[INFO] fetching crate crypt_guard 1.3.3... [INFO] checking crypt_guard-1.3.3 against master#ab869e094a907cc5d19b4080f22eccaf347f1f95 for pr-129604 [INFO] extracting crate crypt_guard 1.3.3 into /workspace/builds/worker-6-tc1/source [INFO] validating manifest of crates.io crate crypt_guard 1.3.3 on toolchain ab869e094a907cc5d19b4080f22eccaf347f1f95 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ab869e094a907cc5d19b4080f22eccaf347f1f95" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate crypt_guard 1.3.3 [INFO] removed 0 missing examples [INFO] finished tweaking crates.io crate crypt_guard 1.3.3 [INFO] tweaked toml for crates.io crate crypt_guard 1.3.3 written to /workspace/builds/worker-6-tc1/source/Cargo.toml [INFO] crate crates.io crate crypt_guard 1.3.3 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ab869e094a907cc5d19b4080f22eccaf347f1f95" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded xts-mode v0.5.1 [INFO] [stderr] Downloaded pqcrypto-traits v0.3.5 [INFO] [stderr] Downloaded crypt_guard_proc v0.2.0 [INFO] [stderr] Downloaded sudo v0.6.0 [INFO] [stderr] Downloaded pqcrypto-internals v0.2.5 [INFO] [stderr] Downloaded aes-gcm-siv v0.11.1 [INFO] [stderr] Downloaded cc v1.1.6 [INFO] [stderr] Downloaded generic-array v1.1.0 [INFO] [stderr] Downloaded pqcrypto-falcon v0.3.0 [INFO] [stderr] Downloaded pqcrypto-dilithium v0.5.0 [INFO] [stderr] Downloaded pqcrypto-kyber v0.8.1 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:923055f121b5182466d55868a8b05e67af8ba4a3a3f6bad814e953ca3cd3ac2a" "/opt/rustwide/cargo-home/bin/cargo" "+ab869e094a907cc5d19b4080f22eccaf347f1f95" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] c39d8bdb87a5bb8209f7fc4a01729ef7d9052d810be14b7d056a30788bd776b7 [INFO] running `Command { std: "docker" "start" "-a" "c39d8bdb87a5bb8209f7fc4a01729ef7d9052d810be14b7d056a30788bd776b7", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "c39d8bdb87a5bb8209f7fc4a01729ef7d9052d810be14b7d056a30788bd776b7", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "c39d8bdb87a5bb8209f7fc4a01729ef7d9052d810be14b7d056a30788bd776b7", kill_on_drop: false }` [INFO] [stdout] c39d8bdb87a5bb8209f7fc4a01729ef7d9052d810be14b7d056a30788bd776b7 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:923055f121b5182466d55868a8b05e67af8ba4a3a3f6bad814e953ca3cd3ac2a" "/opt/rustwide/cargo-home/bin/cargo" "+ab869e094a907cc5d19b4080f22eccaf347f1f95" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 168bbbe33d18968b46694161ee406930dee27f1b3d1b4f984ef5a28f0419d1a6 [INFO] running `Command { std: "docker" "start" "-a" "168bbbe33d18968b46694161ee406930dee27f1b3d1b4f984ef5a28f0419d1a6", kill_on_drop: false }` [INFO] [stderr] Compiling typenum v1.17.0 [INFO] [stderr] Compiling glob v0.3.1 [INFO] [stderr] Compiling dunce v1.0.4 [INFO] [stderr] Checking cpufeatures v0.2.12 [INFO] [stderr] Checking pqcrypto-traits v0.3.5 [INFO] [stderr] Compiling generic-array v0.14.7 [INFO] [stderr] Compiling libc v0.2.155 [INFO] [stderr] Checking ppv-lite86 v0.2.17 [INFO] [stderr] Compiling rustix v0.38.34 [INFO] [stderr] Checking getrandom v0.2.15 [INFO] [stderr] Compiling hex v0.4.3 [INFO] [stderr] Compiling syn v2.0.72 [INFO] [stderr] Checking sudo v0.6.0 [INFO] [stderr] Checking fastrand v2.1.0 [INFO] [stderr] Checking rayon v1.10.0 [INFO] [stderr] Checking rand_core v0.6.4 [INFO] [stderr] Checking rand_chacha v0.3.1 [INFO] [stderr] Checking rand v0.8.5 [INFO] [stderr] Compiling jobserver v0.1.32 [INFO] [stderr] Compiling cc v1.1.6 [INFO] [stderr] Checking generic-array v1.1.0 [INFO] [stderr] Compiling pqcrypto-internals v0.2.5 [INFO] [stderr] Compiling pqcrypto-dilithium v0.5.0 [INFO] [stderr] Compiling pqcrypto-kyber v0.8.1 [INFO] [stderr] Compiling pqcrypto-falcon v0.3.0 [INFO] [stderr] Checking sysinfo v0.30.13 [INFO] [stderr] Checking tempfile v3.10.1 [INFO] [stderr] Checking crypto-common v0.1.6 [INFO] [stderr] Checking block-padding v0.3.3 [INFO] [stderr] Checking block-buffer v0.10.4 [INFO] [stderr] Checking universal-hash v0.5.1 [INFO] [stderr] Checking aead v0.5.2 [INFO] [stderr] Checking inout v0.1.3 [INFO] [stderr] Checking digest v0.10.7 [INFO] [stderr] Checking polyval v0.6.2 [INFO] [stderr] Checking poly1305 v0.8.0 [INFO] [stderr] Checking cipher v0.4.4 [INFO] [stderr] Checking chacha20 v0.9.1 [INFO] [stderr] Checking ctr v0.9.2 [INFO] [stderr] Checking aes v0.8.4 [INFO] [stderr] Checking cbc v0.1.2 [INFO] [stderr] Checking xts-mode v0.5.1 [INFO] [stderr] Checking hmac v0.12.1 [INFO] [stderr] Checking sha2 v0.10.8 [INFO] [stderr] Checking chacha20poly1305 v0.10.1 [INFO] [stderr] Checking aes-gcm-siv v0.11.1 [INFO] [stderr] Compiling crypt_guard_proc v0.2.0 [INFO] [stderr] Checking crypt_guard v1.3.3 (/opt/rustwide/workdir) [INFO] [stdout] warning: type `AES_GCM_SIV` should have an upper camel case name [INFO] [stdout] --> src/Core/kyber/mod.rs:83:12 [INFO] [stdout] | [INFO] [stdout] 83 | pub struct AES_GCM_SIV; [INFO] [stdout] | ^^^^^^^^^^^ help: convert the identifier to upper camel case: `AesGcmSiv` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_camel_case_types)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `AES_CTR` should have an upper camel case name [INFO] [stdout] --> src/Core/kyber/mod.rs:86:12 [INFO] [stdout] | [INFO] [stdout] 86 | pub struct AES_CTR; [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesCtr` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `CipherChaCha` [INFO] [stdout] --> src/Core/cipher_aes_gcm_siv.rs:8:9 [INFO] [stdout] | [INFO] [stdout] 8 | CipherChaCha, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_aes_gcm_siv.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `Aead`, `Aes256GcmSiv`, and `Nonce` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:23:12 [INFO] [stdout] | [INFO] [stdout] 23 | aead::{Aead, KeyInit}, [INFO] [stdout] | ^^^^ [INFO] [stdout] 24 | Aes256GcmSiv, Nonce, [INFO] [stdout] | ^^^^^^^^^^^^ ^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `StreamCipherSeek` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:26:44 [INFO] [stdout] | [INFO] [stdout] 26 | use aes::cipher::{KeyIvInit, StreamCipher, StreamCipherSeek, generic_array::GenericArray}; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `Components` and `Networks` [INFO] [stdout] --> src/Core/devices.rs:2:5 [INFO] [stdout] | [INFO] [stdout] 2 | Components, Disks, Networks, System, [INFO] [stdout] | ^^^^^^^^^^ ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `Path`, `Read`, `SeekFrom`, `Seek`, `fs::File`, `process::Command`, and `self` [INFO] [stdout] --> src/Core/devices.rs:5:2 [INFO] [stdout] | [INFO] [stdout] 