std::panicking::begin_panic_handler::{{closure}}::hbc4e76194a5e287c
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:664:13
[INFO] [stdout]   16:     0x556a46c764f9 - std::sys_common::backtrace::__rust_end_short_backtrace::h847fedc9d1ff7b6d
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/sys_common/backtrace.rs:171:18
[INFO] [stdout]   17:     0x556a46c778e7 - rust_begin_unwind
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:652:5
[INFO] [stdout]   18:     0x556a469f6e33 - core::panicking::panic_fmt::hec11a924b87ce965
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/panicking.rs:72:14
[INFO] [stdout]   19:     0x556a469f7366 - core::result::unwrap_failed::h382691b96ca8c13a
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/result.rs:1654:5
[INFO] [stdout]   20:     0x556a46a94507 - core::result::Result<T,E>::unwrap::ha87ce6e5c9e2e788
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/result.rs:1077:23
[INFO] [stdout]   21:     0x556a46a94507 - crypt_guard::Core::kyber::KeyControler::KeyControl<T>::load::hecfa953642e74f5c
[INFO] [stdout]                                at /opt/rustwide/workdir/src/Core/kyber/KeyControler.rs:256:6
[INFO] [stdout]   22:     0x556a46a6e75b - crypt_guard::tests::KyberKeyTest::test_key::h360021ccc5d1783e
[INFO] [stdout]                                at /opt/rustwide/workdir/src/tests/KyberKeyTest.rs:159:23
[INFO] [stdout]   23:     0x556a46a6e387 - crypt_guard::tests::KyberKeyTest::test_key::{{closure}}::he660871da66d32c1
[INFO] [stdout]                                at /opt/rustwide/workdir/src/tests/KyberKeyTest.rs:139:14
[INFO] [stdout]   24:     0x556a46a3f406 - core::ops::function::FnOnce::call_once::ha9030d33d3ab61c2
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   25:     0x556a46acfc1b - core::ops::function::FnOnce::call_once::h2e43a8f6f3d94b99
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   26:     0x556a46acfc1b - test::__rust_begin_short_backtrace::h214c9f2d2d3fee90
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/test/src/lib.rs:625:18
[INFO] [stdout]   27:     0x556a46acf321 - test::run_test_in_process::{{closure}}::h510b7ba7990692a5
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/test/src/lib.rs:648:60
[INFO] [stdout]   28:     0x556a46acf321 - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::h4157186197a93871
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/panic/unwind_safe.rs:272:9
[INFO] [stdout]   29:     0x556a46acf321 - std::panicking::try::do_call::h1bf2463bccd4b28c
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:559:40
[INFO] [stdout]   30:     0x556a46acf321 - std::panicking::try::hd6d4808c9fab4fa5
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:523:19
[INFO] [stdout]   31:     0x556a46acf321 - std::panic::catch_unwind::hd5641d97d123f9f2
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panic.rs:149:14
[INFO] [stdout]   32:     0x556a46acf321 - test::run_test_in_process::hc273b71c8b878a4c
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/test/src/lib.rs:648:27
[INFO] [stdout]   33:     0x556a46acf321 - test::run_test::{{closure}}::h6838df834eb8467e
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/test/src/lib.rs:569:43
[INFO] [stdout]   34:     0x556a46a97ce4 - test::run_test::{{closure}}::h608b98ecff5665fb
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/test/src/lib.rs:599:41
[INFO] [stdout]   35:     0x556a46a97ce4 - std::sys_common::backtrace::__rust_begin_short_backtrace::hdc4182b97d1042e9
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/sys_common/backtrace.rs:155:18
[INFO] [stdout]   36:     0x556a46a9c712 - std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}}::h571773fd21d674c8
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/thread/mod.rs:542:17
[INFO] [stdout]   37:     0x556a46a9c712 - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::hdcd384cf2fa70ba3
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/panic/unwind_safe.rs:272:9
[INFO] [stdout]   38:     0x556a46a9c712 - std::panicking::try::do_call::h4f1a44bd81423be1
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:559:40
[INFO] [stdout]   39:     0x556a46a9c712 - std::panicking::try::h5e02afcb81dcd361
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:523:19
[INFO] [stdout]   40:     0x556a46a9c712 - std::panic::catch_unwind::h022f75775bfd8c45
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panic.rs:149:14
[INFO] [stdout]   41:     0x556a46a9c712 - std::thread::Builder::spawn_unchecked_::{{closure}}::hf5a62e9e4e6df1f8
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/thread/mod.rs:541:30
[INFO] [stdout]   42:     0x556a46a9c712 - core::ops::function::FnOnce::call_once{{vtable.shim}}::h6d56360aeb9509a7
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   43:     0x556a46c7cccb - <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once::h7a343dc551c06baa
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/alloc/src/boxed.rs:2022:9
[INFO] [stdout]   44:     0x556a46c7cccb - <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once::h30b8111cbaa644f3
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/alloc/src/boxed.rs:2022:9
[INFO] [stdout]   45:     0x556a46c7cccb - std::sys::pal::unix::thread::Thread::new::thread_start::h7404e134e61e7a11
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/sys/pal/unix/thread.rs:108:17
[INFO] [stdout]   46:     0x7fa0c5a33ac3 - <unknown>
[INFO] [stdout]   47:     0x7fa0c5ac4a04 - __clone
[INFO] [stdout]   48:                0x0 - <unknown>
[INFO] [stdout] 
[INFO] [stdout] ---- tests::KyberKeyTest::test_key_control_safe_functionality stdout ----
[INFO] [stdout] thread 'tests::KyberKeyTest::test_key_control_safe_functionality' panicked at src/tests/KyberKeyTest.rs:113:59:
[INFO] [stdout] called `Result::unwrap()` on an `Err` value: WriteError
[INFO] [stdout] stack backtrace:
[INFO] [stdout]    0:     0x556a46c76035 - std::backtrace_rs::backtrace::libunwind::trace::h59d96bdb08384354
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/../../backtrace/src/backtrace/libunwind.rs:105:5
[INFO] [stdout]    1:     0x556a46c76035 - std::backtrace_rs::backtrace::trace_unsynchronized::h9cf5becacfc93fba
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/../../backtrace/src/backtrace/mod.rs:66:5
[INFO] [stdout]    2:     0x556a46c76035 - std::sys_common::backtrace::_print_fmt::h10b76d10405dbd48
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/sys_common/backtrace.rs:68:5
[INFO] [stdout]    3:     0x556a46c76035 - <std::sys_common::backtrace::_print::DisplayBacktrace as core::fmt::Display>::fmt::h6ed9e62a156d84e4
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/sys_common/backtrace.rs:44:22
[INFO] [stdout]    4:     0x556a46c9d8eb - core::fmt::rt::Argument::fmt::h645c680983f03c9f
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/fmt/rt.rs:165:63
[INFO] [stdout]    5:     0x556a46c9d8eb - core::fmt::write::h8bcd80919a02be29
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/fmt/mod.rs:1169:21
[INFO] [stdout]    6:     0x556a46c731af - std::io::Write::write_fmt::h8d0c47c662cad79c
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/io/mod.rs:1835:15
[INFO] [stdout]    7:     0x556a46c75e0e - std::sys_common::backtrace::_print::h6306f131a28d62b0
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/sys_common/backtrace.rs:47:5
[INFO] [stdout]    8:     0x556a46c75e0e - std::sys_common::backtrace::print::h7079288e0a26dfcc
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/sys_common/backtrace.rs:34:9
[INFO] [stdout]    9:     0x556a46c77839 - std::panicking::default_hook::{{closure}}::hb063ecec81a736ba
[INFO] [stdout]   10:     0x556a46c774fe - std::panicking::default_hook::hd56ee406bf547b5c
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:295:9
[INFO] [stdout]   11:     0x556a46acb23a - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::he5eacdef44c8728f
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/alloc/src/boxed.rs:2036:9
[INFO] [stdout]   12:     0x556a46acb23a - test::test_main::{{closure}}::h0ec9aed229e79095
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/test/src/lib.rs:137:21
[INFO] [stdout]   13:     0x556a46c77e3b - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::hcbd0d80e1ad4e4f9
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/alloc/src/boxed.rs:2036:9
[INFO] [stdout]   14:     0x556a46c77e3b - std::panicking::rust_panic_with_hook::h624aa3ca42ebb8f2
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:799:13
[INFO] [stdout]   15:     0x556a46c77bb4 - std::panicking::begin_panic_handler::{{closure}}::hbc4e76194a5e287c
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:664:13
[INFO] [stdout]   16:     0x556a46c764f9 - std::sys_common::backtrace::__rust_end_short_backtrace::h847fedc9d1ff7b6d
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/sys_common/backtrace.rs:171:18
[INFO] [stdout]   17:     0x556a46c778e7 - rust_begin_unwind
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:652:5
[INFO] [stdout]   18:     0x556a469f6e33 - core::panicking::panic_fmt::hec11a924b87ce965
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/panicking.rs:72:14
[INFO] [stdout]   19:     0x556a469f7366 - core::result::unwrap_failed::h382691b96ca8c13a
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/result.rs:1654:5
[INFO] [stdout]   20:     0x556a46a6d1b4 - core::result::Result<T,E>::unwrap::h3a17ec4177b8e0f7
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/result.rs:1077:23
[INFO] [stdout]   21:     0x556a46a6d1b4 - crypt_guard::tests::KyberKeyTest::test_key_control_safe_functionality::hbba120755ceef88f
[INFO] [stdout]                                at /opt/rustwide/workdir/src/tests/KyberKeyTest.rs:113:5
[INFO] [stdout]   22:     0x556a46a6cbd7 - crypt_guard::tests::KyberKeyTest::test_key_control_safe_functionality::{{closure}}::h2ef089d5fe6a08e3
[INFO] [stdout]                                at /opt/rustwide/workdir/src/tests/KyberKeyTest.rs:102:45
[INFO] [stdout]   23:     0x556a46a3f7c6 - core::ops::function::FnOnce::call_once::hec6f37d68fae795a
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   24:     0x556a46acfc1b - core::ops::function::FnOnce::call_once::h2e43a8f6f3d94b99
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   25:     0x556a46acfc1b - test::__rust_begin_short_backtrace::h214c9f2d2d3fee90
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/test/src/lib.rs:625:18
[INFO] [stdout]   26:     0x556a46acf321 - test::run_test_in_process::{{closure}}::h510b7ba7990692a5
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/test/src/lib.rs:648:60
[INFO] [stdout]   27:     0x556a46acf321 - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::h4157186197a93871
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/panic/unwind_safe.rs:272:9
[INFO] [stdout]   28:     0x556a46acf321 - std::panicking::try::do_call::h1bf2463bccd4b28c
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:559:40
[INFO] [stdout]   29:     0x556a46acf321 - std::panicking::try::hd6d4808c9fab4fa5
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:523:19
[INFO] [stdout]   30:     0x556a46acf321 - std::panic::catch_unwind::hd5641d97d123f9f2
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panic.rs:149:14
[INFO] [stdout]   31:     0x556a46acf321 - test::run_test_in_process::hc273b71c8b878a4c
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/test/src/lib.rs:648:27
[INFO] [stdout]   32:     0x556a46acf321 - test::run_test::{{closure}}::h6838df834eb8467e
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/test/src/lib.rs:569:43
[INFO] [stdout]   33:     0x556a46a97ce4 - test::run_test::{{closure}}::h608b98ecff5665fb
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/test/src/lib.rs:599:41
[INFO] [stdout]   34:     0x556a46a97ce4 - std::sys_common::backtrace::__rust_begin_short_backtrace::hdc4182b97d1042e9
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/sys_common/backtrace.rs:155:18
[INFO] [stdout]   35:     0x556a46a9c712 - std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}}::h571773fd21d674c8
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/thread/mod.rs:542:17
[INFO] [stdout]   36:     0x556a46a9c712 - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::hdcd384cf2fa70ba3
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/panic/unwind_safe.rs:272:9
[INFO] [stdout]   37:     0x556a46a9c712 - std::panicking::try::do_call::h4f1a44bd81423be1
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:559:40
[INFO] [stdout]   38:     0x556a46a9c712 - std::panicking::try::h5e02afcb81dcd361
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panicking.rs:523:19
[INFO] [stdout]   39:     0x556a46a9c712 - std::panic::catch_unwind::h022f75775bfd8c45
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/panic.rs:149:14
[INFO] [stdout]   40:     0x556a46a9c712 - std::thread::Builder::spawn_unchecked_::{{closure}}::hf5a62e9e4e6df1f8
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/thread/mod.rs:541:30
[INFO] [stdout]   41:     0x556a46a9c712 - core::ops::function::FnOnce::call_once{{vtable.shim}}::h6d56360aeb9509a7
