[INFO] fetching crate ctr 0.10.0-pre.2... [INFO] checking ctr-0.10.0-pre.2 against try#306c6aded24f02440063be828ebe601fe5eb8323 for pr-133502-3 [INFO] extracting crate ctr 0.10.0-pre.2 into /workspace/builds/worker-0-tc2/source [INFO] validating manifest of crates.io crate ctr 0.10.0-pre.2 on toolchain 306c6aded24f02440063be828ebe601fe5eb8323 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+306c6aded24f02440063be828ebe601fe5eb8323" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate ctr 0.10.0-pre.2 [INFO] removed 0 missing tests [INFO] finished tweaking crates.io crate ctr 0.10.0-pre.2 [INFO] tweaked toml for crates.io crate ctr 0.10.0-pre.2 written to /workspace/builds/worker-0-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+306c6aded24f02440063be828ebe601fe5eb8323" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 18 packages to latest compatible versions [INFO] [stderr] Adding aes v0.9.0-pre.2 (available: v0.9.0-pre.3) [INFO] [stderr] Adding block-padding v0.4.0-rc.0 (available: v0.4.0-rc.3) [INFO] [stderr] Adding cipher v0.5.0-pre.7 (available: v0.5.0-pre.8) [INFO] [stderr] Adding crypto-common v0.2.0-rc.1 (available: v0.2.0-rc.2) [INFO] [stderr] Adding hex-literal v0.4.1 (available: v1.0.0) [INFO] [stderr] Adding inout v0.2.0-rc.0 (available: v0.2.0-rc.4) [INFO] [stderr] Adding kuznyechik v0.9.0-pre.2 (available: v0.9.0-pre.3) [INFO] [stderr] Adding magma v0.10.0-pre.2 (available: v0.10.0-pre.3) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+306c6aded24f02440063be828ebe601fe5eb8323" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:b0b074c097205a61b89e8ad263052f976b2b332c4dc5f02aef1fe52501660d6e" "/opt/rustwide/cargo-home/bin/cargo" "+306c6aded24f02440063be828ebe601fe5eb8323" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] ef6a5299c7b81eb1abb48df1f7db913889fe86b47e1666498ff2375b49651b2b [INFO] running `Command { std: "docker" "start" "-a" "ef6a5299c7b81eb1abb48df1f7db913889fe86b47e1666498ff2375b49651b2b", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "ef6a5299c7b81eb1abb48df1f7db913889fe86b47e1666498ff2375b49651b2b", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "ef6a5299c7b81eb1abb48df1f7db913889fe86b47e1666498ff2375b49651b2b", kill_on_drop: false }` [INFO] [stdout] ef6a5299c7b81eb1abb48df1f7db913889fe86b47e1666498ff2375b49651b2b [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:b0b074c097205a61b89e8ad263052f976b2b332c4dc5f02aef1fe52501660d6e" "/opt/rustwide/cargo-home/bin/cargo" "+306c6aded24f02440063be828ebe601fe5eb8323" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 34894a3040ec8fefe218cd3e2dfbf815305bfd1190359d8c80e4515e194f608f [INFO] running `Command { std: "docker" "start" "-a" "34894a3040ec8fefe218cd3e2dfbf815305bfd1190359d8c80e4515e194f608f", kill_on_drop: false }` [INFO] [stderr] Compiling typenum v1.18.0 [INFO] [stderr] Checking blobby v0.3.1 [INFO] [stderr] Checking hybrid-array v0.2.3 [INFO] [stderr] Checking inout v0.2.0-rc.0 [INFO] [stderr] Checking crypto-common v0.2.0-rc.1 [INFO] [stderr] Checking cipher v0.5.0-pre.7 [INFO] [stderr] Checking kuznyechik v0.9.0-pre.2 [INFO] [stderr] Checking aes v0.9.0-pre.2 [INFO] [stderr] Checking magma v0.10.0-pre.2 [INFO] [stderr] Checking ctr v0.10.0-pre.2 (/opt/rustwide/workdir) [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: KeyIvInit` [INFO] [stdout] --> benches/aes128.rs:5:5 [INFO] [stdout] | [INFO] [stdout] 5 | ctr::Ctr32LE; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> benches/aes128.rs:5:5 [INFO] [stdout] | [INFO] [stdout] 5 | ctr::Ctr32LE; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> benches/aes128.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / cipher::stream_cipher_bench!( [INFO] [stdout] 5 | | ctr::Ctr32LE; [INFO] [stdout] 6 | | ctr_32le_aes128_stream_bench1_16b 16; [INFO] [stdout] 7 | | ctr_32le_aes128_stream_bench2_256b 256; [INFO] [stdout] 8 | | ctr_32le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 9 | | ctr_32le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 10 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `UInt, ...>, ...>, ...>, ...> == ...` [INFO] [stdout] --> benches/aes128.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / cipher::stream_cipher_bench!( [INFO] [stdout] 5 | | ctr::Ctr32LE; [INFO] [stdout] 6 | | ctr_32le_aes128_stream_bench1_16b 16; [INFO] [stdout] 7 | | ctr_32le_aes128_stream_bench2_256b 256; [INFO] [stdout] 8 | | ctr_32le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 9 | | ctr_32le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 10 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> benches/aes128.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / cipher::stream_cipher_bench!( [INFO] [stdout] 5 | | ctr::Ctr32LE; [INFO] [stdout] 6 | | ctr_32le_aes128_stream_bench1_16b 16; [INFO] [stdout] 7 | | ctr_32le_aes128_stream_bench2_256b 256; [INFO] [stdout] 8 | | ctr_32le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 9 | | ctr_32le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 10 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> benches/aes128.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / cipher::stream_cipher_bench!( [INFO] [stdout] 5 | | ctr::Ctr32LE; [INFO] [stdout] 6 | | ctr_32le_aes128_stream_bench1_16b 16; [INFO] [stdout] 7 | | ctr_32le_aes128_stream_bench2_256b 256; [INFO] [stdout] 8 | | ctr_32le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 9 | | ctr_32le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 10 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> benches/aes128.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / cipher::stream_cipher_bench!( [INFO] [stdout] 5 | | ctr::Ctr32LE; [INFO] [stdout] 6 | | ctr_32le_aes128_stream_bench1_16b 16; [INFO] [stdout] 7 | | ctr_32le_aes128_stream_bench2_256b 256; [INFO] [stdout] 8 | | ctr_32le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 9 | | ctr_32le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 10 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> benches/aes128.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / cipher::stream_cipher_bench!( [INFO] [stdout] 5 | | ctr::Ctr32LE; [INFO] [stdout] 6 | | ctr_32le_aes128_stream_bench1_16b 16; [INFO] [stdout] 7 | | ctr_32le_aes128_stream_bench2_256b 256; [INFO] [stdout] 8 | | ctr_32le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 9 | | ctr_32le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 10 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> benches/aes128.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / cipher::stream_cipher_bench!( [INFO] [stdout] 5 | | ctr::Ctr32LE; [INFO] [stdout] 6 | | ctr_32le_aes128_stream_bench1_16b 16; [INFO] [stdout] 7 | | ctr_32le_aes128_stream_bench2_256b 256; [INFO] [stdout] 8 | | ctr_32le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 9 | | ctr_32le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 10 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> benches/aes128.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / cipher::stream_cipher_bench!( [INFO] [stdout] 5 | | ctr::Ctr32LE; [INFO] [stdout] 6 | | ctr_32le_aes128_stream_bench1_16b 16; [INFO] [stdout] 7 | | ctr_32le_aes128_stream_bench2_256b 256; [INFO] [stdout] 8 | | ctr_32le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 9 | | ctr_32le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 10 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `{closure@/opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/dev/stream.rs:133:24: 133:26} well-formed` [INFO] [stdout] --> benches/aes128.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / cipher::stream_cipher_bench!( [INFO] [stdout] 5 | | ctr::Ctr32LE; [INFO] [stdout] 6 | | ctr_32le_aes128_stream_bench1_16b 16; [INFO] [stdout] 7 | | ctr_32le_aes128_stream_bench2_256b 256; [INFO] [stdout] 8 | | ctr_32le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 9 | | ctr_32le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 10 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut Bencher, {closure@/opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/dev/stream.rs:133:24: 133:26}) well-formed` [INFO] [stdout] --> benches/aes128.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / cipher::stream_cipher_bench!( [INFO] [stdout] 5 | | ctr::Ctr32LE; [INFO] [stdout] 6 | | ctr_32le_aes128_stream_bench1_16b 16; [INFO] [stdout] 7 | | ctr_32le_aes128_stream_bench2_256b 256; [INFO] [stdout] 8 | | ctr_32le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 9 | | ctr_32le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 10 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `{closure@/opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/dev/stream.rs:133:24: 133:26} well-formed` [INFO] [stdout] --> benches/aes128.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / cipher::stream_cipher_bench!( [INFO] [stdout] 5 | | ctr::Ctr32LE; [INFO] [stdout] 6 | | ctr_32le_aes128_stream_bench1_16b 16; [INFO] [stdout] 7 | | ctr_32le_aes128_stream_bench2_256b 256; [INFO] [stdout] 8 | | ctr_32le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 9 | | ctr_32le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 10 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> benches/aes128.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / cipher::stream_cipher_bench!( [INFO] [stdout] 5 | | ctr::Ctr32LE; [INFO] [stdout] 6 | | ctr_32le_aes128_stream_bench1_16b 16; [INFO] [stdout] 7 | | ctr_32le_aes128_stream_bench2_256b 256; [INFO] [stdout] 8 | | ctr_32le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 9 | | ctr_32le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 10 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> benches/aes128.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / cipher::stream_cipher_bench!( [INFO] [stdout] 5 | | ctr::Ctr32LE; [INFO] [stdout] 6 | | ctr_32le_aes128_stream_bench1_16b 16; [INFO] [stdout] 7 | | ctr_32le_aes128_stream_bench2_256b 256; [INFO] [stdout] 8 | | ctr_32le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 9 | | ctr_32le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 10 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as KeySizeUser>::KeySize == _` [INFO] [stdout] --> benches/aes128.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / cipher::stream_cipher_bench!( [INFO] [stdout] 5 | | ctr::Ctr32LE; [INFO] [stdout] 6 | | ctr_32le_aes128_stream_bench1_16b 16; [INFO] [stdout] 7 | | ctr_32le_aes128_stream_bench2_256b 256; [INFO] [stdout] 8 | | ctr_32le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 9 | | ctr_32le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 10 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as IvSizeUser>::IvSize == _` [INFO] [stdout] --> benches/aes128.