Build Information
Failed to build Crypto, reference 3.4.1 (105c2f
), with Swift 6.1 for Linux on 25 Apr 2025 22:41:39 UTC.
Build Command
bash -c docker run --pull=always --rm -v "checkouts-4609320-0":/host -w "$PWD" registry.gitlab.com/finestructure/spi-images:basic-6.1-latest swift build --triple x86_64-unknown-linux-gnu 2>&1
Build Log
========================================
RunAll
========================================
Builder version: 4.61.0
Interrupt handler set up.
========================================
Checkout
========================================
Clone URL: https://github.com/vapor/open-crypto.git
Reference: 3.4.1
Initialized empty Git repository in /host/spi-builder-workspace/.git/
hint: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint:
hint: git config --global init.defaultBranch <name>
hint:
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint:
hint: git branch -m <name>
From https://github.com/vapor/open-crypto
* tag 3.4.1 -> FETCH_HEAD
HEAD is now at 105c2f8 fix openssl 1.0 / 1.1 error
Cloned https://github.com/vapor/open-crypto.git
Revision (git rev-parse @):
105c2f875588bf40dd24c00cef3644bf8e327770
SUCCESS checkout https://github.com/vapor/open-crypto.git at 3.4.1
========================================
Build
========================================
Selected platform: linux
Swift version: 6.1
Building package at path: $PWD
https://github.com/vapor/open-crypto.git
https://github.com/vapor/open-crypto.git
WARNING: environment variable SUPPRESS_SWIFT_6_FLAGS is not set
{
"dependencies" : [
{
"identity" : "core",
"requirement" : {
"range" : [
{
"lower_bound" : "3.0.0",
"upper_bound" : "4.0.0"
}
]
},
"type" : "sourceControl",
"url" : "https://github.com/vapor/core.git"
},
{
"identity" : "swift-nio-ssl-support",
"requirement" : {
"range" : [
{
"lower_bound" : "1.0.0",
"upper_bound" : "2.0.0"
}
]
},
"type" : "sourceControl",
"url" : "https://github.com/apple/swift-nio-ssl-support.git"
}
],
"manifest_display_name" : "Crypto",
"name" : "Crypto",
"path" : "/host/spi-builder-workspace",
"platforms" : [
],
"products" : [
{
"name" : "Crypto",
"targets" : [
"Crypto"
],
"type" : {
"library" : [
"automatic"
]
}
},
{
"name" : "Random",
"targets" : [
"Random"
],
"type" : {
"library" : [
"automatic"
]
}
}
],
"targets" : [
{
"c99name" : "RandomTests",
"module_type" : "SwiftTarget",
"name" : "RandomTests",
"path" : "Tests/RandomTests",
"sources" : [
"RandomTests.swift"
],
"target_dependencies" : [
"Random"
],
"type" : "test"
},
{
"c99name" : "Random",
"module_type" : "SwiftTarget",
"name" : "Random",
"path" : "Sources/Random",
"product_dependencies" : [
"Bits"
],
"product_memberships" : [
"Crypto",
"Random"
],
"sources" : [
"Array+Random.swift",
"OSRandom.swift",
"RandomProtocol.swift",
"URandom.swift"
],
"type" : "library"
},
{
"c99name" : "CryptoTests",
"module_type" : "SwiftTarget",
"name" : "CryptoTests",
"path" : "Tests/CryptoTests",
"sources" : [
"BCryptTests.swift",
"CipherTests.swift",
"MD5Tests.swift",
"OTPTests.swift",
"RSATests.swift",
"SHA1Tests.swift",
"SHA2Tests.swift"
],
"target_dependencies" : [
"Crypto"
],
"type" : "test"
},
{
"c99name" : "Crypto",
"module_type" : "SwiftTarget",
"name" : "Crypto",
"path" : "Sources/Crypto",
"product_dependencies" : [
"Async",
"Bits",
"Core",
"COperatingSystem",
"Debugging"
],
"product_memberships" : [
"Crypto"
],
"sources" : [
"BCrypt/BCryptDigest.swift",
"Cipher/AuthenticatedCipher.swift",
"Cipher/AuthenticatedCipherAlgorithm.swift",
"Cipher/Cipher.swift",
"Cipher/CipherAlgorithm.swift",
"Cipher/OpenSSLCipherAlgorithm.swift",
"Cipher/OpenSSLStreamCipher.swift",
"Digest/Digest.swift",
"Digest/DigestAlgorithm.swift",
"MAC/HMAC.swift",
"MAC/OTP.swift",
"RSA/RSA.swift",
"RSA/RSAKey.swift",
"RSA/RSAPadding.swift",
"Random/CryptoRandom.swift",
"Utilities/Base32.swift",
"Utilities/CryptoError.swift",
"Utilities/Deprecated.swift",
"Utilities/Exports.swift"
],
"target_dependencies" : [
"CBase32",
"CBcrypt",
"CCryptoOpenSSL",
"Random"
],
"type" : "library"
},
{
"c99name" : "CCryptoOpenSSL",
"module_type" : "ClangTarget",
"name" : "CCryptoOpenSSL",
"path" : "Sources/CCryptoOpenSSL",
"product_memberships" : [
"Crypto"
],
"sources" : [
"shim.c"
],
"type" : "library"
},
{
"c99name" : "CBcrypt",
"module_type" : "ClangTarget",
"name" : "CBcrypt",
"path" : "Sources/CBcrypt",
"product_memberships" : [
"Crypto"
],
"sources" : [
"bcrypt.c",
"blf.c"
],
"type" : "library"
},
{
"c99name" : "CBase32",
"module_type" : "ClangTarget",
"name" : "CBase32",
"path" : "Sources/CBase32",
"product_memberships" : [
"Crypto"
],
"sources" : [
"base32.c"
],
"type" : "library"
}
],
"tools_version" : "4.0"
}
Running build ...
bash -c docker run --pull=always --rm -v "checkouts-4609320-0":/host -w "$PWD" registry.gitlab.com/finestructure/spi-images:basic-6.1-latest swift build --triple x86_64-unknown-linux-gnu -Xswiftc -Xfrontend -Xswiftc -stats-output-dir -Xswiftc -Xfrontend -Xswiftc .stats -Xswiftc -strict-concurrency=complete -Xswiftc -enable-upcoming-feature -Xswiftc StrictConcurrency -Xswiftc -enable-upcoming-feature -Xswiftc DisableOutwardActorInference -Xswiftc -enable-upcoming-feature -Xswiftc GlobalActorIsolatedTypesUsability -Xswiftc -enable-upcoming-feature -Xswiftc InferSendableFromCaptures 2>&1
basic-6.1-latest: Pulling from finestructure/spi-images
Digest: sha256:3bdcac04179f4ed3e5b8e9dbd6e74bbf5ebc0f4fde48bbaad7d1e5c757e65bcb
Status: Image is up to date for registry.gitlab.com/finestructure/spi-images:basic-6.1-latest
Fetching https://github.com/vapor/core.git
Fetching https://github.com/apple/swift-nio-ssl-support.git
[1/16] Fetching swift-nio-ssl-support
[17/20159] Fetching swift-nio-ssl-support, core
Fetched https://github.com/apple/swift-nio-ssl-support.git from cache (0.31s)
[2216/20143] Fetching core
Fetched https://github.com/vapor/core.git from cache (1.36s)
Computing version for https://github.com/apple/swift-nio-ssl-support.git
Computed https://github.com/apple/swift-nio-ssl-support.git at 1.0.0 (2.35s)
Computing version for https://github.com/vapor/core.git
Computed https://github.com/vapor/core.git at 3.10.1 (0.93s)
Fetching https://github.com/apple/swift-nio.git
[1/75431] Fetching swift-nio
Fetched https://github.com/apple/swift-nio.git from cache (8.77s)
Computing version for https://github.com/apple/swift-nio.git
Computed https://github.com/apple/swift-nio.git at 1.14.4 (9.72s)
Fetching https://github.com/apple/swift-nio-zlib-support.git
[1/15] Fetching swift-nio-zlib-support
Fetched https://github.com/apple/swift-nio-zlib-support.git from cache (1.31s)
Computing version for https://github.com/apple/swift-nio-zlib-support.git
Computed https://github.com/apple/swift-nio-zlib-support.git at 1.0.0 (2.20s)
Creating working copy for https://github.com/vapor/core.git
Working copy of https://github.com/vapor/core.git resolved at 3.10.1
Creating working copy for https://github.com/apple/swift-nio.git
Working copy of https://github.com/apple/swift-nio.git resolved at 1.14.4
Creating working copy for https://github.com/apple/swift-nio-zlib-support.git
Working copy of https://github.com/apple/swift-nio-zlib-support.git resolved at 1.0.0
Creating working copy for https://github.com/apple/swift-nio-ssl-support.git
Working copy of https://github.com/apple/swift-nio-ssl-support.git resolved at 1.0.0
warning: 'swift-nio-ssl-support': ignoring declared target(s) 'swift-nio-ssl-support' in the system package
warning: 'swift-nio-zlib-support': ignoring declared target(s) 'swift-nio-zlib-support' in the system package
warning: 'spi-builder-workspace': dependency 'swift-nio-ssl-support' is not used by any target
Building for debugging...
[0/21] Write sources
[9/21] Compiling CNIOLinux ifaddrs-android.c
[10/21] Compiling CNIODarwin shim.c
[11/21] Compiling CNIOSHA1 c_nio_sha1.c
[11/21] Write sources
[14/21] Compiling CNIOLinux shim.c
[15/21] Compiling CBase32 base32.c
[16/21] Compiling CBcrypt blf.c
[17/21] Compiling CBcrypt bcrypt.c
[18/21] Write swift-version-24593BA9C3E375BF.txt
[19/21] Compiling CCryptoOpenSSL shim.c
[20/30] Compiling c-atomics.c
[22/33] Compiling Debugging SourceLocation.swift
[23/33] Compiling NIOPriorityQueue PriorityQueue.swift
[24/33] Emitting module COperatingSystem
[25/33] Compiling COperatingSystem libc.swift
[26/34] Emitting module NIOConcurrencyHelpers
[27/34] Compiling NIOConcurrencyHelpers lock.swift
[28/34] Compiling NIOConcurrencyHelpers atomics.swift
[31/35] Compiling Debugging Demangler.swift
[32/35] Compiling NIOPriorityQueue Heap.swift
[33/35] Emitting module NIOPriorityQueue
[35/36] Emitting module Debugging
[36/36] Compiling Debugging Debuggable.swift
[38/87] Compiling NIO ByteBuffer-int.swift
[39/87] Compiling NIO ByteBuffer-views.swift
[40/87] Compiling NIO Channel.swift
[41/87] Compiling NIO ChannelHandler.swift
[42/87] Compiling NIO ChannelHandlers.swift
[43/87] Compiling NIO ChannelInvoker.swift
[44/87] Compiling NIO ChannelOption.swift
[45/93] Emitting module NIO
[46/93] Compiling NIO Heap.swift
[47/93] Compiling NIO IO.swift
[48/93] Compiling NIO IOData.swift
[49/93] Compiling NIO IntegerTypes.swift
[50/93] Compiling NIO Interfaces.swift
[51/93] Compiling NIO Linux.swift
[52/93] Compiling NIO LinuxCPUSet.swift
[53/93] Compiling NIO RecvByteBufferAllocator.swift
[54/93] Compiling NIO Resolver.swift
[55/93] Compiling NIO Selectable.swift
[56/93] Compiling NIO Selector.swift
[57/93] Compiling NIO ServerSocket.swift
[58/93] Compiling NIO Socket.swift
[59/93] Compiling NIO SocketAddresses.swift
[60/93] Compiling NIO MarkedCircularBuffer.swift
[61/93] Compiling NIO MulticastChannel.swift
[62/93] Compiling NIO NIOAny.swift
[63/93] Compiling NIO NonBlockingFileIO.swift
[64/93] Compiling NIO PendingDatagramWritesManager.swift
[65/93] Compiling NIO PendingWritesManager.swift
[66/93] Compiling NIO PriorityQueue.swift
[67/93] Compiling NIO EventLoop.swift
[68/93] Compiling NIO EventLoopFuture.swift
[69/93] Compiling NIO FileDescriptor.swift
[70/93] Compiling NIO FileHandle.swift
[71/93] Compiling NIO FileRegion.swift
[72/93] Compiling NIO GetaddrinfoResolver.swift
[73/93] Compiling NIO HappyEyeballs.swift
[74/93] Compiling NIO ChannelPipeline.swift
[75/93] Compiling NIO CircularBuffer.swift
[76/93] Compiling NIO Codec.swift
[77/93] Compiling NIO CompositeError.swift
[78/93] Compiling NIO ContiguousCollection.swift
[79/93] Compiling NIO DeadChannel.swift
[80/93] Compiling NIO Embedded.swift
[81/93] Compiling NIO SocketChannel.swift
[82/93] Compiling NIO SocketOptionProvider.swift
[83/93] Compiling NIO System.swift
[84/93] Compiling NIO Thread.swift
[85/93] Compiling NIO TypeAssistedChannelHandler.swift
[86/93] Compiling NIO Utilities.swift
[87/93] Compiling NIO AddressedEnvelope.swift
[88/93] Compiling NIO BaseSocket.swift
[89/93] Compiling NIO BaseSocketChannel.swift
[90/93] Compiling NIO BlockingIOThreadPool.swift
[91/93] Compiling NIO Bootstrap.swift
[92/93] Compiling NIO ByteBuffer-aux.swift
[93/93] Compiling NIO ByteBuffer-core.swift
[95/123] Compiling Async Collection+Future.swift
[96/123] Compiling Async Deprecated.swift
[97/124] Compiling Async Future+Flatten.swift
[98/124] Compiling Async Future+Global.swift
[99/124] Compiling Async Exports.swift
[100/124] Compiling Async Future+DoCatch.swift
[101/124] Compiling Bits Bytes.swift
[102/125] Emitting module NIOFoundationCompat
[103/125] Compiling NIOFoundationCompat ByteBuffer-foundation.swift
[104/126] Emitting module Async
[105/126] Compiling Async Async+NIO.swift
[106/126] Compiling Async AsyncError.swift
[107/126] Emitting module Bits
[108/126] Compiling Bits Data+Bytes.swift
[109/126] Compiling Bits Data+Strings.swift
[119/126] Compiling Bits Deprecated.swift
[120/126] Compiling Async Worker.swift
[121/127] Compiling Async Future+Map.swift
[122/127] Compiling Async Future+Transform.swift
[123/127] Compiling Async Future+Variadic.swift
[124/127] Compiling Async Future+Void.swift
[125/127] Compiling Async FutureType.swift
[126/127] Compiling Async QueueHandler.swift
[129/156] Compiling Random URandom.swift
[130/156] Compiling Random RandomProtocol.swift
[131/156] Compiling Random OSRandom.swift
[132/156] Compiling Random Array+Random.swift
[133/156] Emitting module Random
[135/157] Compiling Core NotFound.swift
[136/157] Compiling Core OptionalType.swift
[137/157] Compiling Core Process+Execute.swift
[138/160] Compiling Core Future+Unwrap.swift
[139/160] Compiling Core FutureEncoder.swift
[140/160] Compiling Core HeaderValue.swift
[141/160] Compiling Core Reflectable.swift
[142/160] Compiling Core String+Utilities.swift
[143/160] Compiling Core Thread+Async.swift
[144/160] Emitting module Core
[145/160] Compiling Core DirectoryConfig.swift
[146/160] Compiling Core Exports.swift
[147/160] Compiling Core File.swift
[148/160] Compiling Core BasicKey.swift
[149/160] Compiling Core CaseInsensitiveString.swift
[150/160] Compiling Core Decodable+Reflectable.swift
[151/160] Compiling Core ReflectionDecodable.swift
[152/160] Compiling Core ReflectionDecoders.swift
[153/160] Compiling Core CoreError.swift
[154/160] Compiling Core Data+Base64URL.swift
[155/160] Compiling Core Data+Hex.swift
[156/160] Compiling Core DataCoders.swift
[157/160] Compiling Core Deprecated.swift
[158/160] Compiling Core LosslessDataConvertible.swift
[159/160] Compiling Core MediaType.swift
[160/160] Compiling Core NestedData.swift
[162/179] Emitting module Crypto
/host/spi-builder-workspace/Sources/Crypto/Cipher/AuthenticatedCipherAlgorithm.swift:29:23: warning: static property 'aes256gcm' is not concurrency-safe because non-'Sendable' type 'AuthenticatedCipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `AuthenticatedCipherAlgorithm` such as `AuthenticatedCipherAlgorithm.named(_:)`
8 | public final class AuthenticatedCipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'AuthenticatedCipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
27 | /// AES-256 GCM cipher. This is the recommended cipher.
