Mon May 22 02:34:04 UTC 2023 I: starting to build pam-ssh-agent-auth/bookworm/armhf on jenkins on '2023-05-22 02:33' Mon May 22 02:34:04 UTC 2023 I: The jenkins build log is/was available at https://jenkins.debian.net/userContent/reproducible/debian/build_service/armhf_10/2063/console.log Mon May 22 02:34:04 UTC 2023 I: Downloading source for bookworm/pam-ssh-agent-auth=0.10.3-4 --2023-05-22 02:34:04-- http://cdn-fastly.deb.debian.org/debian/pool/main/p/pam-ssh-agent-auth/pam-ssh-agent-auth_0.10.3-4.dsc Connecting to 78.137.99.97:3128... connected. Proxy request sent, awaiting response... 200 OK Length: 1863 (1.8K) [text/prs.lines.tag] Saving to: ‘pam-ssh-agent-auth_0.10.3-4.dsc’ 0K . 100% 166M=0s 2023-05-22 02:34:04 (166 MB/s) - ‘pam-ssh-agent-auth_0.10.3-4.dsc’ saved [1863/1863] Mon May 22 02:34:04 UTC 2023 I: pam-ssh-agent-auth_0.10.3-4.dsc -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 3.0 (quilt) Source: pam-ssh-agent-auth Binary: libpam-ssh-agent-auth Architecture: any Version: 0.10.3-4 Maintainer: Debian QA Group Homepage: http://pamsshagentauth.sf.net/ Standards-Version: 3.9.5 Build-Depends: debhelper (>= 9), autotools-dev, libssl-dev, libpam0g-dev Package-List: libpam-ssh-agent-auth deb admin optional arch=any Checksums-Sha1: a4482a050fdad1d012427e45799564136708cf6b 1066393 pam-ssh-agent-auth_0.10.3.orig.tar.bz2 e2fcb41f14044c4f393bb5296700e84cc2bd952a 14288 pam-ssh-agent-auth_0.10.3-4.debian.tar.xz Checksums-Sha256: 3c53d358d6eaed1b211239df017c27c6f9970995d14102ae67bae16d4f47a763 1066393 pam-ssh-agent-auth_0.10.3.orig.tar.bz2 9b3787f00368851be1f628875c41d644e6fbb31f3cdde189971d810965ebac53 14288 pam-ssh-agent-auth_0.10.3-4.debian.tar.xz Files: 8dbe90ab3625e545036333e6f51ccf1d 1066393 pam-ssh-agent-auth_0.10.3.orig.tar.bz2 fa3833e1643d322d1c14c23b0e3af4b0 14288 pam-ssh-agent-auth_0.10.3-4.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtSLzkVnaB9053AsR9LqqgNsoukwFAmNwe3wACgkQ9LqqgNso ukxCdxAAg+L95J+xzkf3A6iQdVN5WX8YNIhfV2xe2E3VlHUOQzhlNaoWb08WN53c shnA7NPHa701bJHNmeWzVMEm0p8r7O0T46QSwjOyMdQXXTJuktKzFHH7Mf88zirY laQGsyvLhNS+ftdJ+9XXFHGehiM4g6vL1r4BqQYdyvtCsgrH1MjzJu37NoriH24n XDMqf89sdH33BtfBFLFUuj0I6byexzhmsRoXZo9vg4TxGpn4bJzh3Cqca9tiHqY9 oBPZmMBLfsbVYJuBOgXNf486aky/v6p2qDTHLEzeSAvowo7Wl5l5gTm9TY91Phqu AdpdswUon1jCeYr7tLYXqCH0aEVxTFKfF5cRbM9ecQfy6jP8W0UefpQ2qswPl/cQ SdSVBPUFJ0Pv6BkVj4e+kZCoXGybKatNNg29bIxjv2GQzVTrH9oTCEbN6BKE7OxX gW2CluUjOxNFleIpecG7TBoN/AUHa2AKdAYIm8VzxiStwDSu3XbXC9gHIECzoOL8 5OfwhEft6oduIJdPlCMaBC9VLgLwAGzcKhm9a9v/fnkeRBeWZhrScnKAZ8TVn4d/ Jxo4o2lbR+LlO4UFAOIoXcvXOhnZiSNa8TBShUqDaAVw/wiL0X4AFbyyMzw41mmR 1nrTP1V24LQVFYTcAUs0POWci4w6LjXRqrq0E+tsg7oMb9PJ0Xo= =KflT -----END PGP SIGNATURE----- Mon May 22 02:34:04 UTC 2023 I: Checking whether the package is not for us Mon May 22 02:34:04 UTC 2023 I: Starting 1st build on remote node jtx1b-armhf-rb.debian.net. Mon May 22 02:34:04 UTC 2023 I: Preparing to do remote build '1' on jtx1b-armhf-rb.debian.net. Mon May 22 02:37:27 UTC 2023 I: Deleting $TMPDIR on jtx1b-armhf-rb.debian.net. I: pbuilder: network access will be disabled during build I: Current time: Sun May 21 14:34:10 -12 2023 I: pbuilder-time-stamp: 1684722850 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/bookworm-reproducible-base.tgz] I: copying local configuration W: --override-config is not set; not updating apt.conf Read the manpage for details. I: mounting /proc filesystem I: mounting /sys filesystem I: creating /{dev,run}/shm I: mounting /dev/pts filesystem I: redirecting /dev/ptmx to /dev/pts/ptmx I: policy-rc.d already exists I: Copying source file I: copying [pam-ssh-agent-auth_0.10.3-4.dsc] I: copying [./pam-ssh-agent-auth_0.10.3.orig.tar.bz2] I: copying [./pam-ssh-agent-auth_0.10.3-4.debian.tar.xz] I: Extracting source gpgv: Signature made Sat Nov 12 17:07:08 2022 -12 gpgv: using RSA key B522F39159DA07DD39DC0B11F4BAAA80DB28BA4C gpgv: Can't check signature: No public key dpkg-source: warning: cannot verify inline signature for ./pam-ssh-agent-auth_0.10.3-4.dsc: no acceptable signature found dpkg-source: info: extracting pam-ssh-agent-auth in pam-ssh-agent-auth-0.10.3 dpkg-source: info: unpacking pam-ssh-agent-auth_0.10.3.orig.tar.bz2 dpkg-source: info: unpacking pam-ssh-agent-auth_0.10.3-4.debian.tar.xz dpkg-source: info: using patch list from debian/patches/series dpkg-source: info: applying 0001-authfd.c-check-return-value-of-seteuid-2.patch dpkg-source: info: applying openssl-1.1.1-1.patch dpkg-source: info: applying openssl-1.1.1-2.patch dpkg-source: info: applying 0002-fix-segfault-when-using-ECDSA-keys.patch I: using fakeroot in build. I: Installing the build-deps