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   42:     0x556a46c7cccb - <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once::h7a343dc551c06baa
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/alloc/src/boxed.rs:2022:9
[INFO] [stdout]   43:     0x556a46c7cccb - <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once::h30b8111cbaa644f3
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/alloc/src/boxed.rs:2022:9
[INFO] [stdout]   44:     0x556a46c7cccb - std::sys::pal::unix::thread::Thread::new::thread_start::h7404e134e61e7a11
[INFO] [stdout]                                at /rustc/1871252fc8bb672d40787e67404e6eaae7059369/library/std/src/sys/pal/unix/thread.rs:108:17
[INFO] [stdout]   45:     0x7fa0c5a33ac3 - <unknown>
[INFO] [stdout]   46:     0x7fa0c5ac4a04 - __clone
[INFO] [stdout]   47:                0x0 - <unknown>
[INFO] [stdout] 
[INFO] [stdout] ---- tests::SignatureTests::test_save_Falcon512_keys stdout ----
[INFO] [stdout] Error: UnsupportedFileType("pub")
[INFO] [stdout] 
[INFO] [stdout] ---- tests::SignatureTests::test_save_Falcon1024_keys stdout ----
[INFO] [stdout] Error: UnsupportedFileType("pub")
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout]     tests::KyberKeyTest::test_key
[INFO] [stdout]     tests::KyberKeyTest::test_key_control_safe_functionality
[INFO] [stdout]     tests::SignatureTests::test_save_Dilithium2_keys
[INFO] [stdout]     tests::SignatureTests::test_save_Dilithium3_keys
[INFO] [stdout]     tests::SignatureTests::test_save_Dilithium5_keys
[INFO] [stdout]     tests::SignatureTests::test_save_Falcon1024_keys
[INFO] [stdout]     tests::SignatureTests::test_save_Falcon512_keys
[INFO] [stdout] 
[INFO] [stdout] test result: FAILED. 46 passed; 7 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.27s
[INFO] [stdout] 
[INFO] [stderr] error: test failed, to rerun pass `--lib`
[INFO] running `Command { std: "docker" "inspect" "2241e0ddbae321d92b3a2a469ed92137fd81ab1f7000a2b2c98616ecead500ae", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "2241e0ddbae321d92b3a2a469ed92137fd81ab1f7000a2b2c98616ecead500ae", kill_on_drop: false }`
[INFO] [stdout] 2241e0ddbae321d92b3a2a469ed92137fd81ab1f7000a2b2c98616ecead500ae
[INFO] testing crypt_guard-1.2.9 against try#b642703cf9526da1e72c0b6755753b939a9c6b6d for pr-125151
[INFO] extracting crate crypt_guard 1.2.9 into /workspace/builds/worker-7-tc2/source
[INFO] validating manifest of crates.io crate crypt_guard 1.2.9 on toolchain b642703cf9526da1e72c0b6755753b939a9c6b6d
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b642703cf9526da1e72c0b6755753b939a9c6b6d" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking crates.io crate crypt_guard 1.2.9
[INFO] finished tweaking crates.io crate crypt_guard 1.2.9
[INFO] tweaked toml for crates.io crate crypt_guard 1.2.9 written to /workspace/builds/worker-7-tc2/source/Cargo.toml
[INFO] crate crates.io crate crypt_guard 1.2.9 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b642703cf9526da1e72c0b6755753b939a9c6b6d" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Blocking waiting for file lock on package cache
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:59a85a07ab18ca8720692f8e61effa1c651d9e2ca591e072c2b212bb91a6b8b5" "/opt/rustwide/cargo-home/bin/cargo" "+b642703cf9526da1e72c0b6755753b939a9c6b6d" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 3cddf3198c4bb25bb3cdd6bdb8ed4977b045454ff64f9ee40d87e757741e88b0
[INFO] running `Command { std: "docker" "start" "-a" "3cddf3198c4bb25bb3cdd6bdb8ed4977b045454ff64f9ee40d87e757741e88b0", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "3cddf3198c4bb25bb3cdd6bdb8ed4977b045454ff64f9ee40d87e757741e88b0", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "3cddf3198c4bb25bb3cdd6bdb8ed4977b045454ff64f9ee40d87e757741e88b0", kill_on_drop: false }`
[INFO] [stdout] 3cddf3198c4bb25bb3cdd6bdb8ed4977b045454ff64f9ee40d87e757741e88b0
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:59a85a07ab18ca8720692f8e61effa1c651d9e2ca591e072c2b212bb91a6b8b5" "/opt/rustwide/cargo-home/bin/cargo" "+b642703cf9526da1e72c0b6755753b939a9c6b6d" "build" "--frozen" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] fa6f52a7f3c154742e1176294db8ecc0bc254097351f34120ced82988ae259de
[INFO] running `Command { std: "docker" "start" "-a" "fa6f52a7f3c154742e1176294db8ecc0bc254097351f34120ced82988ae259de", kill_on_drop: false }`
[INFO] [stderr]    Compiling libc v0.2.154
[INFO] [stderr]    Compiling once_cell v1.19.0
[INFO] [stderr]    Compiling typenum v1.17.0
[INFO] [stderr]    Compiling version_check v0.9.4
[INFO] [stderr]    Compiling cfg-if v1.0.0
[INFO] [stderr]    Compiling dunce v1.0.4
[INFO] [stderr]    Compiling glob v0.3.1
[INFO] [stderr]    Compiling proc-macro2 v1.0.81
[INFO] [stderr]    Compiling unicode-ident v1.0.12
[INFO] [stderr]    Compiling autocfg v1.2.0
[INFO] [stderr]    Compiling subtle v2.5.0
[INFO] [stderr]    Compiling cpufeatures v0.2.12
[INFO] [stderr]    Compiling pqcrypto-traits v0.3.5
[INFO] [stderr]    Compiling ppv-lite86 v0.2.17
[INFO] [stderr]    Compiling iana-time-zone v0.1.60
[INFO] [stderr]    Compiling hex v0.4.3
[INFO] [stderr]    Compiling env v0.0.0
[INFO] [stderr]    Compiling lazy_static v1.4.0
[INFO] [stderr]    Compiling generic-array v0.14.7
[INFO] [stderr]    Compiling num-traits v0.2.18
[INFO] [stderr]    Compiling quote v1.0.36
[INFO] [stderr]    Compiling syn v2.0.60
[INFO] [stderr]    Compiling jobserver v0.1.31
[INFO] [stderr]    Compiling getrandom v0.2.14
[INFO] [stderr]    Compiling rand_core v0.6.4
[INFO] [stderr]    Compiling rand_chacha v0.3.1
[INFO] [stderr]    Compiling cc v1.0.96
[INFO] [stderr]    Compiling rand v0.8.5
[INFO] [stderr]    Compiling chrono v0.4.38
[INFO] [stderr]    Compiling crypto-common v0.1.6
[INFO] [stderr]    Compiling inout v0.1.3
[INFO] [stderr]    Compiling block-buffer v0.10.4
[INFO] [stderr]    Compiling digest v0.10.7
[INFO] [stderr]    Compiling cipher v0.4.4
[INFO] [stderr]    Compiling sha2 v0.10.8
[INFO] [stderr]    Compiling hmac v0.12.1
[INFO] [stderr]    Compiling aes v0.8.4
[INFO] [stderr]    Compiling chacha20 v0.9.1
[INFO] [stderr]    Compiling pqcrypto-internals v0.2.5
[INFO] [stderr]    Compiling pqcrypto-dilithium v0.5.0
[INFO] [stderr]    Compiling pqcrypto-falcon v0.3.0
[INFO] [stderr]    Compiling pqcrypto-kyber v0.8.1
[INFO] [stderr]    Compiling crypt_guard_proc v0.1.0
[INFO] [stderr]    Compiling crypt_guard v1.2.9 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused import: `Mac`
[INFO] [stdout]  --> src/Core/KDF.rs:1:12
[INFO] [stdout]   |
[INFO] [stdout] 1 | use hmac::{Mac};
[INFO] [stdout]   |            ^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Ciphertext`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:64
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                                                ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Write`
[INFO] [stdout]   --> src/Core/cipher_aes.rs:25:10
[INFO] [stdout]    |
[INFO] [stdout] 25 |     io::{Write}, 
[INFO] [stdout]    |          ^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `KyberKeyFunctions`
[INFO] [stdout]  --> src/Core/cipher_aes.rs:9:9
[INFO] [stdout]   |
[INFO] [stdout] 9 |         KyberKeyFunctions,
[INFO] [stdout]   |         ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `KyberKeyFunctions`
[INFO] [stdout]   --> src/Core/cipher_xchacha.rs:12:9
[INFO] [stdout]    |
[INFO] [stdout] 12 |         KyberKeyFunctions,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `SharedSecret`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:50
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                                  ^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Mac`
[INFO] [stdout]  --> src/cryptography/hmac_sign/mod.rs:3:12
[INFO] [stdout]   |
[INFO] [stdout] 3 | use hmac::{Mac};
[INFO] [stdout]   |            ^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `SecretKey`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:39
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                       ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `PublicKey`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:28
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                            ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:157:13
[INFO] [stdout]     |
[INFO] [stdout] 157 |             _ => Err(|e| CryptError::IOError(e)),
[INFO] [stdout]     |             ^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unreachable_patterns)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `encrypted_data` is never read
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:125:17
[INFO] [stdout]     |
[INFO] [stdout] 125 |         let mut encrypted_data: Vec<u8> = Vec::new();
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: `#[warn(unused_assignments)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `nonce_vec` is never read
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:126:17
[INFO] [stdout]     |
[INFO] [stdout] 126 |         let mut nonce_vec: Vec<u8> = Vec::new();
[INFO] [stdout]     |                 ^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]   --> src/cryptography/hmac_sign/sign.rs:47:13
[INFO] [stdout]    |
[INFO] [stdout] 47 |             _ => vec![],
[INFO] [stdout]    |             ^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `save_ciphertext` is never used
[INFO] [stdout]    --> src/Core/cipher_aes.rs:104:8
[INFO] [stdout]     |
[INFO] [stdout] 33  | impl CipherAES {
[INFO] [stdout]     | -------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 104 |     fn save_ciphertext(&self, _encrypted_data: &[u8]) -> Result<(), CryptError> {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `public_key`, `secret_key`, `signed_msg`, and `signature` are never used
[INFO] [stdout]    --> src/cryptography/hmac_sign/mod.rs:176:8
[INFO] [stdout]     |
[INFO] [stdout] 168 | impl SignatureKey {
[INFO] [stdout]     | ----------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 176 |     fn public_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 181 |     fn secret_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 186 |     fn signed_msg(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 191 |     fn signature(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `Core` should have a snake case name
[INFO] [stdout]    --> src/lib.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 | mod Core;
[INFO] [stdout]     |     ^^^^ help: convert the identifier to snake case (notice the capitalization): `core`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(non_snake_case)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KeyControl` should have a snake case name
[INFO] [stdout]    --> src/lib.rs:172:9
[INFO] [stdout]     |
[INFO] [stdout] 172 | pub mod KeyControl;
[INFO] [stdout]     |         ^^^^^^^^^^ help: convert the identifier to snake case: `key_control`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KDF` should have a snake case name
[INFO] [stdout]  --> src/Core/mod.rs:4:9
[INFO] [stdout]   |
[INFO] [stdout] 4 | pub mod KDF;
[INFO] [stdout]   |         ^^^ help: convert the identifier to snake case: `kdf`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KeyControler` should have a snake case name
[INFO] [stdout]  --> src/Core/kyber/mod.rs:2:9
[INFO] [stdout]   |
[INFO] [stdout] 2 | pub mod KeyControler;
[INFO] [stdout]   |         ^^^^^^^^^^^^ help: convert the identifier to snake case: `key_controler`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `Ciphertext` should have a snake case name
[INFO] [stdout]   --> src/KeyControl/mod.rs:42:12
[INFO] [stdout]    |
[INFO] [stdout] 42 |     pub fn Ciphertext()  -> Self {
[INFO] [stdout]    |            ^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `ciphertext`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 20 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 21.14s
[INFO] running `Command { std: "docker" "inspect" "fa6f52a7f3c154742e1176294db8ecc0bc254097351f34120ced82988ae259de", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "fa6f52a7f3c154742e1176294db8ecc0bc254097351f34120ced82988ae259de", kill_on_drop: false }`
[INFO] [stdout] fa6f52a7f3c154742e1176294db8ecc0bc254097351f34120ced82988ae259de
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:59a85a07ab18ca8720692f8e61effa1c651d9e2ca591e072c2b212bb91a6b8b5" "/opt/rustwide/cargo-home/bin/cargo" "+b642703cf9526da1e72c0b6755753b939a9c6b6d" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 92ab2dfb65dc4c233f1cc857096df7927f2091de8b2d3cddc019a9c37ab5ec68
[INFO] running `Command { std: "docker" "start" "-a" "92ab2dfb65dc4c233f1cc857096df7927f2091de8b2d3cddc019a9c37ab5ec68", kill_on_drop: false }`
[INFO] [stderr]    Compiling rustix v0.38.34
[INFO] [stderr]    Compiling bitflags v2.5.0
[INFO] [stderr]    Compiling linux-raw-sys v0.4.13
[INFO] [stderr]    Compiling fastrand v2.1.0
[INFO] [stdout] warning: unused import: `Mac`
[INFO] [stdout]  --> src/Core/KDF.rs:1:12
[INFO] [stdout]   |
[INFO] [stdout] 1 | use hmac::{Mac};