28 | /// See the global `AES256GCM` constant on usage.
29 | public static let aes256gcm: AuthenticatedCipherAlgorithm = .init(c: EVP_aes_256_gcm().convert())
| |- warning: static property 'aes256gcm' is not concurrency-safe because non-'Sendable' type 'AuthenticatedCipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256gcm' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
30 |
31 | /// OpenSSL `EVP_CIPHER` context.
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:29:23: warning: static property 'aes128ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
27 | /// AES-128 ECB cipher. Deprecated (see https://github.com/vapor/crypto/issues/59).
28 | @available(*, deprecated, message: "Stream encryption in ECB mode is unsafe (see https://github.com/vapor/crypto/issues/59). Use AES256 in GCM mode instead.")
29 | public static let aes128ecb: CipherAlgorithm = .init(c: EVP_aes_128_ecb().convert())
| |- warning: static property 'aes128ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes128ecb' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
30 |
31 | /// AES-256 ECB cipher. Deprecated (see https://github.com/vapor/crypto/issues/59).
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:33:23: warning: static property 'aes256ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
31 | /// AES-256 ECB cipher. Deprecated (see https://github.com/vapor/crypto/issues/59).
32 | @available(*, deprecated, message: "Stream encryption in ECB mode is unsafe (see https://github.com/vapor/crypto/issues/59). Use AES256 in GCM mode instead.")
33 | public static let aes256ecb: CipherAlgorithm = .init(c: EVP_aes_256_ecb().convert())
| |- warning: static property 'aes256ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256ecb' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
34 |
35 | /// AES-256 CBC cipher.
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:37:23: warning: static property 'aes256cbc' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
35 | /// AES-256 CBC cipher.
36 | /// Only use this if you know what you are doing; use AES-256 GCM otherwise (see https://github.com/vapor/crypto/issues/59).
37 | public static let aes256cbc: CipherAlgorithm = .init(c: EVP_aes_256_cbc().convert())
| |- warning: static property 'aes256cbc' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256cbc' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
38 |
39 | /// AES-256 CFB cipher. May not be available on all platforms.
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:41:23: warning: static property 'aes256cfb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
39 | /// AES-256 CFB cipher. May not be available on all platforms.
40 | /// Only use this if you know what you are doing; use AES-256 GCM otherwise (see https://github.com/vapor/crypto/issues/59).
41 | public static let aes256cfb: CipherAlgorithm = .init(c: EVP_aes_256_cfb128().convert())
| |- warning: static property 'aes256cfb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256cfb' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
42 |
43 | /// OpenSSL `EVP_CIPHER` context.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:47:23: warning: static property 'md4' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
45 | ///
46 | /// https://en.wikipedia.org/wiki/MD4
47 | public static let md4: DigestAlgorithm = .init(c: EVP_md4().convert())
| |- warning: static property 'md4' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'md4' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
48 |
49 | /// MD5 digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:52:23: warning: static property 'md5' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
50 | ///
51 | /// https://en.wikipedia.org/wiki/MD5
52 | public static let md5: DigestAlgorithm = .init(c: EVP_md5().convert())
| |- warning: static property 'md5' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'md5' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
53 |
54 | /// SHA-1 digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:57:23: warning: static property 'sha1' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
55 | ///
56 | /// https://en.wikipedia.org/wiki/SHA-1
57 | public static let sha1: DigestAlgorithm = .init(c: EVP_sha1().convert())
| |- warning: static property 'sha1' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha1' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
58 |
59 | /// SHA-224 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:62:23: warning: static property 'sha224' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
60 | ///
61 | /// https://en.wikipedia.org/wiki/SHA-2
62 | public static let sha224: DigestAlgorithm = .init(c: EVP_sha224().convert())
| |- warning: static property 'sha224' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha224' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
63 |
64 | /// SHA-256 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:67:23: warning: static property 'sha256' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
65 | ///
66 | /// https://en.wikipedia.org/wiki/SHA-2
67 | public static let sha256: DigestAlgorithm = .init(c: EVP_sha256().convert())
| |- warning: static property 'sha256' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha256' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
68 |
69 | /// SHA-384 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:72:23: warning: static property 'sha384' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
70 | ///
71 | /// https://en.wikipedia.org/wiki/SHA-2
72 | public static let sha384: DigestAlgorithm = .init(c: EVP_sha384().convert())
| |- warning: static property 'sha384' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha384' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
73 |
74 | /// SHA-512 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:77:23: warning: static property 'sha512' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
75 | ///
76 | /// https://en.wikipedia.org/wiki/SHA-2
77 | public static let sha512: DigestAlgorithm = .init(c: EVP_sha512().convert())
| |- warning: static property 'sha512' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha512' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
78 | }
79 |
[163/181] Compiling Crypto OpenSSLStreamCipher.swift
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLStreamCipher.swift:71:25: error: cannot find 'EVP_CIPHER_key_length' in scope
69 | let iv = iv?.convertToData()
70 |
71 | let keyLength = EVP_CIPHER_key_length(algorithm.c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
72 | guard keyLength == key.count else {
73 | throw CryptoError(identifier: "cipherKeySize", reason: "Invalid cipher key length \(key.count) != \(keyLength).")
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLStreamCipher.swift:76:24: error: cannot find 'EVP_CIPHER_iv_length' in scope
74 | }
75 |
76 | let ivLength = EVP_CIPHER_iv_length(algorithm.c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
77 | guard (ivLength == 0 && (iv == nil || iv?.count == 0)) || (iv != nil && iv?.count == Int(ivLength)) else {
78 | throw CryptoError(identifier: "cipherIVSize", reason: "Invalid cipher IV length \(iv?.count ?? 0) != \(ivLength).")
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:47:23: warning: static property 'md4' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
45 | ///
46 | /// https://en.wikipedia.org/wiki/MD4
47 | public static let md4: DigestAlgorithm = .init(c: EVP_md4().convert())
| |- warning: static property 'md4' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'md4' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
48 |
49 | /// MD5 digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:52:23: warning: static property 'md5' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
50 | ///
51 | /// https://en.wikipedia.org/wiki/MD5
52 | public static let md5: DigestAlgorithm = .init(c: EVP_md5().convert())
| |- warning: static property 'md5' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'md5' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
53 |
54 | /// SHA-1 digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:57:23: warning: static property 'sha1' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
55 | ///
56 | /// https://en.wikipedia.org/wiki/SHA-1
57 | public static let sha1: DigestAlgorithm = .init(c: EVP_sha1().convert())
| |- warning: static property 'sha1' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha1' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
58 |
59 | /// SHA-224 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:62:23: warning: static property 'sha224' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
60 | ///
61 | /// https://en.wikipedia.org/wiki/SHA-2
62 | public static let sha224: DigestAlgorithm = .init(c: EVP_sha224().convert())
| |- warning: static property 'sha224' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha224' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
63 |
64 | /// SHA-256 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:67:23: warning: static property 'sha256' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
65 | ///
66 | /// https://en.wikipedia.org/wiki/SHA-2
67 | public static let sha256: DigestAlgorithm = .init(c: EVP_sha256().convert())
| |- warning: static property 'sha256' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha256' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
68 |
69 | /// SHA-384 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:72:23: warning: static property 'sha384' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
70 | ///
71 | /// https://en.wikipedia.org/wiki/SHA-2
72 | public static let sha384: DigestAlgorithm = .init(c: EVP_sha384().convert())
| |- warning: static property 'sha384' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha384' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
73 |
74 | /// SHA-512 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:77:23: warning: static property 'sha512' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
75 | ///
76 | /// https://en.wikipedia.org/wiki/SHA-2
77 | public static let sha512: DigestAlgorithm = .init(c: EVP_sha512().convert())
| |- warning: static property 'sha512' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha512' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
78 | }
79 |
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:41:16: error: cannot find 'EVP_MD_type' in scope
39 | /// Returns the OpenSSL NID type for this algorithm.
40 | public var type: Int32 {
41 | return EVP_MD_type(c.convert())
| `- error: cannot find 'EVP_MD_type' in scope
42 | }
43 |
[164/181] Compiling Crypto Digest.swift
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLStreamCipher.swift:71:25: error: cannot find 'EVP_CIPHER_key_length' in scope
69 | let iv = iv?.convertToData()
70 |
71 | let keyLength = EVP_CIPHER_key_length(algorithm.c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
72 | guard keyLength == key.count else {
73 | throw CryptoError(identifier: "cipherKeySize", reason: "Invalid cipher key length \(key.count) != \(keyLength).")
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLStreamCipher.swift:76:24: error: cannot find 'EVP_CIPHER_iv_length' in scope
74 | }
75 |
76 | let ivLength = EVP_CIPHER_iv_length(algorithm.c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
77 | guard (ivLength == 0 && (iv == nil || iv?.count == 0)) || (iv != nil && iv?.count == Int(ivLength)) else {
78 | throw CryptoError(identifier: "cipherIVSize", reason: "Invalid cipher IV length \(iv?.count ?? 0) != \(ivLength).")