5 | fs::File, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] 6 | io::{self, Read, Seek, SeekFrom}, [INFO] [stdout] | ^^^^ ^^^^ ^^^^ ^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 9 | process::Command, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] 10 | path::{PathBuf, Path}, [INFO] [stdout] | ^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `CipherChaCha` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:8:9 [INFO] [stdout] | [INFO] [stdout] 8 | CipherChaCha, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `AeadCore` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:23:18 [INFO] [stdout] | [INFO] [stdout] 23 | aead::{Aead, AeadCore, KeyInit}, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherAES_GCM_SIV` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:26:12 [INFO] [stdout] | [INFO] [stdout] 26 | pub struct CipherAES_GCM_SIV { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesGcmSiv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherAES_CTR` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:39:12 [INFO] [stdout] | [INFO] [stdout] 39 | pub struct CipherAES_CTR { [INFO] [stdout] | ^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesCtr` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherChaCha_Poly` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:69:12 [INFO] [stdout] | [INFO] [stdout] 69 | pub struct CipherChaCha_Poly { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherChaChaPoly` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `AES_GCM_SIV` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:85:5 [INFO] [stdout] | [INFO] [stdout] 85 | AES_GCM_SIV, [INFO] [stdout] | ^^^^^^^^^^^ help: convert the identifier to upper camel case: `AesGcmSiv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `AES_CTR` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:86:5 [INFO] [stdout] | [INFO] [stdout] 86 | AES_CTR, [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesCtr` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `zeroize::Zeroize` [INFO] [stdout] --> src/lib.rs:226:5 [INFO] [stdout] | [INFO] [stdout] 226 | use zeroize::Zeroize; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `AES_GCM_SIV` should have an upper camel case name [INFO] [stdout] --> src/Core/kyber/mod.rs:83:12 [INFO] [stdout] | [INFO] [stdout] 83 | pub struct AES_GCM_SIV; [INFO] [stdout] | ^^^^^^^^^^^ help: convert the identifier to upper camel case: `AesGcmSiv` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_camel_case_types)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `AES_CTR` should have an upper camel case name [INFO] [stdout] --> src/Core/kyber/mod.rs:86:12 [INFO] [stdout] | [INFO] [stdout] 86 | pub struct AES_CTR; [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesCtr` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `CipherChaCha` [INFO] [stdout] --> src/Core/cipher_aes_gcm_siv.rs:8:9 [INFO] [stdout] | [INFO] [stdout] 8 | CipherChaCha, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_aes_gcm_siv.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `Aead`, `Aes256GcmSiv`, and `Nonce` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:23:12 [INFO] [stdout] | [INFO] [stdout] 23 | aead::{Aead, KeyInit}, [INFO] [stdout] | ^^^^ [INFO] [stdout] 24 | Aes256GcmSiv, Nonce, [INFO] [stdout] | ^^^^^^^^^^^^ ^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `StreamCipherSeek` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:26:44 [INFO] [stdout] | [INFO] [stdout] 26 | use aes::cipher::{KeyIvInit, StreamCipher, StreamCipherSeek, generic_array::GenericArray}; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `Components` and `Networks` [INFO] [stdout] --> src/Core/devices.rs:2:5 [INFO] [stdout] | [INFO] [stdout] 2 | Components, Disks, Networks, System, [INFO] [stdout] | ^^^^^^^^^^ ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `Path`, `Read`, `SeekFrom`, `Seek`, `fs::File`, `process::Command`, and `self` [INFO] [stdout] --> src/Core/devices.rs:5:2 [INFO] [stdout] | [INFO] [stdout] 5 | fs::File, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] 6 | io::{self, Read, Seek, SeekFrom}, [INFO] [stdout] | ^^^^ ^^^^ ^^^^ ^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 9 | process::Command, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] 10 | path::{PathBuf, Path}, [INFO] [stdout] | ^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `CipherChaCha` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:8:9 [INFO] [stdout] | [INFO] [stdout] 8 | CipherChaCha, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `fs` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | fs [INFO] [stdout] | ^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `AeadCore` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:23:18 [INFO] [stdout] | [INFO] [stdout] 23 | aead::{Aead, AeadCore, KeyInit}, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherAES_GCM_SIV` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:26:12 [INFO] [stdout] | [INFO] [stdout] 26 | pub struct CipherAES_GCM_SIV { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesGcmSiv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherAES_CTR` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:39:12 [INFO] [stdout] | [INFO] [stdout] 39 | pub struct CipherAES_CTR { [INFO] [stdout] | ^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherAesCtr` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `CipherChaCha_Poly` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:69:12 [INFO] [stdout] | [INFO] [stdout] 69 | pub struct CipherChaCha_Poly { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `CipherChaChaPoly` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `AES_GCM_SIV` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:85:5 [INFO] [stdout] | [INFO] [stdout] 85 | AES_GCM_SIV, [INFO] [stdout] | ^^^^^^^^^^^ help: convert the identifier to upper camel case: `AesGcmSiv` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `AES_CTR` should have an upper camel case name [INFO] [stdout] --> src/cryptography/mod.rs:86:5 [INFO] [stdout] | [INFO] [stdout] 86 | AES_CTR, [INFO] [stdout] | ^^^^^^^ help: convert the identifier to upper camel case: `AesCtr` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `super::*` [INFO] [stdout] --> src/tests/DevicesTests.rs:1:5 [INFO] [stdout] | [INFO] [stdout] 1 | use super::*; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `std::collections::HashMap` [INFO] [stdout] --> src/tests/DevicesTests.rs:2:5 [INFO] [stdout] | [INFO] [stdout] 2 | use std::collections::HashMap; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `*`, `*`, `DecryptFile`, `Decryption`, `EncryptFile`, `Encryption`, `KyberFunctions`, and `error::*` [INFO] [stdout] --> src/tests/DevicesTests.rs:4:5 [INFO] [stdout] | [INFO] [stdout] 4 | Encryption, [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] 5 | Decryption, [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] 6 | EncryptFile, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] 7 | DecryptFile, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] 8 | Core::{kyber::{KyberFunctions, *}, *}, [INFO] [stdout] | ^^^^^^^^^^^^^^ ^ ^ [INFO] [stdout] 9 | error::*, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary trailing semicolon [INFO] [stdout] --> src/lib.rs:1145:28 [INFO] [stdout] | [INFO] [stdout] 1145 | let mut key = $key;; [INFO] [stdout] | ^ help: remove this semicolon [INFO] [stdout] | [INFO] [stdout] ::: src/tests/SignatureTests.rs:12:16 [INFO] [stdout] | [INFO] [stdout] 12 | let sign = Signature!