[INFO] [stdout]   |            ^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Ciphertext`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:64
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                                                ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Write`
[INFO] [stdout]   --> src/Core/cipher_aes.rs:25:10
[INFO] [stdout]    |
[INFO] [stdout] 25 |     io::{Write}, 
[INFO] [stdout]    |          ^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `KyberKeyFunctions`
[INFO] [stdout]  --> src/Core/cipher_aes.rs:9:9
[INFO] [stdout]   |
[INFO] [stdout] 9 |         KyberKeyFunctions,
[INFO] [stdout]   |         ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `KyberKeyFunctions`
[INFO] [stdout]   --> src/Core/cipher_xchacha.rs:12:9
[INFO] [stdout]    |
[INFO] [stdout] 12 |         KyberKeyFunctions,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `SharedSecret`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:50
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                                  ^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Mac`
[INFO] [stdout]  --> src/cryptography/hmac_sign/mod.rs:3:12
[INFO] [stdout]   |
[INFO] [stdout] 3 | use hmac::{Mac};
[INFO] [stdout]   |            ^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `SecretKey`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:39
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                       ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `PublicKey`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:28
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                            ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:157:13
[INFO] [stdout]     |
[INFO] [stdout] 157 |             _ => Err(|e| CryptError::IOError(e)),
[INFO] [stdout]     |             ^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unreachable_patterns)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `encrypted_data` is never read
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:125:17
[INFO] [stdout]     |
[INFO] [stdout] 125 |         let mut encrypted_data: Vec<u8> = Vec::new();
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: `#[warn(unused_assignments)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `nonce_vec` is never read
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:126:17
[INFO] [stdout]     |
[INFO] [stdout] 126 |         let mut nonce_vec: Vec<u8> = Vec::new();
[INFO] [stdout]     |                 ^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]   --> src/cryptography/hmac_sign/sign.rs:47:13
[INFO] [stdout]    |
[INFO] [stdout] 47 |             _ => vec![],
[INFO] [stdout]    |             ^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `save_ciphertext` is never used
[INFO] [stdout]    --> src/Core/cipher_aes.rs:104:8
[INFO] [stdout]     |
[INFO] [stdout] 33  | impl CipherAES {
[INFO] [stdout]     | -------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 104 |     fn save_ciphertext(&self, _encrypted_data: &[u8]) -> Result<(), CryptError> {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `public_key`, `secret_key`, `signed_msg`, and `signature` are never used
[INFO] [stdout]    --> src/cryptography/hmac_sign/mod.rs:176:8
[INFO] [stdout]     |
[INFO] [stdout] 168 | impl SignatureKey {
[INFO] [stdout]     | ----------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 176 |     fn public_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 181 |     fn secret_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 186 |     fn signed_msg(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 191 |     fn signature(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `Core` should have a snake case name
[INFO] [stdout]    --> src/lib.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 | mod Core;
[INFO] [stdout]     |     ^^^^ help: convert the identifier to snake case (notice the capitalization): `core`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(non_snake_case)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KeyControl` should have a snake case name
[INFO] [stdout]    --> src/lib.rs:172:9
[INFO] [stdout]     |
[INFO] [stdout] 172 | pub mod KeyControl;
[INFO] [stdout]     |         ^^^^^^^^^^ help: convert the identifier to snake case: `key_control`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KDF` should have a snake case name
[INFO] [stdout]  --> src/Core/mod.rs:4:9
[INFO] [stdout]   |
[INFO] [stdout] 4 | pub mod KDF;
[INFO] [stdout]   |         ^^^ help: convert the identifier to snake case: `kdf`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KeyControler` should have a snake case name
[INFO] [stdout]  --> src/Core/kyber/mod.rs:2:9
[INFO] [stdout]   |
[INFO] [stdout] 2 | pub mod KeyControler;
[INFO] [stdout]   |         ^^^^^^^^^^^^ help: convert the identifier to snake case: `key_controler`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `Ciphertext` should have a snake case name
[INFO] [stdout]   --> src/KeyControl/mod.rs:42:12
[INFO] [stdout]    |
[INFO] [stdout] 42 |     pub fn Ciphertext()  -> Self {
[INFO] [stdout]    |            ^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `ciphertext`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 20 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]    Compiling tempfile v3.10.1
[INFO] [stderr]    Compiling crypt_guard v1.2.9 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused imports: `PathBuf`, `Path`, `Read`, `Write`, `marker::PhantomData`
[INFO] [stdout]  --> examples/encrypt_xchacha.rs:4:2
[INFO] [stdout]   |
[INFO] [stdout] 4 |     marker::PhantomData,
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 5 |     path::{PathBuf, Path},
[INFO] [stdout]   |            ^^^^^^^  ^^^^
[INFO] [stdout] 6 |     io::{Read, Write},
[INFO] [stdout]   |          ^^^^  ^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused imports: `Message`, `error::*`
[INFO] [stdout]  --> examples/macro_example.rs:5:5
[INFO] [stdout]   |
[INFO] [stdout] 5 |     error::*,
[INFO] [stdout]   |     ^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 9 |     Message, 
[INFO] [stdout]   |     ^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `tmp_dir`
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:15:9
[INFO] [stdout]    |
[INFO] [stdout] 15 |     let tmp_dir = TempDir::new().map_err(|e| CryptError::from(e))?;
[INFO] [stdout]    |         ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_tmp_dir`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_variables)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `encrypt_message`
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:33:10
[INFO] [stdout]    |
[INFO] [stdout] 33 |     let (encrypt_message, cipher) = encryptor.encrypt_file(enc_path.clone(), passphrase.clone())?;
[INFO] [stdout]    |          ^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_encrypt_message`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `decrypt_message`
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:44:9
[INFO] [stdout]    |
[INFO] [stdout] 44 |     let decrypt_message = decryptor.decrypt_file(dec_path.clone(), passphrase.clone(), cipher)?;
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_decrypt_message`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:41:9
[INFO] [stdout]    |
[INFO] [stdout] 41 |     let mut decryptor = Kyber::<Decryption, Kyber768, File, XChaCha20>::new(secret_key, Some(nonce?.to_string()))?;
[INFO] [stdout]    |         ----^^^^^^^^^
[INFO] [stdout]    |         |
[INFO] [stdout]    |         help: remove this `mut`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_mut)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:18:34
[INFO] [stdout]    |
[INFO] [stdout] 18 |     let enc_path = tmp_dir.path().clone().join("message.txt");
[INFO] [stdout]    |                                  ^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed
[INFO] [stdout]    = note: `#[warn(noop_method_call)]` on by default
[INFO] [stdout] help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout] 18 -     let enc_path = tmp_dir.path().clone().join("message.txt");
[INFO] [stdout] 18 +     let enc_path = tmp_dir.path().join("message.txt");
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:19:34
[INFO] [stdout]    |
[INFO] [stdout] 19 |     let dec_path = tmp_dir.path().clone().join("message.txt.enc"); 
[INFO] [stdout]    |                                  ^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed
[INFO] [stdout] help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout] 19 -     let dec_path = tmp_dir.path().clone().join("message.txt.enc"); 
[INFO] [stdout] 19 +     let dec_path = tmp_dir.path().join("message.txt.enc"); 
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:33:88
[INFO] [stdout]    |
[INFO] [stdout] 33 |     let (encrypt_message, cipher) = encryptor.encrypt_file(enc_path.clone(), passphrase.clone())?;
[INFO] [stdout]    |                                                                                        ^^^^^^^^ help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> examples/encrypt_xchacha.rs:44:78
[INFO] [stdout]    |
[INFO] [stdout] 44 |     let decrypt_message = decryptor.decrypt_file(dec_path.clone(), passphrase.clone(), cipher)?;
[INFO] [stdout]    |                                                                              ^^^^^^^^ help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `error::*`
[INFO] [stdout]  --> examples/encrypt_aes.rs:2:22
[INFO] [stdout]   |
[INFO] [stdout] 2 | use crypt_guard::{*, error::*};
[INFO] [stdout]   |                      ^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused imports: `PathBuf`, `Path`, `Read`, `Write`, `marker::PhantomData`, `self`
[INFO] [stdout]  --> examples/encrypt_aes.rs:4:10
[INFO] [stdout]   |
[INFO] [stdout] 4 |     fs::{self, File}, 
[INFO] [stdout]   |          ^^^^
[INFO] [stdout] 5 |     marker::PhantomData,
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 6 |     path::{PathBuf, Path},
[INFO] [stdout]   |            ^^^^^^^  ^^^^
[INFO] [stdout] 7 |     io::{Read, Write},
[INFO] [stdout]   |          ^^^^  ^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused imports: `Builder`, `TempDir`
[INFO] [stdout]   --> examples/encrypt_aes.rs:10:16
[INFO] [stdout]    |
[INFO] [stdout] 10 | use tempfile::{TempDir, Builder};
[INFO] [stdout]    |                ^^^^^^^  ^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]   --> examples/encrypt_aes.rs:33:9
[INFO] [stdout]    |
[INFO] [stdout] 33 |     let mut decryptor = Kyber::<Decryption, Kyber1024, File, AES>::new(secret_key, None)?;
[INFO] [stdout]    |         ----^^^^^^^^^
[INFO] [stdout]    |         |
[INFO] [stdout]    |         help: remove this `mut`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_mut)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> examples/encrypt_aes.rs:26:66
[INFO] [stdout]    |
[INFO] [stdout] 26 |     let (encrypt_message, cipher) = encryptor.encrypt_msg(message.clone(), passphrase.clone())?;
[INFO] [stdout]    |                                                                  ^^^^^^^^ help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stdout]    = note: `#[warn(noop_method_call)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> examples/encrypt_aes.rs:26:86
[INFO] [stdout]    |
[INFO] [stdout] 26 |     let (encrypt_message, cipher) = encryptor.encrypt_msg(message.clone(), passphrase.clone())?;
[INFO] [stdout]    |                                                                                      ^^^^^^^^ help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> examples/encrypt_aes.rs:36:84
[INFO] [stdout]    |
[INFO] [stdout] 36 |     let decrypt_message = decryptor.decrypt_msg(encrypt_message.clone(), passphrase.clone(), cipher)?;
[INFO] [stdout]    |                                                                                    ^^^^^^^^ help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Mac`
[INFO] [stdout]  --> src/Core/KDF.rs:1:12
[INFO] [stdout]   |
[INFO] [stdout] 1 | use hmac::{Mac};
[INFO] [stdout]   |            ^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Write`
[INFO] [stdout]   --> src/Core/cipher_aes.rs:25:10
[INFO] [stdout]    |
[INFO] [stdout] 25 |     io::{Write}, 
[INFO] [stdout]    |          ^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `KyberKeyFunctions`
[INFO] [stdout]  --> src/Core/cipher_aes.rs:9:9
[INFO] [stdout]   |
[INFO] [stdout] 9 |         KyberKeyFunctions,
[INFO] [stdout]   |         ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `KyberKeyFunctions`
[INFO] [stdout]   --> src/Core/cipher_xchacha.rs:12:9
[INFO] [stdout]    |
[INFO] [stdout] 12 |         KyberKeyFunctions,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `hmac_sign`
[INFO] [stdout]   --> src/tests/KyberKeyTest.rs:10:9
[INFO] [stdout]    |
[INFO] [stdout] 10 |         hmac_sign::*, 
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Mac`
[INFO] [stdout]  --> src/cryptography/hmac_sign/mod.rs:3:12