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:47:23: warning: static property 'md4' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
45 | ///
46 | /// https://en.wikipedia.org/wiki/MD4
47 | public static let md4: DigestAlgorithm = .init(c: EVP_md4().convert())
| |- warning: static property 'md4' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'md4' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
48 |
49 | /// MD5 digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:52:23: warning: static property 'md5' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
50 | ///
51 | /// https://en.wikipedia.org/wiki/MD5
52 | public static let md5: DigestAlgorithm = .init(c: EVP_md5().convert())
| |- warning: static property 'md5' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'md5' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
53 |
54 | /// SHA-1 digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:57:23: warning: static property 'sha1' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
55 | ///
56 | /// https://en.wikipedia.org/wiki/SHA-1
57 | public static let sha1: DigestAlgorithm = .init(c: EVP_sha1().convert())
| |- warning: static property 'sha1' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha1' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
58 |
59 | /// SHA-224 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:62:23: warning: static property 'sha224' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
60 | ///
61 | /// https://en.wikipedia.org/wiki/SHA-2
62 | public static let sha224: DigestAlgorithm = .init(c: EVP_sha224().convert())
| |- warning: static property 'sha224' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha224' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
63 |
64 | /// SHA-256 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:67:23: warning: static property 'sha256' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
65 | ///
66 | /// https://en.wikipedia.org/wiki/SHA-2
67 | public static let sha256: DigestAlgorithm = .init(c: EVP_sha256().convert())
| |- warning: static property 'sha256' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha256' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
68 |
69 | /// SHA-384 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:72:23: warning: static property 'sha384' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
70 | ///
71 | /// https://en.wikipedia.org/wiki/SHA-2
72 | public static let sha384: DigestAlgorithm = .init(c: EVP_sha384().convert())
| |- warning: static property 'sha384' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha384' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
73 |
74 | /// SHA-512 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:77:23: warning: static property 'sha512' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
75 | ///
76 | /// https://en.wikipedia.org/wiki/SHA-2
77 | public static let sha512: DigestAlgorithm = .init(c: EVP_sha512().convert())
| |- warning: static property 'sha512' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha512' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
78 | }
79 |
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:41:16: error: cannot find 'EVP_MD_type' in scope
39 | /// Returns the OpenSSL NID type for this algorithm.
40 | public var type: Int32 {
41 | return EVP_MD_type(c.convert())
| `- error: cannot find 'EVP_MD_type' in scope
42 | }
43 |
[165/181] Compiling Crypto DigestAlgorithm.swift
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLStreamCipher.swift:71:25: error: cannot find 'EVP_CIPHER_key_length' in scope
69 | let iv = iv?.convertToData()
70 |
71 | let keyLength = EVP_CIPHER_key_length(algorithm.c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
72 | guard keyLength == key.count else {
73 | throw CryptoError(identifier: "cipherKeySize", reason: "Invalid cipher key length \(key.count) != \(keyLength).")
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLStreamCipher.swift:76:24: error: cannot find 'EVP_CIPHER_iv_length' in scope
74 | }
75 |
76 | let ivLength = EVP_CIPHER_iv_length(algorithm.c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
77 | guard (ivLength == 0 && (iv == nil || iv?.count == 0)) || (iv != nil && iv?.count == Int(ivLength)) else {
78 | throw CryptoError(identifier: "cipherIVSize", reason: "Invalid cipher IV length \(iv?.count ?? 0) != \(ivLength).")
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:47:23: warning: static property 'md4' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
45 | ///
46 | /// https://en.wikipedia.org/wiki/MD4
47 | public static let md4: DigestAlgorithm = .init(c: EVP_md4().convert())
| |- warning: static property 'md4' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'md4' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
48 |
49 | /// MD5 digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:52:23: warning: static property 'md5' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
50 | ///
51 | /// https://en.wikipedia.org/wiki/MD5
52 | public static let md5: DigestAlgorithm = .init(c: EVP_md5().convert())
| |- warning: static property 'md5' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'md5' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
53 |
54 | /// SHA-1 digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:57:23: warning: static property 'sha1' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
55 | ///
56 | /// https://en.wikipedia.org/wiki/SHA-1
57 | public static let sha1: DigestAlgorithm = .init(c: EVP_sha1().convert())
| |- warning: static property 'sha1' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha1' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
58 |
59 | /// SHA-224 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:62:23: warning: static property 'sha224' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
60 | ///
61 | /// https://en.wikipedia.org/wiki/SHA-2
62 | public static let sha224: DigestAlgorithm = .init(c: EVP_sha224().convert())
| |- warning: static property 'sha224' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha224' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
63 |
64 | /// SHA-256 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:67:23: warning: static property 'sha256' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
65 | ///
66 | /// https://en.wikipedia.org/wiki/SHA-2
67 | public static let sha256: DigestAlgorithm = .init(c: EVP_sha256().convert())
| |- warning: static property 'sha256' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha256' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
68 |
69 | /// SHA-384 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:72:23: warning: static property 'sha384' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
70 | ///
71 | /// https://en.wikipedia.org/wiki/SHA-2
72 | public static let sha384: DigestAlgorithm = .init(c: EVP_sha384().convert())
| |- warning: static property 'sha384' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha384' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
73 |
74 | /// SHA-512 (SHA-2) digest.
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:77:23: warning: static property 'sha512' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
7 | /// https://en.wikipedia.org/wiki/Cryptographic_hash_function
8 | /// https://www.openssl.org/docs/man1.1.0/crypto/EVP_MD_CTX_free.html
9 | public final class DigestAlgorithm: Equatable {
| `- note: class 'DigestAlgorithm' does not conform to the 'Sendable' protocol
10 | /// Looks up a hash function algorithm by name (e.g., "sha256").
11 | /// Uses OpenSSL's `EVP_get_digestbyname` function.
:
75 | ///
76 | /// https://en.wikipedia.org/wiki/SHA-2
77 | public static let sha512: DigestAlgorithm = .init(c: EVP_sha512().convert())
| |- warning: static property 'sha512' is not concurrency-safe because non-'Sendable' type 'DigestAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'sha512' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
78 | }
79 |
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:41:16: error: cannot find 'EVP_MD_type' in scope
39 | /// Returns the OpenSSL NID type for this algorithm.
40 | public var type: Int32 {
41 | return EVP_MD_type(c.convert())
| `- error: cannot find 'EVP_MD_type' in scope
42 | }
43 |
[166/181] Compiling Crypto Deprecated.swift
[167/181] Compiling Crypto Exports.swift
[168/181] Compiling Crypto Base32.swift
/host/spi-builder-workspace/Sources/Crypto/Utilities/Base32.swift:17:13: warning: variable 'result' was never mutated; consider changing to 'let' constant
15 | public init?(base32Encoded: Data) {
16 | let maxSize = (base32Encoded.count * 5 + 4) / 8
17 | var result = UnsafeMutablePointer<UInt8>.allocate(capacity: maxSize)
| `- warning: variable 'result' was never mutated; consider changing to 'let' constant
18 | defer {
19 | result.deinitialize(count: maxSize)
/host/spi-builder-workspace/Sources/Crypto/Utilities/Base32.swift:38:13: warning: variable 'result' was never mutated; consider changing to 'let' constant
36 | public func base32EncodedData() -> Data {
37 | let maxSize = (count * 8 + 4) / 5
38 | var result = UnsafeMutablePointer<UInt8>.allocate(capacity: maxSize)
| `- warning: variable 'result' was never mutated; consider changing to 'let' constant
39 | defer {
40 | result.deinitialize(count: maxSize)
[169/181] Compiling Crypto CryptoError.swift
/host/spi-builder-workspace/Sources/Crypto/Utilities/Base32.swift:17:13: warning: variable 'result' was never mutated; consider changing to 'let' constant
15 | public init?(base32Encoded: Data) {
16 | let maxSize = (base32Encoded.count * 5 + 4) / 8
17 | var result = UnsafeMutablePointer<UInt8>.allocate(capacity: maxSize)
| `- warning: variable 'result' was never mutated; consider changing to 'let' constant
18 | defer {
19 | result.deinitialize(count: maxSize)
/host/spi-builder-workspace/Sources/Crypto/Utilities/Base32.swift:38:13: warning: variable 'result' was never mutated; consider changing to 'let' constant
36 | public func base32EncodedData() -> Data {
37 | let maxSize = (count * 8 + 4) / 5
38 | var result = UnsafeMutablePointer<UInt8>.allocate(capacity: maxSize)
| `- warning: variable 'result' was never mutated; consider changing to 'let' constant
39 | defer {
40 | result.deinitialize(count: maxSize)
[170/181] Compiling Crypto RSA.swift
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:73:24: warning: 'RSA_size' is deprecated
71 | var sig = Data(
72 | repeating: 0,
73 | count: Int(RSA_size(key.c.pointer.convert()))
| `- warning: 'RSA_size' is deprecated
74 | )
75 |
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:85:24: warning: 'RSA_sign' is deprecated
83 | let ret = input.withByteBuffer { inputBuffer in
84 | return sig.withMutableByteBuffer { sigBuffer in
85 | return RSA_sign(
| `- warning: 'RSA_sign' is deprecated
86 | algorithm.type,
87 | inputBuffer.baseAddress!,
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:125:24: warning: 'RSA_verify' is deprecated
123 | let result = input.withByteBuffer { inputBuffer in
124 | return signature.withByteBuffer { signatureBuffer in
125 | return RSA_verify(
| `- warning: 'RSA_verify' is deprecated
126 | algorithm.type,
127 | inputBuffer.baseAddress!,
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:153:17: warning: 'RSA_public_decrypt' is deprecated
151 | case .public:
152 | return try cipher(input, padding: padding, key: key) {
153 | RSA_public_decrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_public_decrypt' is deprecated
154 | }
155 | case .private:
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:157:17: warning: 'RSA_private_decrypt' is deprecated
155 | case .private:
156 | return try cipher(input, padding: padding, key: key) {
157 | RSA_private_decrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_private_decrypt' is deprecated
158 | }
159 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:176:17: warning: 'RSA_public_encrypt' is deprecated
174 | case .public:
175 | return try cipher(input, padding: padding, key: key) {
176 | RSA_public_encrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_public_encrypt' is deprecated
177 | }
178 | case .private:
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:180:17: warning: 'RSA_private_encrypt' is deprecated
178 | case .private:
179 | return try cipher(input, padding: padding, key: key) {
180 | RSA_private_encrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_private_encrypt' is deprecated
181 | }
182 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:193:42: warning: 'RSA_size' is deprecated
191 | /// Private cipher
192 | private static func cipher(_ input: LosslessDataConvertible, padding: RSAPadding, key: RSAKey, coder: RSAPkeySymmetricCoder) throws -> Data {
193 | var outputData = Data(count: Int(RSA_size(key.c.pointer.convert())))
| `- warning: 'RSA_size' is deprecated
194 |
195 | let outputLen = input.convertToData().withByteBuffer { inputBuffer in
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:72:25: warning: 'RSA_new()' is deprecated
70 | /// - throws: `CryptoError` if key generation fails.
71 | public static func components(n: String, e: String, d: String? = nil) throws -> RSAKey {
72 | guard let rsa = RSA_new() else {
| `- warning: 'RSA_new()' is deprecated
73 | throw CryptoError.openssl(identifier: "rsaNull", reason: "RSA key creation failed")
74 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:80:9: warning: 'RSA_set0_key' is deprecated
78 | let d = d.flatMap { parseBignum($0) }
79 |
80 | RSA_set0_key(rsa, n.convert(), e.convert(), d?.convert())
| `- warning: 'RSA_set0_key' is deprecated
81 | return try .init(type: d == nil ? .public : .private, key: CRSAKey(rsa.convert()))
82 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:156:25: warning: 'EVP_PKEY_get1_RSA' is deprecated
154 | defer { EVP_PKEY_free(pkey.convert()) }
155 |
156 | guard let rsa = EVP_PKEY_get1_RSA(pkey.convert()) else {
| `- warning: 'EVP_PKEY_get1_RSA' is deprecated
157 | throw CryptoError.openssl(identifier: "rsaPkeyGet1", reason: "RSA key creation failed")
158 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:162:14: warning: 'RSA_free' is deprecated
160 | }
161 |
162 | deinit { RSA_free(pointer.convert()) }
| `- warning: 'RSA_free' is deprecated
163 | }
164 |
[171/181] Compiling Crypto RSAKey.swift
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:73:24: warning: 'RSA_size' is deprecated
71 | var sig = Data(
72 | repeating: 0,
73 | count: Int(RSA_size(key.c.pointer.convert()))
| `- warning: 'RSA_size' is deprecated
74 | )
75 |
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:85:24: warning: 'RSA_sign' is deprecated
83 | let ret = input.withByteBuffer { inputBuffer in
84 | return sig.withMutableByteBuffer { sigBuffer in
85 | return RSA_sign(
| `- warning: 'RSA_sign' is deprecated
86 | algorithm.type,
87 | inputBuffer.baseAddress!,
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:125:24: warning: 'RSA_verify' is deprecated
123 | let result = input.withByteBuffer { inputBuffer in
124 | return signature.withByteBuffer { signatureBuffer in
125 | return RSA_verify(
| `- warning: 'RSA_verify' is deprecated
126 | algorithm.type,
127 | inputBuffer.baseAddress!,
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:153:17: warning: 'RSA_public_decrypt' is deprecated
151 | case .public:
152 | return try cipher(input, padding: padding, key: key) {
153 | RSA_public_decrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_public_decrypt' is deprecated
154 | }
155 | case .private:
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:157:17: warning: 'RSA_private_decrypt' is deprecated
155 | case .private:
156 | return try cipher(input, padding: padding, key: key) {
157 | RSA_private_decrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_private_decrypt' is deprecated
158 | }
159 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:176:17: warning: 'RSA_public_encrypt' is deprecated
174 | case .public:
175 | return try cipher(input, padding: padding, key: key) {
176 | RSA_public_encrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_public_encrypt' is deprecated
177 | }
178 | case .private:
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:180:17: warning: 'RSA_private_encrypt' is deprecated
178 | case .private:
179 | return try cipher(input, padding: padding, key: key) {
180 | RSA_private_encrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_private_encrypt' is deprecated
181 | }
182 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:193:42: warning: 'RSA_size' is deprecated
191 | /// Private cipher
192 | private static func cipher(_ input: LosslessDataConvertible, padding: RSAPadding, key: RSAKey, coder: RSAPkeySymmetricCoder) throws -> Data {
193 | var outputData = Data(count: Int(RSA_size(key.c.pointer.convert())))
| `- warning: 'RSA_size' is deprecated
194 |
195 | let outputLen = input.convertToData().withByteBuffer { inputBuffer in
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:72:25: warning: 'RSA_new()' is deprecated
70 | /// - throws: `CryptoError` if key generation fails.