(Falcon, secret_key.to_owned(), 1024, data.clone(), Message); [INFO] [stdout] | ---------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(redundant_semicolons)]` on by default [INFO] [stdout] = note: this warning originates in the macro `Signature` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary trailing semicolon [INFO] [stdout] --> src/lib.rs:1146:36 [INFO] [stdout] | [INFO] [stdout] 1146 | let mut content = $content;; [INFO] [stdout] | ^ help: remove this semicolon [INFO] [stdout] | [INFO] [stdout] ::: src/tests/SignatureTests.rs:12:16 [INFO] [stdout] | [INFO] [stdout] 12 | let sign = Signature!(Falcon, secret_key.to_owned(), 1024, data.clone(), Message); [INFO] [stdout] | ---------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `Signature` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary trailing semicolon [INFO] [stdout] --> src/lib.rs:1157:28 [INFO] [stdout] | [INFO] [stdout] 1157 | let mut key = $key;; [INFO] [stdout] | ^ help: remove this semicolon [INFO] [stdout] | [INFO] [stdout] ::: src/tests/SignatureTests.rs:33:16 [INFO] [stdout] | [INFO] [stdout] 33 | let sign = Signature!(Falcon, secret_key.to_owned(), 1024, data.clone(), Detached); [INFO] [stdout] | ----------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `Signature` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary trailing semicolon [INFO] [stdout] --> src/lib.rs:1158:36 [INFO] [stdout] | [INFO] [stdout] 1158 | let mut content = $content;; [INFO] [stdout] | ^ help: remove this semicolon [INFO] [stdout] | [INFO] [stdout] ::: src/tests/SignatureTests.rs:33:16 [INFO] [stdout] | [INFO] [stdout] 33 | let sign = Signature!(Falcon, secret_key.to_owned(), 1024, data.clone(), Detached); [INFO] [stdout] | ----------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `Signature` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `zeroize::Zeroize` [INFO] [stdout] --> src/lib.rs:226:5 [INFO] [stdout] | [INFO] [stdout] 226 | use zeroize::Zeroize; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Mac` [INFO] [stdout] --> src/Core/KDF.rs:1:12 [INFO] [stdout] | [INFO] [stdout] 1 | use hmac::{Mac}; [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Ciphertext` [INFO] [stdout] --> src/KeyControl/mod.rs:4:64 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `SharedSecret` [INFO] [stdout] --> src/KeyControl/mod.rs:4:50 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `SecretKey` [INFO] [stdout] --> src/KeyControl/mod.rs:4:39 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `PublicKey` [INFO] [stdout] --> src/KeyControl/mod.rs:4:28 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes_gcm_siv.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KeyInit` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:23:18 [INFO] [stdout] | [INFO] [stdout] 23 | aead::{Aead, KeyInit}, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Write` [INFO] [stdout] --> src/Core/cipher_aes.rs:26:10 [INFO] [stdout] | [INFO] [stdout] 26 | io::{Write}, [INFO] [stdout] | ^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes.rs:9:9 [INFO] [stdout] | [INFO] [stdout] 9 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_xchacha.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Mac` [INFO] [stdout] --> src/cryptography/hmac_sign/mod.rs:3:12 [INFO] [stdout] | [INFO] [stdout] 3 | use hmac::{Mac}; [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:25:35 [INFO] [stdout] | [INFO] [stdout] 25 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:65:35 [INFO] [stdout] | [INFO] [stdout] 65 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key_encap_mechanism` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:105:14 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_key_encap_mechanism` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:105:35 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:177:35 [INFO] [stdout] | [INFO] [stdout] 177 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:216:35 [INFO] [stdout] | [INFO] [stdout] 216 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:253:35 [INFO] [stdout] | [INFO] [stdout] 253 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:25:35 [INFO] [stdout] | [INFO] [stdout] 25 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:65:35 [INFO] [stdout] | [INFO] [stdout] 65 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key_encap_mechanism` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:105:14 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_key_encap_mechanism` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:105:35 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:177:35 [INFO] [stdout] | [INFO] [stdout] 177 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:216:35 [INFO] [stdout] | [INFO] [stdout] 216 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:253:35 [INFO] [stdout] | [INFO] [stdout] 253 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:118:13 [INFO] [stdout] | [INFO] [stdout] 118 | let mut data = hmac.hmac(); [INFO] [stdout] | ----^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:129:13 [INFO] [stdout] | [INFO] [stdout] 129 | let mut ciphertext = self.infos.content()?; [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Mac` [INFO] [stdout] --> src/Core/KDF.rs:1:12 [INFO] [stdout] | [INFO] [stdout] 1 | use hmac::{Mac}; [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `PublicKey` [INFO] [stdout] --> src/KeyControl/mod.rs:4:28 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `hmac_sign` [INFO] [stdout] --> src/tests/MacroTests.rs:5:9 [INFO] [stdout] | [INFO] [stdout] 5 | hmac_sign::*, [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `SecretKey` [INFO] [stdout] --> src/KeyControl/mod.rs:4:39 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `SharedSecret` [INFO] [stdout] --> src/KeyControl/mod.rs:4:50 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes_gcm_siv.