Skip to content

add factorization attack on RSA #223

add factorization attack on RSA

add factorization attack on RSA #223

Triggered via push January 23, 2024 17:03
Status Failure
Total duration 31m 37s
Artifacts

windows-test.yml

on: push
Matrix: test
Fit to window
Zoom out
Zoom in

Annotations

4 errors and 35 warnings
test (windows-latest): cryptatools-core/src/maths/factorization.rs#L16
cannot find function `factor` in module `factorization`
test (windows-latest): cryptatools-core/src/maths/factorization.rs#L16
integer literal is too large
test (windows-latest)
aborting due to 2 previous errors
test (windows-latest)
Process completed with exit code 1.
test (windows-latest)
The following actions uses node12 which is deprecated and will be forced to run on node16: actions/checkout@v2, actions-rs/toolchain@v1, actions-rs/cargo@v1. For more info: https://github.blog/changelog/2023-06-13-github-actions-all-actions-will-run-on-node16-instead-of-node12-by-default/
test (windows-latest)
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
test (windows-latest)
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
test (windows-latest)
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
test (windows-latest)
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
test (windows-latest): cryptatools-core/src/cryptanalysis/common/rsa/public_exponent_attack.rs#L6
unused import: `num_bigint_dig::prime::probably_prime`
test (windows-latest): cryptatools-core/src/cryptanalysis/common/rsa/public_exponent_attack.rs#L18
unused import: `crate::utils::convert::Encode`
test (windows-latest): cryptatools-core/src/maths/factorization.rs#L1
unused import: `num_bigint::BigUint`
test (windows-latest): cryptatools-core/src/cryptanalysis/common/rsa/public_exponent_attack.rs#L6
unused import: `num_bigint_dig::prime::probably_prime`
test (windows-latest): cryptatools-core/src/cryptanalysis/common/rsa/public_exponent_attack.rs#L18
unused import: `crate::utils::convert::Encode`
test (windows-latest): cryptatools-core/src/maths/factorization.rs#L1
unused import: `num_bigint::BigUint`
test (windows-latest): cryptatools-core/src/cryptanalysis/common/rsa/public_exponent_attack.rs#L6
unused import: `num_bigint_dig::prime::probably_prime`
test (windows-latest): cryptatools-core/src/cryptanalysis/common/rsa/public_exponent_attack.rs#L18
unused import: `crate::utils::convert::Encode`
test (windows-latest): cryptatools-core/src/maths/factorization.rs#L1
unused import: `num_bigint::BigUint`