71 | public static func components(n: String, e: String, d: String? = nil) throws -> RSAKey {
72 | guard let rsa = RSA_new() else {
| `- warning: 'RSA_new()' is deprecated
73 | throw CryptoError.openssl(identifier: "rsaNull", reason: "RSA key creation failed")
74 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:80:9: warning: 'RSA_set0_key' is deprecated
78 | let d = d.flatMap { parseBignum($0) }
79 |
80 | RSA_set0_key(rsa, n.convert(), e.convert(), d?.convert())
| `- warning: 'RSA_set0_key' is deprecated
81 | return try .init(type: d == nil ? .public : .private, key: CRSAKey(rsa.convert()))
82 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:156:25: warning: 'EVP_PKEY_get1_RSA' is deprecated
154 | defer { EVP_PKEY_free(pkey.convert()) }
155 |
156 | guard let rsa = EVP_PKEY_get1_RSA(pkey.convert()) else {
| `- warning: 'EVP_PKEY_get1_RSA' is deprecated
157 | throw CryptoError.openssl(identifier: "rsaPkeyGet1", reason: "RSA key creation failed")
158 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:162:14: warning: 'RSA_free' is deprecated
160 | }
161 |
162 | deinit { RSA_free(pointer.convert()) }
| `- warning: 'RSA_free' is deprecated
163 | }
164 |
[172/181] Compiling Crypto BCryptDigest.swift
/host/spi-builder-workspace/Sources/Crypto/Cipher/AuthenticatedCipherAlgorithm.swift:29:23: warning: static property 'aes256gcm' is not concurrency-safe because non-'Sendable' type 'AuthenticatedCipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `AuthenticatedCipherAlgorithm` such as `AuthenticatedCipherAlgorithm.named(_:)`
8 | public final class AuthenticatedCipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'AuthenticatedCipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
27 | /// AES-256 GCM cipher. This is the recommended cipher.
28 | /// See the global `AES256GCM` constant on usage.
29 | public static let aes256gcm: AuthenticatedCipherAlgorithm = .init(c: EVP_aes_256_gcm().convert())
| |- warning: static property 'aes256gcm' is not concurrency-safe because non-'Sendable' type 'AuthenticatedCipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256gcm' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
30 |
31 | /// OpenSSL `EVP_CIPHER` context.
[173/181] Compiling Crypto AuthenticatedCipher.swift
/host/spi-builder-workspace/Sources/Crypto/Cipher/AuthenticatedCipherAlgorithm.swift:29:23: warning: static property 'aes256gcm' is not concurrency-safe because non-'Sendable' type 'AuthenticatedCipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `AuthenticatedCipherAlgorithm` such as `AuthenticatedCipherAlgorithm.named(_:)`
8 | public final class AuthenticatedCipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'AuthenticatedCipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
27 | /// AES-256 GCM cipher. This is the recommended cipher.
28 | /// See the global `AES256GCM` constant on usage.
29 | public static let aes256gcm: AuthenticatedCipherAlgorithm = .init(c: EVP_aes_256_gcm().convert())
| |- warning: static property 'aes256gcm' is not concurrency-safe because non-'Sendable' type 'AuthenticatedCipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256gcm' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
30 |
31 | /// OpenSSL `EVP_CIPHER` context.
[174/181] Compiling Crypto AuthenticatedCipherAlgorithm.swift
/host/spi-builder-workspace/Sources/Crypto/Cipher/AuthenticatedCipherAlgorithm.swift:29:23: warning: static property 'aes256gcm' is not concurrency-safe because non-'Sendable' type 'AuthenticatedCipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `AuthenticatedCipherAlgorithm` such as `AuthenticatedCipherAlgorithm.named(_:)`
8 | public final class AuthenticatedCipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'AuthenticatedCipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
27 | /// AES-256 GCM cipher. This is the recommended cipher.
28 | /// See the global `AES256GCM` constant on usage.
29 | public static let aes256gcm: AuthenticatedCipherAlgorithm = .init(c: EVP_aes_256_gcm().convert())
| |- warning: static property 'aes256gcm' is not concurrency-safe because non-'Sendable' type 'AuthenticatedCipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256gcm' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
30 |
31 | /// OpenSSL `EVP_CIPHER` context.
[175/181] Compiling Crypto HMAC.swift
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:72:15: warning: 'HMAC_CTX_new()' is deprecated
70 | public init(algorithm: DigestAlgorithm) {
71 | self.algorithm = algorithm
72 | ctx = HMAC_CTX_new().convert()
| `- warning: 'HMAC_CTX_new()' is deprecated
73 | }
74 |
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:107:36: warning: 'HMAC_Init_ex' is deprecated
105 | let key = key.convertToData()
106 |
107 | guard key.withByteBuffer({ HMAC_Init_ex(ctx.convert(), $0.baseAddress!, Int32($0.count), algorithm.c.convert(), nil) }) == 1 else {
| `- warning: 'HMAC_Init_ex' is deprecated
108 | throw CryptoError.openssl(identifier: "HMAC_Init_ex", reason: "Failed initializing HMAC context.")
109 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:128:37: warning: 'HMAC_Update' is deprecated
126 | let data = data.convertToData()
127 |
128 | guard data.withByteBuffer({ HMAC_Update(ctx.convert(), $0.baseAddress!, $0.count) }) == 1 else {
| `- warning: 'HMAC_Update' is deprecated
129 | throw CryptoError.openssl(identifier: "HMAC_Update", reason: "Failed updating HMAC digest.")
130 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:149:44: warning: 'HMAC_Final' is deprecated
147 | var count: UInt32 = 0
148 |
149 | guard hash.withMutableByteBuffer({ HMAC_Final(ctx.convert(), $0.baseAddress!, &count) }) == 1 else {
| `- warning: 'HMAC_Final' is deprecated
150 | throw CryptoError.openssl(identifier: "HMAC_Final", reason: "Failed finalizing HMAC digest.")
151 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:156:9: warning: 'HMAC_CTX_free' is deprecated
154 |
155 | deinit {
156 | HMAC_CTX_free(ctx.convert())
| `- warning: 'HMAC_CTX_free' is deprecated
157 | }
158 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/OTP.swift:144:25: error: ambiguous use of 'withUnsafeBytes'
142 | let subdigest = Data(digest[offset...offset + 3])
143 | // convert data to UInt32
144 | var num = subdigest.withUnsafeBytes { $0.baseAddress!.assumingMemoryBound(to: UInt32.self).pointee.bigEndian }
| `- error: ambiguous use of 'withUnsafeBytes'
145 | // remove most sig bit
146 | num &= 0x7fffffff
FoundationEssentials.Data.withUnsafeBytes:2:24: note: found this candidate in module 'FoundationEssentials'
1 | struct Data {
2 | @inlinable public func withUnsafeBytes<ResultType>(_ body: (UnsafeRawBufferPointer) throws -> ResultType) rethrows -> ResultType}
| `- note: found this candidate in module 'FoundationEssentials'
3 |
/host/spi-builder-workspace/.build/checkouts/swift-nio/Sources/NIOFoundationCompat/ByteBuffer-foundation.swift:34:17: note: found this candidate in module 'NIOFoundationCompat'
32 | extension Data: ContiguousCollection {
33 | @_inlineable
34 | public func withUnsafeBytes<R>(_ body: (UnsafeRawBufferPointer) throws -> R) rethrows -> R {
| `- note: found this candidate in module 'NIOFoundationCompat'
35 | return try self.withUnsafeBytes { (ptr: UnsafePointer<UInt8>) -> R in
36 | try body(UnsafeRawBufferPointer(start: ptr, count: self.count))
[176/181] Compiling Crypto OTP.swift
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:72:15: warning: 'HMAC_CTX_new()' is deprecated
70 | public init(algorithm: DigestAlgorithm) {
71 | self.algorithm = algorithm
72 | ctx = HMAC_CTX_new().convert()
| `- warning: 'HMAC_CTX_new()' is deprecated
73 | }
74 |
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:107:36: warning: 'HMAC_Init_ex' is deprecated
105 | let key = key.convertToData()
106 |
107 | guard key.withByteBuffer({ HMAC_Init_ex(ctx.convert(), $0.baseAddress!, Int32($0.count), algorithm.c.convert(), nil) }) == 1 else {
| `- warning: 'HMAC_Init_ex' is deprecated
108 | throw CryptoError.openssl(identifier: "HMAC_Init_ex", reason: "Failed initializing HMAC context.")
109 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:128:37: warning: 'HMAC_Update' is deprecated
126 | let data = data.convertToData()
127 |
128 | guard data.withByteBuffer({ HMAC_Update(ctx.convert(), $0.baseAddress!, $0.count) }) == 1 else {
| `- warning: 'HMAC_Update' is deprecated
129 | throw CryptoError.openssl(identifier: "HMAC_Update", reason: "Failed updating HMAC digest.")
130 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:149:44: warning: 'HMAC_Final' is deprecated
147 | var count: UInt32 = 0
148 |
149 | guard hash.withMutableByteBuffer({ HMAC_Final(ctx.convert(), $0.baseAddress!, &count) }) == 1 else {
| `- warning: 'HMAC_Final' is deprecated
150 | throw CryptoError.openssl(identifier: "HMAC_Final", reason: "Failed finalizing HMAC digest.")
151 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:156:9: warning: 'HMAC_CTX_free' is deprecated
154 |
155 | deinit {
156 | HMAC_CTX_free(ctx.convert())
| `- warning: 'HMAC_CTX_free' is deprecated
157 | }
158 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/OTP.swift:144:25: error: ambiguous use of 'withUnsafeBytes'
142 | let subdigest = Data(digest[offset...offset + 3])
143 | // convert data to UInt32
144 | var num = subdigest.withUnsafeBytes { $0.baseAddress!.assumingMemoryBound(to: UInt32.self).pointee.bigEndian }
| `- error: ambiguous use of 'withUnsafeBytes'
145 | // remove most sig bit
146 | num &= 0x7fffffff
FoundationEssentials.Data.withUnsafeBytes:2:24: note: found this candidate in module 'FoundationEssentials'
1 | struct Data {
2 | @inlinable public func withUnsafeBytes<ResultType>(_ body: (UnsafeRawBufferPointer) throws -> ResultType) rethrows -> ResultType}
| `- note: found this candidate in module 'FoundationEssentials'
3 |
/host/spi-builder-workspace/.build/checkouts/swift-nio/Sources/NIOFoundationCompat/ByteBuffer-foundation.swift:34:17: note: found this candidate in module 'NIOFoundationCompat'
32 | extension Data: ContiguousCollection {
33 | @_inlineable
34 | public func withUnsafeBytes<R>(_ body: (UnsafeRawBufferPointer) throws -> R) rethrows -> R {
| `- note: found this candidate in module 'NIOFoundationCompat'
35 | return try self.withUnsafeBytes { (ptr: UnsafePointer<UInt8>) -> R in
36 | try body(UnsafeRawBufferPointer(start: ptr, count: self.count))
[177/181] Compiling Crypto RSAPadding.swift
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAPadding.swift:23:14: error: cannot find 'RSA_SSLV23_PADDING' in scope
21 | case RSA_PKCS1_PADDING:
22 | self = .pkcs1
23 | case RSA_SSLV23_PADDING:
| `- error: cannot find 'RSA_SSLV23_PADDING' in scope
24 | self = .sslv23
25 | case RSA_NO_PADDING:
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAPadding.swift:42:20: error: cannot find 'RSA_SSLV23_PADDING' in scope
40 | return RSA_PKCS1_PADDING
41 | case .sslv23:
42 | return RSA_SSLV23_PADDING
| `- error: cannot find 'RSA_SSLV23_PADDING' in scope
43 | case .none:
44 | return RSA_NO_PADDING
[178/181] Compiling Crypto CryptoRandom.swift
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAPadding.swift:23:14: error: cannot find 'RSA_SSLV23_PADDING' in scope
21 | case RSA_PKCS1_PADDING:
22 | self = .pkcs1
23 | case RSA_SSLV23_PADDING:
| `- error: cannot find 'RSA_SSLV23_PADDING' in scope
24 | self = .sslv23
25 | case RSA_NO_PADDING:
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAPadding.swift:42:20: error: cannot find 'RSA_SSLV23_PADDING' in scope
40 | return RSA_PKCS1_PADDING
41 | case .sslv23:
42 | return RSA_SSLV23_PADDING
| `- error: cannot find 'RSA_SSLV23_PADDING' in scope
43 | case .none:
44 | return RSA_NO_PADDING
[179/181] Compiling Crypto Cipher.swift
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:29:23: warning: static property 'aes128ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
27 | /// AES-128 ECB cipher. Deprecated (see https://github.com/vapor/crypto/issues/59).