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KeyInit` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:23:18 [INFO] [stdout] | [INFO] [stdout] 23 | aead::{Aead, KeyInit}, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Write` [INFO] [stdout] --> src/Core/cipher_aes.rs:26:10 [INFO] [stdout] | [INFO] [stdout] 26 | io::{Write}, [INFO] [stdout] | ^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_aes.rs:9:9 [INFO] [stdout] | [INFO] [stdout] 9 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_xchacha.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `KyberKeyFunctions` [INFO] [stdout] --> src/Core/cipher_xchacha_poly.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | KyberKeyFunctions, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Ciphertext` [INFO] [stdout] --> src/KeyControl/mod.rs:4:64 [INFO] [stdout] | [INFO] [stdout] 4 | use pqcrypto_traits::kem::{PublicKey, SecretKey, SharedSecret, Ciphertext}; [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `Mac` [INFO] [stdout] --> src/cryptography/hmac_sign/mod.rs:3:12 [INFO] [stdout] | [INFO] [stdout] 3 | use hmac::{Mac}; [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `hmac_sign` [INFO] [stdout] --> src/tests/KyberKeyTests.rs:8:9 [INFO] [stdout] | [INFO] [stdout] 8 | hmac_sign::*, [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/Core/cipher_aes.rs:190:13 [INFO] [stdout] | [INFO] [stdout] 190 | let mut cipher = Aes128CbcDec::new(key, iv_arr); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unreachable pattern [INFO] [stdout] --> src/Core/cipher_xchacha.rs:157:13 [INFO] [stdout] | [INFO] [stdout] 157 | _ => Err(|e| CryptError::IOError(e)), [INFO] [stdout] | ^ no value can reach this [INFO] [stdout] | [INFO] [stdout] note: multiple earlier patterns match some of the same values [INFO] [stdout] --> src/Core/cipher_xchacha.rs:157:13 [INFO] [stdout] | [INFO] [stdout] 129 | Process::Encryption => { [INFO] [stdout] | ------------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 143 | Process::Decryption => { [INFO] [stdout] | ------------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 157 | _ => Err(|e| CryptError::IOError(e)), [INFO] [stdout] | ^ collectively making this unreachable [INFO] [stdout] = note: `#[warn(unreachable_patterns)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `encrypted_data` is never read [INFO] [stdout] --> src/Core/cipher_xchacha.rs:125:17 [INFO] [stdout] | [INFO] [stdout] 125 | let mut encrypted_data: Vec = Vec::new(); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: `#[warn(unused_assignments)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `nonce_vec` is never read [INFO] [stdout] --> src/Core/cipher_xchacha.rs:126:17 [INFO] [stdout] | [INFO] [stdout] 126 | let mut nonce_vec: Vec = Vec::new(); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unreachable pattern [INFO] [stdout] --> src/cryptography/hmac_sign/sign.rs:47:13 [INFO] [stdout] | [INFO] [stdout] 47 | _ => vec![], [INFO] [stdout] | ^ no value can reach this [INFO] [stdout] | [INFO] [stdout] note: multiple earlier patterns match some of the same values [INFO] [stdout] --> src/cryptography/hmac_sign/sign.rs:47:13 [INFO] [stdout] | [INFO] [stdout] 39 | Operation::Sign => { [INFO] [stdout] | --------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 43 | Operation::Verify => { [INFO] [stdout] | ----------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 47 | _ => vec![], [INFO] [stdout] | ^ collectively making this unreachable [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `device_name`, `mount_point`, and `raw_blocks` are never read [INFO] [stdout] --> src/Core/devices.rs:14:2 [INFO] [stdout] | [INFO] [stdout] 13 | pub struct Device { [INFO] [stdout] | ------ fields in this struct [INFO] [stdout] 14 | device_name: String, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] 15 | mount_point: PathBuf, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] 16 | raw_blocks: Vec, [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `save_ciphertext` and `generate_cbc_iv` are never used [INFO] [stdout] --> src/Core/cipher_aes.rs:110:8 [INFO] [stdout] | [INFO] [stdout] 39 | impl CipherAES { [INFO] [stdout] | -------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 110 | fn save_ciphertext(&self, _encrypted_data: &[u8]) -> Result<(), CryptError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 152 | fn generate_cbc_iv(&mut self) -> Result, CryptError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `public_key`, `secret_key`, `signed_msg`, and `signature` are never used [INFO] [stdout] --> src/cryptography/hmac_sign/mod.rs:176:8 [INFO] [stdout] | [INFO] [stdout] 168 | impl SignatureKey { [INFO] [stdout] | ----------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 176 | fn public_key(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 181 | fn secret_key(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 186 | fn signed_msg(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 191 | fn signature(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `Core` should have a snake case name [INFO] [stdout] --> src/lib.rs:196:5 [INFO] [stdout] | [INFO] [stdout] 196 | mod Core; [INFO] [stdout] | ^^^^ help: convert the identifier to snake case (notice the capitalization): `core` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_snake_case)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KeyControl` should have a snake case name [INFO] [stdout] --> src/lib.rs:200:9 [INFO] [stdout] | [INFO] [stdout] 200 | pub mod KeyControl; [INFO] [stdout] | ^^^^^^^^^^ help: convert the identifier to snake case: `key_control` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KDF` should have a snake case name [INFO] [stdout] --> src/Core/mod.rs:4:9 [INFO] [stdout] | [INFO] [stdout] 4 | pub mod KDF; [INFO] [stdout] | ^^^ help: convert the identifier to snake case: `kdf` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KeyControler` should have a snake case name [INFO] [stdout] --> src/Core/kyber/mod.rs:2:9 [INFO] [stdout] | [INFO] [stdout] 2 | pub mod KeyControler; [INFO] [stdout] | ^^^^^^^^^^^^ help: convert the identifier to snake case: `key_controler` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/Core/cipher_aes.rs:155:9 [INFO] [stdout] | [INFO] [stdout] 155 | rng.try_fill(&mut