[INFO] fetching crate eth-keystore 0.5.0... [INFO] checking eth-keystore-0.5.0 against try#306c6aded24f02440063be828ebe601fe5eb8323 for pr-133502-3 [INFO] extracting crate eth-keystore 0.5.0 into /workspace/builds/worker-3-tc2/source [INFO] validating manifest of crates.io crate eth-keystore 0.5.0 on toolchain 306c6aded24f02440063be828ebe601fe5eb8323 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+306c6aded24f02440063be828ebe601fe5eb8323" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate eth-keystore 0.5.0 [INFO] finished tweaking crates.io crate eth-keystore 0.5.0 [INFO] tweaked toml for crates.io crate eth-keystore 0.5.0 written to /workspace/builds/worker-3-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+306c6aded24f02440063be828ebe601fe5eb8323" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 95 packages to latest compatible versions [INFO] [stderr] Adding ethereum-types v0.13.1 (available: v0.15.1) [INFO] [stderr] Adding k256 v0.11.6 (available: v0.13.4) [INFO] [stderr] Adding pbkdf2 v0.11.0 (available: v0.12.2) [INFO] [stderr] Adding rand v0.8.5 (available: v0.9.1) [INFO] [stderr] Adding scrypt v0.10.0 (available: v0.11.0) [INFO] [stderr] Adding thiserror v1.0.69 (available: v2.0.12) [INFO] [stderr] Adding uuid v0.8.2 (available: v1.16.0) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+306c6aded24f02440063be828ebe601fe5eb8323" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:b0b074c097205a61b89e8ad263052f976b2b332c4dc5f02aef1fe52501660d6e" "/opt/rustwide/cargo-home/bin/cargo" "+306c6aded24f02440063be828ebe601fe5eb8323" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 792e64c61be5a276d44a85a07d6b4b1bae0aa53bfb38b124d6e1b3958f0e4326 [INFO] running `Command { std: "docker" "start" "-a" "792e64c61be5a276d44a85a07d6b4b1bae0aa53bfb38b124d6e1b3958f0e4326", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "792e64c61be5a276d44a85a07d6b4b1bae0aa53bfb38b124d6e1b3958f0e4326", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "792e64c61be5a276d44a85a07d6b4b1bae0aa53bfb38b124d6e1b3958f0e4326", kill_on_drop: false }` [INFO] [stdout] 792e64c61be5a276d44a85a07d6b4b1bae0aa53bfb38b124d6e1b3958f0e4326 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:b0b074c097205a61b89e8ad263052f976b2b332c4dc5f02aef1fe52501660d6e" "/opt/rustwide/cargo-home/bin/cargo" "+306c6aded24f02440063be828ebe601fe5eb8323" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 5860323ebe6d385423822b5b9340817ab0a62f1e7fe76d94b82229496db3f0da [INFO] running `Command { std: "docker" "start" "-a" "5860323ebe6d385423822b5b9340817ab0a62f1e7fe76d94b82229496db3f0da", kill_on_drop: false }` [INFO] [stderr] Compiling version_check v0.9.5 [INFO] [stderr] Compiling typenum v1.18.0 [INFO] [stderr] Compiling proc-macro2 v1.0.95 [INFO] [stderr] Compiling unicode-ident v1.0.18 [INFO] [stderr] Checking cfg-if v1.0.0 [INFO] [stderr] Compiling libc v0.2.172 [INFO] [stderr] Checking subtle v2.6.1 [INFO] [stderr] Compiling zerocopy v0.8.24 [INFO] [stderr] Compiling serde v1.0.219 [INFO] [stderr] Checking cpufeatures v0.2.17 [INFO] [stderr] Compiling thiserror v1.0.69 [INFO] [stderr] Compiling serde_json v1.0.140 [INFO] [stderr] Checking itoa v1.0.15 [INFO] [stderr] Checking ryu v1.0.20 [INFO] [stderr] Checking memchr v2.7.4 [INFO] [stderr] Checking keccak v0.1.5 [INFO] [stderr] Checking hex v0.4.3 [INFO] [stderr] Compiling generic-array v0.14.7 [INFO] [stderr] Compiling quote v1.0.40 [INFO] [stderr] Compiling syn v2.0.100 [INFO] [stderr] Checking getrandom v0.2.15 [INFO] [stderr] Checking rand_core v0.6.4 [INFO] [stderr] Checking ppv-lite86 v0.2.21 [INFO] [stderr] Checking rand_chacha v0.3.1 [INFO] [stderr] Checking rand v0.8.5 [INFO] [stderr] Compiling serde_derive v1.0.219 [INFO] [stderr] Compiling thiserror-impl v1.0.69 [INFO] [stderr] Checking crypto-common v0.1.6 [INFO] [stderr] Checking block-buffer v0.10.4 [INFO] [stderr] Checking inout v0.1.4 [INFO] [stderr] Checking cipher v0.4.4 [INFO] [stderr] Checking digest v0.10.7 [INFO] [stderr] Checking salsa20 v0.10.2 [INFO] [stderr] Checking aes v0.8.4 [INFO] [stderr] Checking ctr v0.9.2 [INFO] [stderr] Checking pbkdf2 v0.11.0 [INFO] [stderr] Checking sha2 v0.10.8 [INFO] [stderr] Checking hmac v0.12.1 [INFO] [stderr] Checking sha3 v0.10.8 [INFO] [stderr] Checking scrypt v0.10.0 [INFO] [stderr] Checking uuid v0.8.2 [INFO] [stderr] Checking eth-keystore v0.5.0 (/opt/rustwide/workdir) [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> src/lib.rs:262:12 [INFO] [stdout] | [INFO] [stdout] 262 | inner: ctr::CtrCore, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> src/lib.rs:262:12 [INFO] [stdout] | [INFO] [stdout] 262 | inner: ctr::CtrCore, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Result well-formed` [INFO] [stdout] --> src/lib.rs:266:38 [INFO] [stdout] | [INFO] [stdout] 266 | fn new(key: &[u8], iv: &[u8]) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Result well-formed` [INFO] [stdout] --> src/lib.rs:266:38 [INFO] [stdout] | [INFO] [stdout] 266 | fn new(key: &[u8], iv: &[u8]) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Aes128Ctr: Sized` [INFO] [stdout] --> src/lib.rs:149:9 [INFO] [stdout] | [INFO] [stdout] 149 | let decryptor = [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Aes128Ctr: Sized` [INFO] [stdout] --> src/lib.rs:150:76 [INFO] [stdout] | [INFO] [stdout] 150 | Aes128Ctr::new(&key[..16], &keystore.crypto.cipherparams.iv[..16]).expect("invalid length"); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] note: required by a bound in `Result::::expect` [INFO] [stdout] --> /rustc/306c6aded24f02440063be828ebe601fe5eb8323/library/core/src/result.rs:1055:5 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Result well-formed` [INFO] [stdout] --> src/lib.rs:150:9 [INFO] [stdout] | [INFO] [stdout] 150 | Aes128Ctr::new(&key[..16], &keystore.crypto.cipherparams.iv[..16]).expect("invalid length"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(Result, &str) -> Aes128Ctr well-formed` [INFO] [stdout] --> src/lib.rs:150:76 [INFO] [stdout] | [INFO] [stdout] 150 | Aes128Ctr::new(&key[..16], &keystore.crypto.cipherparams.iv[..16]).expect("invalid length"); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Aes128Ctr: Sized` [INFO] [stdout] --> src/lib.rs:149:9 [INFO] [stdout] | [INFO] [stdout] 149 | let decryptor = [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Aes128Ctr: Sized` [INFO] [stdout] --> src/lib.rs:150:76 [INFO] [stdout] | [INFO] [stdout] 150 | Aes128Ctr::new(&key[..16], &keystore.crypto.cipherparams.iv[..16]).expect("invalid length"); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] note: required by a bound in `Result::::expect` [INFO] [stdout] --> /rustc/306c6aded24f02440063be828ebe601fe5eb8323/library/core/src/result.rs:1055:5 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Result well-formed` [INFO] [stdout] --> src/lib.rs:150:9 [INFO] [stdout] | [INFO] [stdout] 150 | Aes128Ctr::new(&key[..16], &keystore.crypto.cipherparams.iv[..16]).expect("invalid length"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(Result, &str) -> Aes128Ctr well-formed` [INFO] [stdout] --> src/lib.rs:150:76 [INFO] [stdout] | [INFO] [stdout] 150 | Aes128Ctr::new(&key[..16], &keystore.crypto.cipherparams.iv[..16]).expect("invalid length"); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Aes128Ctr: Sized` [INFO] [stdout] --> src/lib.rs:212:9 [INFO] [stdout] | [INFO] [stdout] 212 | let encryptor = Aes128Ctr::new(&key[..16], &iv[..16]).expect("invalid length"); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Aes128Ctr: Sized` [INFO] [stdout] --> src/lib.rs:212:59 [INFO] [stdout] | [INFO] [stdout] 212 | let encryptor = Aes128Ctr::new(&key[..16], &iv[..16]).expect("invalid length"); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] note: required by a bound in `Result::::expect` [INFO] [stdout] --> /rustc/306c6aded24f02440063be828ebe601fe5eb8323/library/core/src/result.rs:1055:5 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Result well-formed` [INFO] [stdout] --> src/lib.rs:212:21 [INFO] [stdout] | [INFO] [stdout] 212 | let encryptor = Aes128Ctr::new(&key[..16], &iv[..16]).expect("invalid length"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(Result, &str) -> Aes128Ctr well-formed` [INFO] [stdout] --> src/lib.rs:212:59 [INFO] [stdout] | [INFO] [stdout] 212 | let encryptor = Aes128Ctr::new(&key[..16], &iv[..16]).expect("invalid length"); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: InnerIvInit` [INFO] [stdout] --> src/lib.rs:268:21 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as InnerUser>::Inner == Aes128` [INFO] [stdout] --> src/lib.rs:268:55 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: Sized` [INFO] [stdout] --> src/lib.rs:268:13 