[INFO] [stdout]   |
[INFO] [stdout] 3 | use hmac::{Mac};
[INFO] [stdout]   |            ^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `hmac_sign`
[INFO] [stdout]  --> src/tests/MacroTests.rs:7:9
[INFO] [stdout]   |
[INFO] [stdout] 7 |         hmac_sign::*, 
[INFO] [stdout]   |         ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `PublicKey`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:28
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                            ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `SecretKey`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:39
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                       ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `SharedSecret`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:50
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                                  ^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `Ciphertext`
[INFO] [stdout]  --> src/KeyControl/mod.rs:4:64
[INFO] [stdout]   |
[INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stdout]   |                                                                ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:157:13
[INFO] [stdout]     |
[INFO] [stdout] 157 |             _ => Err(|e| CryptError::IOError(e)),
[INFO] [stdout]     |             ^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unreachable_patterns)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `encrypted_data` is never read
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:125:17
[INFO] [stdout]     |
[INFO] [stdout] 125 |         let mut encrypted_data: Vec<u8> = Vec::new();
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: `#[warn(unused_assignments)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `nonce_vec` is never read
[INFO] [stdout]    --> src/Core/cipher_xchacha.rs:126:17
[INFO] [stdout]     |
[INFO] [stdout] 126 |         let mut nonce_vec: Vec<u8> = Vec::new();
[INFO] [stdout]     |                 ^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]   --> src/cryptography/hmac_sign/sign.rs:47:13
[INFO] [stdout]    |
[INFO] [stdout] 47 |             _ => vec![],
[INFO] [stdout]    |             ^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 9 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 1 warning emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `save_ciphertext` is never used
[INFO] [stdout]    --> src/Core/cipher_aes.rs:104:8
[INFO] [stdout]     |
[INFO] [stdout] 33  | impl CipherAES {
[INFO] [stdout]     | -------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 104 |     fn save_ciphertext(&self, _encrypted_data: &[u8]) -> Result<(), CryptError> {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `public_key`, `secret_key`, `signed_msg`, and `signature` are never used
[INFO] [stdout]    --> src/cryptography/hmac_sign/mod.rs:176:8
[INFO] [stdout]     |
[INFO] [stdout] 168 | impl SignatureKey {
[INFO] [stdout]     | ----------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 176 |     fn public_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 181 |     fn secret_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 186 |     fn signed_msg(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 191 |     fn signature(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stdout]     |        ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `read_file` is never used
[INFO] [stdout]   --> src/tests/KyberKeyTest.rs:94:4
[INFO] [stdout]    |
[INFO] [stdout] 94 | fn read_file(path: &PathBuf) -> Result<Vec<u8>, std::io::Error> {
[INFO] [stdout]    |    ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_message_AES_Kyber512` is never used
[INFO] [stdout]    --> src/tests/KyberTests.rs:184:4
[INFO] [stdout]     |
[INFO] [stdout] 184 | fn encrypt_message_AES_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `Core` should have a snake case name
[INFO] [stdout]    --> src/lib.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 | mod Core;
[INFO] [stdout]     |     ^^^^ help: convert the identifier to snake case (notice the capitalization): `core`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(non_snake_case)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KeyControl` should have a snake case name
[INFO] [stdout]    --> src/lib.rs:172:9
[INFO] [stdout]     |
[INFO] [stdout] 172 | pub mod KeyControl;
[INFO] [stdout]     |         ^^^^^^^^^^ help: convert the identifier to snake case: `key_control`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KDF` should have a snake case name
[INFO] [stdout]  --> src/Core/mod.rs:4:9
[INFO] [stdout]   |
[INFO] [stdout] 4 | pub mod KDF;
[INFO] [stdout]   |         ^^^ help: convert the identifier to snake case: `kdf`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KeyControler` should have a snake case name
[INFO] [stdout]  --> src/Core/kyber/mod.rs:2:9
[INFO] [stdout]   |
[INFO] [stdout] 2 | pub mod KeyControler;
[INFO] [stdout]   |         ^^^^^^^^^^^^ help: convert the identifier to snake case: `key_controler`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `Ciphertext` should have a snake case name
[INFO] [stdout]   --> src/KeyControl/mod.rs:42:12
[INFO] [stdout]    |
[INFO] [stdout] 42 |     pub fn Ciphertext()  -> Self {
[INFO] [stdout]    |            ^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `ciphertext`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KyberKeyTest` should have a snake case name
[INFO] [stdout]  --> src/tests/mod.rs:4:5
[INFO] [stdout]   |
[INFO] [stdout] 4 | mod KyberKeyTest;
[INFO] [stdout]   |     ^^^^^^^^^^^^ help: convert the identifier to snake case: `kyber_key_test`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `KyberTests` should have a snake case name
[INFO] [stdout]  --> src/tests/mod.rs:7:5
[INFO] [stdout]   |
[INFO] [stdout] 7 | mod KyberTests;
[INFO] [stdout]   |     ^^^^^^^^^^ help: convert the identifier to snake case: `kyber_tests`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `MacroTests` should have a snake case name
[INFO] [stdout]   --> src/tests/mod.rs:10:5
[INFO] [stdout]    |
[INFO] [stdout] 10 | mod MacroTests;
[INFO] [stdout]    |     ^^^^^^^^^^ help: convert the identifier to snake case: `macro_tests`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: module `SignatureTests` should have a snake case name
[INFO] [stdout]   --> src/tests/mod.rs:13:5
[INFO] [stdout]    |
[INFO] [stdout] 13 | mod SignatureTests;
[INFO] [stdout]    |     ^^^^^^^^^^^^^^ help: convert the identifier to snake case: `signature_tests`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_decrypt_msg_macro_AES_Kyber1024` should have a snake case name
[INFO] [stdout]   --> src/tests/KyberTests.rs:18:4
[INFO] [stdout]    |
[INFO] [stdout] 18 | fn encrypt_decrypt_msg_macro_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_aes_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_decrypt_data_macro_AES_Kyber1024` should have a snake case name
[INFO] [stdout]   --> src/tests/KyberTests.rs:41:4
[INFO] [stdout]    |
[INFO] [stdout] 41 | fn encrypt_decrypt_data_macro_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_aes_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_decrypt_file_macro_AES_Kyber1024` should have a snake case name
[INFO] [stdout]   --> src/tests/KyberTests.rs:61:4
[INFO] [stdout]    |
[INFO] [stdout] 61 | fn encrypt_decrypt_file_macro_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_file_macro_aes_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused `std::result::Result` that must be used
[INFO] [stdout]   --> src/tests/KyberTests.rs:80:5
[INFO] [stdout]    |
[INFO] [stdout] 80 |     fs::remove_file(enc_path.clone());
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stdout]    = note: `#[warn(unused_must_use)]` on by default
[INFO] [stdout] help: use `let _ = ...` to ignore the resulting value
[INFO] [stdout]    |
[INFO] [stdout] 80 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stdout]    |     +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_message_AES_Kyber1024` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:100:4
[INFO] [stdout]     |
[INFO] [stdout] 100 | fn encrypt_message_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_data_AES_Kyber1024` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:129:4
[INFO] [stdout]     |
[INFO] [stdout] 129 | fn encrypt_data_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_data_aes_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_message_AES_Kyber768` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:156:4
[INFO] [stdout]     |
[INFO] [stdout] 156 | fn encrypt_message_AES_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber768`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_message_AES_Kyber512` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:184:4
[INFO] [stdout]     |
[INFO] [stdout] 184 | fn encrypt_message_AES_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber512`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_file_AES_Kyber1024` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:213:4
[INFO] [stdout]     |
[INFO] [stdout] 213 | fn encrypt_file_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused `std::result::Result` that must be used
[INFO] [stdout]    --> src/tests/KyberTests.rs:235:5
[INFO] [stdout]     |
[INFO] [stdout] 235 |     fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stdout] help: use `let _ = ...` to ignore the resulting value
[INFO] [stdout]     |
[INFO] [stdout] 235 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_file_AES_Kyber768` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:257:4
[INFO] [stdout]     |
[INFO] [stdout] 257 | fn encrypt_file_AES_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber768`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused `std::result::Result` that must be used
[INFO] [stdout]    --> src/tests/KyberTests.rs:279:5
[INFO] [stdout]     |
[INFO] [stdout] 279 |     fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stdout] help: use `let _ = ...` to ignore the resulting value
[INFO] [stdout]     |
[INFO] [stdout] 279 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_file_AES_Kyber512` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:302:4
[INFO] [stdout]     |
[INFO] [stdout] 302 | fn encrypt_file_AES_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber512`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused `std::result::Result` that must be used
[INFO] [stdout]    --> src/tests/KyberTests.rs:324:5
[INFO] [stdout]     |
[INFO] [stdout] 324 |     fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stdout] help: use `let _ = ...` to ignore the resulting value
[INFO] [stdout]     |
[INFO] [stdout] 324 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_message_XChaCha20_Kyber1024` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:346:4
[INFO] [stdout]     |
[INFO] [stdout] 346 | fn encrypt_message_XChaCha20_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_message_XChaCha20_Kyber768` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:374:4
[INFO] [stdout]     |
[INFO] [stdout] 374 | fn encrypt_message_XChaCha20_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber768`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_message_XChaCha20_Kyber512` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:402:4
[INFO] [stdout]     |
[INFO] [stdout] 402 | fn encrypt_message_XChaCha20_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber512`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_file_XChaCha20_Kyber1024` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:430:4
[INFO] [stdout]     |
[INFO] [stdout] 430 | fn encrypt_file_XChaCha20_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber1024`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused `std::result::Result` that must be used
[INFO] [stdout]    --> src/tests/KyberTests.rs:454:5
[INFO] [stdout]     |
[INFO] [stdout] 454 |     fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stdout] help: use `let _ = ...` to ignore the resulting value
[INFO] [stdout]     |
[INFO] [stdout] 454 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_file_XChaCha20_Kyber768` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:476:4
[INFO] [stdout]     |
[INFO] [stdout] 476 | fn encrypt_file_XChaCha20_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber768`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused `std::result::Result` that must be used
[INFO] [stdout]    --> src/tests/KyberTests.rs:500:5
[INFO] [stdout]     |
[INFO] [stdout] 500 |     fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stdout] help: use `let _ = ...` to ignore the resulting value
[INFO] [stdout]     |
[INFO] [stdout] 500 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `encrypt_file_XChaCha20_Kyber512` should have a snake case name
[INFO] [stdout]    --> src/tests/KyberTests.rs:522:4
[INFO] [stdout]     |
[INFO] [stdout] 522 | fn encrypt_file_XChaCha20_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber512`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused `std::result::Result` that must be used