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / cipher::stream_cipher_bench!( [INFO] [stdout] 5 | | ctr::Ctr32LE; [INFO] [stdout] 6 | | ctr_32le_aes128_stream_bench1_16b 16; [INFO] [stdout] 7 | | ctr_32le_aes128_stream_bench2_256b 256; [INFO] [stdout] 8 | | ctr_32le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 9 | | ctr_32le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 10 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: KeyIvInit` [INFO] [stdout] --> benches/aes128.rs:13:5 [INFO] [stdout] | [INFO] [stdout] 13 | ctr::Ctr64LE; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> benches/aes128.rs:13:5 [INFO] [stdout] | [INFO] [stdout] 13 | ctr::Ctr64LE; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> benches/aes128.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / cipher::stream_cipher_bench!( [INFO] [stdout] 13 | | ctr::Ctr64LE; [INFO] [stdout] 14 | | ctr_64le_aes128_stream_bench1_16b 16; [INFO] [stdout] 15 | | ctr_64le_aes128_stream_bench2_256b 256; [INFO] [stdout] 16 | | ctr_64le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 17 | | ctr_64le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 18 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `UInt, ...>, ...>, ...>, ...> == ...` [INFO] [stdout] --> benches/aes128.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / cipher::stream_cipher_bench!( [INFO] [stdout] 13 | | ctr::Ctr64LE; [INFO] [stdout] 14 | | ctr_64le_aes128_stream_bench1_16b 16; [INFO] [stdout] 15 | | ctr_64le_aes128_stream_bench2_256b 256; [INFO] [stdout] 16 | | ctr_64le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 17 | | ctr_64le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 18 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> benches/aes128.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / cipher::stream_cipher_bench!( [INFO] [stdout] 13 | | ctr::Ctr64LE; [INFO] [stdout] 14 | | ctr_64le_aes128_stream_bench1_16b 16; [INFO] [stdout] 15 | | ctr_64le_aes128_stream_bench2_256b 256; [INFO] [stdout] 16 | | ctr_64le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 17 | | ctr_64le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 18 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> benches/aes128.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / cipher::stream_cipher_bench!( [INFO] [stdout] 13 | | ctr::Ctr64LE; [INFO] [stdout] 14 | | ctr_64le_aes128_stream_bench1_16b 16; [INFO] [stdout] 15 | | ctr_64le_aes128_stream_bench2_256b 256; [INFO] [stdout] 16 | | ctr_64le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 17 | | ctr_64le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 18 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> benches/aes128.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / cipher::stream_cipher_bench!( [INFO] [stdout] 13 | | ctr::Ctr64LE; [INFO] [stdout] 14 | | ctr_64le_aes128_stream_bench1_16b 16; [INFO] [stdout] 15 | | ctr_64le_aes128_stream_bench2_256b 256; [INFO] [stdout] 16 | | ctr_64le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 17 | | ctr_64le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 18 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> benches/aes128.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / cipher::stream_cipher_bench!( [INFO] [stdout] 13 | | ctr::Ctr64LE; [INFO] [stdout] 14 | | ctr_64le_aes128_stream_bench1_16b 16; [INFO] [stdout] 15 | | ctr_64le_aes128_stream_bench2_256b 256; [INFO] [stdout] 16 | | ctr_64le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 17 | | ctr_64le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 18 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> benches/aes128.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / cipher::stream_cipher_bench!( [INFO] [stdout] 13 | | ctr::Ctr64LE; [INFO] [stdout] 14 | | ctr_64le_aes128_stream_bench1_16b 16; [INFO] [stdout] 15 | | ctr_64le_aes128_stream_bench2_256b 256; [INFO] [stdout] 16 | | ctr_64le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 17 | | ctr_64le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 18 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> benches/aes128.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / cipher::stream_cipher_bench!( [INFO] [stdout] 13 | | ctr::Ctr64LE; [INFO] [stdout] 14 | | ctr_64le_aes128_stream_bench1_16b 16; [INFO] [stdout] 15 | | ctr_64le_aes128_stream_bench2_256b 256; [INFO] [stdout] 16 | | ctr_64le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 17 | | ctr_64le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 18 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `{closure@/opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/dev/stream.rs:133:24: 133:26} well-formed` [INFO] [stdout] --> benches/aes128.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / cipher::stream_cipher_bench!( [INFO] [stdout] 13 | | ctr::Ctr64LE; [INFO] [stdout] 14 | | ctr_64le_aes128_stream_bench1_16b 16; [INFO] [stdout] 15 | | ctr_64le_aes128_stream_bench2_256b 256; [INFO] [stdout] 16 | | ctr_64le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 17 | | ctr_64le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 18 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut Bencher, {closure@/opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/dev/stream.rs:133:24: 133:26}) well-formed` [INFO] [stdout] --> benches/aes128.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / cipher::stream_cipher_bench!( [INFO] [stdout] 13 | | ctr::Ctr64LE; [INFO] [stdout] 14 | | ctr_64le_aes128_stream_bench1_16b 16; [INFO] [stdout] 15 | | ctr_64le_aes128_stream_bench2_256b 256; [INFO] [stdout] 16 | | ctr_64le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 17 | | ctr_64le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 18 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `{closure@/opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/dev/stream.rs:133:24: 133:26} well-formed` [INFO] [stdout] --> benches/aes128.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / cipher::stream_cipher_bench!( [INFO] [stdout] 13 | | ctr::Ctr64LE; [INFO] [stdout] 14 | | ctr_64le_aes128_stream_bench1_16b 16; [INFO] [stdout] 15 | | ctr_64le_aes128_stream_bench2_256b 256; [INFO] [stdout] 16 | | ctr_64le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 17 | | ctr_64le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 18 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> benches/aes128.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / cipher::stream_cipher_bench!( [INFO] [stdout] 13 | | ctr::Ctr64LE; [INFO] [stdout] 14 | | ctr_64le_aes128_stream_bench1_16b 16; [INFO] [stdout] 15 | | ctr_64le_aes128_stream_bench2_256b 256; [INFO] [stdout] 16 | | ctr_64le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 17 | | ctr_64le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 18 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> benches/aes128.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / cipher::stream_cipher_bench!( [INFO] [stdout] 13 | | ctr::Ctr64LE; [INFO] [stdout] 14 | | ctr_64le_aes128_stream_bench1_16b 16; [INFO] [stdout] 15 | | ctr_64le_aes128_stream_bench2_256b 256; [INFO] [stdout] 16 | | ctr_64le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 17 | | ctr_64le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 18 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as KeySizeUser>::KeySize == _` [INFO] [stdout] --> benches/aes128.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / cipher::stream_cipher_bench!( [INFO] [stdout] 13 | | ctr::Ctr64LE; [INFO] [stdout] 14 | | ctr_64le_aes128_stream_bench1_16b 16; [INFO] [stdout] 15 | | ctr_64le_aes128_stream_bench2_256b 256; [INFO] [stdout] 16 | | ctr_64le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 17 | | ctr_64le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 18 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as IvSizeUser>::IvSize == _` [INFO] [stdout] --> benches/aes128.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / cipher::stream_cipher_bench!( [INFO] [stdout] 13 | | ctr::Ctr64LE; [INFO] [stdout] 14 | | ctr_64le_aes128_stream_bench1_16b 16; [INFO] [stdout] 15 | | ctr_64le_aes128_stream_bench2_256b 256; [INFO] [stdout] 16 | | ctr_64le_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 17 | | ctr_64le_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 18 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:6:51 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: the return type of a function must have a statically known size [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:51 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:7:51 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: the return type of a function must have a statically known size [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:51 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: cipher::KeyIvInit` [INFO] [stdout] --> tests/ctr128/mod.rs:4:60 [INFO] [stdout] | [INFO] [stdout] 4 | cipher::stream_cipher_test!(aes128_ctr_core, "aes128-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:4:60 [INFO] [stdout] | [INFO] [stdout] 4 | cipher::stream_cipher_test!(aes128_ctr_core, "aes128-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr128/mod.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | cipher::stream_cipher_test!(aes128_ctr_core, "aes128-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | cipher::stream_cipher_test!(aes128_ctr_core, "aes128-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | cipher::stream_cipher_test!(aes128_ctr_core, "aes128-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] note: required by a bound in `Result::::unwrap` [INFO] [stdout] --> /rustc/306c6aded24f02440063be828ebe601fe5eb8323/library/core/src/result.rs:1103:5 [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | cipher::stream_cipher_test!(aes128_ctr_core, "aes128-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Result>, InvalidLength> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | cipher::stream_cipher_test!(aes128_ctr_core, "aes128-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | cipher::stream_cipher_test!(aes128_ctr_core, "aes128-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(Result>, InvalidLength>) -> ... well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | cipher::stream_cipher_test!