[INFO] crate sodium-sys 0.0.4 is already in cache [INFO] extracting crate sodium-sys 0.0.4 into work/ex/pr-63376/sources/master#60960a260f7b5c695fd0717311d72ce62dd4eb43/reg/sodium-sys/0.0.4 [INFO] extracting crate sodium-sys 0.0.4 into work/ex/pr-63376/sources/try#266783e4e09e4e9d5307c1c8e695659c58bbcac7/reg/sodium-sys/0.0.4 [INFO] validating manifest of sodium-sys-0.0.4 on toolchain master#60960a260f7b5c695fd0717311d72ce62dd4eb43 [INFO] running `"/mnt/big/crater/work/local/cargo-home/bin/cargo" "+60960a260f7b5c695fd0717311d72ce62dd4eb43-alt" "read-manifest" "--manifest-path" "Cargo.toml"` [INFO] validating manifest of sodium-sys-0.0.4 on toolchain try#266783e4e09e4e9d5307c1c8e695659c58bbcac7 [INFO] running `"/mnt/big/crater/work/local/cargo-home/bin/cargo" "+266783e4e09e4e9d5307c1c8e695659c58bbcac7-alt" "read-manifest" "--manifest-path" "Cargo.toml"` [INFO] started frobbing sodium-sys-0.0.4 [INFO] finished frobbing sodium-sys-0.0.4 [INFO] frobbed toml for sodium-sys-0.0.4 written to work/ex/pr-63376/sources/master#60960a260f7b5c695fd0717311d72ce62dd4eb43/reg/sodium-sys/0.0.4/Cargo.toml [INFO] started frobbing sodium-sys-0.0.4 [INFO] finished frobbing sodium-sys-0.0.4 [INFO] frobbed toml for sodium-sys-0.0.4 written to work/ex/pr-63376/sources/try#266783e4e09e4e9d5307c1c8e695659c58bbcac7/reg/sodium-sys/0.0.4/Cargo.toml [INFO] running `"/mnt/big/crater/work/local/cargo-home/bin/cargo" "+60960a260f7b5c695fd0717311d72ce62dd4eb43-alt" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update"` [INFO] running `"/mnt/big/crater/work/local/cargo-home/bin/cargo" "+266783e4e09e4e9d5307c1c8e695659c58bbcac7-alt" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update"` [INFO] running `"/mnt/big/crater/work/local/cargo-home/bin/cargo" "+60960a260f7b5c695fd0717311d72ce62dd4eb43-alt" "fetch" "--locked" "--manifest-path" "Cargo.toml"` [INFO] running `"/mnt/big/crater/work/local/cargo-home/bin/cargo" "+266783e4e09e4e9d5307c1c8e695659c58bbcac7-alt" "fetch" "--locked" "--manifest-path" "Cargo.toml"` [INFO] checking sodium-sys-0.0.4 against try#266783e4e09e4e9d5307c1c8e695659c58bbcac7 for pr-63376 [INFO] running `"docker" "create" "-v" "/mnt/big/crater/work/local/target-dirs/pr-63376/worker-7/try#266783e4e09e4e9d5307c1c8e695659c58bbcac7:/opt/crater/target:rw,Z" "-v" "/mnt/big/crater/work/ex/pr-63376/sources/try#266783e4e09e4e9d5307c1c8e695659c58bbcac7/reg/sodium-sys/0.0.4:/opt/crater/workdir:ro,Z" "-v" "/mnt/big/crater/work/local/cargo-home:/opt/crater/cargo-home:ro,Z" "-v" "/mnt/big/crater/work/local/rustup-home:/opt/crater/rustup-home:ro,Z" "-e" "USER_ID=1000" "-e" "SOURCE_DIR=/opt/crater/workdir" "-e" "MAP_USER_ID=1000" "-e" "CARGO_TARGET_DIR=/opt/crater/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/crater/cargo-home" "-e" "RUSTUP_HOME=/opt/crater/rustup-home" "-w" "/opt/crater/workdir" "-m" "1536M" "--network" "none" "rustops/crates-build-env" "/opt/crater/cargo-home/bin/cargo" "+266783e4e09e4e9d5307c1c8e695659c58bbcac7-alt" "check" "--frozen" "--all" "--all-targets"` [INFO] [stdout] c67a8e7d862822983856235b6f506b97a5f98277d71a1687ba44af25c49acf24 [INFO] running `"docker" "start" "-a" "c67a8e7d862822983856235b6f506b97a5f98277d71a1687ba44af25c49acf24"` [INFO] [stderr] Compiling sodium-sys v0.0.4 (/opt/crater/workdir) [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:88:5 [INFO] [stderr] | [INFO] [stderr] 88 | uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:89:5 [INFO] [stderr] | [INFO] [stderr] 89 | uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:90:5 [INFO] [stderr] | [INFO] [stderr] 90 | uint64_t [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:104:53 [INFO] [stderr] | [INFO] [stderr] 104 | fn crypto_pwhash_scryptsalsa208sha256(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:106:58 [INFO] [stderr] | [INFO] [stderr] 106 | passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:111:57 [INFO] [stderr] | [INFO] [stderr] 111 | fn crypto_pwhash_scryptsalsa208sha256_str(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:112:62 [INFO] [stderr] | [INFO] [stderr] 112 | passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:116:67 [INFO] [stderr] | [INFO] [stderr] 116 | fn crypto_pwhash_scryptsalsa208sha256_str_verify(str_: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:117:69 [INFO] [stderr] | [INFO] [stderr] 117 | passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:120:61 [INFO] [stderr] | [INFO] [stderr] 120 | fn crypto_pwhash_scryptsalsa208sha256_ll(passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:122:59 [INFO] [stderr] | [INFO] [stderr] 122 | salt: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:124:49 [INFO] [stderr] | [INFO] [stderr] 124 | N: uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:125:49 [INFO] [stderr] | [INFO] [stderr] 125 | r: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:126:49 [INFO] [stderr] | [INFO] [stderr] 126 | p: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:127:56 [INFO] [stderr] | [INFO] [stderr] 127 | buf: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:342:58 [INFO] [stderr] | [INFO] [stderr] 342 | n as uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:343:58 [INFO] [stderr] | [INFO] [stderr] 343 | r as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:344:58 [INFO] [stderr] | [INFO] [stderr] 344 | p as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:2:28 [INFO] [stderr] | [INFO] [stderr] 2 | use libc::{c_void, size_t, uint32_t}; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:6:32 [INFO] [stderr] | [INFO] [stderr] 6 | fn randombytes_random() -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:41 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:54 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:22:20 [INFO] [stderr] | [INFO] [stderr] 22 | pub fn random() -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:29 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:42 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:62:13 [INFO] [stderr] | [INFO] [stderr] 62 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_mut)]` on by default [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:63:13 [INFO] [stderr] | [INFO] [stderr] 63 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:120:13 [INFO] [stderr] | [INFO] [stderr] 120 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:121:13 [INFO] [stderr] | [INFO] [stderr] 121 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:150:13 [INFO] [stderr] | [INFO] [stderr] 150 | let mut nsk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:151:13 [INFO] [stderr] | [INFO] [stderr] 151 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:243:13 [INFO] [stderr] | [INFO] [stderr] 243 | let mut ssk = secmem::malloc(BEFORENMBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:172:9 [INFO] [stderr] | [INFO] [stderr] 172 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:246:9 [INFO] [stderr] | [INFO] [stderr] 246 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:311:9 [INFO] [stderr] | [INFO] [stderr] 311 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:312:9 [INFO] [stderr] | [INFO] [stderr] 312 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:387:9 [INFO] [stderr] | [INFO] [stderr] 387 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:453:9 [INFO] [stderr] | [INFO] [stderr] 453 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:524:9 [INFO] [stderr] | [INFO] [stderr] 524 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:587:9 [INFO] [stderr] | [INFO] [stderr] 587 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:588:9 [INFO] [stderr] | [INFO] [stderr] 588 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:662:9 [INFO] [stderr] | [INFO] [stderr] 662 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:726:9 [INFO] [stderr] | [INFO] [stderr] 726 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:736:9 [INFO] [stderr] | [INFO] [stderr] 736 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:810:9 [INFO] [stderr] | [INFO] [stderr] 810 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:874:9 [INFO] [stderr] | [INFO] [stderr] 874 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] [INFO] [stderr] --> src/crypto/hash/passhash.rs:88:5 [INFO] [stderr] | [INFO] [stderr] 88 | uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:89:5 [INFO] [stderr] | [INFO] [stderr] 89 | uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:90:5 [INFO] [stderr] | [INFO] [stderr] 90 | uint64_t [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:104:53 [INFO] [stderr] | [INFO] [stderr] 104 | fn crypto_pwhash_scryptsalsa208sha256(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:106:58 [INFO] [stderr] | [INFO] [stderr] 106 | passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:111:57 [INFO] [stderr] | [INFO] [stderr] 111 | fn crypto_pwhash_scryptsalsa208sha256_str(out: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:112:62 [INFO] [stderr] | [INFO] [stderr] 112 | passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:116:67 [INFO] [stderr] | [INFO] [stderr] 116 | fn crypto_pwhash_scryptsalsa208sha256_str_verify(str_: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:117:69 [INFO] [stderr] | [INFO] [stderr] 117 | passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:120:61 [INFO] [stderr] | [INFO] [stderr] 120 | fn crypto_pwhash_scryptsalsa208sha256_ll(passwd: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:122:59 [INFO] [stderr] | [INFO] [stderr] 122 | salt: *const uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:124:49 [INFO] [stderr] | [INFO] [stderr] 124 | N: uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:125:49 [INFO] [stderr] | [INFO] [stderr] 125 | r: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:126:49 [INFO] [stderr] | [INFO] [stderr] 126 | p: uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint8_t': Use u8 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:127:56 [INFO] [stderr] | [INFO] [stderr] 127 | buf: *mut uint8_t, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint64_t': Use u64 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:342:58 [INFO] [stderr] | [INFO] [stderr] 342 | n as uint64_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:343:58 [INFO] [stderr] | [INFO] [stderr] 343 | r as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/hash/passhash.rs:344:58 [INFO] [stderr] | [INFO] [stderr] 344 | p as uint32_t, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:2:28 [INFO] [stderr] | [INFO] [stderr] 2 | use libc::{c_void, size_t, uint32_t}; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:6:32 [INFO] [stderr] | [INFO] [stderr] 6 | fn randombytes_random() -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:41 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:7:54 [INFO] [stderr] | [INFO] [stderr] 7 | fn randombytes_uniform(upper_bound: uint32_t) -> uint32_t; [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:22:20 [INFO] [stderr] | [INFO] [stderr] 22 | pub fn random() -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:29 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'libc::uint32_t': Use u32 instead. [INFO] [stderr] --> src/crypto/utils/randombytes.rs:42:42 [INFO] [stderr] | [INFO] [stderr] 42 | pub fn uniform(upper_bound: uint32_t) -> uint32_t { [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:884:9 [INFO] [stderr] | [INFO] [stderr] 884 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:954:9 [INFO] [stderr] | [INFO] [stderr] 954 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:71:9 [INFO] [stderr] | [INFO] [stderr] 71 | let mut ciphertext = secmem::malloc(SEALBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:125:9 [INFO] [stderr] | [INFO] [stderr] 125 | let mut message = secmem::malloc(ciphertext.len() - SEALBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:72:9 [INFO] [stderr] | [INFO] [stderr] 72 | let mut signedmessage = secmem::malloc(BYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:121:9 [INFO] [stderr] | [INFO] [stderr] 121 | let mut message = secmem::malloc(signedmessage.len() - BYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:168:9 [INFO] [stderr] | [INFO] [stderr] 168 | let mut signature = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:58:13 [INFO] [stderr] | [INFO] [stderr] 58 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:59:13 [INFO] [stderr] | [INFO] [stderr] 59 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:116:13 [INFO] [stderr] | [INFO] [stderr] 116 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:117:13 [INFO] [stderr] | [INFO] [stderr] 117 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:201:13 [INFO] [stderr] | [INFO] [stderr] 201 | let mut seed = secmem::malloc(SEEDBYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:218:13 [INFO] [stderr] | [INFO] [stderr] 218 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/generichash.rs:126:9 [INFO] [stderr] | [INFO] [stderr] 126 | let mut hash = secmem::malloc(outlen); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:190:9 [INFO] [stderr] | [INFO] [stderr] 190 | let mut key = secmem::malloc(keylen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:258:9 [INFO] [stderr] | [INFO] [stderr] 258 | let mut out = secmem::malloc(STRBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:332:9 [INFO] [stderr] | [INFO] [stderr] 332 | let mut out = secmem::malloc(outlen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut out = secmem::malloc(SHA256_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:261:9 [INFO] [stderr] | [INFO] [stderr] 261 | let mut out = secmem::malloc(SHA512_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/shorthash.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut hash = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:152:9 [INFO] [stderr] | [INFO] [stderr] 152 | let mut ciphertext = secmem::malloc(ABYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:203:9 [INFO] [stderr] | [INFO] [stderr] 203 | let mut message = secmem::malloc(ciphertext.len() - ABYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/auth.rs:62:9 [INFO] [stderr] | [INFO] [stderr] 62 | let mut output = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:99:9 [INFO] [stderr] | [INFO] [stderr] 99 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:162:9 [INFO] [stderr] | [INFO] [stderr] 162 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:216:9 [INFO] [stderr] | [INFO] [stderr] 216 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:217:9 [INFO] [stderr] | [INFO] [stderr] 217 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:280:9 [INFO] [stderr] | [INFO] [stderr] 280 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:335:9 [INFO] [stderr] | [INFO] [stderr] 335 