28 | @available(*, deprecated, message: "Stream encryption in ECB mode is unsafe (see https://github.com/vapor/crypto/issues/59). Use AES256 in GCM mode instead.")
29 | public static let aes128ecb: CipherAlgorithm = .init(c: EVP_aes_128_ecb().convert())
| |- warning: static property 'aes128ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes128ecb' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
30 |
31 | /// AES-256 ECB cipher. Deprecated (see https://github.com/vapor/crypto/issues/59).
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:33:23: warning: static property 'aes256ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
31 | /// AES-256 ECB cipher. Deprecated (see https://github.com/vapor/crypto/issues/59).
32 | @available(*, deprecated, message: "Stream encryption in ECB mode is unsafe (see https://github.com/vapor/crypto/issues/59). Use AES256 in GCM mode instead.")
33 | public static let aes256ecb: CipherAlgorithm = .init(c: EVP_aes_256_ecb().convert())
| |- warning: static property 'aes256ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256ecb' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
34 |
35 | /// AES-256 CBC cipher.
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:37:23: warning: static property 'aes256cbc' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
35 | /// AES-256 CBC cipher.
36 | /// Only use this if you know what you are doing; use AES-256 GCM otherwise (see https://github.com/vapor/crypto/issues/59).
37 | public static let aes256cbc: CipherAlgorithm = .init(c: EVP_aes_256_cbc().convert())
| |- warning: static property 'aes256cbc' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256cbc' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
38 |
39 | /// AES-256 CFB cipher. May not be available on all platforms.
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:41:23: warning: static property 'aes256cfb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
39 | /// AES-256 CFB cipher. May not be available on all platforms.
40 | /// Only use this if you know what you are doing; use AES-256 GCM otherwise (see https://github.com/vapor/crypto/issues/59).
41 | public static let aes256cfb: CipherAlgorithm = .init(c: EVP_aes_256_cfb128().convert())
| |- warning: static property 'aes256cfb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256cfb' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
42 |
43 | /// OpenSSL `EVP_CIPHER` context.
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:55:16: error: cannot find 'EVP_CIPHER_type' in scope
53 | /// Returns the OpenSSL NID type for this algorithm.
54 | public var type: Int32 {
55 | return EVP_CIPHER_type(c.convert())
| `- error: cannot find 'EVP_CIPHER_type' in scope
56 | }
57 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:60:16: error: cannot find 'EVP_CIPHER_key_length' in scope
58 | /// This cipher's required key length.
59 | public var keySize: Int32 {
60 | return EVP_CIPHER_key_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
61 | }
62 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:65:16: error: cannot find 'EVP_CIPHER_iv_length' in scope
63 | /// This cipher's required initialization vector length.
64 | public var ivSize: Int32 {
65 | return EVP_CIPHER_iv_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
66 | }
67 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:70:16: error: cannot find 'EVP_CIPHER_block_size' in scope
68 | /// This cipher's block size, used internally to allocate "out" buffers.
69 | public var blockSize: Int32 {
70 | return EVP_CIPHER_block_size(c.convert())
| `- error: cannot find 'EVP_CIPHER_block_size' in scope
71 | }
72 | }
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:30:16: error: cannot find 'EVP_CIPHER_type' in scope
28 | /// See `OpenSSLCipherAlgorithm`
29 | public var type: Int32 {
30 | return EVP_CIPHER_type(c.convert())
| `- error: cannot find 'EVP_CIPHER_type' in scope
31 | }
32 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:35:16: error: cannot find 'EVP_CIPHER_key_length' in scope
33 | /// See `OpenSSLCipherAlgorithm`
34 | public var keySize: Int32 {
35 | return EVP_CIPHER_key_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
36 | }
37 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:40:16: error: cannot find 'EVP_CIPHER_iv_length' in scope
38 | /// See `OpenSSLCipherAlgorithm`
39 | public var ivSize: Int32 {
40 | return EVP_CIPHER_iv_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
41 | }
42 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:45:16: error: cannot find 'EVP_CIPHER_block_size' in scope
43 | /// See `OpenSSLCipherAlgorithm`
44 | public var blockSize: Int32 {
45 | return EVP_CIPHER_block_size(c.convert())
| `- error: cannot find 'EVP_CIPHER_block_size' in scope
46 | }
47 | }
[180/181] Compiling Crypto CipherAlgorithm.swift
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:29:23: warning: static property 'aes128ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
27 | /// AES-128 ECB cipher. Deprecated (see https://github.com/vapor/crypto/issues/59).
28 | @available(*, deprecated, message: "Stream encryption in ECB mode is unsafe (see https://github.com/vapor/crypto/issues/59). Use AES256 in GCM mode instead.")
29 | public static let aes128ecb: CipherAlgorithm = .init(c: EVP_aes_128_ecb().convert())
| |- warning: static property 'aes128ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes128ecb' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
30 |
31 | /// AES-256 ECB cipher. Deprecated (see https://github.com/vapor/crypto/issues/59).
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:33:23: warning: static property 'aes256ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
31 | /// AES-256 ECB cipher. Deprecated (see https://github.com/vapor/crypto/issues/59).
32 | @available(*, deprecated, message: "Stream encryption in ECB mode is unsafe (see https://github.com/vapor/crypto/issues/59). Use AES256 in GCM mode instead.")
33 | public static let aes256ecb: CipherAlgorithm = .init(c: EVP_aes_256_ecb().convert())
| |- warning: static property 'aes256ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256ecb' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
34 |
35 | /// AES-256 CBC cipher.
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:37:23: warning: static property 'aes256cbc' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
35 | /// AES-256 CBC cipher.
36 | /// Only use this if you know what you are doing; use AES-256 GCM otherwise (see https://github.com/vapor/crypto/issues/59).
37 | public static let aes256cbc: CipherAlgorithm = .init(c: EVP_aes_256_cbc().convert())
| |- warning: static property 'aes256cbc' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256cbc' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
38 |
39 | /// AES-256 CFB cipher. May not be available on all platforms.
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:41:23: warning: static property 'aes256cfb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
39 | /// AES-256 CFB cipher. May not be available on all platforms.
40 | /// Only use this if you know what you are doing; use AES-256 GCM otherwise (see https://github.com/vapor/crypto/issues/59).
41 | public static let aes256cfb: CipherAlgorithm = .init(c: EVP_aes_256_cfb128().convert())
| |- warning: static property 'aes256cfb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256cfb' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
42 |
43 | /// OpenSSL `EVP_CIPHER` context.
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:55:16: error: cannot find 'EVP_CIPHER_type' in scope
53 | /// Returns the OpenSSL NID type for this algorithm.
54 | public var type: Int32 {
55 | return EVP_CIPHER_type(c.convert())
| `- error: cannot find 'EVP_CIPHER_type' in scope
56 | }
57 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:60:16: error: cannot find 'EVP_CIPHER_key_length' in scope
58 | /// This cipher's required key length.
59 | public var keySize: Int32 {
60 | return EVP_CIPHER_key_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
61 | }
62 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:65:16: error: cannot find 'EVP_CIPHER_iv_length' in scope
63 | /// This cipher's required initialization vector length.
64 | public var ivSize: Int32 {
65 | return EVP_CIPHER_iv_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
66 | }
67 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:70:16: error: cannot find 'EVP_CIPHER_block_size' in scope
68 | /// This cipher's block size, used internally to allocate "out" buffers.
69 | public var blockSize: Int32 {
70 | return EVP_CIPHER_block_size(c.convert())
| `- error: cannot find 'EVP_CIPHER_block_size' in scope
71 | }
72 | }
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:30:16: error: cannot find 'EVP_CIPHER_type' in scope
28 | /// See `OpenSSLCipherAlgorithm`
29 | public var type: Int32 {
30 | return EVP_CIPHER_type(c.convert())
| `- error: cannot find 'EVP_CIPHER_type' in scope
31 | }
32 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:35:16: error: cannot find 'EVP_CIPHER_key_length' in scope
33 | /// See `OpenSSLCipherAlgorithm`
34 | public var keySize: Int32 {
35 | return EVP_CIPHER_key_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
36 | }
37 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:40:16: error: cannot find 'EVP_CIPHER_iv_length' in scope
38 | /// See `OpenSSLCipherAlgorithm`
39 | public var ivSize: Int32 {
40 | return EVP_CIPHER_iv_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
41 | }
42 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:45:16: error: cannot find 'EVP_CIPHER_block_size' in scope
43 | /// See `OpenSSLCipherAlgorithm`
44 | public var blockSize: Int32 {
45 | return EVP_CIPHER_block_size(c.convert())
| `- error: cannot find 'EVP_CIPHER_block_size' in scope
46 | }
47 | }
[181/181] Compiling Crypto OpenSSLCipherAlgorithm.swift
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:29:23: warning: static property 'aes128ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
27 | /// AES-128 ECB cipher. Deprecated (see https://github.com/vapor/crypto/issues/59).
28 | @available(*, deprecated, message: "Stream encryption in ECB mode is unsafe (see https://github.com/vapor/crypto/issues/59). Use AES256 in GCM mode instead.")
29 | public static let aes128ecb: CipherAlgorithm = .init(c: EVP_aes_128_ecb().convert())
| |- warning: static property 'aes128ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes128ecb' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
30 |
31 | /// AES-256 ECB cipher. Deprecated (see https://github.com/vapor/crypto/issues/59).
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:33:23: warning: static property 'aes256ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
31 | /// AES-256 ECB cipher. Deprecated (see https://github.com/vapor/crypto/issues/59).
32 | @available(*, deprecated, message: "Stream encryption in ECB mode is unsafe (see https://github.com/vapor/crypto/issues/59). Use AES256 in GCM mode instead.")
33 | public static let aes256ecb: CipherAlgorithm = .init(c: EVP_aes_256_ecb().convert())
| |- warning: static property 'aes256ecb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256ecb' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
34 |
35 | /// AES-256 CBC cipher.
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:37:23: warning: static property 'aes256cbc' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
35 | /// AES-256 CBC cipher.
36 | /// Only use this if you know what you are doing; use AES-256 GCM otherwise (see https://github.com/vapor/crypto/issues/59).
37 | public static let aes256cbc: CipherAlgorithm = .init(c: EVP_aes_256_cbc().convert())
| |- warning: static property 'aes256cbc' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256cbc' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
38 |
39 | /// AES-256 CFB cipher. May not be available on all platforms.
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:41:23: warning: static property 'aes256cfb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
6 | ///
7 | /// There are also static methods for creating `CipherAlgorithm` such as `CipherAlgorithm.named(_:)`
8 | public final class CipherAlgorithm: OpenSSLCipherAlgorithm {
| `- note: class 'CipherAlgorithm' does not conform to the 'Sendable' protocol
9 | // MARK: Static
10 |
:
39 | /// AES-256 CFB cipher. May not be available on all platforms.
40 | /// Only use this if you know what you are doing; use AES-256 GCM otherwise (see https://github.com/vapor/crypto/issues/59).
41 | public static let aes256cfb: CipherAlgorithm = .init(c: EVP_aes_256_cfb128().convert())
| |- warning: static property 'aes256cfb' is not concurrency-safe because non-'Sendable' type 'CipherAlgorithm' may have shared mutable state; this is an error in the Swift 6 language mode
| |- note: add '@MainActor' to make static property 'aes256cfb' part of global actor 'MainActor'
| `- note: disable concurrency-safety checks if accesses are protected by an external synchronization mechanism
42 |
43 | /// OpenSSL `EVP_CIPHER` context.
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:55:16: error: cannot find 'EVP_CIPHER_type' in scope
53 | /// Returns the OpenSSL NID type for this algorithm.
54 | public var type: Int32 {
55 | return EVP_CIPHER_type(c.convert())
| `- error: cannot find 'EVP_CIPHER_type' in scope
56 | }
57 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:60:16: error: cannot find 'EVP_CIPHER_key_length' in scope
58 | /// This cipher's required key length.