[INFO] [stdout]    --> src/tests/KyberTests.rs:546:5
[INFO] [stdout]     |
[INFO] [stdout] 546 |     fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stdout] help: use `let _ = ...` to ignore the resulting value
[INFO] [stdout]     |
[INFO] [stdout] 546 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stdout]     |     +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `SignEncrypt` should have a snake case name
[INFO] [stdout]   --> src/tests/MacroTests.rs:97:4
[INFO] [stdout]    |
[INFO] [stdout] 97 | fn SignEncrypt() {
[INFO] [stdout]    |    ^^^^^^^^^^^ help: convert the identifier to snake case: `sign_encrypt`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `SignEncrypt_DecryptOpen` should have a snake case name
[INFO] [stdout]    --> src/tests/MacroTests.rs:109:4
[INFO] [stdout]     |
[INFO] [stdout] 109 | fn SignEncrypt_DecryptOpen() {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `sign_encrypt_decrypt_open`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `test_save_Falcon1024_keys` should have a snake case name
[INFO] [stdout]  --> src/tests/SignatureTests.rs:9:4
[INFO] [stdout]   |
[INFO] [stdout] 9 | fn test_save_Falcon1024_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]   |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `test_save_falcon1024_keys`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `test_save_Falcon512_keys` should have a snake case name
[INFO] [stdout]   --> src/tests/SignatureTests.rs:24:4
[INFO] [stdout]    |
[INFO] [stdout] 24 | fn test_save_Falcon512_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]    |    ^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `test_save_falcon512_keys`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `test_save_Dilithium2_keys` should have a snake case name
[INFO] [stdout]   --> src/tests/SignatureTests.rs:39:4
[INFO] [stdout]    |
[INFO] [stdout] 39 | fn test_save_Dilithium2_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium2_keys`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `test_save_Dilithium3_keys` should have a snake case name
[INFO] [stdout]   --> src/tests/SignatureTests.rs:54:4
[INFO] [stdout]    |
[INFO] [stdout] 54 | fn test_save_Dilithium3_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium3_keys`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `test_save_Dilithium5_keys` should have a snake case name
[INFO] [stdout]   --> src/tests/SignatureTests.rs:69:4
[INFO] [stdout]    |
[INFO] [stdout] 69 | fn test_save_Dilithium5_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stdout]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium5_keys`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 7 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 58 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 5.44s
[INFO] running `Command { std: "docker" "inspect" "92ab2dfb65dc4c233f1cc857096df7927f2091de8b2d3cddc019a9c37ab5ec68", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "92ab2dfb65dc4c233f1cc857096df7927f2091de8b2d3cddc019a9c37ab5ec68", kill_on_drop: false }`
[INFO] [stdout] 92ab2dfb65dc4c233f1cc857096df7927f2091de8b2d3cddc019a9c37ab5ec68
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:59a85a07ab18ca8720692f8e61effa1c651d9e2ca591e072c2b212bb91a6b8b5" "/opt/rustwide/cargo-home/bin/cargo" "+b642703cf9526da1e72c0b6755753b939a9c6b6d" "test" "--frozen", kill_on_drop: false }`
[INFO] [stdout] eb1c8d8ea94ed55a25ff5b66338fc182e8985794145ed17012b4bcdc3bbac2a4
[INFO] running `Command { std: "docker" "start" "-a" "eb1c8d8ea94ed55a25ff5b66338fc182e8985794145ed17012b4bcdc3bbac2a4", kill_on_drop: false }`
[INFO] [stderr] warning: unused import: `Mac`
[INFO] [stderr]  --> src/Core/KDF.rs:1:12
[INFO] [stderr]   |
[INFO] [stderr] 1 | use hmac::{Mac};
[INFO] [stderr]   |            ^^^
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `Ciphertext`
[INFO] [stderr]  --> src/KeyControl/mod.rs:4:64
[INFO] [stderr]   |
[INFO] [stderr] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stderr]   |                                                                ^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `Write`
[INFO] [stderr]   --> src/Core/cipher_aes.rs:25:10
[INFO] [stderr]    |
[INFO] [stderr] 25 |     io::{Write}, 
[INFO] [stderr]    |          ^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `KyberKeyFunctions`
[INFO] [stderr]  --> src/Core/cipher_aes.rs:9:9
[INFO] [stderr]   |
[INFO] [stderr] 9 |         KyberKeyFunctions,
[INFO] [stderr]   |         ^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `KyberKeyFunctions`
[INFO] [stderr]   --> src/Core/cipher_xchacha.rs:12:9
[INFO] [stderr]    |
[INFO] [stderr] 12 |         KyberKeyFunctions,
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `SharedSecret`
[INFO] [stderr]  --> src/KeyControl/mod.rs:4:50
[INFO] [stderr]   |
[INFO] [stderr] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stderr]   |                                                  ^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `Mac`
[INFO] [stderr]  --> src/cryptography/hmac_sign/mod.rs:3:12
[INFO] [stderr]   |
[INFO] [stderr] 3 | use hmac::{Mac};
[INFO] [stderr]   |            ^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `SecretKey`
[INFO] [stderr]  --> src/KeyControl/mod.rs:4:39
[INFO] [stderr]   |
[INFO] [stderr] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stderr]   |                                       ^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `PublicKey`
[INFO] [stderr]  --> src/KeyControl/mod.rs:4:28
[INFO] [stderr]   |
[INFO] [stderr] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext};
[INFO] [stderr]   |                            ^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unreachable pattern
[INFO] [stderr]    --> src/Core/cipher_xchacha.rs:157:13
[INFO] [stderr]     |
[INFO] [stderr] 157 |             _ => Err(|e| CryptError::IOError(e)),
[INFO] [stderr]     |             ^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(unreachable_patterns)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: value assigned to `encrypted_data` is never read
[INFO] [stderr]    --> src/Core/cipher_xchacha.rs:125:17
[INFO] [stderr]     |
[INFO] [stderr] 125 |         let mut encrypted_data: Vec<u8> = Vec::new();
[INFO] [stderr]     |                 ^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = help: maybe it is overwritten before being read?
[INFO] [stderr]     = note: `#[warn(unused_assignments)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: value assigned to `nonce_vec` is never read
[INFO] [stderr]    --> src/Core/cipher_xchacha.rs:126:17
[INFO] [stderr]     |
[INFO] [stderr] 126 |         let mut nonce_vec: Vec<u8> = Vec::new();
[INFO] [stderr]     |                 ^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = help: maybe it is overwritten before being read?
[INFO] [stderr] 
[INFO] [stderr] warning: unreachable pattern
[INFO] [stderr]   --> src/cryptography/hmac_sign/sign.rs:47:13
[INFO] [stderr]    |
[INFO] [stderr] 47 |             _ => vec![],
[INFO] [stderr]    |             ^
[INFO] [stderr] 
[INFO] [stderr] warning: method `save_ciphertext` is never used
[INFO] [stderr]    --> src/Core/cipher_aes.rs:104:8
[INFO] [stderr]     |
[INFO] [stderr] 33  | impl CipherAES {
[INFO] [stderr]     | -------------- method in this implementation
[INFO] [stderr] ...
[INFO] [stderr] 104 |     fn save_ciphertext(&self, _encrypted_data: &[u8]) -> Result<(), CryptError> {
[INFO] [stderr]     |        ^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(dead_code)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: methods `public_key`, `secret_key`, `signed_msg`, and `signature` are never used
[INFO] [stderr]    --> src/cryptography/hmac_sign/mod.rs:176:8
[INFO] [stderr]     |
[INFO] [stderr] 168 | impl SignatureKey {
[INFO] [stderr]     | ----------------- methods in this implementation
[INFO] [stderr] ...
[INFO] [stderr] 176 |     fn public_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stderr]     |        ^^^^^^^^^^
[INFO] [stderr] ...
[INFO] [stderr] 181 |     fn secret_key(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stderr]     |        ^^^^^^^^^^
[INFO] [stderr] ...
[INFO] [stderr] 186 |     fn signed_msg(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stderr]     |        ^^^^^^^^^^
[INFO] [stderr] ...
[INFO] [stderr] 191 |     fn signature(&mut self) -> Result<&[u8], SigningErr> {
[INFO] [stderr]     |        ^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: module `Core` should have a snake case name
[INFO] [stderr]    --> src/lib.rs:168:5
[INFO] [stderr]     |
[INFO] [stderr] 168 | mod Core;
[INFO] [stderr]     |     ^^^^ help: convert the identifier to snake case (notice the capitalization): `core`
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(non_snake_case)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: module `KeyControl` should have a snake case name
[INFO] [stderr]    --> src/lib.rs:172:9
[INFO] [stderr]     |
[INFO] [stderr] 172 | pub mod KeyControl;
[INFO] [stderr]     |         ^^^^^^^^^^ help: convert the identifier to snake case: `key_control`
[INFO] [stderr] 
[INFO] [stderr] warning: module `KDF` should have a snake case name
[INFO] [stderr]  --> src/Core/mod.rs:4:9
[INFO] [stderr]   |
[INFO] [stderr] 4 | pub mod KDF;
[INFO] [stderr]   |         ^^^ help: convert the identifier to snake case: `kdf`
[INFO] [stderr] 
[INFO] [stderr] warning: module `KeyControler` should have a snake case name
[INFO] [stderr]  --> src/Core/kyber/mod.rs:2:9
[INFO] [stderr]   |
[INFO] [stderr] 2 | pub mod KeyControler;
[INFO] [stderr]   |         ^^^^^^^^^^^^ help: convert the identifier to snake case: `key_controler`
[INFO] [stderr] 
[INFO] [stderr] warning: method `Ciphertext` should have a snake case name
[INFO] [stderr]   --> src/KeyControl/mod.rs:42:12
[INFO] [stderr]    |
[INFO] [stderr] 42 |     pub fn Ciphertext()  -> Self {
[INFO] [stderr]    |            ^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `ciphertext`
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `hmac_sign`
[INFO] [stderr]   --> src/tests/KyberKeyTest.rs:10:9
[INFO] [stderr]    |
[INFO] [stderr] 10 |         hmac_sign::*, 
[INFO] [stderr]    |         ^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `hmac_sign`
[INFO] [stderr]  --> src/tests/MacroTests.rs:7:9
[INFO] [stderr]   |
[INFO] [stderr] 7 |         hmac_sign::*, 
[INFO] [stderr]   |         ^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: function `read_file` is never used
[INFO] [stderr]   --> src/tests/KyberKeyTest.rs:94:4
[INFO] [stderr]    |
[INFO] [stderr] 94 | fn read_file(path: &PathBuf) -> Result<Vec<u8>, std::io::Error> {
[INFO] [stderr]    |    ^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_message_AES_Kyber512` is never used
[INFO] [stderr]    --> src/tests/KyberTests.rs:184:4
[INFO] [stderr]     |
[INFO] [stderr] 184 | fn encrypt_message_AES_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: module `KyberKeyTest` should have a snake case name
[INFO] [stderr]  --> src/tests/mod.rs:4:5
[INFO] [stderr]   |
[INFO] [stderr] 4 | mod KyberKeyTest;
[INFO] [stderr]   |     ^^^^^^^^^^^^ help: convert the identifier to snake case: `kyber_key_test`
[INFO] [stderr] 
[INFO] [stderr] warning: module `KyberTests` should have a snake case name
[INFO] [stderr]  --> src/tests/mod.rs:7:5
[INFO] [stderr]   |
[INFO] [stderr] 7 | mod KyberTests;
[INFO] [stderr]   |     ^^^^^^^^^^ help: convert the identifier to snake case: `kyber_tests`
[INFO] [stderr] 
[INFO] [stderr] warning: module `MacroTests` should have a snake case name
[INFO] [stderr]   --> src/tests/mod.rs:10:5
[INFO] [stderr]    |
[INFO] [stderr] 10 | mod MacroTests;
[INFO] [stderr]    |     ^^^^^^^^^^ help: convert the identifier to snake case: `macro_tests`
[INFO] [stderr] 
[INFO] [stderr] warning: module `SignatureTests` should have a snake case name
[INFO] [stderr]   --> src/tests/mod.rs:13:5
[INFO] [stderr]    |
[INFO] [stderr] 13 | mod SignatureTests;
[INFO] [stderr]    |     ^^^^^^^^^^^^^^ help: convert the identifier to snake case: `signature_tests`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_decrypt_msg_macro_AES_Kyber1024` should have a snake case name
[INFO] [stderr]   --> src/tests/KyberTests.rs:18:4
[INFO] [stderr]    |
[INFO] [stderr] 18 | fn encrypt_decrypt_msg_macro_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_aes_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_decrypt_data_macro_AES_Kyber1024` should have a snake case name
[INFO] [stderr]   --> src/tests/KyberTests.rs:41:4
[INFO] [stderr]    |
[INFO] [stderr] 41 | fn encrypt_decrypt_data_macro_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_aes_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_decrypt_file_macro_AES_Kyber1024` should have a snake case name
[INFO] [stderr]   --> src/tests/KyberTests.rs:61:4
[INFO] [stderr]    |
[INFO] [stderr] 61 | fn encrypt_decrypt_file_macro_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_file_macro_aes_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: unused `std::result::Result` that must be used