iv[..]); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] = note: `#[warn(unused_must_use)]` on by default [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 155 | let _ = rng.try_fill(&mut iv[..]); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `Ciphertext` should have a snake case name [INFO] [stdout] --> src/KeyControl/mod.rs:42:12 [INFO] [stdout] | [INFO] [stdout] 42 | pub fn Ciphertext() -> Self { [INFO] [stdout] | ^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `ciphertext` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:25:35 [INFO] [stdout] | [INFO] [stdout] 25 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:65:35 [INFO] [stdout] | [INFO] [stdout] 65 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key_encap_mechanism` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:105:14 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_key_encap_mechanism` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:105:35 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:177:35 [INFO] [stdout] | [INFO] [stdout] 177 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:216:35 [INFO] [stdout] | [INFO] [stdout] 216 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_gcm_siv.rs:253:35 [INFO] [stdout] | [INFO] [stdout] 253 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:25:35 [INFO] [stdout] | [INFO] [stdout] 25 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:65:35 [INFO] [stdout] | [INFO] [stdout] 65 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key_encap_mechanism` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:105:14 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_key_encap_mechanism` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:105:35 [INFO] [stdout] | [INFO] [stdout] 105 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:177:35 [INFO] [stdout] | [INFO] [stdout] 177 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:216:35 [INFO] [stdout] | [INFO] [stdout] 216 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `kybersize` [INFO] [stdout] --> src/Core/kyber/kyber_crypto_aes_ctr.rs:253:35 [INFO] [stdout] | [INFO] [stdout] 253 | let (key_encap_mechanism, kybersize) = match KyberSize::variant() { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_kybersize` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 61 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:118:13 [INFO] [stdout] | [INFO] [stdout] 118 | let mut data = hmac.hmac(); [INFO] [stdout] | ----^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/Core/cipher_aes_ctr.rs:129:13 [INFO] [stdout] | [INFO] [stdout] 129 | let mut ciphertext = self.infos.content()?; [INFO] [stdout] | ----^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/Core/cipher_aes.rs:190:13 [INFO] [stdout] | [INFO] [stdout] 190 | let mut cipher = Aes128CbcDec::new(key, iv_arr); [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unreachable pattern [INFO] [stdout] --> src/Core/cipher_xchacha.rs:157:13 [INFO] [stdout] | [INFO] [stdout] 157 | _ => Err(|e| CryptError::IOError(e)), [INFO] [stdout] | ^ no value can reach this [INFO] [stdout] | [INFO] [stdout] note: multiple earlier patterns match some of the same values [INFO] [stdout] --> src/Core/cipher_xchacha.rs:157:13 [INFO] [stdout] | [INFO] [stdout] 129 | Process::Encryption => { [INFO] [stdout] | ------------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 143 | Process::Decryption => { [INFO] [stdout] | ------------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 157 | _ => Err(|e| CryptError::IOError(e)), [INFO] [stdout] | ^ collectively making this unreachable [INFO] [stdout] = note: `#[warn(unreachable_patterns)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `encrypted_data` is never read [INFO] [stdout] --> src/Core/cipher_xchacha.rs:125:17 [INFO] [stdout] | [INFO] [stdout] 125 | let mut encrypted_data: Vec = Vec::new(); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: `#[warn(unused_assignments)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `nonce_vec` is never read [INFO] [stdout] --> src/Core/cipher_xchacha.rs:126:17 [INFO] [stdout] | [INFO] [stdout] 126 | let mut nonce_vec: Vec = Vec::new(); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `tmp_dir` [INFO] [stdout] --> examples/encrypt_xchacha.rs:9:9 [INFO] [stdout] | [INFO] [stdout] 9 | let tmp_dir = TempDir::new().map_err(|e| CryptError::from(e))?; [INFO] [stdout] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_tmp_dir` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `encrypt_message` [INFO] [stdout] --> examples/encrypt_xchacha.rs:27:10 [INFO] [stdout] | [INFO] [stdout] 27 | let (encrypt_message, cipher) = encryptor.encrypt_file(enc_path.clone(), passphrase)?; [INFO] [stdout] | ^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_encrypt_message` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `decrypt_message` [INFO] [stdout] --> examples/encrypt_xchacha.rs:38:9 [INFO] [stdout] | [INFO] [stdout] 38 | let decrypt_message = decryptor.decrypt_file(dec_path.clone(), passphrase, cipher)?; [INFO] [stdout] | ^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_decrypt_message` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unreachable pattern [INFO] [stdout] --> src/cryptography/hmac_sign/sign.rs:47:13 [INFO] [stdout] | [INFO] [stdout] 47 | _ => vec![], [INFO] [stdout] | ^ no value can reach this [INFO] [stdout] | [INFO] [stdout] note: multiple earlier patterns match some of the same values [INFO] [stdout] --> src/cryptography/hmac_sign/sign.rs:47:13 [INFO] [stdout] | [INFO] [stdout] 39 | Operation::Sign => { [INFO] [stdout] | --------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 43 | Operation::Verify => { [INFO] [stdout] | ----------------- matches some of the same values [INFO] [stdout] ... [INFO] [stdout] 47 | _ => vec![], [INFO] [stdout] | ^ collectively making this unreachable [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 3 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/lib.rs:838:13 [INFO] [stdout] | [INFO] [stdout] 838 | let key = $key; [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] | [INFO] [stdout] ::: src/tests/KyberTests.rs:57:27 [INFO] [stdout] | [INFO] [stdout] 57 | ... = Decryption!(secret_key.to_owned(), 1024, encrypt_message.to_owned(), passphrase, cipher.to_owned(), Some(nonce.clone()), XChaCha20); [INFO] [stdout] | ----------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `Decryption` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/tests/KyberTests.rs:51:9 [INFO] [stdout] | [INFO] [stdout] 51 | let mut key = public_key; [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/lib.rs:738:13 [INFO] [stdout] | [INFO] [stdout] 738 | let key = $key; [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] | [INFO] [stdout] ::: src/tests/KyberTests.rs:158:27 [INFO] [stdout] | [INFO] [stdout] 158 | ... = Decryption!