59 | public var keySize: Int32 {
60 | return EVP_CIPHER_key_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
61 | }
62 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:65:16: error: cannot find 'EVP_CIPHER_iv_length' in scope
63 | /// This cipher's required initialization vector length.
64 | public var ivSize: Int32 {
65 | return EVP_CIPHER_iv_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
66 | }
67 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:70:16: error: cannot find 'EVP_CIPHER_block_size' in scope
68 | /// This cipher's block size, used internally to allocate "out" buffers.
69 | public var blockSize: Int32 {
70 | return EVP_CIPHER_block_size(c.convert())
| `- error: cannot find 'EVP_CIPHER_block_size' in scope
71 | }
72 | }
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:30:16: error: cannot find 'EVP_CIPHER_type' in scope
28 | /// See `OpenSSLCipherAlgorithm`
29 | public var type: Int32 {
30 | return EVP_CIPHER_type(c.convert())
| `- error: cannot find 'EVP_CIPHER_type' in scope
31 | }
32 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:35:16: error: cannot find 'EVP_CIPHER_key_length' in scope
33 | /// See `OpenSSLCipherAlgorithm`
34 | public var keySize: Int32 {
35 | return EVP_CIPHER_key_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
36 | }
37 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:40:16: error: cannot find 'EVP_CIPHER_iv_length' in scope
38 | /// See `OpenSSLCipherAlgorithm`
39 | public var ivSize: Int32 {
40 | return EVP_CIPHER_iv_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
41 | }
42 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:45:16: error: cannot find 'EVP_CIPHER_block_size' in scope
43 | /// See `OpenSSLCipherAlgorithm`
44 | public var blockSize: Int32 {
45 | return EVP_CIPHER_block_size(c.convert())
| `- error: cannot find 'EVP_CIPHER_block_size' in scope
46 | }
47 | }
Running build ...
bash -c docker run --pull=always --rm -v "checkouts-4609320-0":/host -w "$PWD" registry.gitlab.com/finestructure/spi-images:basic-6.1-latest swift build --triple x86_64-unknown-linux-gnu 2>&1
basic-6.1-latest: Pulling from finestructure/spi-images
Digest: sha256:3bdcac04179f4ed3e5b8e9dbd6e74bbf5ebc0f4fde48bbaad7d1e5c757e65bcb
Status: Image is up to date for registry.gitlab.com/finestructure/spi-images:basic-6.1-latest
warning: 'swift-nio-ssl-support': ignoring declared target(s) 'swift-nio-ssl-support' in the system package
warning: 'swift-nio-zlib-support': ignoring declared target(s) 'swift-nio-zlib-support' in the system package
warning: 'spi-builder-workspace': dependency 'swift-nio-ssl-support' is not used by any target
[0/1] Planning build
Building for debugging...
[0/1] Write swift-version-24593BA9C3E375BF.txt
[2/13] Emitting module COperatingSystem
[3/13] Compiling COperatingSystem libc.swift
[4/14] Emitting module Debugging
[5/14] Compiling NIOPriorityQueue PriorityQueue.swift
[7/14] Compiling Debugging SourceLocation.swift
[8/14] Compiling Debugging Demangler.swift
[9/14] Emitting module NIOPriorityQueue
[10/14] Compiling NIOPriorityQueue Heap.swift
[11/15] Compiling Debugging Debuggable.swift
[12/16] Compiling NIOConcurrencyHelpers lock.swift
[15/16] Compiling NIOConcurrencyHelpers atomics.swift
[16/16] Emitting module NIOConcurrencyHelpers
[18/67] Compiling NIO Heap.swift
[19/67] Compiling NIO IO.swift
[20/67] Compiling NIO IOData.swift
[21/67] Compiling NIO IntegerTypes.swift
[22/67] Compiling NIO Interfaces.swift
[23/67] Compiling NIO Linux.swift
[24/67] Compiling NIO LinuxCPUSet.swift
[25/73] Emitting module NIO
[26/73] Compiling NIO MarkedCircularBuffer.swift
[27/73] Compiling NIO MulticastChannel.swift
[28/73] Compiling NIO NIOAny.swift
[29/73] Compiling NIO NonBlockingFileIO.swift
[30/73] Compiling NIO PendingDatagramWritesManager.swift
[31/73] Compiling NIO PendingWritesManager.swift
[32/73] Compiling NIO PriorityQueue.swift
[33/73] Compiling NIO RecvByteBufferAllocator.swift
[34/73] Compiling NIO Resolver.swift
[35/73] Compiling NIO Selectable.swift
[36/73] Compiling NIO Selector.swift
[37/73] Compiling NIO ServerSocket.swift
[38/73] Compiling NIO Socket.swift
[39/73] Compiling NIO SocketAddresses.swift
[40/73] Compiling NIO EventLoop.swift
[41/73] Compiling NIO EventLoopFuture.swift
[42/73] Compiling NIO FileDescriptor.swift
[43/73] Compiling NIO FileHandle.swift
[44/73] Compiling NIO FileRegion.swift
[45/73] Compiling NIO GetaddrinfoResolver.swift
[46/73] Compiling NIO HappyEyeballs.swift
[47/73] Compiling NIO ByteBuffer-int.swift
[48/73] Compiling NIO ByteBuffer-views.swift
[49/73] Compiling NIO Channel.swift
[50/73] Compiling NIO ChannelHandler.swift
[51/73] Compiling NIO ChannelHandlers.swift
[52/73] Compiling NIO ChannelInvoker.swift
[53/73] Compiling NIO ChannelOption.swift
[54/73] Compiling NIO ChannelPipeline.swift
[55/73] Compiling NIO CircularBuffer.swift
[56/73] Compiling NIO Codec.swift
[57/73] Compiling NIO CompositeError.swift
[58/73] Compiling NIO ContiguousCollection.swift
[59/73] Compiling NIO DeadChannel.swift
[60/73] Compiling NIO Embedded.swift
[61/73] Compiling NIO AddressedEnvelope.swift
[62/73] Compiling NIO BaseSocket.swift
[63/73] Compiling NIO BaseSocketChannel.swift
[64/73] Compiling NIO BlockingIOThreadPool.swift
[65/73] Compiling NIO Bootstrap.swift
[66/73] Compiling NIO ByteBuffer-aux.swift
[67/73] Compiling NIO ByteBuffer-core.swift
[68/73] Compiling NIO SocketChannel.swift
[69/73] Compiling NIO SocketOptionProvider.swift
[70/73] Compiling NIO System.swift
[71/73] Compiling NIO Thread.swift
[72/73] Compiling NIO TypeAssistedChannelHandler.swift
[73/73] Compiling NIO Utilities.swift
[75/103] Compiling Bits Bytes.swift
[76/104] Compiling Async Async+NIO.swift
[77/104] Compiling Async AsyncError.swift
[78/104] Emitting module Async
[79/105] Compiling Bits ByteBuffer+binaryFloatingPointOperations.swift
[80/105] Compiling Bits ByteBuffer+peek.swift
[81/105] Compiling Async Future+Variadic.swift
[82/105] Compiling Async Future+Void.swift
[83/105] Compiling Bits Byte+Control.swift
[84/105] Compiling Bits Byte+Digit.swift
[85/105] Compiling Async Future+Flatten.swift
[86/105] Compiling Async Future+Global.swift
[87/105] Compiling Bits ByteBuffer+require.swift
[88/105] Compiling Bits ByteBuffer+string.swift
[89/105] Compiling Async FutureType.swift
[90/105] Compiling Async QueueHandler.swift
[93/105] Compiling NIOFoundationCompat ByteBuffer-foundation.swift
[94/105] Emitting module NIOFoundationCompat
[95/105] Emitting module Bits
[96/106] Compiling Bits Deprecated.swift
[97/106] Compiling Async Worker.swift
[99/107] Compiling Bits Data+Bytes.swift
[106/107] Compiling Bits Data+Strings.swift
[109/136] Compiling Random URandom.swift
[110/136] Compiling Random RandomProtocol.swift
[111/136] Compiling Random Array+Random.swift
[112/136] Compiling Random OSRandom.swift
[113/136] Emitting module Random
[115/137] Compiling Core NotFound.swift
[116/137] Compiling Core OptionalType.swift
[117/137] Compiling Core Process+Execute.swift
[118/140] Compiling Core DirectoryConfig.swift
[119/140] Compiling Core Exports.swift
[120/140] Compiling Core File.swift
[121/140] Compiling Core Future+Unwrap.swift
[122/140] Compiling Core FutureEncoder.swift
[123/140] Compiling Core HeaderValue.swift
[124/140] Compiling Core Data+Hex.swift
[125/140] Compiling Core DataCoders.swift
[126/140] Compiling Core Deprecated.swift
[127/140] Compiling Core BasicKey.swift
[128/140] Compiling Core CaseInsensitiveString.swift
[129/140] Compiling Core Decodable+Reflectable.swift
[130/140] Compiling Core ReflectionDecodable.swift
[131/140] Compiling Core ReflectionDecoders.swift
[132/140] Compiling Core CoreError.swift
[133/140] Compiling Core Data+Base64URL.swift
[134/140] Compiling Core Reflectable.swift
[135/140] Compiling Core String+Utilities.swift
[136/140] Compiling Core Thread+Async.swift
[137/140] Emitting module Core
[138/140] Compiling Core LosslessDataConvertible.swift
[139/140] Compiling Core MediaType.swift
[140/140] Compiling Core NestedData.swift
[142/159] Emitting module Crypto
[143/161] Compiling Crypto HMAC.swift
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:72:15: warning: 'HMAC_CTX_new()' is deprecated
70 | public init(algorithm: DigestAlgorithm) {
71 | self.algorithm = algorithm
72 | ctx = HMAC_CTX_new().convert()
| `- warning: 'HMAC_CTX_new()' is deprecated
73 | }
74 |
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:107:36: warning: 'HMAC_Init_ex' is deprecated
105 | let key = key.convertToData()
106 |
107 | guard key.withByteBuffer({ HMAC_Init_ex(ctx.convert(), $0.baseAddress!, Int32($0.count), algorithm.c.convert(), nil) }) == 1 else {
| `- warning: 'HMAC_Init_ex' is deprecated
108 | throw CryptoError.openssl(identifier: "HMAC_Init_ex", reason: "Failed initializing HMAC context.")
109 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:128:37: warning: 'HMAC_Update' is deprecated
126 | let data = data.convertToData()
127 |
128 | guard data.withByteBuffer({ HMAC_Update(ctx.convert(), $0.baseAddress!, $0.count) }) == 1 else {
| `- warning: 'HMAC_Update' is deprecated
129 | throw CryptoError.openssl(identifier: "HMAC_Update", reason: "Failed updating HMAC digest.")
130 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:149:44: warning: 'HMAC_Final' is deprecated
147 | var count: UInt32 = 0
148 |
149 | guard hash.withMutableByteBuffer({ HMAC_Final(ctx.convert(), $0.baseAddress!, &count) }) == 1 else {
| `- warning: 'HMAC_Final' is deprecated
150 | throw CryptoError.openssl(identifier: "HMAC_Final", reason: "Failed finalizing HMAC digest.")
151 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:156:9: warning: 'HMAC_CTX_free' is deprecated
154 |
155 | deinit {
156 | HMAC_CTX_free(ctx.convert())
| `- warning: 'HMAC_CTX_free' is deprecated
157 | }
158 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/OTP.swift:144:25: error: ambiguous use of 'withUnsafeBytes'
142 | let subdigest = Data(digest[offset...offset + 3])
143 | // convert data to UInt32
144 | var num = subdigest.withUnsafeBytes { $0.baseAddress!.assumingMemoryBound(to: UInt32.self).pointee.bigEndian }
| `- error: ambiguous use of 'withUnsafeBytes'
145 | // remove most sig bit
146 | num &= 0x7fffffff
FoundationEssentials.Data.withUnsafeBytes:2:24: note: found this candidate in module 'FoundationEssentials'
1 | struct Data {
2 | @inlinable public func withUnsafeBytes<ResultType>(_ body: (UnsafeRawBufferPointer) throws -> ResultType) rethrows -> ResultType}
| `- note: found this candidate in module 'FoundationEssentials'
3 |
/host/spi-builder-workspace/.build/checkouts/swift-nio/Sources/NIOFoundationCompat/ByteBuffer-foundation.swift:34:17: note: found this candidate in module 'NIOFoundationCompat'
32 | extension Data: ContiguousCollection {
33 | @_inlineable
34 | public func withUnsafeBytes<R>(_ body: (UnsafeRawBufferPointer) throws -> R) rethrows -> R {
| `- note: found this candidate in module 'NIOFoundationCompat'
35 | return try self.withUnsafeBytes { (ptr: UnsafePointer<UInt8>) -> R in
36 | try body(UnsafeRawBufferPointer(start: ptr, count: self.count))
[144/161] Compiling Crypto OTP.swift
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:72:15: warning: 'HMAC_CTX_new()' is deprecated
70 | public init(algorithm: DigestAlgorithm) {
71 | self.algorithm = algorithm
72 | ctx = HMAC_CTX_new().convert()
| `- warning: 'HMAC_CTX_new()' is deprecated
73 | }
74 |
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:107:36: warning: 'HMAC_Init_ex' is deprecated
105 | let key = key.convertToData()
106 |
107 | guard key.withByteBuffer({ HMAC_Init_ex(ctx.convert(), $0.baseAddress!, Int32($0.count), algorithm.c.convert(), nil) }) == 1 else {
| `- warning: 'HMAC_Init_ex' is deprecated
108 | throw CryptoError.openssl(identifier: "HMAC_Init_ex", reason: "Failed initializing HMAC context.")