I: user script /srv/workspace/pbuilder/32766/tmp/hooks/D02_print_environment starting I: set BUILDDIR='/build' BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' BUILDUSERNAME='pbuilder1' BUILD_ARCH='armhf' DEBIAN_FRONTEND='noninteractive' DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=3 ' DISTRIBUTION='bookworm' HOME='/root' HOST_ARCH='armhf' IFS=' ' INVOCATION_ID='d4a368c7a9c241b289ae9548b8a16139' LANG='C' LANGUAGE='en_US:en' LC_ALL='C' MAIL='/var/mail/root' OPTIND='1' PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games' PBCURRENTCOMMANDLINEOPERATION='build' PBUILDER_OPERATION='build' PBUILDER_PKGDATADIR='/usr/share/pbuilder' PBUILDER_PKGLIBDIR='/usr/lib/pbuilder' PBUILDER_SYSCONFDIR='/etc' PPID='32766' PS1='# ' PS2='> ' PS4='+ ' PWD='/' SHELL='/bin/bash' SHLVL='2' SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.zKWStvMk/pbuilderrc_0mxg --distribution bookworm --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/bookworm-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.zKWStvMk/b1 --logfile b1/build.log pam-ssh-agent-auth_0.10.3-4.dsc' SUDO_GID='114' SUDO_UID='110' SUDO_USER='jenkins' TERM='unknown' TZ='/usr/share/zoneinfo/Etc/GMT+12' USER='root' _='/usr/bin/systemd-run' http_proxy='http://10.0.0.15:3142/' I: uname -a Linux jtx1b 5.10.0-23-arm64 #1 SMP Debian 5.10.179-1 (2023-05-12) aarch64 GNU/Linux I: ls -l /bin total 5072 -rwxr-xr-x 1 root root 838488 Apr 23 09:24 bash -rwxr-xr-x 3 root root 67144 Sep 18 2022 bunzip2 -rwxr-xr-x 3 root root 67144 Sep 18 2022 bzcat lrwxrwxrwx 1 root root 6 Sep 18 2022 bzcmp -> bzdiff -rwxr-xr-x 1 root root 2225 Sep 18 2022 bzdiff lrwxrwxrwx 1 root root 6 Sep 18 2022 bzegrep -> bzgrep -rwxr-xr-x 1 root root 4893 Nov 27 2021 bzexe lrwxrwxrwx 1 root root 6 Sep 18 2022 bzfgrep -> bzgrep -rwxr-xr-x 1 root root 3775 Sep 18 2022 bzgrep -rwxr-xr-x 3 root root 67144 Sep 18 2022 bzip2 -rwxr-xr-x 1 root root 67112 Sep 18 2022 bzip2recover lrwxrwxrwx 1 root root 6 Sep 18 2022 bzless -> bzmore -rwxr-xr-x 1 root root 1297 Sep 18 2022 bzmore -rwxr-xr-x 1 root root 67632 Sep 20 2022 cat -rwxr-xr-x 1 root root 67676 Sep 20 2022 chgrp -rwxr-xr-x 1 root root 67644 Sep 20 2022 chmod -rwxr-xr-x 1 root root 67684 Sep 20 2022 chown -rwxr-xr-x 1 root root 133532 Sep 20 2022 cp -rwxr-xr-x 1 root root 132868 Jan 5 01:20 dash -rwxr-xr-x 1 root root 133220 Sep 20 2022 date -rwxr-xr-x 1 root root 67732 Sep 20 2022 dd -rwxr-xr-x 1 root root 68104 Sep 20 2022 df -rwxr-xr-x 1 root root 133632 Sep 20 2022 dir -rwxr-xr-x 1 root root 59128 Mar 22 21:02 dmesg lrwxrwxrwx 1 root root 8 Dec 19 01:33 dnsdomainname -> hostname lrwxrwxrwx 1 root root 8 Dec 19 01:33 domainname -> hostname -rwxr-xr-x 1 root root 67560 Sep 20 2022 echo -rwxr-xr-x 1 root root 41 Jan 24 02:43 egrep -rwxr-xr-x 1 root root 67548 Sep 20 2022 false -rwxr-xr-x 1 root root 41 Jan 24 02:43 fgrep -rwxr-xr-x 1 root root 55748 Mar 22 21:02 findmnt -rwsr-xr-x 1 root root 26208 Mar 22 20:15 fusermount -rwxr-xr-x 1 root root 128608 Jan 24 02:43 grep -rwxr-xr-x 2 root root 2346 Apr 9 2022 gunzip -rwxr-xr-x 1 root root 6447 Apr 9 2022 gzexe -rwxr-xr-x 1 root root 64220 Apr 9 2022 gzip -rwxr-xr-x 1 root root 67032 Dec 19 01:33 hostname -rwxr-xr-x 1 root root 67720 Sep 20 2022 ln -rwxr-xr-x 1 root root 35132 Mar 22 21:51 login -rwxr-xr-x 1 root root 133632 Sep 20 2022 ls -rwxr-xr-x 1 root root 136808 Mar 22 21:02 lsblk -rwxr-xr-x 1 root root 67800 Sep 20 2022 mkdir -rwxr-xr-x 1 root root 67764 Sep 20 2022 mknod -rwxr-xr-x 1 root root 67596 Sep 20 2022 mktemp -rwxr-xr-x 1 root root 38504 Mar 22 21:02 more -rwsr-xr-x 1 root root 38496 Mar 22 21:02 mount -rwxr-xr-x 1 root root 9824 Mar 22 21:02 mountpoint -rwxr-xr-x 1 root root 133532 Sep 20 2022 mv lrwxrwxrwx 1 root root 8 Dec 19 01:33 nisdomainname -> hostname lrwxrwxrwx 1 root root 14 Apr 2 18:25 pidof -> /sbin/killall5 -rwxr-xr-x 1 root root 67608 Sep 20 2022 pwd lrwxrwxrwx 1 root root 4 Apr 23 09:24 rbash -> bash -rwxr-xr-x 1 root root 67600 Sep 20 2022 readlink -rwxr-xr-x 1 root root 67672 Sep 20 2022 rm -rwxr-xr-x 1 root root 67600 Sep 20 2022 rmdir -rwxr-xr-x 1 root root 67400 Nov 2 2022 run-parts -rwxr-xr-x 1 root root 133372 Jan 5 07:55 sed lrwxrwxrwx 1 root root 4 Jan 5 01:20 sh -> dash -rwxr-xr-x 1 root root 67584 Sep 20 2022 sleep -rwxr-xr-x 1 root root 67644 Sep 20 2022 stty -rwsr-xr-x 1 root root 50800 Mar 22 21:02 su -rwxr-xr-x 1 root root 67584 Sep 20 2022 sync -rwxr-xr-x 1 root root 336764 Apr 6 02:25 tar -rwxr-xr-x 1 root root 67144 Nov 2 2022 tempfile -rwxr-xr-x 1 root root 133224 Sep 20 2022 touch -rwxr-xr-x 1 root root 67548 Sep 20 2022 true -rwxr-xr-x 1 root root 