[INFO] [stderr]   --> src/tests/KyberTests.rs:80:5
[INFO] [stderr]    |
[INFO] [stderr] 80 |     fs::remove_file(enc_path.clone());
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]    |
[INFO] [stderr]    = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stderr]    = note: `#[warn(unused_must_use)]` on by default
[INFO] [stderr] help: use `let _ = ...` to ignore the resulting value
[INFO] [stderr]    |
[INFO] [stderr] 80 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stderr]    |     +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_message_AES_Kyber1024` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:100:4
[INFO] [stderr]     |
[INFO] [stderr] 100 | fn encrypt_message_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_data_AES_Kyber1024` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:129:4
[INFO] [stderr]     |
[INFO] [stderr] 129 | fn encrypt_data_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_data_aes_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_message_AES_Kyber768` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:156:4
[INFO] [stderr]     |
[INFO] [stderr] 156 | fn encrypt_message_AES_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber768`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_message_AES_Kyber512` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:184:4
[INFO] [stderr]     |
[INFO] [stderr] 184 | fn encrypt_message_AES_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber512`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_file_AES_Kyber1024` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:213:4
[INFO] [stderr]     |
[INFO] [stderr] 213 | fn encrypt_file_AES_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: unused `std::result::Result` that must be used
[INFO] [stderr]    --> src/tests/KyberTests.rs:235:5
[INFO] [stderr]     |
[INFO] [stderr] 235 |     fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stderr] help: use `let _ = ...` to ignore the resulting value
[INFO] [stderr]     |
[INFO] [stderr] 235 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_file_AES_Kyber768` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:257:4
[INFO] [stderr]     |
[INFO] [stderr] 257 | fn encrypt_file_AES_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber768`
[INFO] [stderr] 
[INFO] [stderr] warning: unused `std::result::Result` that must be used
[INFO] [stderr]    --> src/tests/KyberTests.rs:279:5
[INFO] [stderr]     |
[INFO] [stderr] 279 |     fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stderr] help: use `let _ = ...` to ignore the resulting value
[INFO] [stderr]     |
[INFO] [stderr] 279 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_file_AES_Kyber512` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:302:4
[INFO] [stderr]     |
[INFO] [stderr] 302 | fn encrypt_file_AES_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber512`
[INFO] [stderr] 
[INFO] [stderr] warning: unused `std::result::Result` that must be used
[INFO] [stderr]    --> src/tests/KyberTests.rs:324:5
[INFO] [stderr]     |
[INFO] [stderr] 324 |     fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stderr] help: use `let _ = ...` to ignore the resulting value
[INFO] [stderr]     |
[INFO] [stderr] 324 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_message_XChaCha20_Kyber1024` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:346:4
[INFO] [stderr]     |
[INFO] [stderr] 346 | fn encrypt_message_XChaCha20_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_message_XChaCha20_Kyber768` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:374:4
[INFO] [stderr]     |
[INFO] [stderr] 374 | fn encrypt_message_XChaCha20_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber768`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_message_XChaCha20_Kyber512` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:402:4
[INFO] [stderr]     |
[INFO] [stderr] 402 | fn encrypt_message_XChaCha20_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber512`
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_file_XChaCha20_Kyber1024` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:430:4
[INFO] [stderr]     |
[INFO] [stderr] 430 | fn encrypt_file_XChaCha20_Kyber1024() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber1024`
[INFO] [stderr] 
[INFO] [stderr] warning: unused `std::result::Result` that must be used
[INFO] [stderr]    --> src/tests/KyberTests.rs:454:5
[INFO] [stderr]     |
[INFO] [stderr] 454 |     fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stderr] help: use `let _ = ...` to ignore the resulting value
[INFO] [stderr]     |
[INFO] [stderr] 454 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_file_XChaCha20_Kyber768` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:476:4
[INFO] [stderr]     |
[INFO] [stderr] 476 | fn encrypt_file_XChaCha20_Kyber768() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber768`
[INFO] [stderr] 
[INFO] [stderr] warning: unused `std::result::Result` that must be used
[INFO] [stderr]    --> src/tests/KyberTests.rs:500:5
[INFO] [stderr]     |
[INFO] [stderr] 500 |     fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stderr] help: use `let _ = ...` to ignore the resulting value
[INFO] [stderr]     |
[INFO] [stderr] 500 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: function `encrypt_file_XChaCha20_Kyber512` should have a snake case name
[INFO] [stderr]    --> src/tests/KyberTests.rs:522:4
[INFO] [stderr]     |
[INFO] [stderr] 522 | fn encrypt_file_XChaCha20_Kyber512() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber512`
[INFO] [stderr] 
[INFO] [stderr] warning: unused `std::result::Result` that must be used
[INFO] [stderr]    --> src/tests/KyberTests.rs:546:5
[INFO] [stderr]     |
[INFO] [stderr] 546 |     fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this `Result` may be an `Err` variant, which should be handled
[INFO] [stderr] help: use `let _ = ...` to ignore the resulting value
[INFO] [stderr]     |
[INFO] [stderr] 546 |     let _ = fs::remove_file(enc_path.clone());
[INFO] [stderr]     |     +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: function `SignEncrypt` should have a snake case name
[INFO] [stderr]   --> src/tests/MacroTests.rs:97:4
[INFO] [stderr]    |
[INFO] [stderr] 97 | fn SignEncrypt() {
[INFO] [stderr]    |    ^^^^^^^^^^^ help: convert the identifier to snake case: `sign_encrypt`
[INFO] [stderr] 
[INFO] [stderr] warning: function `SignEncrypt_DecryptOpen` should have a snake case name
[INFO] [stderr]    --> src/tests/MacroTests.rs:109:4
[INFO] [stderr]     |
[INFO] [stderr] 109 | fn SignEncrypt_DecryptOpen() {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `sign_encrypt_decrypt_open`
[INFO] [stderr] 
[INFO] [stderr] warning: function `test_save_Falcon1024_keys` should have a snake case name
[INFO] [stderr]  --> src/tests/SignatureTests.rs:9:4
[INFO] [stderr]   |
[INFO] [stderr] 9 | fn test_save_Falcon1024_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]   |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `test_save_falcon1024_keys`
[INFO] [stderr] 
[INFO] [stderr] warning: function `test_save_Falcon512_keys` should have a snake case name
[INFO] [stderr]   --> src/tests/SignatureTests.rs:24:4
[INFO] [stderr]    |
[INFO] [stderr] 24 | fn test_save_Falcon512_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]    |    ^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `test_save_falcon512_keys`
[INFO] [stderr] 
[INFO] [stderr] warning: function `test_save_Dilithium2_keys` should have a snake case name
[INFO] [stderr]   --> src/tests/SignatureTests.rs:39:4
[INFO] [stderr]    |
[INFO] [stderr] 39 | fn test_save_Dilithium2_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium2_keys`
[INFO] [stderr] 
[INFO] [stderr] warning: function `test_save_Dilithium3_keys` should have a snake case name
[INFO] [stderr]   --> src/tests/SignatureTests.rs:54:4
[INFO] [stderr]    |
[INFO] [stderr] 54 | fn test_save_Dilithium3_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium3_keys`
[INFO] [stderr] 
[INFO] [stderr] warning: function `test_save_Dilithium5_keys` should have a snake case name
[INFO] [stderr]   --> src/tests/SignatureTests.rs:69:4
[INFO] [stderr]    |
[INFO] [stderr] 69 | fn test_save_Dilithium5_keys() -> Result<(), Box<dyn std::error::Error>> {
[INFO] [stderr]    |    ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium5_keys`
[INFO] [stderr] 
[INFO] [stderr] warning: `crypt_guard` (lib) generated 20 warnings
[INFO] [stderr] warning: `crypt_guard` (lib test) generated 58 warnings (20 duplicates)
[INFO] [stderr] warning: unused imports: `PathBuf`, `Path`, `Read`, `Write`, `marker::PhantomData`
[INFO] [stderr]  --> examples/encrypt_xchacha.rs:4:2
[INFO] [stderr]   |
[INFO] [stderr] 4 |     marker::PhantomData,
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 5 |     path::{PathBuf, Path},
[INFO] [stderr]   |            ^^^^^^^  ^^^^
[INFO] [stderr] 6 |     io::{Read, Write},
[INFO] [stderr]   |          ^^^^  ^^^^^
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `tmp_dir`
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:15:9
[INFO] [stderr]    |
[INFO] [stderr] 15 |     let tmp_dir = TempDir::new().map_err(|e| CryptError::from(e))?;
[INFO] [stderr]    |         ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_tmp_dir`
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(unused_variables)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `encrypt_message`
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:33:10
[INFO] [stderr]    |
[INFO] [stderr] 33 |     let (encrypt_message, cipher) = encryptor.encrypt_file(enc_path.clone(), passphrase.clone())?;
[INFO] [stderr]    |          ^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_encrypt_message`
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `decrypt_message`
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:44:9
[INFO] [stderr]    |
[INFO] [stderr] 44 |     let decrypt_message = decryptor.decrypt_file(dec_path.clone(), passphrase.clone(), cipher)?;
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_decrypt_message`
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:41:9
[INFO] [stderr]    |
[INFO] [stderr] 41 |     let mut decryptor = Kyber::<Decryption, Kyber768, File, XChaCha20>::new(secret_key, Some(nonce?.to_string()))?;
[INFO] [stderr]    |         ----^^^^^^^^^
[INFO] [stderr]    |         |
[INFO] [stderr]    |         help: remove this `mut`
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(unused_mut)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:18:34
[INFO] [stderr]    |
[INFO] [stderr] 18 |     let enc_path = tmp_dir.path().clone().join("message.txt");
[INFO] [stderr]    |                                  ^^^^^^^^
[INFO] [stderr]    |
[INFO] [stderr]    = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed
[INFO] [stderr]    = note: `#[warn(noop_method_call)]` on by default
[INFO] [stderr] help: remove this redundant call
[INFO] [stderr]    |
[INFO] [stderr] 18 -     let enc_path = tmp_dir.path().clone().join("message.txt");
[INFO] [stderr] 18 +     let enc_path = tmp_dir.path().join("message.txt");
[INFO] [stderr]    |
[INFO] [stderr] 
[INFO] [stderr] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:19:34
[INFO] [stderr]    |
[INFO] [stderr] 19 |     let dec_path = tmp_dir.path().clone().join("message.txt.enc"); 
[INFO] [stderr]    |                                  ^^^^^^^^
[INFO] [stderr]    |
[INFO] [stderr]    = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed
[INFO] [stderr] help: remove this redundant call
[INFO] [stderr]    |
[INFO] [stderr] 19 -     let dec_path = tmp_dir.path().clone().join("message.txt.enc"); 
[INFO] [stderr] 19 +     let dec_path = tmp_dir.path().join("message.txt.enc"); 
[INFO] [stderr]    |
[INFO] [stderr] 
[INFO] [stderr] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:33:88
[INFO] [stderr]    |
[INFO] [stderr] 33 |     let (encrypt_message, cipher) = encryptor.encrypt_file(enc_path.clone(), passphrase.clone())?;
[INFO] [stderr]    |                                                                                        ^^^^^^^^ help: remove this redundant call
[INFO] [stderr]    |
[INFO] [stderr]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stderr] 
[INFO] [stderr] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stderr]   --> examples/encrypt_xchacha.rs:44:78
[INFO] [stderr]    |
[INFO] [stderr] 44 |     let decrypt_message = decryptor.decrypt_file(dec_path.clone(), passphrase.clone(), cipher)?;
[INFO] [stderr]    |                                                                              ^^^^^^^^ help: remove this redundant call
[INFO] [stderr]    |
[INFO] [stderr]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stderr] 
[INFO] [stderr] warning: unused imports: `Message`, `error::*`
[INFO] [stderr]  --> examples/macro_example.rs:5:5
[INFO] [stderr]   |
[INFO] [stderr] 5 |     error::*,
[INFO] [stderr]   |     ^^^^^^^^
[INFO] [stderr] ...