109 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:128:37: warning: 'HMAC_Update' is deprecated
126 | let data = data.convertToData()
127 |
128 | guard data.withByteBuffer({ HMAC_Update(ctx.convert(), $0.baseAddress!, $0.count) }) == 1 else {
| `- warning: 'HMAC_Update' is deprecated
129 | throw CryptoError.openssl(identifier: "HMAC_Update", reason: "Failed updating HMAC digest.")
130 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:149:44: warning: 'HMAC_Final' is deprecated
147 | var count: UInt32 = 0
148 |
149 | guard hash.withMutableByteBuffer({ HMAC_Final(ctx.convert(), $0.baseAddress!, &count) }) == 1 else {
| `- warning: 'HMAC_Final' is deprecated
150 | throw CryptoError.openssl(identifier: "HMAC_Final", reason: "Failed finalizing HMAC digest.")
151 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/HMAC.swift:156:9: warning: 'HMAC_CTX_free' is deprecated
154 |
155 | deinit {
156 | HMAC_CTX_free(ctx.convert())
| `- warning: 'HMAC_CTX_free' is deprecated
157 | }
158 | }
/host/spi-builder-workspace/Sources/Crypto/MAC/OTP.swift:144:25: error: ambiguous use of 'withUnsafeBytes'
142 | let subdigest = Data(digest[offset...offset + 3])
143 | // convert data to UInt32
144 | var num = subdigest.withUnsafeBytes { $0.baseAddress!.assumingMemoryBound(to: UInt32.self).pointee.bigEndian }
| `- error: ambiguous use of 'withUnsafeBytes'
145 | // remove most sig bit
146 | num &= 0x7fffffff
FoundationEssentials.Data.withUnsafeBytes:2:24: note: found this candidate in module 'FoundationEssentials'
1 | struct Data {
2 | @inlinable public func withUnsafeBytes<ResultType>(_ body: (UnsafeRawBufferPointer) throws -> ResultType) rethrows -> ResultType}
| `- note: found this candidate in module 'FoundationEssentials'
3 |
/host/spi-builder-workspace/.build/checkouts/swift-nio/Sources/NIOFoundationCompat/ByteBuffer-foundation.swift:34:17: note: found this candidate in module 'NIOFoundationCompat'
32 | extension Data: ContiguousCollection {
33 | @_inlineable
34 | public func withUnsafeBytes<R>(_ body: (UnsafeRawBufferPointer) throws -> R) rethrows -> R {
| `- note: found this candidate in module 'NIOFoundationCompat'
35 | return try self.withUnsafeBytes { (ptr: UnsafePointer<UInt8>) -> R in
36 | try body(UnsafeRawBufferPointer(start: ptr, count: self.count))
[145/161] Compiling Crypto RSA.swift
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:73:24: warning: 'RSA_size' is deprecated
71 | var sig = Data(
72 | repeating: 0,
73 | count: Int(RSA_size(key.c.pointer.convert()))
| `- warning: 'RSA_size' is deprecated
74 | )
75 |
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:85:24: warning: 'RSA_sign' is deprecated
83 | let ret = input.withByteBuffer { inputBuffer in
84 | return sig.withMutableByteBuffer { sigBuffer in
85 | return RSA_sign(
| `- warning: 'RSA_sign' is deprecated
86 | algorithm.type,
87 | inputBuffer.baseAddress!,
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:125:24: warning: 'RSA_verify' is deprecated
123 | let result = input.withByteBuffer { inputBuffer in
124 | return signature.withByteBuffer { signatureBuffer in
125 | return RSA_verify(
| `- warning: 'RSA_verify' is deprecated
126 | algorithm.type,
127 | inputBuffer.baseAddress!,
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:153:17: warning: 'RSA_public_decrypt' is deprecated
151 | case .public:
152 | return try cipher(input, padding: padding, key: key) {
153 | RSA_public_decrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_public_decrypt' is deprecated
154 | }
155 | case .private:
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:157:17: warning: 'RSA_private_decrypt' is deprecated
155 | case .private:
156 | return try cipher(input, padding: padding, key: key) {
157 | RSA_private_decrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_private_decrypt' is deprecated
158 | }
159 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:176:17: warning: 'RSA_public_encrypt' is deprecated
174 | case .public:
175 | return try cipher(input, padding: padding, key: key) {
176 | RSA_public_encrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_public_encrypt' is deprecated
177 | }
178 | case .private:
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:180:17: warning: 'RSA_private_encrypt' is deprecated
178 | case .private:
179 | return try cipher(input, padding: padding, key: key) {
180 | RSA_private_encrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_private_encrypt' is deprecated
181 | }
182 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:193:42: warning: 'RSA_size' is deprecated
191 | /// Private cipher
192 | private static func cipher(_ input: LosslessDataConvertible, padding: RSAPadding, key: RSAKey, coder: RSAPkeySymmetricCoder) throws -> Data {
193 | var outputData = Data(count: Int(RSA_size(key.c.pointer.convert())))
| `- warning: 'RSA_size' is deprecated
194 |
195 | let outputLen = input.convertToData().withByteBuffer { inputBuffer in
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:72:25: warning: 'RSA_new()' is deprecated
70 | /// - throws: `CryptoError` if key generation fails.
71 | public static func components(n: String, e: String, d: String? = nil) throws -> RSAKey {
72 | guard let rsa = RSA_new() else {
| `- warning: 'RSA_new()' is deprecated
73 | throw CryptoError.openssl(identifier: "rsaNull", reason: "RSA key creation failed")
74 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:80:9: warning: 'RSA_set0_key' is deprecated
78 | let d = d.flatMap { parseBignum($0) }
79 |
80 | RSA_set0_key(rsa, n.convert(), e.convert(), d?.convert())
| `- warning: 'RSA_set0_key' is deprecated
81 | return try .init(type: d == nil ? .public : .private, key: CRSAKey(rsa.convert()))
82 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:156:25: warning: 'EVP_PKEY_get1_RSA' is deprecated
154 | defer { EVP_PKEY_free(pkey.convert()) }
155 |
156 | guard let rsa = EVP_PKEY_get1_RSA(pkey.convert()) else {
| `- warning: 'EVP_PKEY_get1_RSA' is deprecated
157 | throw CryptoError.openssl(identifier: "rsaPkeyGet1", reason: "RSA key creation failed")
158 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:162:14: warning: 'RSA_free' is deprecated
160 | }
161 |
162 | deinit { RSA_free(pointer.convert()) }
| `- warning: 'RSA_free' is deprecated
163 | }
164 |
[146/161] Compiling Crypto RSAKey.swift
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:73:24: warning: 'RSA_size' is deprecated
71 | var sig = Data(
72 | repeating: 0,
73 | count: Int(RSA_size(key.c.pointer.convert()))
| `- warning: 'RSA_size' is deprecated
74 | )
75 |
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:85:24: warning: 'RSA_sign' is deprecated
83 | let ret = input.withByteBuffer { inputBuffer in
84 | return sig.withMutableByteBuffer { sigBuffer in
85 | return RSA_sign(
| `- warning: 'RSA_sign' is deprecated
86 | algorithm.type,
87 | inputBuffer.baseAddress!,
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:125:24: warning: 'RSA_verify' is deprecated
123 | let result = input.withByteBuffer { inputBuffer in
124 | return signature.withByteBuffer { signatureBuffer in
125 | return RSA_verify(
| `- warning: 'RSA_verify' is deprecated
126 | algorithm.type,
127 | inputBuffer.baseAddress!,
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:153:17: warning: 'RSA_public_decrypt' is deprecated
151 | case .public:
152 | return try cipher(input, padding: padding, key: key) {
153 | RSA_public_decrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_public_decrypt' is deprecated
154 | }
155 | case .private:
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:157:17: warning: 'RSA_private_decrypt' is deprecated
155 | case .private:
156 | return try cipher(input, padding: padding, key: key) {
157 | RSA_private_decrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_private_decrypt' is deprecated
158 | }
159 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:176:17: warning: 'RSA_public_encrypt' is deprecated
174 | case .public:
175 | return try cipher(input, padding: padding, key: key) {
176 | RSA_public_encrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_public_encrypt' is deprecated
177 | }
178 | case .private:
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:180:17: warning: 'RSA_private_encrypt' is deprecated
178 | case .private:
179 | return try cipher(input, padding: padding, key: key) {
180 | RSA_private_encrypt($0, $1, $2, $3!.convert(), $4)
| `- warning: 'RSA_private_encrypt' is deprecated
181 | }
182 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSA.swift:193:42: warning: 'RSA_size' is deprecated
191 | /// Private cipher
192 | private static func cipher(_ input: LosslessDataConvertible, padding: RSAPadding, key: RSAKey, coder: RSAPkeySymmetricCoder) throws -> Data {
193 | var outputData = Data(count: Int(RSA_size(key.c.pointer.convert())))
| `- warning: 'RSA_size' is deprecated
194 |
195 | let outputLen = input.convertToData().withByteBuffer { inputBuffer in
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:72:25: warning: 'RSA_new()' is deprecated
70 | /// - throws: `CryptoError` if key generation fails.
71 | public static func components(n: String, e: String, d: String? = nil) throws -> RSAKey {
72 | guard let rsa = RSA_new() else {
| `- warning: 'RSA_new()' is deprecated
73 | throw CryptoError.openssl(identifier: "rsaNull", reason: "RSA key creation failed")
74 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:80:9: warning: 'RSA_set0_key' is deprecated
78 | let d = d.flatMap { parseBignum($0) }
79 |
80 | RSA_set0_key(rsa, n.convert(), e.convert(), d?.convert())
| `- warning: 'RSA_set0_key' is deprecated
81 | return try .init(type: d == nil ? .public : .private, key: CRSAKey(rsa.convert()))
82 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:156:25: warning: 'EVP_PKEY_get1_RSA' is deprecated
154 | defer { EVP_PKEY_free(pkey.convert()) }
155 |
156 | guard let rsa = EVP_PKEY_get1_RSA(pkey.convert()) else {
| `- warning: 'EVP_PKEY_get1_RSA' is deprecated
157 | throw CryptoError.openssl(identifier: "rsaPkeyGet1", reason: "RSA key creation failed")
158 | }
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAKey.swift:162:14: warning: 'RSA_free' is deprecated
160 | }
161 |
162 | deinit { RSA_free(pointer.convert()) }
| `- warning: 'RSA_free' is deprecated
163 | }
164 |
[147/161] Compiling Crypto Deprecated.swift
[148/161] Compiling Crypto Exports.swift
[149/161] Compiling Crypto Base32.swift
/host/spi-builder-workspace/Sources/Crypto/Utilities/Base32.swift:17:13: warning: variable 'result' was never mutated; consider changing to 'let' constant
15 | public init?(base32Encoded: Data) {
16 | let maxSize = (base32Encoded.count * 5 + 4) / 8
17 | var result = UnsafeMutablePointer<UInt8>.allocate(capacity: maxSize)
| `- warning: variable 'result' was never mutated; consider changing to 'let' constant
18 | defer {
19 | result.deinitialize(count: maxSize)
/host/spi-builder-workspace/Sources/Crypto/Utilities/Base32.swift:38:13: warning: variable 'result' was never mutated; consider changing to 'let' constant
36 | public func base32EncodedData() -> Data {
37 | let maxSize = (count * 8 + 4) / 5
38 | var result = UnsafeMutablePointer<UInt8>.allocate(capacity: maxSize)
| `- warning: variable 'result' was never mutated; consider changing to 'let' constant
39 | defer {
40 | result.deinitialize(count: maxSize)
[150/161] Compiling Crypto CryptoError.swift
/host/spi-builder-workspace/Sources/Crypto/Utilities/Base32.swift:17:13: warning: variable 'result' was never mutated; consider changing to 'let' constant
15 | public init?(base32Encoded: Data) {
16 | let maxSize = (base32Encoded.count * 5 + 4) / 8
17 | var result = UnsafeMutablePointer<UInt8>.allocate(capacity: maxSize)
| `- warning: variable 'result' was never mutated; consider changing to 'let' constant
18 | defer {
19 | result.deinitialize(count: maxSize)
/host/spi-builder-workspace/Sources/Crypto/Utilities/Base32.swift:38:13: warning: variable 'result' was never mutated; consider changing to 'let' constant
36 | public func base32EncodedData() -> Data {
37 | let maxSize = (count * 8 + 4) / 5
38 | var result = UnsafeMutablePointer<UInt8>.allocate(capacity: maxSize)
| `- warning: variable 'result' was never mutated; consider changing to 'let' constant
39 | defer {
40 | result.deinitialize(count: maxSize)
[151/161] Compiling Crypto RSAPadding.swift
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAPadding.swift:23:14: error: cannot find 'RSA_SSLV23_PADDING' in scope
21 | case RSA_PKCS1_PADDING:
22 | self = .pkcs1
23 | case RSA_SSLV23_PADDING:
| `- error: cannot find 'RSA_SSLV23_PADDING' in scope
24 | self = .sslv23
25 | case RSA_NO_PADDING:
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAPadding.swift:42:20: error: cannot find 'RSA_SSLV23_PADDING' in scope
40 | return RSA_PKCS1_PADDING
41 | case .sslv23:
42 | return RSA_SSLV23_PADDING
| `- error: cannot find 'RSA_SSLV23_PADDING' in scope
43 | case .none:
44 | return RSA_NO_PADDING
[152/161] Compiling Crypto CryptoRandom.swift
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAPadding.swift:23:14: error: cannot find 'RSA_SSLV23_PADDING' in scope
21 | case RSA_PKCS1_PADDING:
22 | self = .pkcs1
23 | case RSA_SSLV23_PADDING:
| `- error: cannot find 'RSA_SSLV23_PADDING' in scope
24 | self = .sslv23
25 | case RSA_NO_PADDING:
/host/spi-builder-workspace/Sources/Crypto/RSA/RSAPadding.swift:42:20: error: cannot find 'RSA_SSLV23_PADDING' in scope
40 | return RSA_PKCS1_PADDING
41 | case .sslv23:
42 | return RSA_SSLV23_PADDING
| `- error: cannot find 'RSA_SSLV23_PADDING' in scope
43 | case .none:
44 | return RSA_NO_PADDING
[153/161] Compiling Crypto OpenSSLStreamCipher.swift
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLStreamCipher.swift:71:25: error: cannot find 'EVP_CIPHER_key_length' in scope
69 | let iv = iv?.convertToData()
70 |
71 | let keyLength = EVP_CIPHER_key_length(algorithm.c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
72 | guard keyLength == key.count else {
73 | throw CryptoError(identifier: "cipherKeySize", reason: "Invalid cipher key length \(key.count) != \(keyLength).")