9768 Mar 22 20:15 ulockmgr_server -rwsr-xr-x 1 root root 22108 Mar 22 21:02 umount -rwxr-xr-x 1 root root 67572 Sep 20 2022 uname -rwxr-xr-x 2 root root 2346 Apr 9 2022 uncompress -rwxr-xr-x 1 root root 133632 Sep 20 2022 vdir -rwxr-xr-x 1 root root 42608 Mar 22 21:02 wdctl lrwxrwxrwx 1 root root 8 Dec 19 01:33 ypdomainname -> hostname -rwxr-xr-x 1 root root 1984 Apr 9 2022 zcat -rwxr-xr-x 1 root root 1678 Apr 9 2022 zcmp -rwxr-xr-x 1 root root 6460 Apr 9 2022 zdiff -rwxr-xr-x 1 root root 29 Apr 9 2022 zegrep -rwxr-xr-x 1 root root 29 Apr 9 2022 zfgrep -rwxr-xr-x 1 root root 2081 Apr 9 2022 zforce -rwxr-xr-x 1 root root 8103 Apr 9 2022 zgrep -rwxr-xr-x 1 root root 2206 Apr 9 2022 zless -rwxr-xr-x 1 root root 1842 Apr 9 2022 zmore -rwxr-xr-x 1 root root 4577 Apr 9 2022 znew I: user script /srv/workspace/pbuilder/32766/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy Version: 0.invalid.0 Architecture: armhf Maintainer: Debian Pbuilder Team Description: Dummy package to satisfy dependencies with aptitude - created by pbuilder This package was created automatically by pbuilder to satisfy the build-dependencies of the package being currently built. Depends: debhelper (>= 9), autotools-dev, libssl-dev, libpam0g-dev dpkg-deb: building package 'pbuilder-satisfydepends-dummy' in '/tmp/satisfydepends-aptitude/pbuilder-satisfydepends-dummy.deb'. Selecting previously unselected package pbuilder-satisfydepends-dummy. (Reading database ... 19329 files and directories currently installed.) Preparing to unpack .../pbuilder-satisfydepends-dummy.deb ... Unpacking pbuilder-satisfydepends-dummy (0.invalid.0) ... dpkg: pbuilder-satisfydepends-dummy: dependency problems, but configuring anyway as you requested: pbuilder-satisfydepends-dummy depends on debhelper (>= 9); however: Package debhelper is not installed. pbuilder-satisfydepends-dummy depends on autotools-dev; however: Package autotools-dev is not installed. pbuilder-satisfydepends-dummy depends on libssl-dev; however: Package libssl-dev is not installed. pbuilder-satisfydepends-dummy depends on libpam0g-dev; however: Package libpam0g-dev is not installed. Setting up pbuilder-satisfydepends-dummy (0.invalid.0) ... Reading package lists... Building dependency tree... Reading state information... Initializing package states... Writing extended state information... Building tag database... pbuilder-satisfydepends-dummy is already installed at the requested version (0.invalid.0) pbuilder-satisfydepends-dummy is already installed at the requested version (0.invalid.0) The following NEW packages will be installed: autoconf{a} automake{a} autopoint{a} autotools-dev{a} bsdextrautils{a} debhelper{a} dh-autoreconf{a} dh-strip-nondeterminism{a} dwz{a} file{a} gettext{a} gettext-base{a} groff-base{a} intltool-debian{a} libarchive-zip-perl{a} libdebhelper-perl{a} libelf1{a} libfile-stripnondeterminism-perl{a} libicu72{a} libmagic-mgc{a} libmagic1{a} libpam0g-dev{a} libpipeline1{a} libssl-dev{a} libsub-override-perl{a} libtool{a} libuchardet0{a} libxml2{a} m4{a} man-db{a} po-debconf{a} sensible-utils{a} The following packages are RECOMMENDED but will NOT be installed: curl libarchive-cpio-perl libltdl-dev libmail-sendmail-perl lynx wget 0 packages upgraded, 32 newly installed, 0 to remove and 0 not upgraded. Need to get 20.3 MB of archives. After unpacking 76.4 MB will be used. Writing extended state information... Get: 1 http://deb.debian.org/debian bookworm/main armhf sensible-utils all 0.0.17+nmu1 [19.0 kB] Get: 2 http://deb.debian.org/debian bookworm/main armhf libmagic-mgc armhf 1:5.44-3 [305 kB] Get: 3 http://deb.debian.org/debian bookworm/main armhf libmagic1 armhf 1:5.44-3 [96.5 kB] Get: 4 http://deb.debian.org/debian bookworm/main armhf file armhf 1:5.44-3 [41.6 kB] Get: 5 http://deb.debian.org/debian bookworm/main armhf gettext-base armhf 0.21-12 [157 kB] Get: 6 http://deb.debian.org/debian bookworm/main armhf libuchardet0 armhf 0.0.7-1 [65.0 kB] Get: 7 http://deb.debian.org/debian bookworm/main armhf groff-base armhf 1.22.4-10 [825 kB] Get: 8 http://deb.debian.org/debian bookworm/main armhf bsdextrautils armhf 2.38.1-5+b1 [78.6 kB] Get: 9 http://deb.debian.org/debian bookworm/main armhf libpipeline1 armhf 1.5.7-1 [33.6 kB] Get: 10 http://deb.debian.org/debian bookworm/main armhf man-db armhf 2.11.2-2 [1351 kB] Get: 11 http://deb.debian.org/debian bookworm/main armhf m4 armhf 1.4.19-3 [265 kB] Get: 12 http://deb.debian.org/debian bookworm/main armhf autoconf all 2.71-3 [332 kB] Get: 13 http://deb.debian.org/debian bookworm/main armhf autotools-dev all 20220109.1 [51.6 kB] Get: 14 