[INFO] [stderr] 9 |     Message, 
[INFO] [stderr]   |     ^^^^^^^
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `error::*`
[INFO] [stderr]  --> examples/encrypt_aes.rs:2:22
[INFO] [stderr]   |
[INFO] [stderr] 2 | use crypt_guard::{*, error::*};
[INFO] [stderr]   |                      ^^^^^^^^
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused imports: `PathBuf`, `Path`, `Read`, `Write`, `marker::PhantomData`, `self`
[INFO] [stderr]  --> examples/encrypt_aes.rs:4:10
[INFO] [stderr]   |
[INFO] [stderr] 4 |     fs::{self, File}, 
[INFO] [stderr]   |          ^^^^
[INFO] [stderr] 5 |     marker::PhantomData,
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 6 |     path::{PathBuf, Path},
[INFO] [stderr]   |            ^^^^^^^  ^^^^
[INFO] [stderr] 7 |     io::{Read, Write},
[INFO] [stderr]   |          ^^^^  ^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused imports: `Builder`, `TempDir`
[INFO] [stderr]   --> examples/encrypt_aes.rs:10:16
[INFO] [stderr]    |
[INFO] [stderr] 10 | use tempfile::{TempDir, Builder};
[INFO] [stderr]    |                ^^^^^^^  ^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]   --> examples/encrypt_aes.rs:33:9
[INFO] [stderr]    |
[INFO] [stderr] 33 |     let mut decryptor = Kyber::<Decryption, Kyber1024, File, AES>::new(secret_key, None)?;
[INFO] [stderr]    |         ----^^^^^^^^^
[INFO] [stderr]    |         |
[INFO] [stderr]    |         help: remove this `mut`
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(unused_mut)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stderr]   --> examples/encrypt_aes.rs:26:66
[INFO] [stderr]    |
[INFO] [stderr] 26 |     let (encrypt_message, cipher) = encryptor.encrypt_msg(message.clone(), passphrase.clone())?;
[INFO] [stderr]    |                                                                  ^^^^^^^^ help: remove this redundant call
[INFO] [stderr]    |
[INFO] [stderr]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stderr]    = note: `#[warn(noop_method_call)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stderr]   --> examples/encrypt_aes.rs:26:86
[INFO] [stderr]    |
[INFO] [stderr] 26 |     let (encrypt_message, cipher) = encryptor.encrypt_msg(message.clone(), passphrase.clone())?;
[INFO] [stderr]    |                                                                                      ^^^^^^^^ help: remove this redundant call
[INFO] [stderr]    |
[INFO] [stderr]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stderr] 
[INFO] [stderr] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stderr]   --> examples/encrypt_aes.rs:36:84
[INFO] [stderr]    |
[INFO] [stderr] 36 |     let decrypt_message = decryptor.decrypt_msg(encrypt_message.clone(), passphrase.clone(), cipher)?;
[INFO] [stderr]    |                                                                                    ^^^^^^^^ help: remove this redundant call
[INFO] [stderr]    |
[INFO] [stderr]    = note: the type `str` does not implement `Clone`, so calling `clone` on `&str` copies the reference, which does not do anything and can be removed
[INFO] [stderr] 
[INFO] [stderr] warning: `crypt_guard` (example "encrypt_xchacha") generated 9 warnings (run `cargo fix --example "encrypt_xchacha"` to apply 6 suggestions)
[INFO] [stderr] warning: `crypt_guard` (example "macro_example") generated 1 warning (run `cargo fix --example "macro_example"` to apply 1 suggestion)
[INFO] [stderr] warning: `crypt_guard` (example "encrypt_aes") generated 7 warnings (run `cargo fix --example "encrypt_aes"` to apply 7 suggestions)
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.05s
[INFO] [stderr]      Running unittests src/lib.rs (/opt/rustwide/target/debug/deps/crypt_guard-71c2a7164a7ad10a)
[INFO] [stdout] 
[INFO] [stdout] running 53 tests
[INFO] [stdout] test tests::KyberKeyTest::begin ... ok
[INFO] [stdout] test tests::KyberKeyTest::keypair_generation_kyber512 ... ok
[INFO] [stdout] test tests::KyberKeyTest::keypair_generation_kyber768 ... ok
[INFO] [stdout] test tests::KyberKeyTest::encap_decap_kyber512 ... ok
[INFO] [stdout] test tests::KyberKeyTest::keypair_generation_kyber1024 ... ok
[INFO] [stdout] test tests::KyberKeyTest::encap_decap_kyber768 ... ok
[INFO] [stdout] test tests::KyberKeyTest::key_control_functionality ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_data_AES_Kyber1024 ... ok
[INFO] [stdout] test tests::KyberKeyTest::encap_decap_kyber1024 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_decrypt_data_macro_AES_Kyber1024 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_file_AES_Kyber768 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_decrypt_msg_macro_AES_Kyber1024 ... ok
[INFO] [stdout] test tests::MacroTests::test_concat_and_split_key ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_message_AES_Kyber768 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_message_AES_Kyber1024 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_file_XChaCha20_Kyber512 ... ok
[INFO] [stdout] test tests::MacroTests::test_dilithium_keypair_2 ... ok
[INFO] [stdout] test tests::MacroTests::test_dilithium_keypair_5 ... ok
[INFO] [stdout] test tests::MacroTests::test_dilithium_keypair_3 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_message_XChaCha20_Kyber1024 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_file_XChaCha20_Kyber1024 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_decrypt_file_macro_AES_Kyber1024 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_file_AES_Kyber512 ... ok
[INFO] [stdout] test tests::MacroTests::test_kyber_keypair_512 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_message_XChaCha20_Kyber512 ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_file_AES_Kyber1024 ... ok
[INFO] [stdout] test tests::MacroTests::test_kyber_keypair_768 ... ok
[INFO] [stdout] test tests::SignatureTests::end2 ... ok
[INFO] [stdout] test tests::MacroTests::test_kyber_keypair_1024 ... ok
[INFO] [stdout] test tests::SignatureTests::test_dilithium2_detached_signature ... ok
[INFO] [stdout] test tests::KyberTests::encrypt_file_XChaCha20_Kyber768 ... ok
[INFO] [stdout] test tests::SignatureTests::test_dilithium3_signature_message ... ok
[INFO] [stdout] test tests::SignatureTests::test_dilithium3_detached_signature ... ok
[INFO] [stdout] test tests::SignatureTests::test_save_Dilithium2_keys ... FAILED
[INFO] [stdout] test tests::KyberTests::encrypt_message_XChaCha20_Kyber768 ... ok
[INFO] [stdout] test tests::SignatureTests::test_dilithium5_detached_signature ... ok
[INFO] [stdout] test tests::SignatureTests::test_dilithium5_signature_message ... ok
[INFO] [stdout] test tests::SignatureTests::test_save_Dilithium5_keys ... FAILED
[INFO] [stdout] test tests::SignatureTests::test_dilithium2_signature_message ... ok
[INFO] [stdout] test tests::SignatureTests::test_save_Dilithium3_keys ... FAILED
[INFO] [stdout] test tests::ze_end::end ... ok
[INFO] [stdout] test tests::KyberKeyTest::test_key ... FAILED
[INFO] [stdout] test tests::KyberKeyTest::test_key_control_safe_functionality ... FAILED
[INFO] [stdout] test tests::SignatureTests::test_falcon512_detached_signature ... ok
[INFO] [stdout] test tests::SignatureTests::test_save_Falcon512_keys ... FAILED
[INFO] [stdout] test tests::MacroTests::test_falcon_keypair_512 ... ok
[INFO] [stdout] test tests::SignatureTests::test_falcon512_signature_message ... ok
[INFO] [stdout] test tests::MacroTests::SignEncrypt ... ok
[INFO] [stdout] test tests::MacroTests::SignEncrypt_DecryptOpen ... ok
[INFO] [stdout] test tests::SignatureTests::test_save_Falcon1024_keys ... FAILED
[INFO] [stdout] test tests::SignatureTests::test_falcon1024_signature_message ... ok
[INFO] [stdout] test tests::SignatureTests::test_falcon1024_detached_signature ... ok
[INFO] [stdout] test tests::MacroTests::test_falcon_keypair_1024 ... ok
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout] 
[INFO] [stdout] ---- tests::SignatureTests::test_save_Dilithium2_keys stdout ----
[INFO] [stdout] Error: UnsupportedFileType("pub")
[INFO] [stdout] 
[INFO] [stdout] ---- tests::SignatureTests::test_save_Dilithium5_keys stdout ----
[INFO] [stdout] Error: UnsupportedFileType("pub")
[INFO] [stdout] 
[INFO] [stdout] ---- tests::SignatureTests::test_save_Dilithium3_keys stdout ----
[INFO] [stdout] Error: UnsupportedFileType("pub")
[INFO] [stdout] 
[INFO] [stdout] ---- tests::KyberKeyTest::test_key stdout ----
[INFO] [stdout] thread 'tests::KyberKeyTest::test_key' panicked at src/Core/kyber/KeyControler.rs:256:23:
[INFO] [stdout] called `Result::unwrap()` on an `Err` value: IOError(Os { code: 2, kind: NotFound, message: "No such file or directory" })
[INFO] [stdout] stack backtrace:
[INFO] [stdout]    0:     0x55901303bec5 - std::backtrace_rs::backtrace::libunwind::trace::he49dc9a9e3164223
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/../../backtrace/src/backtrace/libunwind.rs:105:5
[INFO] [stdout]    1:     0x55901303bec5 - std::backtrace_rs::backtrace::trace_unsynchronized::h3a3e77c68030aa6b
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/../../backtrace/src/backtrace/mod.rs:66:5
[INFO] [stdout]    2:     0x55901303bec5 - std::sys_common::backtrace::_print_fmt::h9479ad2f99afd5d4
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/sys_common/backtrace.rs:68:5
[INFO] [stdout]    3:     0x55901303bec5 - <std::sys_common::backtrace::_print::DisplayBacktrace as core::fmt::Display>::fmt::hfb01aa1fa3fb1821
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/sys_common/backtrace.rs:44:22
[INFO] [stdout]    4:     0x55901306371b - core::fmt::rt::Argument::fmt::h125e56152abbc1c3
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/fmt/rt.rs:165:63
[INFO] [stdout]    5:     0x55901306371b - core::fmt::write::hb0ab4ff05ccfe741
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/fmt/mod.rs:1169:21
[INFO] [stdout]    6:     0x5590130390ef - std::io::Write::write_fmt::hea6336dbf2fa00b8
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/io/mod.rs:1835:15
[INFO] [stdout]    7:     0x55901303bc9e - std::sys_common::backtrace::_print::h79ca548f3a2adf4b
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/sys_common/backtrace.rs:47:5
[INFO] [stdout]    8:     0x55901303bc9e - std::sys_common::backtrace::print::h9aebf997b2fea2d3
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/sys_common/backtrace.rs:34:9
[INFO] [stdout]    9:     0x55901303d609 - std::panicking::default_hook::{{closure}}::h68a0954af2694526
[INFO] [stdout]   10:     0x55901303d35c - std::panicking::default_hook::h5be50cc6849ffb00
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:295:9
[INFO] [stdout]   11:     0x559012e8db2f - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::hd874405dcbd1d3ed
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/alloc/src/boxed.rs:2036:9
[INFO] [stdout]   12:     0x559012e8db2f - test::test_main::{{closure}}::h4f26a9df34a84b94
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/test/src/lib.rs:137:21
[INFO] [stdout]   13:     0x55901303dc0b - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::h00e96d9c62aa9a12
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/alloc/src/boxed.rs:2036:9
[INFO] [stdout]   14:     0x55901303dc0b - std::panicking::rust_panic_with_hook::h3c0df6036729334c
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:799:13
[INFO] [stdout]   15:     0x55901303d984 - std::panicking::begin_panic_handler::{{closure}}::ha3a21e93c4cfd807
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:664:13
[INFO] [stdout]   16:     0x55901303c389 - std::sys_common::backtrace::__rust_end_short_backtrace::h19508a8f8ae71dc9
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/sys_common/backtrace.rs:171:18
[INFO] [stdout]   17:     0x55901303d6b7 - rust_begin_unwind
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:652:5
[INFO] [stdout]   18:     0x559012db9e13 - core::panicking::panic_fmt::h2ba8af99174d83ea
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/panicking.rs:72:14
[INFO] [stdout]   19:     0x559012dba346 - core::result::unwrap_failed::h52f3bbb78b59f71d
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/result.rs:1654:5
[INFO] [stdout]   20:     0x559012e531f7 - core::result::Result<T,E>::unwrap::h1a5e2bc562f473f5
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/result.rs:1077:23
[INFO] [stdout]   21:     0x559012e531f7 - crypt_guard::Core::kyber::KeyControler::KeyControl<T>::load::ha296c000825ad19d
[INFO] [stdout]                                at /opt/rustwide/workdir/src/Core/kyber/KeyControler.rs:256:6
[INFO] [stdout]   22:     0x559012e2fa0b - crypt_guard::tests::KyberKeyTest::test_key::h35822caf19646234
[INFO] [stdout]                                at /opt/rustwide/workdir/src/tests/KyberKeyTest.rs:159:23
[INFO] [stdout]   23:     0x559012e2f637 - crypt_guard::tests::KyberKeyTest::test_key::{{closure}}::h9dfa69fa0019f379
[INFO] [stdout]                                at /opt/rustwide/workdir/src/tests/KyberKeyTest.rs:139:14
[INFO] [stdout]   24:     0x559012e020d6 - core::ops::function::FnOnce::call_once::hdde31ce69528abc9
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   25:     0x559012e9244b - core::ops::function::FnOnce::call_once::h18c6bf92212b87a4
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   26:     0x559012e9244b - test::__rust_begin_short_backtrace::hdcf0edcfa9080086
