chacha20 0.5.0

The ChaCha20 stream cipher (RFC 8439) implemented in pure Rust using traits from the RustCrypto stream-cipher crate, with optional architecture-specific hardware acceleration (AVX2, SSE2). Additionally provides the ChaCha8, ChaCha12, and XChaCha20 stream ciphers, and also optional rand_core-compatible RNGs based on those ciphers.
Documentation
Build #285803 2020-08-25T15:27:34.526700+00:00
# rustc version
rustc 1.47.0-nightly (f44c6e4e2 2020-08-24)# docs.rs version
docsrs 0.6.0 (72dbbed 2020-08-22)# build log
[INFO] running `Command { std: "docker" "create" "-v" "/home/cratesfyi/workspace/builds/chacha20-0.5.0/target:/opt/rustwide/target:rw,Z" "-v" "/home/cratesfyi/workspace/builds/chacha20-0.5.0/source:/opt/rustwide/workdir:ro,Z" "-v" "/home/cratesfyi/workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/home/cratesfyi/workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "RUSTFLAGS=" "-e" "RUSTDOCFLAGS=-Z unstable-options --static-root-path / --cap-lints warn --cfg docsrs --extern-html-root-url stream_cipher=https://docs.rs/stream-cipher/0.7.1 --extern-html-root-url hex_literal=https://docs.rs/hex-literal/0.2.1 --resource-suffix -20200824-1.47.0-nightly-f44c6e4e2" "-e" "DOCS_RS=1" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "3221225472" "--cpus" "2" "--user" "1001:1001" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+nightly" "doc" "--lib" "--no-deps" "-j2" "--all-features", kill_on_drop: false }`
[INFO] [stdout] 83b5f7578f79be5b60ee34ed6c6e624f156d37e73ef154be332789bcd292f710
[INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap.
[INFO] running `Command { std: "docker" "start" "-a" "83b5f7578f79be5b60ee34ed6c6e624f156d37e73ef154be332789bcd292f710", kill_on_drop: false }`
[INFO] [stderr] /opt/crates-build-env/entrypoint.sh: line 7: /etc/hosts: Permission denied
[INFO] [stderr]    Compiling version_check v0.9.2
[INFO] [stderr]    Compiling typenum v1.12.0
[INFO] [stderr]     Checking blobby v0.3.0
[INFO] [stderr]     Checking rand_core v0.5.1
[INFO] [stderr]     Checking zeroize v1.1.0
[INFO] [stderr]    Compiling generic-array v0.14.4
[INFO] [stderr]     Checking block-cipher v0.8.0
[INFO] [stderr]     Checking stream-cipher v0.7.1
[INFO] [stderr]  Documenting chacha20 v0.5.0 (/opt/rustwide/workdir)
[INFO] [stderr] warning: unresolved link to `GenericArray`
[INFO] [stderr]   --> src/cipher.rs:32:34
[INFO] [stderr]    |
[INFO] [stderr] 32 | /// Implemented as an alias for [`GenericArray`].
[INFO] [stderr]    |                                  ^^^^^^^^^^^^^^ unresolved link
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(broken_intra_doc_links)]` on by default
[INFO] [stderr]    = help: to escape `[` and `]` characters, add '\' before them like `\[` or `\]`
[INFO] [stderr] 
[INFO] [stderr] warning: unresolved link to `GenericArray`
[INFO] [stderr]   --> src/cipher.rs:39:34
[INFO] [stderr]    |
[INFO] [stderr] 39 | /// Implemented as an alias for [`GenericArray`].
[INFO] [stderr]    |                                  ^^^^^^^^^^^^^^ unresolved link
[INFO] [stderr]    |
[INFO] [stderr]    = help: to escape `[` and `]` characters, add '\' before them like `\[` or `\]`
[INFO] [stderr] 
[INFO] [stderr] warning: unresolved link to `GenericArray`
[INFO] [stderr]   --> src/cipher.rs:32:34
[INFO] [stderr]    |
[INFO] [stderr] 32 | /// Implemented as an alias for [`GenericArray`].
[INFO] [stderr]    |                                  ^^^^^^^^^^^^^^ unresolved link
[INFO] [stderr]    |
[INFO] [stderr]    = help: to escape `[` and `]` characters, add '\' before them like `\[` or `\]`
[INFO] [stderr] 
[INFO] [stderr] warning: 3 warnings emitted
[INFO] [stderr] 
[INFO] [stderr]     Finished dev [unoptimized + debuginfo] target(s) in 4.46s
[INFO] running `Command { std: "docker" "inspect" "83b5f7578f79be5b60ee34ed6c6e624f156d37e73ef154be332789bcd292f710", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "83b5f7578f79be5b60ee34ed6c6e624f156d37e73ef154be332789bcd292f710", kill_on_drop: false }`
[INFO] [stdout] 83b5f7578f79be5b60ee34ed6c6e624f156d37e73ef154be332789bcd292f710