http://deb.debian.org/debian bookworm/main armhf automake all 1:1.16.5-1.3 [823 kB] Get: 15 http://deb.debian.org/debian bookworm/main armhf autopoint all 0.21-12 [495 kB] Get: 16 http://deb.debian.org/debian bookworm/main armhf libdebhelper-perl all 13.11.4 [81.2 kB] Get: 17 http://deb.debian.org/debian bookworm/main armhf libtool all 2.4.7-5 [517 kB] Get: 18 http://deb.debian.org/debian bookworm/main armhf dh-autoreconf all 20 [17.1 kB] Get: 19 http://deb.debian.org/debian bookworm/main armhf libarchive-zip-perl all 1.68-1 [104 kB] Get: 20 http://deb.debian.org/debian bookworm/main armhf libsub-override-perl all 0.09-4 [9304 B] Get: 21 http://deb.debian.org/debian bookworm/main armhf libfile-stripnondeterminism-perl all 1.13.1-1 [19.4 kB] Get: 22 http://deb.debian.org/debian bookworm/main armhf dh-strip-nondeterminism all 1.13.1-1 [8620 B] Get: 23 http://deb.debian.org/debian bookworm/main armhf libelf1 armhf 0.188-2.1 [170 kB] Get: 24 http://deb.debian.org/debian bookworm/main armhf dwz armhf 0.15-1 [101 kB] Get: 25 http://deb.debian.org/debian bookworm/main armhf libicu72 armhf 72.1-3 [9048 kB] Get: 26 http://deb.debian.org/debian bookworm/main armhf libxml2 armhf 2.9.14+dfsg-1.2 [591 kB] Get: 27 http://deb.debian.org/debian bookworm/main armhf gettext armhf 0.21-12 [1229 kB] Get: 28 http://deb.debian.org/debian bookworm/main armhf intltool-debian all 0.35.0+20060710.6 [22.9 kB] Get: 29 http://deb.debian.org/debian bookworm/main armhf po-debconf all 1.0.21+nmu1 [248 kB] Get: 30 http://deb.debian.org/debian bookworm/main armhf debhelper all 13.11.4 [942 kB] Get: 31 http://deb.debian.org/debian bookworm/main armhf libpam0g-dev armhf 1.5.2-6 [143 kB] Get: 32 http://deb.debian.org/debian bookworm/main armhf libssl-dev armhf 3.0.8-1 [2132 kB] Fetched 20.3 MB in 4s (4813 kB/s) debconf: delaying package configuration, since apt-utils is not installed Selecting previously unselected package sensible-utils. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19329 files and directories currently installed.) Preparing to unpack .../00-sensible-utils_0.0.17+nmu1_all.deb ... Unpacking sensible-utils (0.0.17+nmu1) ... Selecting previously unselected package libmagic-mgc. Preparing to unpack .../01-libmagic-mgc_1%3a5.44-3_armhf.deb ... Unpacking libmagic-mgc (1:5.44-3) ... Selecting previously unselected package libmagic1:armhf. Preparing to unpack .../02-libmagic1_1%3a5.44-3_armhf.deb ... Unpacking libmagic1:armhf (1:5.44-3) ... Selecting previously unselected package file. Preparing to unpack .../03-file_1%3a5.44-3_armhf.deb ... Unpacking file (1:5.44-3) ... Selecting previously unselected package gettext-base. Preparing to unpack .../04-gettext-base_0.21-12_armhf.deb ... Unpacking gettext-base (0.21-12) ... Selecting previously unselected package libuchardet0:armhf. Preparing to unpack .../05-libuchardet0_0.0.7-1_armhf.deb ... Unpacking libuchardet0:armhf (0.0.7-1) ... Selecting previously unselected package groff-base. Preparing to unpack .../06-groff-base_1.22.4-10_armhf.deb ... Unpacking groff-base (1.22.4-10) ... Selecting previously unselected package bsdextrautils. Preparing to unpack .../07-bsdextrautils_2.38.1-5+b1_armhf.deb ... Unpacking bsdextrautils (2.38.1-5+b1) ... Selecting previously unselected package libpipeline1:armhf. Preparing to unpack .../08-libpipeline1_1.5.7-1_armhf.deb ... Unpacking libpipeline1:armhf (1.5.7-1) ... Selecting previously unselected package man-db. Preparing to unpack .../09-man-db_2.11.2-2_armhf.deb ... Unpacking man-db (2.11.2-2) ... Selecting previously unselected package m4. Preparing to unpack .../10-m4_1.4.19-3_armhf.deb ... Unpacking m4 (1.4.19-3) ... Selecting previously unselected package autoconf. Preparing to unpack .../11-autoconf_2.71-3_all.deb ... Unpacking autoconf (2.71-3) ... Selecting previously unselected package autotools-dev. Preparing to unpack .../12-autotools-dev_20220109.1_all.deb ... Unpacking autotools-dev (20220109.1) ... Selecting previously unselected package automake. Preparing to unpack .../13-automake_1%3a1.16.5-1.3_all.deb ... Unpacking automake (1:1.16.5-1.3) ... Selecting previously unselected package autopoint. Preparing to unpack .../14-autopoint_0.21-12_all.deb ... Unpacking autopoint (0.21-12) ... Selecting previously unselected package libdebhelper-perl. Preparing to unpack .../15-libdebhelper-perl_13.11.4_all.deb ... Unpacking libdebhelper-perl (13.11.4) ... Selecting previously unselected package libtool. Preparing to unpack .../16-libtool_2.4.7-5_all.deb ... Unpacking libtool (2.4.7-5) ... Selecting previously unselected package dh-autoreconf. Preparing to unpack .../17-dh-autoreconf_20_all.deb ... Unpacking dh-autoreconf (20) ... Selecting previously unselected package libarchive-zip-perl. Preparing to unpack .../18-libarchive-zip-perl_1.68-1_all.deb ... Unpacking libarchive-zip-perl (1.68-1) ... Selecting previously unselected package libsub-override-perl. Preparing to unpack .../19-libsub-override-perl_0.09-4_all.deb ... Unpacking libsub-override-perl (0.09-4) ... Selecting previously unselected package libfile-stripnondeterminism-perl. Preparing to unpack .../20-libfile-stripnondeterminism-perl_1.13.1-1_all.deb ... Unpacking libfile-stripnondeterminism-perl (1.13.1-1) ... Selecting previously unselected package dh-strip-nondeterminism. Preparing to unpack .../21-dh-strip-nondeterminism_1.13.1-1_all.deb ... Unpacking dh-strip-nondeterminism (1.13.1-1) ... Selecting previously unselected package libelf1:armhf. Preparing to unpack .../22-libelf1_0.188-2.1_armhf.deb ... Unpacking libelf1:armhf (0.188-2.1) ... Selecting previously unselected package dwz. Preparing to unpack .../23-dwz_0.15-1_armhf.deb ... Unpacking dwz (0.15-1) ... Selecting previously unselected package libicu72:armhf. Preparing to unpack .../24-libicu72_72.1-3_armhf.deb ... Unpacking libicu72:armhf (72.1-3) ... Selecting previously unselected package libxml2:armhf. Preparing to unpack .../25-libxml2_2.9.14+dfsg-1.2_armhf.deb ... Unpacking libxml2:armhf (2.9.14+dfsg-1.2) ... Selecting previously unselected package gettext. Preparing to unpack .../26-gettext_0.21-12_armhf.deb ... Unpacking gettext (0.21-12) ... Selecting previously unselected package intltool-debian. Preparing to unpack .../27-intltool-debian_0.35.0+20060710.6_all.deb ... Unpacking intltool-debian (0.35.0+20060710.6) ... Selecting previously unselected package po-debconf. Preparing to unpack .../28-po-debconf_1.0.21+nmu1_all.deb ... Unpacking po-debconf (1.0.21+nmu1) ... Selecting previously unselected package debhelper. Preparing to unpack .../29-debhelper_13.11.4_all.deb ... Unpacking debhelper (13.11.4) ... Selecting previously unselected package libpam0g-dev:armhf. Preparing to unpack .../30-libpam0g-dev_1.5.2-6_armhf.deb ... Unpacking libpam0g-dev:armhf (1.5.2-6) ... Selecting previously unselected package libssl-dev:armhf. Preparing to unpack .../31-libssl-dev_3.0.8-1_armhf.deb ... Unpacking libssl-dev:armhf (3.0.8-1) ... Setting up libpipeline1:armhf (1.5.7-1) ... Setting up libicu72:armhf (72.1-3) ... Setting up bsdextrautils (2.38.1-5+b1) ... Setting up libpam0g-dev:armhf (1.5.2-6) ... Setting up libmagic-mgc (1:5.44-3) ... Setting up libarchive-zip-perl (1.68-1) ... Setting up libdebhelper-perl (13.11.4) ... Setting up libmagic1:armhf (1:5.44-3) ... Setting up gettext-base (0.21-12) ... Setting up m4 (1.4.19-3) ... Setting up file (1:5.44-3) ... Setting up autotools-dev (20220109.1) ... Setting up libssl-dev:armhf (3.0.8-1) ... Setting up autopoint (0.21-12) ... Setting up autoconf (2.71-3) ... Setting up sensible-utils (0.0.17+nmu1) ... Setting up libuchardet0:armhf (0.0.7-1) ... Setting up libsub-override-perl (0.09-4) ... Setting up libelf1:armhf (0.188-2.1) ... Setting up libxml2:armhf (2.9.14+dfsg-1.2) ... Setting up automake (1:1.16.5-1.3) ... update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Setting up libfile-stripnondeterminism-perl (1.13.1-1) ... Setting up gettext (0.21-12) ... Setting up libtool (2.4.7-5) ... Setting up intltool-debian (0.35.0+20060710.6) ... Setting up dh-autoreconf (20) ... Setting up dh-strip-nondeterminism (1.13.1-1) ... Setting up dwz (0.15-1) ... Setting up groff-base (1.22.4-10) ... Setting up po-debconf (1.0.21+nmu1) ... Setting up man-db (2.11.2-2) ... Not building database; man-db/auto-update is not 'true'. Setting up debhelper (13.11.4) ... Processing triggers for libc-bin (2.36-9) ... Reading package lists... Building dependency tree... Reading state information... Reading extended state information... Initializing package states... Writing extended state information... Building tag database... -> Finished parsing the build-deps Reading package lists... Building dependency tree... Reading state information... fakeroot is already the newest version (1.31-1.2). 