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLStreamCipher.swift:76:24: error: cannot find 'EVP_CIPHER_iv_length' in scope
74 | }
75 |
76 | let ivLength = EVP_CIPHER_iv_length(algorithm.c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
77 | guard (ivLength == 0 && (iv == nil || iv?.count == 0)) || (iv != nil && iv?.count == Int(ivLength)) else {
78 | throw CryptoError(identifier: "cipherIVSize", reason: "Invalid cipher IV length \(iv?.count ?? 0) != \(ivLength).")
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:41:16: error: cannot find 'EVP_MD_type' in scope
39 | /// Returns the OpenSSL NID type for this algorithm.
40 | public var type: Int32 {
41 | return EVP_MD_type(c.convert())
| `- error: cannot find 'EVP_MD_type' in scope
42 | }
43 |
[154/161] Compiling Crypto Digest.swift
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLStreamCipher.swift:71:25: error: cannot find 'EVP_CIPHER_key_length' in scope
69 | let iv = iv?.convertToData()
70 |
71 | let keyLength = EVP_CIPHER_key_length(algorithm.c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
72 | guard keyLength == key.count else {
73 | throw CryptoError(identifier: "cipherKeySize", reason: "Invalid cipher key length \(key.count) != \(keyLength).")
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLStreamCipher.swift:76:24: error: cannot find 'EVP_CIPHER_iv_length' in scope
74 | }
75 |
76 | let ivLength = EVP_CIPHER_iv_length(algorithm.c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
77 | guard (ivLength == 0 && (iv == nil || iv?.count == 0)) || (iv != nil && iv?.count == Int(ivLength)) else {
78 | throw CryptoError(identifier: "cipherIVSize", reason: "Invalid cipher IV length \(iv?.count ?? 0) != \(ivLength).")
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:41:16: error: cannot find 'EVP_MD_type' in scope
39 | /// Returns the OpenSSL NID type for this algorithm.
40 | public var type: Int32 {
41 | return EVP_MD_type(c.convert())
| `- error: cannot find 'EVP_MD_type' in scope
42 | }
43 |
[155/161] Compiling Crypto DigestAlgorithm.swift
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLStreamCipher.swift:71:25: error: cannot find 'EVP_CIPHER_key_length' in scope
69 | let iv = iv?.convertToData()
70 |
71 | let keyLength = EVP_CIPHER_key_length(algorithm.c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
72 | guard keyLength == key.count else {
73 | throw CryptoError(identifier: "cipherKeySize", reason: "Invalid cipher key length \(key.count) != \(keyLength).")
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLStreamCipher.swift:76:24: error: cannot find 'EVP_CIPHER_iv_length' in scope
74 | }
75 |
76 | let ivLength = EVP_CIPHER_iv_length(algorithm.c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
77 | guard (ivLength == 0 && (iv == nil || iv?.count == 0)) || (iv != nil && iv?.count == Int(ivLength)) else {
78 | throw CryptoError(identifier: "cipherIVSize", reason: "Invalid cipher IV length \(iv?.count ?? 0) != \(ivLength).")
/host/spi-builder-workspace/Sources/Crypto/Digest/DigestAlgorithm.swift:41:16: error: cannot find 'EVP_MD_type' in scope
39 | /// Returns the OpenSSL NID type for this algorithm.
40 | public var type: Int32 {
41 | return EVP_MD_type(c.convert())
| `- error: cannot find 'EVP_MD_type' in scope
42 | }
43 |
[156/161] Compiling Crypto Cipher.swift
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:55:16: error: cannot find 'EVP_CIPHER_type' in scope
53 | /// Returns the OpenSSL NID type for this algorithm.
54 | public var type: Int32 {
55 | return EVP_CIPHER_type(c.convert())
| `- error: cannot find 'EVP_CIPHER_type' in scope
56 | }
57 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:60:16: error: cannot find 'EVP_CIPHER_key_length' in scope
58 | /// This cipher's required key length.
59 | public var keySize: Int32 {
60 | return EVP_CIPHER_key_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
61 | }
62 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:65:16: error: cannot find 'EVP_CIPHER_iv_length' in scope
63 | /// This cipher's required initialization vector length.
64 | public var ivSize: Int32 {
65 | return EVP_CIPHER_iv_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
66 | }
67 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:70:16: error: cannot find 'EVP_CIPHER_block_size' in scope
68 | /// This cipher's block size, used internally to allocate "out" buffers.
69 | public var blockSize: Int32 {
70 | return EVP_CIPHER_block_size(c.convert())
| `- error: cannot find 'EVP_CIPHER_block_size' in scope
71 | }
72 | }
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:30:16: error: cannot find 'EVP_CIPHER_type' in scope
28 | /// See `OpenSSLCipherAlgorithm`
29 | public var type: Int32 {
30 | return EVP_CIPHER_type(c.convert())
| `- error: cannot find 'EVP_CIPHER_type' in scope
31 | }
32 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:35:16: error: cannot find 'EVP_CIPHER_key_length' in scope
33 | /// See `OpenSSLCipherAlgorithm`
34 | public var keySize: Int32 {
35 | return EVP_CIPHER_key_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
36 | }
37 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:40:16: error: cannot find 'EVP_CIPHER_iv_length' in scope
38 | /// See `OpenSSLCipherAlgorithm`
39 | public var ivSize: Int32 {
40 | return EVP_CIPHER_iv_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
41 | }
42 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:45:16: error: cannot find 'EVP_CIPHER_block_size' in scope
43 | /// See `OpenSSLCipherAlgorithm`
44 | public var blockSize: Int32 {
45 | return EVP_CIPHER_block_size(c.convert())
| `- error: cannot find 'EVP_CIPHER_block_size' in scope
46 | }
47 | }
[157/161] Compiling Crypto CipherAlgorithm.swift
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:55:16: error: cannot find 'EVP_CIPHER_type' in scope
53 | /// Returns the OpenSSL NID type for this algorithm.
54 | public var type: Int32 {
55 | return EVP_CIPHER_type(c.convert())
| `- error: cannot find 'EVP_CIPHER_type' in scope
56 | }
57 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:60:16: error: cannot find 'EVP_CIPHER_key_length' in scope
58 | /// This cipher's required key length.
59 | public var keySize: Int32 {
60 | return EVP_CIPHER_key_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
61 | }
62 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:65:16: error: cannot find 'EVP_CIPHER_iv_length' in scope
63 | /// This cipher's required initialization vector length.
64 | public var ivSize: Int32 {
65 | return EVP_CIPHER_iv_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
66 | }
67 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:70:16: error: cannot find 'EVP_CIPHER_block_size' in scope
68 | /// This cipher's block size, used internally to allocate "out" buffers.
69 | public var blockSize: Int32 {
70 | return EVP_CIPHER_block_size(c.convert())
| `- error: cannot find 'EVP_CIPHER_block_size' in scope
71 | }
72 | }
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:30:16: error: cannot find 'EVP_CIPHER_type' in scope
28 | /// See `OpenSSLCipherAlgorithm`
29 | public var type: Int32 {
30 | return EVP_CIPHER_type(c.convert())
| `- error: cannot find 'EVP_CIPHER_type' in scope
31 | }
32 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:35:16: error: cannot find 'EVP_CIPHER_key_length' in scope
33 | /// See `OpenSSLCipherAlgorithm`
34 | public var keySize: Int32 {
35 | return EVP_CIPHER_key_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
36 | }
37 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:40:16: error: cannot find 'EVP_CIPHER_iv_length' in scope
38 | /// See `OpenSSLCipherAlgorithm`
39 | public var ivSize: Int32 {
40 | return EVP_CIPHER_iv_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
41 | }
42 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:45:16: error: cannot find 'EVP_CIPHER_block_size' in scope
43 | /// See `OpenSSLCipherAlgorithm`
44 | public var blockSize: Int32 {
45 | return EVP_CIPHER_block_size(c.convert())
| `- error: cannot find 'EVP_CIPHER_block_size' in scope
46 | }
47 | }
[158/161] Compiling Crypto OpenSSLCipherAlgorithm.swift
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:55:16: error: cannot find 'EVP_CIPHER_type' in scope
53 | /// Returns the OpenSSL NID type for this algorithm.
54 | public var type: Int32 {
55 | return EVP_CIPHER_type(c.convert())
| `- error: cannot find 'EVP_CIPHER_type' in scope
56 | }
57 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:60:16: error: cannot find 'EVP_CIPHER_key_length' in scope
58 | /// This cipher's required key length.
59 | public var keySize: Int32 {
60 | return EVP_CIPHER_key_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
61 | }
62 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:65:16: error: cannot find 'EVP_CIPHER_iv_length' in scope
63 | /// This cipher's required initialization vector length.
64 | public var ivSize: Int32 {
65 | return EVP_CIPHER_iv_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
66 | }
67 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/CipherAlgorithm.swift:70:16: error: cannot find 'EVP_CIPHER_block_size' in scope
68 | /// This cipher's block size, used internally to allocate "out" buffers.
69 | public var blockSize: Int32 {
70 | return EVP_CIPHER_block_size(c.convert())
| `- error: cannot find 'EVP_CIPHER_block_size' in scope
71 | }
72 | }
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:30:16: error: cannot find 'EVP_CIPHER_type' in scope
28 | /// See `OpenSSLCipherAlgorithm`
29 | public var type: Int32 {
30 | return EVP_CIPHER_type(c.convert())
| `- error: cannot find 'EVP_CIPHER_type' in scope
31 | }
32 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:35:16: error: cannot find 'EVP_CIPHER_key_length' in scope
33 | /// See `OpenSSLCipherAlgorithm`
34 | public var keySize: Int32 {
35 | return EVP_CIPHER_key_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_key_length' in scope
36 | }
37 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:40:16: error: cannot find 'EVP_CIPHER_iv_length' in scope
38 | /// See `OpenSSLCipherAlgorithm`
39 | public var ivSize: Int32 {
40 | return EVP_CIPHER_iv_length(c.convert())
| `- error: cannot find 'EVP_CIPHER_iv_length' in scope
41 | }
42 |
/host/spi-builder-workspace/Sources/Crypto/Cipher/OpenSSLCipherAlgorithm.swift:45:16: error: cannot find 'EVP_CIPHER_block_size' in scope
43 | /// See `OpenSSLCipherAlgorithm`
44 | public var blockSize: Int32 {
45 | return EVP_CIPHER_block_size(c.convert())
| `- error: cannot find 'EVP_CIPHER_block_size' in scope
46 | }
47 | }
[159/161] Compiling Crypto BCryptDigest.swift
[160/161] Compiling Crypto AuthenticatedCipher.swift
[161/161] Compiling Crypto AuthenticatedCipherAlgorithm.swift
BUILD FAILURE 6.1 linux