(aes128_ctr_core, "aes128-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | cipher::stream_cipher_test!(aes128_ctr_core, "aes128-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | cipher::stream_cipher_test!(aes128_ctr_core, "aes128-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: cipher::KeyIvInit` [INFO] [stdout] --> tests/ctr128/mod.rs:5:60 [INFO] [stdout] | [INFO] [stdout] 5 | cipher::stream_cipher_test!(aes256_ctr_core, "aes256-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:5:60 [INFO] [stdout] | [INFO] [stdout] 5 | cipher::stream_cipher_test!(aes256_ctr_core, "aes256-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr128/mod.rs:5:1 [INFO] [stdout] | [INFO] [stdout] 5 | cipher::stream_cipher_test!(aes256_ctr_core, "aes256-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:5:1 [INFO] [stdout] | [INFO] [stdout] 5 | cipher::stream_cipher_test!(aes256_ctr_core, "aes256-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:5:1 [INFO] [stdout] | [INFO] [stdout] 5 | cipher::stream_cipher_test!(aes256_ctr_core, "aes256-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] note: required by a bound in `Result::::unwrap` [INFO] [stdout] --> /rustc/306c6aded24f02440063be828ebe601fe5eb8323/library/core/src/result.rs:1103:5 [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:5:1 [INFO] [stdout] | [INFO] [stdout] 5 | cipher::stream_cipher_test!(aes256_ctr_core, "aes256-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Result>, InvalidLength> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:5:1 [INFO] [stdout] | [INFO] [stdout] 5 | cipher::stream_cipher_test!(aes256_ctr_core, "aes256-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:5:1 [INFO] [stdout] | [INFO] [stdout] 5 | cipher::stream_cipher_test!(aes256_ctr_core, "aes256-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(Result>, InvalidLength>) -> ... well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:5:1 [INFO] [stdout] | [INFO] [stdout] 5 | cipher::stream_cipher_test!(aes256_ctr_core, "aes256-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:5:1 [INFO] [stdout] | [INFO] [stdout] 5 | cipher::stream_cipher_test!(aes256_ctr_core, "aes256-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:5:1 [INFO] [stdout] | [INFO] [stdout] 5 | cipher::stream_cipher_test!(aes256_ctr_core, "aes256-ctr", Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: the return type of a function must have a statically known size [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: the return type of a function must have a statically known size [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: the return type of a function must have a statically known size [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> usize well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, usize) well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> usize well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> usize well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> usize well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> usize well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> usize well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> usize well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, i32) well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: cipher::KeyIvInit` [INFO] [stdout] --> tests/ctr128/mod.rs:6:51 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as IvSizeUser>::IvSize` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | cipher::stream_cipher_seek_test!(aes128_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: the return type of a function must have a statically known size [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: the return type of a function must have a statically known size [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: the return type of a function must have a statically known size [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> usize well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, usize) well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> usize well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> usize well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> usize well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> usize well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> usize well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> usize well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, i32) well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: cipher::KeyIvInit` [INFO] [stdout] --> tests/ctr128/mod.rs:7:51 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as IvSizeUser>::IvSize` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | cipher::stream_cipher_seek_test!(aes256_ctr_seek, Ctr128BE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_seek_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::KeyIvInit` [INFO] [stdout] --> tests/ctr128/mod.rs:10:5 [INFO] [stdout] | [INFO] [stdout] 10 | CtrCore, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:10:5 [INFO] [stdout] | [INFO] [stdout] 10 | CtrCore, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as BlockSizeUser>::BlockSize>: Default` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `UInt, ...>, ...>, ...>, ...> == ...` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as BlockSizeUser>::BlockSize>: Copy` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: the `Copy` trait is required because this value will be copied for each element of the array [INFO] [stdout] = help: consider using `core::array::from_fn` to initialize the array [INFO] [stdout] = help: see https://doc.rust-lang.org/stable/std/array/fn.from_fn.html for more information [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as KeySizeUser>::KeySize>: Default` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as IvSizeUser>::IvSize>: Default` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `UInt, ...>, ...>, ...>, ...> == ...` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == UInt, ...>, ...>` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::StreamCipherCore` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ required by a bound introduced by this call [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `UInt, ...>, ...>, ...>, ...> == ...` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == as BlockSizeUser>::BlockSize` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == UInt, ...>, ...>` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == UInt, ...>, ...>` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == as BlockSizeUser>::BlockSize` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::IvState` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as IvSizeUser>::IvSize` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as IvSizeUser>::IvSize` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == UInt, ...>, ...>` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == as BlockSizeUser>::BlockSize` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: Sized` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as BlockSizeUser>::BlockSize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as BlockSizeUser>::BlockSize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as BlockSizeUser>::BlockSize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut CtrCore, &mut [...]) well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&mut [Array as BlockSizeUser>::BlockSize>] well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&mut [Array as BlockSizeUser>::BlockSize>] well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&CtrCore) -> Array well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&mut [Array as BlockSizeUser>::BlockSize>] well-formed` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr128/mod.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / cipher::iv_state_test!( [INFO] [stdout] 9 | | aes128_ctr_iv_state, [INFO] [stdout] 10 | | CtrCore, [INFO] [stdout] 11 | | apply_ks, [INFO] [stdout] 12 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: cipher::KeyIvInit` [INFO] [stdout] --> tests/ctr32/be.rs:14:19 [INFO] [stdout] | [INFO] [stdout] 14 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/be.rs:14:34 [INFO] [stdout] | [INFO] [stdout] 14 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as IvSizeUser>::IvSize` [INFO] [stdout] --> tests/ctr32/be.rs:14:46 [INFO] [stdout] | [INFO] [stdout] 14 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::StreamCipherCore` [INFO] [stdout] --> tests/ctr32/be.rs:15:20 [INFO] [stdout] | [INFO] [stdout] 15 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] note: required by a bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] --> /opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/stream/wrapper.rs:48:9 [INFO] [stdout] | [INFO] [stdout] 48 | impl StreamCipherCoreWrapper { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ required by this bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] 49 | /// Return reference to the core type. [INFO] [stdout] 50 | pub fn get_core(&self) -> &T { [INFO] [stdout] | -------- required by a bound in this associated function [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: StreamCipherSeekCore` [INFO] [stdout] --> tests/ctr32/be.rs:15:31 [INFO] [stdout] | [INFO] [stdout] 15 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:15:16 [INFO] [stdout] | [INFO] [stdout] 15 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr32/be.rs:18:9 [INFO] [stdout] | [INFO] [stdout] 18 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::StreamCipherCore` [INFO] [stdout] --> tests/ctr32/be.rs:20:20 [INFO] [stdout] | [INFO] [stdout] 20 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] note: required by a bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] --> /opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/stream/wrapper.rs:48:9 [INFO] [stdout] | [INFO] [stdout] 48 | impl StreamCipherCoreWrapper { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ required by this bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] 49 | /// Return reference to the core type. [INFO] [stdout] 50 | pub fn get_core(&self) -> &T { [INFO] [stdout] | -------- required by a bound in this associated function [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: StreamCipherSeekCore` [INFO] [stdout] --> tests/ctr32/be.rs:20:31 [INFO] [stdout] | [INFO] [stdout] 20 