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/test/src/lib.rs:625:18
[INFO] [stdout]   27:     0x559012e91b11 - test::run_test_in_process::{{closure}}::heac2c4eb375d2d10
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/test/src/lib.rs:648:60
[INFO] [stdout]   28:     0x559012e91b11 - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::h0289bafc8a1cc004
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/panic/unwind_safe.rs:272:9
[INFO] [stdout]   29:     0x559012e91b11 - std::panicking::try::do_call::h5e158f1ad8a5f983
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:559:40
[INFO] [stdout]   30:     0x559012e91b11 - std::panicking::try::hea3411d60321c4de
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:523:19
[INFO] [stdout]   31:     0x559012e91b11 - std::panic::catch_unwind::hafb7bb18bc47bbc7
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panic.rs:149:14
[INFO] [stdout]   32:     0x559012e91b11 - test::run_test_in_process::h74dd138dc7762d99
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/test/src/lib.rs:648:27
[INFO] [stdout]   33:     0x559012e91b11 - test::run_test::{{closure}}::h6b390822e63606cf
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/test/src/lib.rs:569:43
[INFO] [stdout]   34:     0x559012e5a4e4 - test::run_test::{{closure}}::h6e11dba8131d354b
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/test/src/lib.rs:599:41
[INFO] [stdout]   35:     0x559012e5a4e4 - std::sys_common::backtrace::__rust_begin_short_backtrace::ha71b3541b59bdbbb
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/sys_common/backtrace.rs:155:18
[INFO] [stdout]   36:     0x559012e5efb2 - std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}}::hef92127c5ef9e53c
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/thread/mod.rs:542:17
[INFO] [stdout]   37:     0x559012e5efb2 - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::h859c109f9d11c92b
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/panic/unwind_safe.rs:272:9
[INFO] [stdout]   38:     0x559012e5efb2 - std::panicking::try::do_call::hbf534c458cd858f0
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:559:40
[INFO] [stdout]   39:     0x559012e5efb2 - std::panicking::try::h65c18365a7b9ad90
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:523:19
[INFO] [stdout]   40:     0x559012e5efb2 - std::panic::catch_unwind::h21b25d4c69478c39
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panic.rs:149:14
[INFO] [stdout]   41:     0x559012e5efb2 - std::thread::Builder::spawn_unchecked_::{{closure}}::h23335f620275a9bf
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/thread/mod.rs:541:30
[INFO] [stdout]   42:     0x559012e5efb2 - core::ops::function::FnOnce::call_once{{vtable.shim}}::hb491dc55513e9b7c
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   43:     0x559013042a8b - <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once::h41b39260afcffdc9
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/alloc/src/boxed.rs:2022:9
[INFO] [stdout]   44:     0x559013042a8b - <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once::h6694c8dc6dd010c4
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/alloc/src/boxed.rs:2022:9
[INFO] [stdout]   45:     0x559013042a8b - std::sys::pal::unix::thread::Thread::new::thread_start::hf16038e1c8e19c99
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/sys/pal/unix/thread.rs:108:17
[INFO] [stdout]   46:     0x7fe476c30ac3 - <unknown>
[INFO] [stdout]   47:     0x7fe476cc1a04 - __clone
[INFO] [stdout]   48:                0x0 - <unknown>
[INFO] [stdout] 
[INFO] [stdout] ---- tests::KyberKeyTest::test_key_control_safe_functionality stdout ----
[INFO] [stdout] thread 'tests::KyberKeyTest::test_key_control_safe_functionality' panicked at src/tests/KyberKeyTest.rs:113:59:
[INFO] [stdout] called `Result::unwrap()` on an `Err` value: WriteError
[INFO] [stdout] stack backtrace:
[INFO] [stdout]    0:     0x55901303bec5 - std::backtrace_rs::backtrace::libunwind::trace::he49dc9a9e3164223
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/../../backtrace/src/backtrace/libunwind.rs:105:5
[INFO] [stdout]    1:     0x55901303bec5 - std::backtrace_rs::backtrace::trace_unsynchronized::h3a3e77c68030aa6b
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/../../backtrace/src/backtrace/mod.rs:66:5
[INFO] [stdout]    2:     0x55901303bec5 - std::sys_common::backtrace::_print_fmt::h9479ad2f99afd5d4
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/sys_common/backtrace.rs:68:5
[INFO] [stdout]    3:     0x55901303bec5 - <std::sys_common::backtrace::_print::DisplayBacktrace as core::fmt::Display>::fmt::hfb01aa1fa3fb1821
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/sys_common/backtrace.rs:44:22
[INFO] [stdout]    4:     0x55901306371b - core::fmt::rt::Argument::fmt::h125e56152abbc1c3
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/fmt/rt.rs:165:63
[INFO] [stdout]    5:     0x55901306371b - core::fmt::write::hb0ab4ff05ccfe741
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/fmt/mod.rs:1169:21
[INFO] [stdout]    6:     0x5590130390ef - std::io::Write::write_fmt::hea6336dbf2fa00b8
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/io/mod.rs:1835:15
[INFO] [stdout]    7:     0x55901303bc9e - std::sys_common::backtrace::_print::h79ca548f3a2adf4b
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/sys_common/backtrace.rs:47:5
[INFO] [stdout]    8:     0x55901303bc9e - std::sys_common::backtrace::print::h9aebf997b2fea2d3
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/sys_common/backtrace.rs:34:9
[INFO] [stdout]    9:     0x55901303d609 - std::panicking::default_hook::{{closure}}::h68a0954af2694526
[INFO] [stdout]   10:     0x55901303d35c - std::panicking::default_hook::h5be50cc6849ffb00
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:295:9
[INFO] [stdout]   11:     0x559012e8db2f - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::hd874405dcbd1d3ed
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/alloc/src/boxed.rs:2036:9
[INFO] [stdout]   12:     0x559012e8db2f - test::test_main::{{closure}}::h4f26a9df34a84b94
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/test/src/lib.rs:137:21
[INFO] [stdout]   13:     0x55901303dc0b - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::h00e96d9c62aa9a12
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/alloc/src/boxed.rs:2036:9
[INFO] [stdout]   14:     0x55901303dc0b - std::panicking::rust_panic_with_hook::h3c0df6036729334c
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:799:13
[INFO] [stdout]   15:     0x55901303d984 - std::panicking::begin_panic_handler::{{closure}}::ha3a21e93c4cfd807
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:664:13
[INFO] [stdout]   16:     0x55901303c389 - std::sys_common::backtrace::__rust_end_short_backtrace::h19508a8f8ae71dc9
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/sys_common/backtrace.rs:171:18
[INFO] [stdout]   17:     0x55901303d6b7 - rust_begin_unwind
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:652:5
[INFO] [stdout]   18:     0x559012db9e13 - core::panicking::panic_fmt::h2ba8af99174d83ea
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/panicking.rs:72:14
[INFO] [stdout]   19:     0x559012dba346 - core::result::unwrap_failed::h52f3bbb78b59f71d
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/result.rs:1654:5
[INFO] [stdout]   20:     0x559012e2e464 - core::result::Result<T,E>::unwrap::h243189c8a5d96bc0
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/result.rs:1077:23
[INFO] [stdout]   21:     0x559012e2e464 - crypt_guard::tests::KyberKeyTest::test_key_control_safe_functionality::h57b55cddd49404ad
[INFO] [stdout]                                at /opt/rustwide/workdir/src/tests/KyberKeyTest.rs:113:5
[INFO] [stdout]   22:     0x559012e2de87 - crypt_guard::tests::KyberKeyTest::test_key_control_safe_functionality::{{closure}}::hab570fada64632c5
[INFO] [stdout]                                at /opt/rustwide/workdir/src/tests/KyberKeyTest.rs:102:45
[INFO] [stdout]   23:     0x559012e01f86 - core::ops::function::FnOnce::call_once::hc83a3c4ab4031183
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   24:     0x559012e9244b - core::ops::function::FnOnce::call_once::h18c6bf92212b87a4
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   25:     0x559012e9244b - test::__rust_begin_short_backtrace::hdcf0edcfa9080086
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/test/src/lib.rs:625:18
[INFO] [stdout]   26:     0x559012e91b11 - test::run_test_in_process::{{closure}}::heac2c4eb375d2d10
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/test/src/lib.rs:648:60
[INFO] [stdout]   27:     0x559012e91b11 - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::h0289bafc8a1cc004
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/panic/unwind_safe.rs:272:9
[INFO] [stdout]   28:     0x559012e91b11 - std::panicking::try::do_call::h5e158f1ad8a5f983
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:559:40
[INFO] [stdout]   29:     0x559012e91b11 - std::panicking::try::hea3411d60321c4de
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:523:19
[INFO] [stdout]   30:     0x559012e91b11 - std::panic::catch_unwind::hafb7bb18bc47bbc7
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panic.rs:149:14
[INFO] [stdout]   31:     0x559012e91b11 - test::run_test_in_process::h74dd138dc7762d99
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/test/src/lib.rs:648:27
[INFO] [stdout]   32:     0x559012e91b11 - test::run_test::{{closure}}::h6b390822e63606cf
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/test/src/lib.rs:569:43
[INFO] [stdout]   33:     0x559012e5a4e4 - test::run_test::{{closure}}::h6e11dba8131d354b
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/test/src/lib.rs:599:41
[INFO] [stdout]   34:     0x559012e5a4e4 - std::sys_common::backtrace::__rust_begin_short_backtrace::ha71b3541b59bdbbb
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/sys_common/backtrace.rs:155:18
[INFO] [stdout]   35:     0x559012e5efb2 - std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}}::hef92127c5ef9e53c
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/thread/mod.rs:542:17
[INFO] [stdout]   36:     0x559012e5efb2 - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::h859c109f9d11c92b
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/panic/unwind_safe.rs:272:9
[INFO] [stdout]   37:     0x559012e5efb2 - std::panicking::try::do_call::hbf534c458cd858f0
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:559:40
[INFO] [stdout]   38:     0x559012e5efb2 - std::panicking::try::h65c18365a7b9ad90
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panicking.rs:523:19
[INFO] [stdout]   39:     0x559012e5efb2 - std::panic::catch_unwind::h21b25d4c69478c39
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/panic.rs:149:14
[INFO] [stdout]   40:     0x559012e5efb2 - std::thread::Builder::spawn_unchecked_::{{closure}}::h23335f620275a9bf
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/thread/mod.rs:541:30
[INFO] [stdout]   41:     0x559012e5efb2 - core::ops::function::FnOnce::call_once{{vtable.shim}}::hb491dc55513e9b7c
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   42:     0x559013042a8b - <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once::h41b39260afcffdc9
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/alloc/src/boxed.rs:2022:9
[INFO] [stdout]   43:     0x559013042a8b - <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once::h6694c8dc6dd010c4
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/alloc/src/boxed.rs:2022:9
[INFO] [stdout]   44:     0x559013042a8b - std::sys::pal::unix::thread::Thread::new::thread_start::hf16038e1c8e19c99
[INFO] [stdout]                                at /rustc/b642703cf9526da1e72c0b6755753b939a9c6b6d/library/std/src/sys/pal/unix/thread.rs:108:17
[INFO] [stdout]   45:     0x7fe476c30ac3 - <unknown>
[INFO] [stdout]   46:     0x7fe476cc1a04 - __clone
[INFO] [stdout]   47:                0x0 - <unknown>
[INFO] [stdout] 
[INFO] [stdout] ---- tests::SignatureTests::test_save_Falcon512_keys stdout ----
[INFO] [stdout] Error: UnsupportedFileType("pub")
[INFO] [stdout] 
[INFO] [stdout] ---- tests::SignatureTests::test_save_Falcon1024_keys stdout ----
[INFO] [stdout] Error: UnsupportedFileType("pub")
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout]     tests::KyberKeyTest::test_key
[INFO] [stdout]     tests::KyberKeyTest::test_key_control_safe_functionality
[INFO] [stdout]     tests::SignatureTests::test_save_Dilithium2_keys
[INFO] [stdout]     tests::SignatureTests::test_save_Dilithium3_keys
[INFO] [stdout]     tests::SignatureTests::test_save_Dilithium5_keys
[INFO] [stdout]     tests::SignatureTests::test_save_Falcon1024_keys
[INFO] [stdout]     tests::SignatureTests::test_save_Falcon512_keys
[INFO] [stdout] 
[INFO] [stdout] test result: FAILED. 46 passed; 7 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.15s
[INFO] [stdout] 
[INFO] [stderr] error: test failed, to rerun pass `--lib`
[INFO] running `Command { std: "docker" "inspect" "eb1c8d8ea94ed55a25ff5b66338fc182e8985794145ed17012b4bcdc3bbac2a4", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "eb1c8d8ea94ed55a25ff5b66338fc182e8985794145ed17012b4bcdc3bbac2a4", kill_on_drop: false }`
[INFO] [stdout] eb1c8d8ea94ed55a25ff5b66338fc182e8985794145ed17012b4bcdc3bbac2a4
