[INFO] cloning repository https://github.com/brongan/cryptopals [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/brongan/cryptopals" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fbrongan%2Fcryptopals", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fbrongan%2Fcryptopals'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] 949fd20d6712298b63b864be3ccb8e85f0fe0ce4 [INFO] checking brongan/cryptopals against try#a4980311fb7bb9e7893708e6bd3fbbfb2819fd3d for pr-145342-1 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fbrongan%2Fcryptopals" "/workspace/builds/worker-7-tc2/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-7-tc2/source'... [INFO] [stderr] done. [INFO] started tweaking git repo https://github.com/brongan/cryptopals [INFO] finished tweaking git repo https://github.com/brongan/cryptopals [INFO] tweaked toml for git repo https://github.com/brongan/cryptopals written to /workspace/builds/worker-7-tc2/source/Cargo.toml [INFO] validating manifest of git repo https://github.com/brongan/cryptopals on toolchain a4980311fb7bb9e7893708e6bd3fbbfb2819fd3d [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+a4980311fb7bb9e7893708e6bd3fbbfb2819fd3d" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate git repo https://github.com/brongan/cryptopals already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+a4980311fb7bb9e7893708e6bd3fbbfb2819fd3d" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:7ad1b28ee6f5f7f699f6cf7015098d6ccdd96d6f2d78dd06228f5b4c9faf309c" "/opt/rustwide/cargo-home/bin/cargo" "+a4980311fb7bb9e7893708e6bd3fbbfb2819fd3d" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 20caa2faefec9d48ec17931936e9819bc6f9bfb2444ba3c674942354f95ce303 [INFO] running `Command { std: "docker" "start" "-a" "20caa2faefec9d48ec17931936e9819bc6f9bfb2444ba3c674942354f95ce303", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "20caa2faefec9d48ec17931936e9819bc6f9bfb2444ba3c674942354f95ce303", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "20caa2faefec9d48ec17931936e9819bc6f9bfb2444ba3c674942354f95ce303", kill_on_drop: false }` [INFO] [stdout] 20caa2faefec9d48ec17931936e9819bc6f9bfb2444ba3c674942354f95ce303 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:7ad1b28ee6f5f7f699f6cf7015098d6ccdd96d6f2d78dd06228f5b4c9faf309c" "/opt/rustwide/cargo-home/bin/cargo" "+a4980311fb7bb9e7893708e6bd3fbbfb2819fd3d" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 2a5c3fe255c55c483b11a52036f3e8246f3c4d8576a9bdfbeb18739463e89013 [INFO] running `Command { std: "docker" "start" "-a" "2a5c3fe255c55c483b11a52036f3e8246f3c4d8576a9bdfbeb18739463e89013", kill_on_drop: false }` [INFO] [stderr] Checking either v1.13.0 [INFO] [stderr] Checking itertools v0.14.0 [INFO] [stderr] Checking cryptopals v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: the feature `slice_as_chunks` has been stable since 1.88.0 and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:1:12 [INFO] [stdout] | [INFO] [stdout] 1 | #![feature(slice_as_chunks)] [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(stable_features)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the feature `slice_as_chunks` has been stable since 1.88.0 and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:1:12 [INFO] [stdout] | [INFO] [stdout] 1 | #![feature(slice_as_chunks)] [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(stable_features)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `b` [INFO] [stdout] --> src/aes.rs:76:13 [INFO] [stdout] | [INFO] [stdout] 76 | fn sbox_inv(b: u8) -> u8 { [INFO] [stdout] | ^ help: if this is intentional, prefix it with an underscore: `_b` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `Word` is more private than the item `aes_128_ecb_decrypt` [INFO] [stdout] --> src/aes.rs:246:1 [INFO] [stdout] | [INFO] [stdout] 246 | pub fn aes_128_ecb_decrypt(ciphertext: &mut [Word], master_key: &[u8; 16]) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ function `aes_128_ecb_decrypt` is reachable at visibility `pub` [INFO] [stdout] | [INFO] [stdout] note: but type `Word` is only usable at visibility `pub(self)` [INFO] [stdout] --> src/aes.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | struct Word([u8; N]); [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(private_interfaces)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `b` [INFO] [stdout] --> src/aes.rs:76:13 [INFO] [stdout] | [INFO] [stdout] 76 | fn sbox_inv(b: u8) -> u8 { [INFO] [stdout] | ^ help: if this is intentional, prefix it with an underscore: `_b` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `Word` is more private than the item `aes_128_ecb_decrypt` [INFO] [stdout] --> src/aes.rs:246:1 [INFO] [stdout] | [INFO] [stdout] 246 | pub fn aes_128_ecb_decrypt(ciphertext: &mut [Word], master_key: &[u8; 16]) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ function `aes_128_ecb_decrypt` is reachable at visibility `pub` [INFO] [stdout] | [INFO] [stdout] note: but type `Word` is only usable at visibility `pub(self)` [INFO] [stdout] --> src/aes.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | struct Word([u8; N]); [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(private_interfaces)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `input` [INFO] [stdout] --> src/bin/set1.rs:134:9 [INFO] [stdout] | [INFO] [stdout] 134 | let input = base64::decode(&include_str!("../../7.txt").replace("\n", "")); [INFO] [stdout] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_input` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/bin/set1.rs:136:9 [INFO] [stdout] | [INFO] [stdout] 136 | let key = b"YELLOW SUBMARINE"; [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `input` [INFO] [stdout] --> src/bin/set1.rs:134:9 [INFO] [stdout] | [INFO] [stdout] 134 | let input = base64::decode(&include_str!("../../7.txt").replace("\n", "")); [INFO] [stdout] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_input` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `key` [INFO] [stdout] --> src/bin/set1.rs:136:9 [INFO] [stdout] | [INFO] [stdout] 136 | let key = b"YELLOW SUBMARINE"; [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_key` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 2.33s [INFO] running `Command { std: "docker" "inspect" "2a5c3fe255c55c483b11a52036f3e8246f3c4d8576a9bdfbeb18739463e89013", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "2a5c3fe255c55c483b11a52036f3e8246f3c4d8576a9bdfbeb18739463e89013", kill_on_drop: false }` [INFO] [stdout] 2a5c3fe255c55c483b11a52036f3e8246f3c4d8576a9bdfbeb18739463e89013