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:345:9 [INFO] [stderr] | [INFO] [stderr] 345 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:406:9 [INFO] [stderr] | [INFO] [stderr] 406 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:286:17 [INFO] [stderr] | [INFO] [stderr] 286 | let mut output = secmem::malloc(HMACSHA256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:301:17 [INFO] [stderr] | [INFO] [stderr] 301 | let mut output = secmem::malloc(HMACSHA512_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:316:17 [INFO] [stderr] | [INFO] [stderr] 316 | let mut output = secmem::malloc(HMACSHA512256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:112:9 [INFO] [stderr] | [INFO] [stderr] 112 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:191:9 [INFO] [stderr] | [INFO] [stderr] 191 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:62:13 [INFO] [stderr] | [INFO] [stderr] 62 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_mut)]` on by default [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:63:13 [INFO] [stderr] | [INFO] [stderr] 63 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:120:13 [INFO] [stderr] | [INFO] [stderr] 120 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:121:13 [INFO] [stderr] | [INFO] [stderr] 121 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:150:13 [INFO] [stderr] | [INFO] [stderr] 150 | let mut nsk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:151:13 [INFO] [stderr] | [INFO] [stderr] 151 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/auth_keypair.rs:243:13 [INFO] [stderr] | [INFO] [stderr] 243 | let mut ssk = secmem::malloc(BEFORENMBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:172:9 [INFO] [stderr] | [INFO] [stderr] 172 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:246:9 [INFO] [stderr] | [INFO] [stderr] 246 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:311:9 [INFO] [stderr] | [INFO] [stderr] 311 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:312:9 [INFO] [stderr] | [INFO] [stderr] 312 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:387:9 [INFO] [stderr] | [INFO] [stderr] 387 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:453:9 [INFO] [stderr] | [INFO] [stderr] 453 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:524:9 [INFO] [stderr] | [INFO] [stderr] 524 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:587:9 [INFO] [stderr] | [INFO] [stderr] 587 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:588:9 [INFO] [stderr] | [INFO] [stderr] 588 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:662:9 [INFO] [stderr] | [INFO] [stderr] 662 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:726:9 [INFO] [stderr] | [INFO] [stderr] 726 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:736:9 [INFO] [stderr] | [INFO] [stderr] 736 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:810:9 [INFO] [stderr] | [INFO] [stderr] 810 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:874:9 [INFO] [stderr] | [INFO] [stderr] 874 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:884:9 [INFO] [stderr] | [INFO] [stderr] 884 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/authenc.rs:954:9 [INFO] [stderr] | [INFO] [stderr] 954 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:71:9 [INFO] [stderr] | [INFO] [stderr] 71 | let mut ciphertext = secmem::malloc(SEALBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sealbox.rs:125:9 [INFO] [stderr] | [INFO] [stderr] 125 | let mut message = secmem::malloc(ciphertext.len() - SEALBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:72:9 [INFO] [stderr] | [INFO] [stderr] 72 | let mut signedmessage = secmem::malloc(BYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:121:9 [INFO] [stderr] | [INFO] [stderr] 121 | let mut message = secmem::malloc(signedmessage.len() - BYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign.rs:168:9 [INFO] [stderr] | [INFO] [stderr] 168 | let mut signature = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:58:13 [INFO] [stderr] | [INFO] [stderr] 58 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:59:13 [INFO] [stderr] | [INFO] [stderr] 59 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:116:13 [INFO] [stderr] | [INFO] [stderr] 116 | let mut sk = secmem::malloc(SECRETKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:117:13 [INFO] [stderr] | [INFO] [stderr] 117 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:201:13 [INFO] [stderr] | [INFO] [stderr] 201 | let mut seed = secmem::malloc(SEEDBYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/asymmetrickey/sign_keypair.rs:218:13 [INFO] [stderr] | [INFO] [stderr] 218 | let mut pk = secmem::malloc(PUBLICKEYBYTES); [INFO] [stderr] | ----^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/generichash.rs:126:9 [INFO] [stderr] | [INFO] [stderr] 126 | let mut hash = secmem::malloc(outlen); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:190:9 [INFO] [stderr] | [INFO] [stderr] 190 | let mut key = secmem::malloc(keylen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:258:9 [INFO] [stderr] | [INFO] [stderr] 258 | let mut out = secmem::malloc(STRBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/passhash.rs:332:9 [INFO] [stderr] | [INFO] [stderr] 332 | let mut out = secmem::malloc(outlen); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut out = secmem::malloc(SHA256_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/sha2.rs:261:9 [INFO] [stderr] | [INFO] [stderr] 261 | let mut out = secmem::malloc(SHA512_BYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/hash/shorthash.rs:60:9 [INFO] [stderr] | [INFO] [stderr] 60 | let mut hash = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:152:9 [INFO] [stderr] | [INFO] [stderr] 152 | let mut ciphertext = secmem::malloc(ABYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/aead.rs:203:9 [INFO] [stderr] | [INFO] [stderr] 203 | let mut message = secmem::malloc(ciphertext.len() - ABYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/auth.rs:62:9 [INFO] [stderr] | [INFO] [stderr] 62 | let mut output = secmem::malloc(BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:99:9 [INFO] [stderr] | [INFO] [stderr] 99 | let mut ciphertext = secmem::malloc(MACBYTES + message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:162:9 [INFO] [stderr] | [INFO] [stderr] 162 | let mut message = secmem::malloc(ciphertext.len() - MACBYTES); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:216:9 [INFO] [stderr] | [INFO] [stderr] 216 | let mut ciphertext = secmem::malloc(message.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:217:9 [INFO] [stderr] | [INFO] [stderr] 217 | let mut mac = secmem::malloc(MACBYTES); [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:280:9 [INFO] [stderr] | [INFO] [stderr] 280 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:335:9 [INFO] [stderr] | [INFO] [stderr] 335 | let mut padded = secmem::malloc(ZEROBYTES + message.len()); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:345:9 [INFO] [stderr] | [INFO] [stderr] 345 | let mut ciphertext = secmem::malloc(padded.len()); [INFO] [stderr] | ----^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/authenc.rs:406:9 [INFO] [stderr] | [INFO] [stderr] 406 | let mut message = secmem::malloc(ciphertext.len()); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:286:17 [INFO] [stderr] | [INFO] [stderr] 286 | let mut output = secmem::malloc(HMACSHA256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:301:17 [INFO] [stderr] | [INFO] [stderr] 301 | let mut output = secmem::malloc(HMACSHA512_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/symmetrickey/hmacsha2.rs:316:17 [INFO] [stderr] | [INFO] [stderr] 316 | let mut output = secmem::malloc(HMACSHA512256_BYTES); [INFO] [stderr] | ----^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:112:9 [INFO] [stderr] | [INFO] [stderr] 112 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/crypto/utils/secmem.rs:191:9 [INFO] [stderr] | [INFO] [stderr] 191 | let mut buf = &mut bufvec[..]; [INFO] [stderr] | ----^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'std::sync::ONCE_INIT': the `new` function is now preferred [INFO] [stderr] --> benches/lib.rs:6:22 [INFO] [stderr] | [INFO] [stderr] 6 | use std::sync::{Once,ONCE_INIT}; [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'std::sync::ONCE_INIT': the `new` function is now preferred [INFO] [stderr] --> benches/lib.rs:8:22 [INFO] [stderr] | [INFO] [stderr] 8 | static START: Once = ONCE_INIT; [INFO] [stderr] | ^^^^^^^^^ help: replace the use of the deprecated item: `Once::new()` [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'std::sync::ONCE_INIT': the `new` function is now preferred [INFO] [stderr] --> tests/lib.rs:5:22 [INFO] [stderr] | [INFO] [stderr] 5 | use std::sync::{Once,ONCE_INIT}; [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'std::sync::ONCE_INIT': the `new` function is now preferred [INFO] [stderr] --> tests/lib.rs:7:22 [INFO] [stderr] | [INFO] [stderr] 7 | static START: Once = ONCE_INIT; [INFO] [stderr] | ^^^^^^^^^ help: replace the use of the deprecated item: `Once::new()` [INFO] [stderr] [INFO] [stderr] warning: constant item is never used: `TEST_MULTI_MESSAGE` [INFO] [stderr] --> benches/crypto/symmetrickey/hmacsha2.rs:7:1 [INFO] [stderr] | [INFO] [stderr] 7 | const TEST_MULTI_MESSAGE: &'static [u8] = b"testtest"; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(dead_code)]` on by default [INFO] [stderr] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 4.70s [INFO] running `"docker" "inspect" "c67a8e7d862822983856235b6f506b97a5f98277d71a1687ba44af25c49acf24"` [INFO] running `"docker" "rm" "-f" "c67a8e7d862822983856235b6f506b97a5f98277d71a1687ba44af25c49acf24"` [INFO] [stdout] c67a8e7d862822983856235b6f506b97a5f98277d71a1687ba44af25c49acf24