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:20:16 [INFO] [stdout] | [INFO] [stdout] 20 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr32/be.rs:14:9 [INFO] [stdout] | [INFO] [stdout] 14 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:14:19 [INFO] [stdout] | [INFO] [stdout] 14 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:14:19 [INFO] [stdout] | [INFO] [stdout] 14 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:14:34 [INFO] [stdout] | [INFO] [stdout] 14 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:14:46 [INFO] [stdout] | [INFO] [stdout] 14 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:14:19 [INFO] [stdout] | [INFO] [stdout] 14 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:15:16 [INFO] [stdout] | [INFO] [stdout] 15 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> &... well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:15:20 [INFO] [stdout] | [INFO] [stdout] 15 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:15:16 [INFO] [stdout] | [INFO] [stdout] 15 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&CtrCore) -> as StreamCipherSeekCore>::Counter well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:15:31 [INFO] [stdout] | [INFO] [stdout] 15 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:18:9 [INFO] [stdout] | [INFO] [stdout] 18 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:20:16 [INFO] [stdout] | [INFO] [stdout] 20 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> &... well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:20:20 [INFO] [stdout] | [INFO] [stdout] 20 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:20:16 [INFO] [stdout] | [INFO] [stdout] 20 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&CtrCore) -> as StreamCipherSeekCore>::Counter well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:20:31 [INFO] [stdout] | [INFO] [stdout] 20 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter <: _` [INFO] [stdout] --> tests/ctr32/be.rs:15:5 [INFO] [stdout] | [INFO] [stdout] 15 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter <: _` [INFO] [stdout] --> tests/ctr32/be.rs:20:5 [INFO] [stdout] | [INFO] [stdout] 20 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: KeyIvInit` [INFO] [stdout] --> benches/aes128.rs:21:5 [INFO] [stdout] | [INFO] [stdout] 21 | ctr::Ctr128BE; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> benches/aes128.rs:21:5 [INFO] [stdout] | [INFO] [stdout] 21 | ctr::Ctr128BE; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> benches/aes128.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | / cipher::stream_cipher_bench!( [INFO] [stdout] 21 | | ctr::Ctr128BE; [INFO] [stdout] 22 | | ctr_128be_aes128_stream_bench1_16b 16; [INFO] [stdout] 23 | | ctr_128be_aes128_stream_bench2_256b 256; [INFO] [stdout] 24 | | ctr_128be_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 25 | | ctr_128be_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 26 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `UInt, ...>, ...>, ...>, ...> == ...` [INFO] [stdout] --> benches/aes128.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | / cipher::stream_cipher_bench!( [INFO] [stdout] 21 | | ctr::Ctr128BE; [INFO] [stdout] 22 | | ctr_128be_aes128_stream_bench1_16b 16; [INFO] [stdout] 23 | | ctr_128be_aes128_stream_bench2_256b 256; [INFO] [stdout] 24 | | ctr_128be_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 25 | | ctr_128be_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 26 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> benches/aes128.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | / cipher::stream_cipher_bench!( [INFO] [stdout] 21 | | ctr::Ctr128BE; [INFO] [stdout] 22 | | ctr_128be_aes128_stream_bench1_16b 16; [INFO] [stdout] 23 | | ctr_128be_aes128_stream_bench2_256b 256; [INFO] [stdout] 24 | | ctr_128be_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 25 | | ctr_128be_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 26 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> benches/aes128.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | / cipher::stream_cipher_bench!( [INFO] [stdout] 21 | | ctr::Ctr128BE; [INFO] [stdout] 22 | | ctr_128be_aes128_stream_bench1_16b 16; [INFO] [stdout] 23 | | ctr_128be_aes128_stream_bench2_256b 256; [INFO] [stdout] 24 | | ctr_128be_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 25 | | ctr_128be_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 26 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> benches/aes128.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | / cipher::stream_cipher_bench!( [INFO] [stdout] 21 | | ctr::Ctr128BE; [INFO] [stdout] 22 | | ctr_128be_aes128_stream_bench1_16b 16; [INFO] [stdout] 23 | | ctr_128be_aes128_stream_bench2_256b 256; [INFO] [stdout] 24 | | ctr_128be_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 25 | | ctr_128be_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 26 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> benches/aes128.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | / cipher::stream_cipher_bench!( [INFO] [stdout] 21 | | ctr::Ctr128BE; [INFO] [stdout] 22 | | ctr_128be_aes128_stream_bench1_16b 16; [INFO] [stdout] 23 | | ctr_128be_aes128_stream_bench2_256b 256; [INFO] [stdout] 24 | | ctr_128be_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 25 | | ctr_128be_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 26 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> benches/aes128.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | / cipher::stream_cipher_bench!( [INFO] [stdout] 21 | | ctr::Ctr128BE; [INFO] [stdout] 22 | | ctr_128be_aes128_stream_bench1_16b 16; [INFO] [stdout] 23 | | ctr_128be_aes128_stream_bench2_256b 256; [INFO] [stdout] 24 | | ctr_128be_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 25 | | ctr_128be_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 26 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> benches/aes128.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | / cipher::stream_cipher_bench!( [INFO] [stdout] 21 | | ctr::Ctr128BE; [INFO] [stdout] 22 | | ctr_128be_aes128_stream_bench1_16b 16; [INFO] [stdout] 23 | | ctr_128be_aes128_stream_bench2_256b 256; [INFO] [stdout] 24 | | ctr_128be_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 25 | | ctr_128be_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 26 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:15:5 [INFO] [stdout] | [INFO] [stdout] 15 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `{closure@/opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/dev/stream.rs:133:24: 133:26} well-formed` [INFO] [stdout] --> benches/aes128.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | / cipher::stream_cipher_bench!( [INFO] [stdout] 21 | | ctr::Ctr128BE; [INFO] [stdout] 22 | | ctr_128be_aes128_stream_bench1_16b 16; [INFO] [stdout] 23 | | ctr_128be_aes128_stream_bench2_256b 256; [INFO] [stdout] 24 | | ctr_128be_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 25 | | ctr_128be_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 26 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut Bencher, {closure@/opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/dev/stream.rs:133:24: 133:26}) well-formed` [INFO] [stdout] --> benches/aes128.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | / cipher::stream_cipher_bench!( [INFO] [stdout] 21 | | ctr::Ctr128BE; [INFO] [stdout] 22 | | ctr_128be_aes128_stream_bench1_16b 16; [INFO] [stdout] 23 | | ctr_128be_aes128_stream_bench2_256b 256; [INFO] [stdout] 24 | | ctr_128be_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 25 | | ctr_128be_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 26 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `{closure@/opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/dev/stream.rs:133:24: 133:26} well-formed` [INFO] [stdout] --> benches/aes128.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | / cipher::stream_cipher_bench!( [INFO] [stdout] 21 | | ctr::Ctr128BE; [INFO] [stdout] 22 | | ctr_128be_aes128_stream_bench1_16b 16; [INFO] [stdout] 23 | | ctr_128be_aes128_stream_bench2_256b 256; [INFO] [stdout] 24 | | ctr_128be_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 25 | | ctr_128be_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 26 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> benches/aes128.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | / cipher::stream_cipher_bench!( [INFO] [stdout] 21 | | ctr::Ctr128BE; [INFO] [stdout] 22 | | ctr_128be_aes128_stream_bench1_16b 16; [INFO] [stdout] 23 | | ctr_128be_aes128_stream_bench2_256b 256; [INFO] [stdout] 24 | | ctr_128be_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 25 | | ctr_128be_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 26 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> benches/aes128.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | / cipher::stream_cipher_bench!( [INFO] [stdout] 21 | | ctr::Ctr128BE; [INFO] [stdout] 22 | | ctr_128be_aes128_stream_bench1_16b 16; [INFO] [stdout] 23 | | ctr_128be_aes128_stream_bench2_256b 256; [INFO] [stdout] 24 | | ctr_128be_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 25 | | ctr_128be_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 26 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `$crate::stream_cipher_bench` which comes from the expansion of the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as KeySizeUser>::KeySize == _` [INFO] [stdout] --> benches/aes128.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | / cipher::stream_cipher_bench!( [INFO] [stdout] 21 | | ctr::Ctr128BE; [INFO] [stdout] 22 | | ctr_128be_aes128_stream_bench1_16b 16; [INFO] [stdout] 23 | | ctr_128be_aes128_stream_bench2_256b 256; [INFO] [stdout] 24 | | ctr_128be_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 25 | | ctr_128be_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 26 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as IvSizeUser>::IvSize == _` [INFO] [stdout] --> benches/aes128.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | / cipher::stream_cipher_bench!