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. I: Building the package I: Running cd /build/pam-ssh-agent-auth-0.10.3/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-genchanges -S > ../pam-ssh-agent-auth_0.10.3-4_source.changes dpkg-buildpackage: info: source package pam-ssh-agent-auth dpkg-buildpackage: info: source version 0.10.3-4 dpkg-buildpackage: info: source distribution unstable dpkg-buildpackage: info: source changed by Marcos Talau dpkg-source --before-build . dpkg-buildpackage: info: host architecture armhf fakeroot debian/rules clean dh clean dh: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_clean dh_clean: warning: Compatibility levels before 10 are deprecated (level 9 in use) debian/rules build dh build dh: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_update_autotools_config debian/rules override_dh_auto_configure make[1]: Entering directory '/build/pam-ssh-agent-auth-0.10.3' dh_auto_configure -- \ --libexecdir=/lib/arm-linux-gnueabihf/security \ --with-mantype=man \ --without-openssl-header-check dh_auto_configure: warning: Compatibility levels before 10 are deprecated (level 9 in use) ./configure --build=arm-linux-gnueabihf --prefix=/usr --includedir=\${prefix}/include --mandir=\${prefix}/share/man --infodir=\${prefix}/share/info --sysconfdir=/etc --localstatedir=/var --disable-option-checking --disable-silent-rules --libdir=\${prefix}/lib/arm-linux-gnueabihf --libexecdir=\${prefix}/lib/arm-linux-gnueabihf --disable-maintainer-mode --disable-dependency-tracking --libexecdir=/lib/arm-linux-gnueabihf/security --with-mantype=man --without-openssl-header-check checking for gcc... gcc checking whether the C compiler works... yes checking for C compiler default output file name... a.out checking for suffix of executables... checking whether we are cross compiling... no checking for suffix of object files... o checking whether we are using the GNU C compiler... yes checking whether gcc accepts -g... yes checking for gcc option to accept ISO C89... none needed checking how to run the C preprocessor... gcc -E checking for grep that handles long lines and -e... /bin/grep checking for egrep... /bin/grep -E checking for ANSI C header files... yes checking for sys/types.h... yes checking for sys/stat.h... yes checking for stdlib.h... yes checking for string.h... yes checking for memory.h... yes checking for strings.h... yes checking for inttypes.h... yes checking for stdint.h... yes checking for unistd.h... yes checking minix/config.h usability... no checking minix/config.h presence... no checking for minix/config.h... no checking whether it is safe to define __EXTENSIONS__... yes checking for gcc... (cached) gcc checking whether we are using the GNU C compiler... (cached) yes checking whether gcc accepts -g... (cached) yes checking for gcc option to accept ISO C89... (cached) none needed checking for inline... inline checking build system type... arm-unknown-linux-gnueabihf checking host system type... arm-unknown-linux-gnueabihf checking whether byte ordering is bigendian... no checking for gawk... no checking for mawk... mawk checking how to run the C preprocessor... gcc -E checking for ranlib... ranlib checking for a BSD-compatible install... /usr/bin/install -c checking for egrep... (cached) /bin/grep -E checking for ar... /usr/bin/ar checking for cat... /bin/cat checking for kill... no checking for perl5... no checking for perl... /usr/bin/perl checking for sed... /bin/sed checking for ent... no checking for bash... /bin/bash checking for ksh... (cached) /bin/bash checking for sh... (cached) /bin/bash checking for sh... /bin/sh checking for groupadd... /usr/sbin/groupadd checking for useradd... /usr/sbin/useradd checking for pkgmk... no checking for uid_t in sys/types.h... yes checking for unistd.h... (cached) yes checking for working chown... yes checking for dirent.h that defines DIR... yes checking for library containing opendir... none required checking whether closedir returns void... no checking for pid_t... yes checking vfork.h usability... no checking vfork.h presence... no checking for vfork.h... no checking for fork... yes checking for vfork... yes checking for working fork... yes checking for working vfork... (cached) yes checking whether gcc needs -traditional... no checking whether lstat correctly handles trailing slash... yes checking whether lstat accepts an empty string... no checking whether lstat correctly handles trailing slash... (cached) yes checking for stdlib.h... (cached) yes checking for GNU libc compatible malloc... yes checking for working memcmp... yes checking for stdlib.h... (cached) yes checking for unistd.h... (cached) yes checking for sys/param.h... yes checking for utime.h... yes checking for getpagesize... yes checking for working mmap... yes checking for stdlib.h... (cached) yes checking for GNU libc compatible realloc... yes checking sys/select.h usability... yes checking sys/select.h presence... yes checking for sys/select.h... yes checking sys/socket.h usability... yes checking