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: Sized` [INFO] [stdout] --> src/lib.rs:268:67 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] note: required by a bound in `Result::::unwrap` [INFO] [stdout] --> /rustc/306c6aded24f02440063be828ebe601fe5eb8323/library/core/src/result.rs:1103:5 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Aes128Ctr: Sized` [INFO] [stdout] --> src/lib.rs:269:12 [INFO] [stdout] | [INFO] [stdout] 269 | Ok(Self { inner }) [INFO] [stdout] | -- ^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | required by a bound introduced by this call [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] note: required by a bound in `Ok` [INFO] [stdout] --> /rustc/306c6aded24f02440063be828ebe601fe5eb8323/library/core/src/result.rs:532:5 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as InnerUser>::Inner: Sized` [INFO] [stdout] --> src/lib.rs:268:55 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] = note: all function arguments must have a statically known size [INFO] [stdout] = help: unsized fn params are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> src/lib.rs:268:21 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> src/lib.rs:268:21 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as InnerUser>::Inner well-formed` [INFO] [stdout] --> src/lib.rs:268:55 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Result, InvalidLength> well-formed` [INFO] [stdout] --> src/lib.rs:268:21 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> src/lib.rs:268:21 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(Result, InvalidLength>) -> CtrCore<..., ...> well-formed` [INFO] [stdout] --> src/lib.rs:268:67 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> src/lib.rs:269:19 [INFO] [stdout] | [INFO] [stdout] 269 | Ok(Self { inner }) [INFO] [stdout] | ^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Result well-formed` [INFO] [stdout] --> src/lib.rs:269:9 [INFO] [stdout] | [INFO] [stdout] 269 | Ok(Self { inner }) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: StreamCipherCore` [INFO] [stdout] --> src/lib.rs:273:20 [INFO] [stdout] | [INFO] [stdout] 273 | self.inner.apply_keystream_partial(buf.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Aes128Ctr: Sized` [INFO] [stdout] --> src/lib.rs:272:24 [INFO] [stdout] | [INFO] [stdout] 272 | fn apply_keystream(self, buf: &mut [u8]) { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] = help: unsized fn params are gated as an unstable feature [INFO] [stdout] help: function arguments must have a statically known size, borrowed types always have a known size [INFO] [stdout] | [INFO] [stdout] 272 | fn apply_keystream(&self, buf: &mut [u8]) { [INFO] [stdout] | + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> src/lib.rs:273:9 [INFO] [stdout] | [INFO] [stdout] 273 | self.inner.apply_keystream_partial(buf.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(CtrCore, InOutBuf<'_, '_, u8>) well-formed` [INFO] [stdout] --> src/lib.rs:273:20 [INFO] [stdout] | [INFO] [stdout] 273 | self.inner.apply_keystream_partial(buf.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0275`. [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Aes128Ctr: Sized` [INFO] [stdout] --> src/lib.rs:212:9 [INFO] [stdout] | [INFO] [stdout] 212 | let encryptor = Aes128Ctr::new(&key[..16], &iv[..16]).expect("invalid length"); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Aes128Ctr: Sized` [INFO] [stdout] --> src/lib.rs:212:59 [INFO] [stdout] | [INFO] [stdout] 212 | let encryptor = Aes128Ctr::new(&key[..16], &iv[..16]).expect("invalid length"); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] note: required by a bound in `Result::::expect` [INFO] [stdout] --> /rustc/306c6aded24f02440063be828ebe601fe5eb8323/library/core/src/result.rs:1055:5 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Result well-formed` [INFO] [stdout] --> src/lib.rs:212:21 [INFO] [stdout] | [INFO] [stdout] 212 | let encryptor = Aes128Ctr::new(&key[..16], &iv[..16]).expect("invalid length"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(Result, &str) -> Aes128Ctr well-formed` [INFO] [stdout] --> src/lib.rs:212:59 [INFO] [stdout] | [INFO] [stdout] 212 | let encryptor = Aes128Ctr::new(&key[..16], &iv[..16]).expect("invalid length"); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: could not compile `eth-keystore` (lib) due to 28 