( [INFO] [stdout] 21 | | ctr::Ctr128BE; [INFO] [stdout] 22 | | ctr_128be_aes128_stream_bench1_16b 16; [INFO] [stdout] 23 | | ctr_128be_aes128_stream_bench2_256b 256; [INFO] [stdout] 24 | | ctr_128be_aes128_stream_bench3_1kib 1024; [INFO] [stdout] 25 | | ctr_128be_aes128_stream_bench4_16kib 16384; [INFO] [stdout] 26 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`aes128`) [INFO] [stdout] = note: this error originates in the macro `cipher::stream_cipher_bench` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:15:5 [INFO] [stdout] | [INFO] [stdout] 15 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:20:5 [INFO] [stdout] | [INFO] [stdout] 20 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:20:5 [INFO] [stdout] | [INFO] [stdout] 20 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: cipher::KeyIvInit` [INFO] [stdout] --> tests/ctr32/be.rs:32:19 [INFO] [stdout] | [INFO] [stdout] 32 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/be.rs:32:34 [INFO] [stdout] | [INFO] [stdout] 32 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as IvSizeUser>::IvSize` [INFO] [stdout] --> tests/ctr32/be.rs:32:46 [INFO] [stdout] | [INFO] [stdout] 32 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr32/be.rs:33:9 [INFO] [stdout] | [INFO] [stdout] 33 | ctr.seek(16); [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::StreamCipherCore` [INFO] [stdout] --> tests/ctr32/be.rs:34:20 [INFO] [stdout] | [INFO] [stdout] 34 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] note: required by a bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] --> /opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/stream/wrapper.rs:48:9 [INFO] [stdout] | [INFO] [stdout] 48 | impl StreamCipherCoreWrapper { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ required by this bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] 49 | /// Return reference to the core type. [INFO] [stdout] 50 | pub fn get_core(&self) -> &T { [INFO] [stdout] | -------- required by a bound in this associated function [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: StreamCipherSeekCore` [INFO] [stdout] --> tests/ctr32/be.rs:34:31 [INFO] [stdout] | [INFO] [stdout] 34 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:34:16 [INFO] [stdout] | [INFO] [stdout] 34 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr32/be.rs:37:9 [INFO] [stdout] | [INFO] [stdout] 37 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::StreamCipherCore` [INFO] [stdout] --> tests/ctr32/be.rs:39:20 [INFO] [stdout] | [INFO] [stdout] 39 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] note: required by a bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] --> /opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/stream/wrapper.rs:48:9 [INFO] [stdout] | [INFO] [stdout] 48 | impl StreamCipherCoreWrapper { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ required by this bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] 49 | /// Return reference to the core type. [INFO] [stdout] 50 | pub fn get_core(&self) -> &T { [INFO] [stdout] | -------- required by a bound in this associated function [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: StreamCipherSeekCore` [INFO] [stdout] --> tests/ctr32/be.rs:39:31 [INFO] [stdout] | [INFO] [stdout] 39 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:39:16 [INFO] [stdout] | [INFO] [stdout] 39 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr32/be.rs:32:9 [INFO] [stdout] | [INFO] [stdout] 32 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:32:19 [INFO] [stdout] | [INFO] [stdout] 32 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:32:19 [INFO] [stdout] | [INFO] [stdout] 32 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:32:34 [INFO] [stdout] | [INFO] [stdout] 32 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:32:46 [INFO] [stdout] | [INFO] [stdout] 32 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:32:19 [INFO] [stdout] | [INFO] [stdout] 32 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:33:5 [INFO] [stdout] | [INFO] [stdout] 33 | ctr.seek(16); [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, i32) well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:33:9 [INFO] [stdout] | [INFO] [stdout] 33 | ctr.seek(16); [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:34:16 [INFO] [stdout] | [INFO] [stdout] 34 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> &... well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:34:20 [INFO] [stdout] | [INFO] [stdout] 34 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:34:16 [INFO] [stdout] | [INFO] [stdout] 34 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&CtrCore) -> as StreamCipherSeekCore>::Counter well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:34:31 [INFO] [stdout] | [INFO] [stdout] 34 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:37:5 [INFO] [stdout] | [INFO] [stdout] 37 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:37:9 [INFO] [stdout] | [INFO] [stdout] 37 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:39:16 [INFO] [stdout] | [INFO] [stdout] 39 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> &... well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:39:20 [INFO] [stdout] | [INFO] [stdout] 39 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:39:16 [INFO] [stdout] | [INFO] [stdout] 39 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&CtrCore) -> as StreamCipherSeekCore>::Counter well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:39:31 [INFO] [stdout] | [INFO] [stdout] 39 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter <: _` [INFO] [stdout] --> tests/ctr32/be.rs:34:5 [INFO] [stdout] | [INFO] [stdout] 34 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter <: _` [INFO] [stdout] --> tests/ctr32/be.rs:39:5 [INFO] [stdout] | [INFO] [stdout] 39 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:34:5 [INFO] [stdout] | [INFO] [stdout] 34 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:34:5 [INFO] [stdout] | [INFO] [stdout] 34 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:39:5 [INFO] [stdout] | [INFO] [stdout] 39 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:39:5 [INFO] [stdout] | [INFO] [stdout] 39 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: cipher::KeyIvInit` [INFO] [stdout] --> tests/ctr32/be.rs:51:19 [INFO] [stdout] | [INFO] [stdout] 51 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/be.rs:51:34 [INFO] [stdout] | [INFO] [stdout] 51 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as IvSizeUser>::IvSize` [INFO] [stdout] --> tests/ctr32/be.rs:51:46 [INFO] [stdout] | [INFO] [stdout] 51 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr32/be.rs:54:9 [INFO] [stdout] | [INFO] [stdout] 54 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr32/be.rs:51:9 [INFO] [stdout] | [INFO] [stdout] 51 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:51:19 [INFO] [stdout] | [INFO] [stdout] 51 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:51:19 [INFO] [stdout] | [INFO] [stdout] 51 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:51:34 [INFO] [stdout] | [INFO] [stdout] 51 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:51:46 [INFO] [stdout] | [INFO] [stdout] 51 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:51:19 [INFO] [stdout] | [INFO] [stdout] 51 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE1.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:54:5 [INFO] [stdout] | [INFO] [stdout] 54 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:54:9 [INFO] [stdout] | [INFO] [stdout] 54 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: cipher::KeyIvInit` [INFO] [stdout] --> tests/ctr32/be.rs:66:19 [INFO] [stdout] | [INFO] [stdout] 66 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE2.into()); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/be.rs:66:34 [INFO] [stdout] | [INFO] [stdout] 66 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE2.into()); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as IvSizeUser>::IvSize` [INFO] [stdout] --> tests/ctr32/be.rs:66:46 [INFO] [stdout] | [INFO] [stdout] 66 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE2.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::StreamCipherCore` [INFO] [stdout] --> tests/ctr32/be.rs:67:20 [INFO] [stdout] | [INFO] [stdout] 67 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] note: required by a bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] --> /opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/stream/wrapper.rs:48:9 [INFO] [stdout] | [INFO] [stdout] 48 | impl StreamCipherCoreWrapper { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ required by this bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] 49 | /// Return reference to the core type. [INFO] [stdout] 50 | pub fn get_core(&self) -> &T { [INFO] [stdout] | -------- required by a bound in this associated function [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: StreamCipherSeekCore` [INFO] [stdout] --> tests/ctr32/be.rs:67:31 [INFO] [stdout] | [INFO] [stdout] 67 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:67:16 [INFO] [stdout] | [INFO] [stdout] 67 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr32/be.rs:70:9 [INFO] [stdout] | [INFO] [stdout] 70 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::StreamCipherCore` [INFO] [stdout] --> tests/ctr32/be.rs:72:20 [INFO] [stdout] | [INFO] [stdout] 72 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] note: required by a bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] --> /opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/stream/wrapper.rs:48:9 [INFO] [stdout] | [INFO] [stdout] 48 | impl StreamCipherCoreWrapper { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ required by this bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] 49 | /// Return reference to the core type. [INFO] [stdout] 50 | pub fn get_core(&self) -> &T { [INFO] [stdout] | -------- required by a bound in this associated function [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: StreamCipherSeekCore` [INFO] [stdout] --> tests/ctr32/be.rs:72:31 [INFO] [stdout] | [INFO] [stdout] 72 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:72:16 [INFO] [stdout] | [INFO] [stdout] 72 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr32/be.rs:66:9 [INFO] [stdout] | [INFO] [stdout] 66 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE2.into()); [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:66:19 [INFO] [stdout] | [INFO] [stdout] 66 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE2.into()); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:66:19 [INFO] [stdout] | [INFO] [stdout] 66 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE2.