sgx_tseal 1.1.1

Rust SGX SDK provides the ability to write Intel SGX applications in Rust Programming Language.
Documentation
Build #235981 2020-04-02T23:44:43.218146+00:00
# rustc version
rustc 1.44.0-nightly (76b11980a 2020-04-01)
# docs.rs version
docsrs 0.6.0 (aebf5d3 2020-04-02)

# build log
[INFO] running `"docker" "create" "-v" "/home/cratesfyi/workspace/builds/sgx_tseal-1.1.1/target:/opt/rustwide/target:rw,Z" "-v" "/home/cratesfyi/workspace/builds/sgx_tseal-1.1.1/source:/opt/rustwide/workdir:ro,Z" "-v" "/home/cratesfyi/workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/home/cratesfyi/workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=1001" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "RUSTFLAGS=" "-e" "RUSTDOCFLAGS=-Z unstable-options --resource-suffix -20200401-1.44.0-nightly-76b11980a --static-root-path / --cap-lints warn --extern-html-root-url sgx_tcrypto=https://docs.rs/sgx_tcrypto/1.1.1 --extern-html-root-url sgx_tse=https://docs.rs/sgx_tse/1.1.1 --extern-html-root-url sgx_trts=https://docs.rs/sgx_trts/1.1.1 --extern-html-root-url sgx_types=https://docs.rs/sgx_types/1.1.1" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "3221225472" "--network" "none" "rustops/crates-build-env" "/opt/rustwide/cargo-home/bin/cargo" "+nightly" "doc" "--lib" "--no-deps" "-j2"`
[INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap.
[INFO] [stdout] be3d9d5f6af5aa7f06c0d2a6b88e79c318f6f2d41aa90392c145f77e1dfdc889
[INFO] running `"docker" "start" "-a" "be3d9d5f6af5aa7f06c0d2a6b88e79c318f6f2d41aa90392c145f77e1dfdc889"`
[INFO] [stderr]     Checking sgx_types v1.1.1
[INFO] [stderr]     Checking sgx_libc v1.1.1
[INFO] [stderr]     Checking sgx_tcrypto v1.1.1
[INFO] [stderr]     Checking sgx_tse v1.1.1
[INFO] [stderr]     Checking sgx_trts v1.1.1
[INFO] [stderr]  Documenting sgx_tseal v1.1.1 (/opt/rustwide/workdir)
[INFO] [stderr] warning: `[T]` cannot be resolved, ignoring it.
[INFO] [stderr]    --> src/seal.rs:440:34
[INFO] [stderr]     |
[INFO] [stderr] 440 | /// The encrypt_text to seal is [T], and T must have Copy and ContiguousMemory trait.
[INFO] [stderr]     |                                  ^ cannot be resolved, ignoring
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(intra_doc_link_resolution_failure)]` on by default
[INFO] [stderr]     = help: to escape `[` and `]` characters, just add '\' before them like `\[` or `\]`
[INFO] [stderr] 
[INFO] [stderr] warning: `[T]` cannot be resolved, ignoring it.
[INFO] [stderr]    --> src/seal.rs:475:64
[INFO] [stderr]     |
[INFO] [stderr] 475 |     /// Pointer to the data stream to be encrypted, which is &[T]. Must be within the enclave.
[INFO] [stderr]     |                                                                ^ cannot be resolved, ignoring
[INFO] [stderr]     |
[INFO] [stderr]     = help: to escape `[` and `]` characters, just add '\' before them like `\[` or `\]`
[INFO] [stderr] 
[INFO] [stderr] warning: `[T]` cannot be resolved, ignoring it.
[INFO] [stderr]    --> src/seal.rs:569:64
[INFO] [stderr]     |
[INFO] [stderr] 569 |     /// Pointer to the data stream to be encrypted, which is &[T]. Must not be NULL. Must be within the enclave.
[INFO] [stderr]     |                                                                ^ cannot be resolved, ignoring
[INFO] [stderr]     |
[INFO] [stderr]     = help: to escape `[` and `]` characters, just add '\' before them like `\[` or `\]`
[INFO] [stderr] 
[INFO] [stderr]     Finished dev [unoptimized + debuginfo] target(s) in 2.34s
[INFO] running `"docker" "inspect" "be3d9d5f6af5aa7f06c0d2a6b88e79c318f6f2d41aa90392c145f77e1dfdc889"`
[INFO] running `"docker" "rm" "-f" "be3d9d5f6af5aa7f06c0d2a6b88e79c318f6f2d41aa90392c145f77e1dfdc889"`
[INFO] [stdout] be3d9d5f6af5aa7f06c0d2a6b88e79c318f6f2d41aa90392c145f77e1dfdc889