sys/socket.h presence... yes checking for sys/socket.h... yes checking types of arguments for select... int,fd_set *,struct timeval * checking return type of signal handlers... void checking whether stat accepts an empty string... no checking for working strnlen... yes checking whether utime accepts a null argument... yes checking for dup2... yes checking for endgrent... yes checking for ftruncate... yes checking for getcwd... yes checking for gethostbyaddr... yes checking for gethostbyname... yes checking for getpass... yes checking for getspnam... yes checking for gettimeofday... yes checking for inet_ntoa... yes checking for isascii... yes checking for memmove... yes checking for memset... yes checking for mkdir... yes checking for realpath... yes checking for rmdir... yes checking for select... yes checking for setenv... yes checking for socket... yes checking for strcasecmp... yes checking for strchr... yes checking for strdup... yes checking for strerror... yes checking for strncasecmp... yes checking for strpbrk... yes checking for strrchr... yes checking for strspn... yes checking for strstr... yes checking for strtol... yes checking for strtoul... yes checking for uname... yes checking for utime... yes checking for strnlen... yes checking for gethostname... yes checking for openpty... yes checking for forkpty... yes checking for special C compiler options needed for large files... no checking for _FILE_OFFSET_BITS value needed for large files... 64 checking for login... /bin/login checking for passwd... /usr/bin/passwd checking whether LLONG_MAX is declared... yes checking if gcc supports -fstack-protector-all... yes checking if -fstack-protector-all works... yes checking bstring.h usability... no checking bstring.h presence... no checking for bstring.h... no checking crypt.h usability... yes checking crypt.h presence... yes checking for crypt.h... yes checking crypto/sha2.h usability... no checking crypto/sha2.h presence... no checking for crypto/sha2.h... no checking dirent.h usability... yes checking dirent.h presence... yes checking for dirent.h... yes checking endian.h usability... yes checking endian.h presence... yes checking for endian.h... yes checking features.h usability... yes checking features.h presence... yes checking for features.h... yes checking fcntl.h usability... yes checking fcntl.h presence... yes checking for fcntl.h... yes checking floatingpoint.h usability... no checking floatingpoint.h presence... no checking for floatingpoint.h... no checking getopt.h usability... yes checking getopt.h presence... yes checking for getopt.h... yes checking glob.h usability... yes checking glob.h presence... yes checking for glob.h... yes checking ia.h usability... no checking ia.h presence... no checking for ia.h... no checking iaf.h usability... no checking iaf.h presence... no checking for iaf.h... no checking limits.h usability... yes checking limits.h presence... yes checking for limits.h... yes checking login.h usability... no checking login.h presence... no checking for login.h... no checking maillock.h usability... no checking maillock.h presence... no checking for maillock.h... no checking ndir.h usability... no checking ndir.h presence... no checking for ndir.h... no checking net/if_tun.h usability... no checking net/if_tun.h presence... no checking for net/if_tun.h... no checking netdb.h usability... yes checking netdb.h presence... yes checking for netdb.h... yes checking netgroup.h usability... no checking netgroup.h presence... no checking for netgroup.h... no checking pam/pam_appl.h usability... no checking pam/pam_appl.h presence... no checking for pam/pam_appl.h... no checking paths.h usability... yes checking paths.h presence... yes checking for paths.h... yes checking poll.h usability... yes checking poll.h presence... yes checking for poll.h... yes checking pty.h usability... yes checking pty.h presence... yes checking for pty.h... yes checking readpassphrase.h usability... no checking readpassphrase.h presence... no checking for readpassphrase.h... no checking rpc/types.h usability... no checking rpc/types.h presence... no checking for rpc/types.h... no checking security/pam_appl.h usability... yes checking security/pam_appl.h presence... yes checking for security/pam_appl.h... yes checking sha2.h usability... no checking sha2.h presence... no checking for sha2.h... no checking shadow.h usability... yes checking shadow.h presence... yes checking for shadow.h... yes checking stddef.h usability... yes checking stddef.h presence... yes checking for stddef.h... yes checking for stdint.h... (cached) yes