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:66:34 [INFO] [stdout] | [INFO] [stdout] 66 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE2.into()); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:66:46 [INFO] [stdout] | [INFO] [stdout] 66 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE2.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:66:19 [INFO] [stdout] | [INFO] [stdout] 66 | let mut ctr = Aes128Ctr::new(KEY.into(), NONCE2.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:67:16 [INFO] [stdout] | [INFO] [stdout] 67 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> &... well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:67:20 [INFO] [stdout] | [INFO] [stdout] 67 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:67:16 [INFO] [stdout] | [INFO] [stdout] 67 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&CtrCore) -> as StreamCipherSeekCore>::Counter well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:67:31 [INFO] [stdout] | [INFO] [stdout] 67 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:70:5 [INFO] [stdout] | [INFO] [stdout] 70 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:70:9 [INFO] [stdout] | [INFO] [stdout] 70 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:72:16 [INFO] [stdout] | [INFO] [stdout] 72 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> &... well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:72:20 [INFO] [stdout] | [INFO] [stdout] 72 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:72:16 [INFO] [stdout] | [INFO] [stdout] 72 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&CtrCore) -> as StreamCipherSeekCore>::Counter well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:72:31 [INFO] [stdout] | [INFO] [stdout] 72 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter <: _` [INFO] [stdout] --> tests/ctr32/be.rs:67:5 [INFO] [stdout] | [INFO] [stdout] 67 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter <: _` [INFO] [stdout] --> tests/ctr32/be.rs:72:5 [INFO] [stdout] | [INFO] [stdout] 72 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:67:5 [INFO] [stdout] | [INFO] [stdout] 67 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:67:5 [INFO] [stdout] | [INFO] [stdout] 67 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:72:5 [INFO] [stdout] | [INFO] [stdout] 72 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/be.rs:72:5 [INFO] [stdout] | [INFO] [stdout] 72 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0275`. [INFO] [stdout] [INFO] [stderr] error: could not compile `ctr` (bench "aes128") due to 51 previous errors [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::KeyIvInit` [INFO] [stdout] --> tests/ctr32/be.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | ctr::CtrCore, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | ctr::CtrCore, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as BlockSizeUser>::BlockSize>: Default` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `UInt, ...>, ...>, ...>, ...> == ...` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as BlockSizeUser>::BlockSize>: Copy` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: the `Copy` trait is required because this value will be copied for each element of the array [INFO] [stdout] = help: consider using `core::array::from_fn` to initialize the array [INFO] [stdout] = help: see https://doc.rust-lang.org/stable/std/array/fn.from_fn.html for more information [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as KeySizeUser>::KeySize>: Default` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as IvSizeUser>::IvSize>: Default` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `UInt, ...>, ...>, ...>, ...> == ...` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == UInt, ...>, ...>` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::StreamCipherCore` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ required by a bound introduced by this call [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `UInt, ...>, ...>, ...>, ...> == ...` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == as BlockSizeUser>::BlockSize` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == UInt, ...>, ...>` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == UInt, ...>, ...>` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == as BlockSizeUser>::BlockSize` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::IvState` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as IvSizeUser>::IvSize` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as IvSizeUser>::IvSize` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == UInt, ...>, ...>` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == as BlockSizeUser>::BlockSize` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: Sized` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: Sized` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: Sized` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as BlockSizeUser>::BlockSize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as BlockSizeUser>::BlockSize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as BlockSizeUser>::BlockSize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut CtrCore, &mut [...]) well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&mut [Array as BlockSizeUser>::BlockSize>] well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&mut [Array as BlockSizeUser>::BlockSize>] well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&CtrCore) -> Array well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&mut [Array as BlockSizeUser>::BlockSize>] well-formed` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr32/be.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / cipher::iv_state_test!( [INFO] [stdout] 83 | | iv_state, [INFO] [stdout] 84 | | ctr::CtrCore, [INFO] [stdout] 85 | | apply_ks, [INFO] [stdout] 86 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: cipher::KeyIvInit` [INFO] [stdout] --> tests/ctr32/le.rs:23:19 [INFO] [stdout] | [INFO] [stdout] 23 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/le.rs:23:34 [INFO] [stdout] | [INFO] [stdout] 23 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as IvSizeUser>::IvSize == UInt, ...>` [INFO] [stdout] --> tests/ctr32/le.rs:23:46 [INFO] [stdout] | [INFO] [stdout] 23 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::StreamCipherCore` [INFO] [stdout] --> tests/ctr32/le.rs:24:20 [INFO] [stdout] | [INFO] [stdout] 24 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] note: required by a bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] --> /opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/stream/wrapper.rs:48:9 [INFO] [stdout] | [INFO] [stdout] 48 | impl StreamCipherCoreWrapper { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ required by this bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] 49 | /// Return reference to the core type. [INFO] [stdout] 50 | pub fn get_core(&self) -> &T { [INFO] [stdout] | -------- required by a bound in this associated function [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: StreamCipherSeekCore` [INFO] [stdout] --> tests/ctr32/le.rs:24:31 [INFO] [stdout] | [INFO] [stdout] 24 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/le.rs:24:16 [INFO] [stdout] | [INFO] [stdout] 24 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr32/le.rs:27:9 [INFO] [stdout] | [INFO] [stdout] 27 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr32/le.rs:23:9 [INFO] [stdout] | [INFO] [stdout] 23 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:23:19 [INFO] [stdout] | [INFO] [stdout] 23 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:23:19 [INFO] [stdout] | [INFO] [stdout] 23 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:23:34 [INFO] [stdout] | [INFO] [stdout] 23 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:23:46 [INFO] [stdout] | [INFO] [stdout] 23 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:23:19 [INFO] [stdout] | [INFO] [stdout] 23 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:24:16 [INFO] [stdout] | [INFO] [stdout] 24 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> &... well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:24:20 [INFO] [stdout] | [INFO] [stdout] 24 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:24:16 [INFO] [stdout] | [INFO] [stdout] 24 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&CtrCore) -> as StreamCipherSeekCore>::Counter well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:24:31 [INFO] [stdout] | [INFO] [stdout] 24 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:27:5 [INFO] [stdout] | [INFO] [stdout] 27 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:27:9 [INFO] [stdout] | [INFO] [stdout] 27 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter <: _` [INFO] [stdout] --> tests/ctr32/le.rs:24:5 [INFO] [stdout] | [INFO] [stdout] 24 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:23:46 [INFO] [stdout] | [INFO] [stdout] 23 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/le.rs:24:5 [INFO] [stdout] | [INFO] [stdout] 24 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/le.rs:24:5 [INFO] [stdout] | [INFO] [stdout] 24 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: cipher::KeyIvInit` [INFO] [stdout] --> tests/ctr32/le.rs:41:19 [INFO] [stdout] | [INFO] [stdout] 41 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/le.rs:41:34 [INFO] [stdout] | [INFO] [stdout] 41 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as IvSizeUser>::IvSize == UInt, ...