(secret_key.to_owned(), 1024, encrypt_message.to_owned(), passphrase, cipher.to_owned(), Some(nonce), AES_GCM_SIV)?; [INFO] [stdout] | ----------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `Decryption` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/lib.rs:788:13 [INFO] [stdout] | [INFO] [stdout] 788 | let key = $key; [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] | [INFO] [stdout] ::: src/tests/KyberTests.rs:284:27 [INFO] [stdout] | [INFO] [stdout] 284 | ...ge = Decryption!(secret_key.to_owned(), 1024, encrypt_message.to_owned(), passphrase, cipher.to_owned(), Some(nonce), AES_CTR)?; [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `Decryption` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/lib.rs:894:13 [INFO] [stdout] | [INFO] [stdout] 894 | let key = $key; [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] | [INFO] [stdout] ::: src/tests/KyberTests.rs:368:27 [INFO] [stdout] | [INFO] [stdout] 368 | ... = Decryption!(secret_key.to_owned(), 1024, encrypt_message.to_owned(), passphrase, cipher.to_owned(), Some(nonce.to_owned()), XChaCha20Poly1305... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `Decryption` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `passphrase` [INFO] [stdout] --> src/lib.rs:241:13 [INFO] [stdout] | [INFO] [stdout] 241 | let passphrase = $passphrase; [INFO] [stdout] | ^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_passphrase` [INFO] [stdout] | [INFO] [stdout] ::: src/tests/MacroTests.rs:99:37 [INFO] [stdout] | [INFO] [stdout] 99 | let (encrypt_message, cipher) = EncryptSign!(public_key.clone(), secret.clone(), message.to_owned(), "hey, how are you?").unwrap(); [INFO] [stdout] | ----------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `EncryptSign` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `passphrase` [INFO] [stdout] --> src/lib.rs:241:13 [INFO] [stdout] | [INFO] [stdout] 241 | let passphrase = $passphrase; [INFO] [stdout] | ^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_passphrase` [INFO] [stdout] | [INFO] [stdout] ::: src/tests/MacroTests.rs:112:37 [INFO] [stdout] | [INFO] [stdout] 112 | let (encrypt_message, cipher) = EncryptSign!(public_key.to_owned(), secret.to_owned(), message.clone(), "hey, how are you?").unwrap(); [INFO] [stdout] | -------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `EncryptSign` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `passphrase` [INFO] [stdout] --> src/lib.rs:262:13 [INFO] [stdout] | [INFO] [stdout] 262 | let passphrase = $passphrase; [INFO] [stdout] | ^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_passphrase` [INFO] [stdout] | [INFO] [stdout] ::: src/tests/MacroTests.rs:114:27 [INFO] [stdout] | [INFO] [stdout] 114 | ...ge = DecryptOpen!(secret_key.to_owned(), public.to_owned(), encrypt_message.clone(), "hey, how are you?", cipher.to_owned()); [INFO] [stdout] | ----------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in the macro `DecryptOpen` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `device_name`, `mount_point`, and `raw_blocks` are never read [INFO] [stdout] --> src/Core/devices.rs:14:2 [INFO] [stdout] | [INFO] [stdout] 13 | pub struct Device { [INFO] [stdout] | ------ fields in this struct [INFO] [stdout] 14 | device_name: String, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] 15 | mount_point: PathBuf, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] 16 | raw_blocks: Vec, [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `save_ciphertext` and `generate_cbc_iv` are never used [INFO] [stdout] --> src/Core/cipher_aes.rs:110:8 [INFO] [stdout] | [INFO] [stdout] 39 | impl CipherAES { [INFO] [stdout] | -------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 110 | fn save_ciphertext(&self, _encrypted_data: &[u8]) -> Result<(), CryptError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 152 | fn generate_cbc_iv(&mut self) -> Result, CryptError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `public_key`, `secret_key`, `signed_msg`, and `signature` are never used [INFO] [stdout] --> src/cryptography/hmac_sign/mod.rs:176:8 [INFO] [stdout] | [INFO] [stdout] 168 | impl SignatureKey { [INFO] [stdout] | ----------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 176 | fn public_key(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 181 | fn secret_key(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 186 | fn signed_msg(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 191 | fn signature(&mut self) -> Result<&[u8], SigningErr> { [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `read_file` is never used [INFO] [stdout] --> src/tests/KyberKeyTests.rs:92:4 [INFO] [stdout] | [INFO] [stdout] 92 | fn read_file(path: &PathBuf) -> Result, std::io::Error> { [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_message_AES_Kyber512` is never used [INFO] [stdout] --> src/tests/KyberTests.rs:545:4 [INFO] [stdout] | [INFO] [stdout] 545 | fn encrypt_message_AES_Kyber512() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `Core` should have a snake case name [INFO] [stdout] --> src/lib.rs:196:5 [INFO] [stdout] | [INFO] [stdout] 196 | mod Core; [INFO] [stdout] | ^^^^ help: convert the identifier to snake case (notice the capitalization): `core` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_snake_case)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KeyControl` should have a snake case name [INFO] [stdout] --> src/lib.rs:200:9 [INFO] [stdout] | [INFO] [stdout] 200 | pub mod KeyControl; [INFO] [stdout] | ^^^^^^^^^^ help: convert the identifier to snake case: `key_control` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KDF` should have a snake case name [INFO] [stdout] --> src/Core/mod.rs:4:9 [INFO] [stdout] | [INFO] [stdout] 4 | pub mod KDF; [INFO] [stdout] | ^^^ help: convert the identifier to snake case: `kdf` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KeyControler` should have a snake case name [INFO] [stdout] --> src/Core/kyber/mod.rs:2:9 [INFO] [stdout] | [INFO] [stdout] 2 | pub mod KeyControler; [INFO] [stdout] | ^^^^^^^^^^^^ help: convert the identifier to snake case: `key_controler` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/Core/cipher_aes.rs:155:9 [INFO] [stdout] | [INFO] [stdout] 155 | rng.try_fill(&mut iv[..]); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] = note: `#[warn(unused_must_use)]` on by default [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 155 | let _ = rng.try_fill(&mut iv[..]); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `Ciphertext` should have a snake case name [INFO] [stdout] --> src/KeyControl/mod.rs:42:12 [INFO] [stdout] | [INFO] [stdout] 42 | pub fn Ciphertext() -> Self { [INFO] [stdout] | ^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `ciphertext` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `DevicesTests` should have a snake case name [INFO] [stdout] --> src/tests/mod.rs:2:5 [INFO] [stdout] | [INFO] [stdout] 2 | mod DevicesTests; [INFO] [stdout] | ^^^^^^^^^^^^ help: convert the identifier to snake case: `devices_tests` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KyberKeyTests` should have a snake case name [INFO] [stdout] --> src/tests/mod.rs:5:5 [INFO] [stdout] | [INFO] [stdout] 5 | mod KyberKeyTests; [INFO] [stdout] | ^^^^^^^^^^^^^ help: convert the identifier to snake case: `kyber_key_tests` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `KyberTests` should have a snake case name [INFO] [stdout] --> src/tests/mod.rs:8:5 [INFO] [stdout] | [INFO] [stdout] 8 | mod KyberTests; [INFO] [stdout] | ^^^^^^^^^^ help: convert the identifier to snake case: `kyber_tests` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `SignatureTests` should have a snake case name [INFO] [stdout] --> src/tests/mod.rs:11:5 [INFO] [stdout] | [INFO] [stdout] 11 | mod SignatureTests; [INFO] [stdout] | ^^^^^^^^^^^^^^ help: convert the identifier to snake case: `signature_tests` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: module `MacroTests` should have a snake case name [INFO] [stdout] --> src/tests/mod.rs:14:5 [INFO] [stdout] | [INFO] [stdout] 14 | mod MacroTests; [INFO] [stdout] | ^^^^^^^^^^ help: convert the identifier to snake case: `macro_tests` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_msg_macro_AES_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:22:4 [INFO] [stdout] | [INFO] [stdout] 22 | fn encrypt_decrypt_msg_macro_AES_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_aes_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_msg_macro_XChaCha20_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:44:4 [INFO] [stdout] | [INFO] [stdout] 44 | fn encrypt_decrypt_msg_macro_XChaCha20_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_xcha_cha20_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_msg_macro_AES_GCM_SIV_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:65:4 [INFO] [stdout] | [INFO] [stdout] 65 | fn encrypt_decrypt_msg_macro_AES_GCM_SIV_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_aes_gcm_siv_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_AES_GCM_SIV_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:124:4 [INFO] [stdout] | [INFO] [stdout] 124 | fn encrypt_decrypt_AES_GCM_SIV_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_aes_gcm_siv_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_data_macro_AES_GCM_SIV_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:144:4 [INFO] [stdout] | [INFO] [stdout] 144 | fn encrypt_decrypt_data_macro_AES_GCM_SIV_Kyber1024() -> Result<(), Box> { // Generate key pair [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_aes_gcm_siv_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_msg_macro_AES_CTR_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:191:4 [INFO] [stdout] | [INFO] [stdout] 191 | fn encrypt_decrypt_msg_macro_AES_CTR_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_aes_ctr_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_AES_CTR_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:250:4 [INFO] [stdout] | [INFO] [stdout] 250 | fn encrypt_decrypt_AES_CTR_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_aes_ctr_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_data_macro_AES_CTR_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:270:4 [INFO] [stdout] | [INFO] [stdout] 270 | fn encrypt_decrypt_data_macro_AES_CTR_Kyber1024() -> Result<(), Box> { // Generate key pair [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_aes_ctr_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_msg_macro_XChaCha20Poly1305_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:294:4 [INFO] [stdout] | [INFO] [stdout] 294 | fn encrypt_decrypt_msg_macro_XChaCha20Poly1305_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_msg_macro_xcha_cha20_poly1305_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_data_macro_XChaCha20Poly1305_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:354:4 [INFO] [stdout] | [INFO] [stdout] 354 | fn encrypt_decrypt_data_macro_XChaCha20Poly1305_Kyber1024() -> Result<(), Box> { // Generate key pair [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_xcha_cha20_poly1305_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_XChaCha20Poly1305_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:378:4 [INFO] [stdout] | [INFO] [stdout] 378 | fn encrypt_decrypt_XChaCha20Poly1305_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_xcha_cha20_poly1305_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_data_macro_AES_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:398:4 [INFO] [stdout] | [INFO] [stdout] 398 | fn encrypt_decrypt_data_macro_AES_Kyber1024() -> Result<(), Box> { // Generate key pair [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_data_macro_aes_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_decrypt_file_macro_AES_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:422:4 [INFO] [stdout] | [INFO] [stdout] 422 | fn encrypt_decrypt_file_macro_AES_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_decrypt_file_macro_aes_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/tests/KyberTests.rs:441:5 [INFO] [stdout] | [INFO] [stdout] 441 | fs::remove_file(enc_path.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 441 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_message_AES_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:461:4 [INFO] [stdout] | [INFO] [stdout] 461 | fn encrypt_message_AES_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_data_AES_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:490:4 [INFO] [stdout] | [INFO] [stdout] 490 | fn encrypt_data_AES_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_data_aes_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_message_AES_Kyber768` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:517:4 [INFO] [stdout] | [INFO] [stdout] 517 | fn encrypt_message_AES_Kyber768() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber768` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_message_AES_Kyber512` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:545:4 [INFO] [stdout] | [INFO] [stdout] 545 | fn encrypt_message_AES_Kyber512() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_aes_kyber512` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_file_AES_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:574:4 [INFO] [stdout] | [INFO] [stdout] 574 | fn encrypt_file_AES_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/tests/KyberTests.rs:596:5 [INFO] [stdout] | [INFO] [stdout] 596 | fs::remove_file(enc_path.