previous errors [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: InnerIvInit` [INFO] [stdout] --> src/lib.rs:268:21 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as InnerUser>::Inner == Aes128` [INFO] [stdout] --> src/lib.rs:268:55 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: Sized` [INFO] [stdout] --> src/lib.rs:268:13 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] = note: all local variables must have a statically known size [INFO] [stdout] = help: unsized locals are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: Sized` [INFO] [stdout] --> src/lib.rs:268:67 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] note: required by a bound in `Result::::unwrap` [INFO] [stdout] --> /rustc/306c6aded24f02440063be828ebe601fe5eb8323/library/core/src/result.rs:1103:5 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Aes128Ctr: Sized` [INFO] [stdout] --> src/lib.rs:269:12 [INFO] [stdout] | [INFO] [stdout] 269 | Ok(Self { inner }) [INFO] [stdout] | -- ^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | required by a bound introduced by this call [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] note: required by a bound in `Ok` [INFO] [stdout] --> /rustc/306c6aded24f02440063be828ebe601fe5eb8323/library/core/src/result.rs:532:5 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as InnerUser>::Inner: Sized` [INFO] [stdout] --> src/lib.rs:268:55 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] = note: all function arguments must have a statically known size [INFO] [stdout] = help: unsized fn params are gated as an unstable feature [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> src/lib.rs:268:21 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> src/lib.rs:268:21 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement ` as InnerUser>::Inner well-formed` [INFO] [stdout] --> src/lib.rs:268:55 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Result, InvalidLength> well-formed` [INFO] [stdout] --> src/lib.rs:268:21 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> src/lib.rs:268:21 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(Result, InvalidLength>) -> CtrCore<..., ...> well-formed` [INFO] [stdout] --> src/lib.rs:268:67 [INFO] [stdout] | [INFO] [stdout] 268 | let inner = ctr::CtrCore::inner_iv_slice_init(cipher, iv).unwrap(); [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> src/lib.rs:269:19 [INFO] [stdout] | [INFO] [stdout] 269 | Ok(Self { inner }) [INFO] [stdout] | ^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Result well-formed` [INFO] [stdout] --> src/lib.rs:269:9 [INFO] [stdout] | [INFO] [stdout] 269 | Ok(Self { inner }) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore: StreamCipherCore` [INFO] [stdout] --> src/lib.rs:273:20 [INFO] [stdout] | [INFO] [stdout] 273 | self.inner.apply_keystream_partial(buf.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `Aes128Ctr: Sized` [INFO] [stdout] --> src/lib.rs:272:24 [INFO] [stdout] | [INFO] [stdout] 272 | fn apply_keystream(self, buf: &mut [u8]) { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] = help: unsized fn params are gated as an unstable feature [INFO] [stdout] help: function arguments must have a statically known size, borrowed types always have a known size [INFO] [stdout] | [INFO] [stdout] 272 | fn apply_keystream(&self, buf: &mut [u8]) { [INFO] [stdout] | + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `CtrCore well-formed` [INFO] [stdout] --> src/lib.rs:273:9 [INFO] [stdout] | [INFO] [stdout] 273 | self.inner.apply_keystream_partial(buf.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(CtrCore, InOutBuf<'_, '_, u8>) well-formed` [INFO] [stdout] --> src/lib.rs:273:20 [INFO] [stdout] | [INFO] [stdout] 273 | self.inner.apply_keystream_partial(buf.into()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`eth_keystore`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0275`. [INFO] [stdout] [INFO] [stderr] error: could not compile `eth-keystore` (lib test) due to 28 previous errors [INFO] running `Command { std: "docker" "inspect" "5860323ebe6d385423822b5b9340817ab0a62f1e7fe76d94b82229496db3f0da", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "5860323ebe6d385423822b5b9340817ab0a62f1e7fe76d94b82229496db3f0da", kill_on_drop: false }` [INFO] [stdout] 5860323ebe6d385423822b5b9340817ab0a62f1e7fe76d94b82229496db3f0da