>` [INFO] [stdout] --> tests/ctr32/le.rs:41:46 [INFO] [stdout] | [INFO] [stdout] 41 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipherSeek` [INFO] [stdout] --> tests/ctr32/le.rs:42:9 [INFO] [stdout] | [INFO] [stdout] 42 | ctr.seek(16); [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::StreamCipherCore` [INFO] [stdout] --> tests/ctr32/le.rs:43:20 [INFO] [stdout] | [INFO] [stdout] 43 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] note: required by a bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] --> /opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/stream/wrapper.rs:48:9 [INFO] [stdout] | [INFO] [stdout] 48 | impl StreamCipherCoreWrapper { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ required by this bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] 49 | /// Return reference to the core type. [INFO] [stdout] 50 | pub fn get_core(&self) -> &T { [INFO] [stdout] | -------- required by a bound in this associated function [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: StreamCipherSeekCore` [INFO] [stdout] --> tests/ctr32/le.rs:43:31 [INFO] [stdout] | [INFO] [stdout] 43 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/le.rs:43:16 [INFO] [stdout] | [INFO] [stdout] 43 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr32/le.rs:46:9 [INFO] [stdout] | [INFO] [stdout] 46 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::StreamCipherCore` [INFO] [stdout] --> tests/ctr32/le.rs:48:20 [INFO] [stdout] | [INFO] [stdout] 48 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] note: required by a bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] --> /opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/stream/wrapper.rs:48:9 [INFO] [stdout] | [INFO] [stdout] 48 | impl StreamCipherCoreWrapper { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ required by this bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] 49 | /// Return reference to the core type. [INFO] [stdout] 50 | pub fn get_core(&self) -> &T { [INFO] [stdout] | -------- required by a bound in this associated function [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: StreamCipherSeekCore` [INFO] [stdout] --> tests/ctr32/le.rs:48:31 [INFO] [stdout] | [INFO] [stdout] 48 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/le.rs:48:16 [INFO] [stdout] | [INFO] [stdout] 48 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr32/le.rs:41:9 [INFO] [stdout] | [INFO] [stdout] 41 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:41:19 [INFO] [stdout] | [INFO] [stdout] 41 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:41:19 [INFO] [stdout] | [INFO] [stdout] 41 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:41:34 [INFO] [stdout] | [INFO] [stdout] 41 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:41:46 [INFO] [stdout] | [INFO] [stdout] 41 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:41:19 [INFO] [stdout] | [INFO] [stdout] 41 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:42:5 [INFO] [stdout] | [INFO] [stdout] 42 | ctr.seek(16); [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, i32) well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:42:9 [INFO] [stdout] | [INFO] [stdout] 42 | ctr.seek(16); [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:43:16 [INFO] [stdout] | [INFO] [stdout] 43 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> &... well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:43:20 [INFO] [stdout] | [INFO] [stdout] 43 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:43:16 [INFO] [stdout] | [INFO] [stdout] 43 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&CtrCore) -> as StreamCipherSeekCore>::Counter well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:43:31 [INFO] [stdout] | [INFO] [stdout] 43 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:46:5 [INFO] [stdout] | [INFO] [stdout] 46 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:46:9 [INFO] [stdout] | [INFO] [stdout] 46 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:48:16 [INFO] [stdout] | [INFO] [stdout] 48 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> &... well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:48:20 [INFO] [stdout] | [INFO] [stdout] 48 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:48:16 [INFO] [stdout] | [INFO] [stdout] 48 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&CtrCore) -> as StreamCipherSeekCore>::Counter well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:48:31 [INFO] [stdout] | [INFO] [stdout] 48 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter <: _` [INFO] [stdout] --> tests/ctr32/le.rs:43:5 [INFO] [stdout] | [INFO] [stdout] 43 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter <: _` [INFO] [stdout] --> tests/ctr32/le.rs:48:5 [INFO] [stdout] | [INFO] [stdout] 48 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:41:46 [INFO] [stdout] | [INFO] [stdout] 41 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/le.rs:43:5 [INFO] [stdout] | [INFO] [stdout] 43 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/le.rs:43:5 [INFO] [stdout] | [INFO] [stdout] 43 | assert_eq!(ctr.get_core().get_block_pos(), 1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/le.rs:48:5 [INFO] [stdout] | [INFO] [stdout] 48 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/le.rs:48:5 [INFO] [stdout] | [INFO] [stdout] 48 | assert_eq!(ctr.get_core().get_block_pos(), 5); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: cipher::KeyIvInit` [INFO] [stdout] --> tests/ctr32/le.rs:60:19 [INFO] [stdout] | [INFO] [stdout] 60 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/le.rs:60:34 [INFO] [stdout] | [INFO] [stdout] 60 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as IvSizeUser>::IvSize == UInt, ...>` [INFO] [stdout] --> tests/ctr32/le.rs:60:46 [INFO] [stdout] | [INFO] [stdout] 60 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr32/le.rs:63:9 [INFO] [stdout] | [INFO] [stdout] 63 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr32/le.rs:60:9 [INFO] [stdout] | [INFO] [stdout] 60 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:60:19 [INFO] [stdout] | [INFO] [stdout] 60 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:60:19 [INFO] [stdout] | [INFO] [stdout] 60 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:60:34 [INFO] [stdout] | [INFO] [stdout] 60 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:60:46 [INFO] [stdout] | [INFO] [stdout] 60 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:60:19 [INFO] [stdout] | [INFO] [stdout] 60 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:63:5 [INFO] [stdout] | [INFO] [stdout] 63 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:63:9 [INFO] [stdout] | [INFO] [stdout] 63 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:60:46 [INFO] [stdout] | [INFO] [stdout] 60 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE1)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: cipher::KeyIvInit` [INFO] [stdout] --> tests/ctr32/le.rs:75:19 [INFO] [stdout] | [INFO] [stdout] 75 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE2)); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/le.rs:75:34 [INFO] [stdout] | [INFO] [stdout] 75 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE2)); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as IvSizeUser>::IvSize == UInt, ...>` [INFO] [stdout] --> tests/ctr32/le.rs:75:46 [INFO] [stdout] | [INFO] [stdout] 75 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE2)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::StreamCipherCore` [INFO] [stdout] --> tests/ctr32/le.rs:76:20 [INFO] [stdout] | [INFO] [stdout] 76 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] note: required by a bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] --> /opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/stream/wrapper.rs:48:9 [INFO] [stdout] | [INFO] [stdout] 48 | impl StreamCipherCoreWrapper { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ required by this bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] 49 | /// Return reference to the core type. [INFO] [stdout] 50 | pub fn get_core(&self) -> &T { [INFO] [stdout] | -------- required by a bound in this associated function [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: StreamCipherSeekCore` [INFO] [stdout] --> tests/ctr32/le.rs:76:31 [INFO] [stdout] | [INFO] [stdout] 76 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/le.rs:76:16 [INFO] [stdout] | [INFO] [stdout] 76 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/ctr32/le.rs:79:9 [INFO] [stdout] | [INFO] [stdout] 79 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::StreamCipherCore` [INFO] [stdout] --> tests/ctr32/le.rs:81:20 [INFO] [stdout] | [INFO] [stdout] 81 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] note: required by a bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] --> /opt/rustwide/cargo-home/registry/src/index.crates.io-1949cf8c6b5b557f/cipher-0.5.0-pre.7/src/stream/wrapper.rs:48:9 [INFO] [stdout] | [INFO] [stdout] 48 | impl StreamCipherCoreWrapper { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ required by this bound in `StreamCipherCoreWrapper::::get_core` [INFO] [stdout] 49 | /// Return reference to the core type. [INFO] [stdout] 50 | pub fn get_core(&self) -> &T { [INFO] [stdout] | -------- required by a bound in this associated function [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: StreamCipherSeekCore` [INFO] [stdout] --> tests/ctr32/le.rs:81:31 [INFO] [stdout] | [INFO] [stdout] 81 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/le.rs:81:16 [INFO] [stdout] | [INFO] [stdout] 81 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/ctr32/le.rs:75:9 [INFO] [stdout] | [INFO] [stdout] 75 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE2)); [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:75:19 [INFO] [stdout] | [INFO] [stdout] 75 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE2)); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:75:19 [INFO] [stdout] | [INFO] [stdout] 75 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE2)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:75:34 [INFO] [stdout] | [INFO] [stdout] 75 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE2)); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:75:46 [INFO] [stdout] | [INFO] [stdout] 75 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE2)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:75:19 [INFO] [stdout] | [INFO] [stdout] 75 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE2)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:76:16 [INFO] [stdout] | [INFO] [stdout] 76 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> &... well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:76:20 [INFO] [stdout] | [INFO] [stdout] 76 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:76:16 [INFO] [stdout] | [INFO] [stdout] 76 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&CtrCore) -> as StreamCipherSeekCore>::Counter well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:76:31 [INFO] [stdout] | [INFO] [stdout] 76 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:79:5 [INFO] [stdout] | [INFO] [stdout] 79 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:79:9 [INFO] [stdout] | [INFO] [stdout] 79 | ctr.apply_keystream(&mut buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:81:16 [INFO] [stdout] | [INFO] [stdout] 81 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&StreamCipherCoreWrapper>) -> &... well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:81:20 [INFO] [stdout] | [INFO] [stdout] 81 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:81:16 [INFO] [stdout] | [INFO] [stdout] 81 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&CtrCore) -> as StreamCipherSeekCore>::Counter well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:81:31 [INFO] [stdout] | [INFO] [stdout] 81 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter <: _` [INFO] [stdout] --> tests/ctr32/le.rs:76:5 [INFO] [stdout] | [INFO] [stdout] 76 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter <: _` [INFO] [stdout] --> tests/ctr32/le.rs:81:5 [INFO] [stdout] | [INFO] [stdout] 81 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:75:46 [INFO] [stdout] | [INFO] [stdout] 75 | let mut ctr = Aes128Ctr::new(KEY.into(), &nonce(NONCE2)); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/le.rs:76:5 [INFO] [stdout] | [INFO] [stdout] 76 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/le.rs:76:5 [INFO] [stdout] | [INFO] [stdout] 76 | assert_eq!