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 596 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_file_AES_Kyber768` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:618:4 [INFO] [stdout] | [INFO] [stdout] 618 | fn encrypt_file_AES_Kyber768() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber768` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/tests/KyberTests.rs:640:5 [INFO] [stdout] | [INFO] [stdout] 640 | fs::remove_file(enc_path.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 640 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_file_AES_Kyber512` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:663:4 [INFO] [stdout] | [INFO] [stdout] 663 | fn encrypt_file_AES_Kyber512() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_aes_kyber512` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/tests/KyberTests.rs:685:5 [INFO] [stdout] | [INFO] [stdout] 685 | fs::remove_file(enc_path.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 685 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_message_XChaCha20_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:707:4 [INFO] [stdout] | [INFO] [stdout] 707 | fn encrypt_message_XChaCha20_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_message_XChaCha20_Kyber768` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:735:4 [INFO] [stdout] | [INFO] [stdout] 735 | fn encrypt_message_XChaCha20_Kyber768() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber768` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_message_XChaCha20_Kyber512` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:763:4 [INFO] [stdout] | [INFO] [stdout] 763 | fn encrypt_message_XChaCha20_Kyber512() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_message_xcha_cha20_kyber512` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_file_XChaCha20_Kyber1024` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:791:4 [INFO] [stdout] | [INFO] [stdout] 791 | fn encrypt_file_XChaCha20_Kyber1024() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber1024` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/tests/KyberTests.rs:815:5 [INFO] [stdout] | [INFO] [stdout] 815 | fs::remove_file(enc_path.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 815 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_file_XChaCha20_Kyber768` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:837:4 [INFO] [stdout] | [INFO] [stdout] 837 | fn encrypt_file_XChaCha20_Kyber768() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber768` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/tests/KyberTests.rs:861:5 [INFO] [stdout] | [INFO] [stdout] 861 | fs::remove_file(enc_path.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 861 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `encrypt_file_XChaCha20_Kyber512` should have a snake case name [INFO] [stdout] --> src/tests/KyberTests.rs:883:4 [INFO] [stdout] | [INFO] [stdout] 883 | fn encrypt_file_XChaCha20_Kyber512() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `encrypt_file_xcha_cha20_kyber512` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/tests/KyberTests.rs:907:5 [INFO] [stdout] | [INFO] [stdout] 907 | fs::remove_file(enc_path.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 907 | let _ = fs::remove_file(enc_path.clone()); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `test_save_Falcon1024_keys` should have a snake case name [INFO] [stdout] --> src/tests/SignatureTests.rs:50:4 [INFO] [stdout] | [INFO] [stdout] 50 | fn test_save_Falcon1024_keys() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `test_save_falcon1024_keys` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `test_save_Falcon512_keys` should have a snake case name [INFO] [stdout] --> src/tests/SignatureTests.rs:73:4 [INFO] [stdout] | [INFO] [stdout] 73 | fn test_save_Falcon512_keys() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case (notice the capitalization): `test_save_falcon512_keys` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `test_save_Dilithium2_keys` should have a snake case name [INFO] [stdout] --> src/tests/SignatureTests.rs:97:4 [INFO] [stdout] | [INFO] [stdout] 97 | fn test_save_Dilithium2_keys() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium2_keys` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `test_save_Dilithium3_keys` should have a snake case name [INFO] [stdout] --> src/tests/SignatureTests.rs:120:4 [INFO] [stdout] | [INFO] [stdout] 120 | fn test_save_Dilithium3_keys() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium3_keys` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `test_save_Dilithium5_keys` should have a snake case name [INFO] [stdout] --> src/tests/SignatureTests.rs:143:4 [INFO] [stdout] | [INFO] [stdout] 143 | fn test_save_Dilithium5_keys() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `test_save_dilithium5_keys` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `SignEncrypt` should have a snake case name [INFO] [stdout] --> src/tests/MacroTests.rs:95:4 [INFO] [stdout] | [INFO] [stdout] 95 | fn SignEncrypt() { [INFO] [stdout] | ^^^^^^^^^^^ help: convert the identifier to snake case: `sign_encrypt` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `SignEncrypt_DecryptOpen` should have a snake case name [INFO] [stdout] --> src/tests/MacroTests.rs:107:4 [INFO] [stdout] | [INFO] [stdout] 107 | fn SignEncrypt_DecryptOpen() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `sign_encrypt_decrypt_open` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 125 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 24.53s [INFO] running `Command { std: "docker" "inspect" "168bbbe33d18968b46694161ee406930dee27f1b3d1b4f984ef5a28f0419d1a6", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "168bbbe33d18968b46694161ee406930dee27f1b3d1b4f984ef5a28f0419d1a6", kill_on_drop: false }` [INFO] [stdout] 168bbbe33d18968b46694161ee406930dee27f1b3d1b4f984ef5a28f0419d1a6