(ctr.get_core().get_block_pos(), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/le.rs:81:5 [INFO] [stdout] | [INFO] [stdout] 81 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as StreamCipherSeekCore>::Counter == _` [INFO] [stdout] --> tests/ctr32/le.rs:81:5 [INFO] [stdout] | [INFO] [stdout] 81 | assert_eq!(ctr.get_core().get_block_pos(), 4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `assert_eq` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::KeyIvInit` [INFO] [stdout] --> tests/ctr32/le.rs:93:5 [INFO] [stdout] | [INFO] [stdout] 93 | ctr::CtrCore, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:93:5 [INFO] [stdout] | [INFO] [stdout] 93 | ctr::CtrCore, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as BlockSizeUser>::BlockSize>: Default` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `UInt, ...>, ...>, ...>, ...> == ...` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as BlockSizeUser>::BlockSize>: Copy` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: the `Copy` trait is required because this value will be copied for each element of the array [INFO] [stdout] = help: consider using `core::array::from_fn` to initialize the array [INFO] [stdout] = help: see https://doc.rust-lang.org/stable/std/array/fn.from_fn.html for more information [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as KeySizeUser>::KeySize>: Default` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as IvSizeUser>::IvSize>: Default` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `UInt, ...>, ...>, ...>, ...> == ...` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == UInt, ...>, ...>` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::StreamCipherCore` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ required by a bound introduced by this call [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `UInt, ...>, ...>, ...>, ...> == ...` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == as BlockSizeUser>::BlockSize` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == UInt, ...>, ...>` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == UInt, ...>, ...>` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == as BlockSizeUser>::BlockSize` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: cipher::IvState` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as IvSizeUser>::IvSize` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == as IvSizeUser>::IvSize` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == UInt, ...>, ...>` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == as BlockSizeUser>::BlockSize` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: Sized` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: Sized` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: Sized` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as BlockSizeUser>::BlockSize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as BlockSizeUser>::BlockSize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as BlockSizeUser>::BlockSize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut CtrCore, &mut [...]) well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&mut [Array as BlockSizeUser>::BlockSize>] well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&mut [Array as BlockSizeUser>::BlockSize>] well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&CtrCore) -> Array well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&mut [Array as BlockSizeUser>::BlockSize>] well-formed` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as BlockSizeUser>::BlockSize == _` [INFO] [stdout] --> tests/ctr32/le.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / cipher::iv_state_test!( [INFO] [stdout] 92 | | iv_state, [INFO] [stdout] 93 | | ctr::CtrCore, [INFO] [stdout] 94 | | apply_ks, [INFO] [stdout] 95 | | ); [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: this error originates in the macro `$crate::iv_state_test` which comes from the expansion of the macro `cipher::iv_state_test` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: cipher::KeyIvInit` [INFO] [stdout] --> tests/gost/mod.rs:27:22 [INFO] [stdout] | [INFO] [stdout] 27 | let mut cipher = KuznyechikCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/gost/mod.rs:27:41 [INFO] [stdout] | [INFO] [stdout] 27 | let mut cipher = KuznyechikCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as IvSizeUser>::IvSize` [INFO] [stdout] --> tests/gost/mod.rs:27:54 [INFO] [stdout] | [INFO] [stdout] 27 | let mut cipher = KuznyechikCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> tests/gost/mod.rs:28:12 [INFO] [stdout] | [INFO] [stdout] 28 | cipher.apply_keystream(&mut pt); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: Sized` [INFO] [stdout] --> tests/gost/mod.rs:27:9 [INFO] [stdout] | [INFO] [stdout] 27 | let mut cipher = KuznyechikCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/gost/mod.rs:27:22 [INFO] [stdout] | [INFO] [stdout] 27 | let mut cipher = KuznyechikCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/gost/mod.rs:27:22 [INFO] [stdout] | [INFO] [stdout] 27 | let mut cipher = KuznyechikCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/gost/mod.rs:27:41 [INFO] [stdout] | [INFO] [stdout] 27 | let mut cipher = KuznyechikCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/gost/mod.rs:27:54 [INFO] [stdout] | [INFO] [stdout] 27 | let mut cipher = KuznyechikCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/gost/mod.rs:27:22 [INFO] [stdout] | [INFO] [stdout] 27 | let mut cipher = KuznyechikCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> tests/gost/mod.rs:28:5 [INFO] [stdout] | [INFO] [stdout] 28 | cipher.apply_keystream(&mut pt); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> tests/gost/mod.rs:28:12 [INFO] [stdout] | [INFO] [stdout] 28 | cipher.apply_keystream(&mut pt); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/gost/mod.rs:27:41 [INFO] [stdout] | [INFO] [stdout] 27 | let mut cipher = KuznyechikCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `> as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/gost/mod.rs:27:54 [INFO] [stdout] | [INFO] [stdout] 27 | let mut cipher = KuznyechikCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper, Ctr32BE>>: cipher::KeyIvInit` [INFO] [stdout] --> tests/gost/mod.rs:52:22 [INFO] [stdout] | [INFO] [stdout] 52 | let mut cipher = MagmaCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == , Ctr32BE>> as KeySizeUser>::KeySize` [INFO] [stdout] --> tests/gost/mod.rs:52:36 [INFO] [stdout] | [INFO] [stdout] 52 | let mut cipher = MagmaCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == , Ctr32BE>> as IvSizeUser>::IvSize` [INFO] [stdout] --> tests/gost/mod.rs:52:49 [INFO] [stdout] | [INFO] [stdout] 52 | let mut cipher = MagmaCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper, Ctr32BE>>: StreamCipher` [INFO] [stdout] --> tests/gost/mod.rs:53:12 [INFO] [stdout] | [INFO] [stdout] 53 | cipher.apply_keystream(&mut pt); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper, Ctr32BE>>: Sized` [INFO] [stdout] --> tests/gost/mod.rs:52:9 [INFO] [stdout] | [INFO] [stdout] 52 | let mut cipher = MagmaCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper, Ctr32BE>> well-formed` [INFO] [stdout] --> tests/gost/mod.rs:52:22 [INFO] [stdout] | [INFO] [stdout] 52 | let mut cipher = MagmaCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper, Ctr32BE>> well-formed` [INFO] [stdout] --> tests/gost/mod.rs:52:22 [INFO] [stdout] | [INFO] [stdout] 52 | let mut cipher = MagmaCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array, ...>> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> tests/gost/mod.rs:52:36 [INFO] [stdout] | [INFO] [stdout] 52 | let mut cipher = MagmaCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&Array, ...>> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> tests/gost/mod.rs:52:49 [INFO] [stdout] | [INFO] [stdout] 52 | let mut cipher = MagmaCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper, Ctr32BE>> well-formed` [INFO] [stdout] --> tests/gost/mod.rs:52:22 [INFO] [stdout] | [INFO] [stdout] 52 | let mut cipher = MagmaCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper, Ctr32BE>> well-formed` [INFO] [stdout] --> tests/gost/mod.rs:53:5 [INFO] [stdout] | [INFO] [stdout] 53 | cipher.apply_keystream(&mut pt); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper, Ctr32BE>>, ...) well-formed` [INFO] [stdout] --> tests/gost/mod.rs:53:12 [INFO] [stdout] | [INFO] [stdout] 53 | cipher.apply_keystream(&mut pt); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `, Ctr32BE>> as KeySizeUser>::KeySize == _` [INFO] [stdout] --> tests/gost/mod.rs:52:36 [INFO] [stdout] | [INFO] [stdout] 52 | let mut cipher = MagmaCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `, Ctr32BE>> as IvSizeUser>::IvSize == _` [INFO] [stdout] --> tests/gost/mod.rs:52:49 [INFO] [stdout] | [INFO] [stdout] 52 | let mut cipher = MagmaCtr::new(&key.into(), &nonce.into()); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`mod`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0275`. [INFO] [stdout] [INFO] [stderr] error: could not compile `ctr` (test "mod") due to 610 previous errors [INFO] running `Command { std: "docker" "inspect" "34894a3040ec8fefe218cd3e2dfbf815305bfd1190359d8c80e4515e194f608f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "34894a3040ec8fefe218cd3e2dfbf815305bfd1190359d8c80e4515e194f608f", kill_on_drop: false }` [INFO] [stdout] 34894a3040ec8fefe218cd3e2dfbf815305bfd1190359d8c80e4515e194f608f