checking for string.h... (cached) yes checking for strings.h... (cached) yes checking sys/audit.h usability... no checking sys/audit.h presence... no checking for sys/audit.h... no checking sys/bitypes.h usability... yes checking sys/bitypes.h presence... yes checking for sys/bitypes.h... yes checking sys/bsdtty.h usability... no checking sys/bsdtty.h presence... no checking for sys/bsdtty.h... no checking sys/cdefs.h usability... yes checking sys/cdefs.h presence... yes checking for sys/cdefs.h... yes checking sys/dir.h usability... yes checking sys/dir.h presence... yes checking for sys/dir.h... yes checking sys/mman.h usability... yes checking sys/mman.h presence... yes checking for sys/mman.h... yes checking sys/ndir.h usability... no checking sys/ndir.h presence... no checking for sys/ndir.h... no checking sys/poll.h usability... yes checking sys/poll.h presence... yes checking for sys/poll.h... yes checking sys/prctl.h usability... yes checking sys/prctl.h presence... yes checking for sys/prctl.h... yes checking sys/pstat.h usability... no checking sys/pstat.h presence... no checking for sys/pstat.h... no checking for sys/select.h... (cached) yes checking for sys/stat.h... (cached) yes checking sys/stream.h usability... no checking sys/stream.h presence... no checking for sys/stream.h... no checking sys/stropts.h usability... no checking sys/stropts.h presence... no checking for sys/stropts.h... no checking sys/strtio.h usability... no checking sys/strtio.h presence... no checking for sys/strtio.h... no checking sys/sysmacros.h usability... yes checking sys/sysmacros.h presence... yes checking for sys/sysmacros.h... yes checking sys/time.h usability... yes checking sys/time.h presence... yes checking for sys/time.h... yes checking sys/timers.h usability... no checking sys/timers.h presence... no checking for sys/timers.h... no checking sys/un.h usability... yes checking sys/un.h presence... yes checking for sys/un.h... yes checking time.h usability... yes checking time.h presence... yes checking for time.h... yes checking tmpdir.h usability... no checking tmpdir.h presence... no checking for tmpdir.h... no checking ttyent.h usability... yes checking ttyent.h presence... yes checking for ttyent.h... yes checking ucred.h usability... no checking ucred.h presence... no checking for ucred.h... no checking for unistd.h... (cached) yes checking usersec.h usability... no checking usersec.h presence... no checking for usersec.h... no checking util.h usability... no checking util.h presence... no checking for util.h... no checking for utime.h... (cached) yes checking utmp.h usability... yes checking utmp.h presence... yes checking for utmp.h... yes checking utmpx.h usability... yes checking utmpx.h presence... yes checking for utmpx.h... yes checking vis.h usability... no checking vis.h presence... no checking for vis.h... no checking for time.h... (cached) yes checking for unistd.h... (cached) yes checking for strnvis... no checking for lastlog.h... yes checking for sys/ptms.h... no checking for login_cap.h... no checking linux/if_tun.h usability... yes checking linux/if_tun.h presence... yes checking for linux/if_tun.h... yes checking compiler and flags for sanity... yes checking for setsockopt... yes checking for dirname... yes checking libgen.h usability... yes checking libgen.h presence... yes checking for libgen.h... yes checking for /proc/pid/fd directory... yes checking for getspnam... (cached) yes checking for library containing basename... none required checking for dlopen in -ldl... yes checking for pam_set_item in -lpam... yes checking for pam_getenvlist... yes checking for pam_putenv... yes checking for pam_get_item... yes checking for strcasecmp... (cached) yes checking for utimes... yes checking for logout... yes checking for updwtmp... yes checking for logwtmp... yes checking for strftime... yes checking for GLOB_ALTDIRFUNC support... yes checking for gl_matchc field in glob_t... no checking whether GLOB_NOMATCH is declared... yes checking whether struct dirent allocates space for d_name... yes checking for /proc/pid/fd directory... yes checking for arc4random... yes checking for asprintf... yes checking for b64_ntop... no checking for __b64_ntop... no checking for b64_pton... no checking for __b64_pton... no checking for bcopy... yes checking for bindresvport_sa... no checking for clock... yes checking for closefrom... yes checking for dirfd... yes checking for fchmod... yes checking for fchown... yes checking for freeaddrinfo... yes checking for futimes... yes checking for getaddrinfo... yes checking for getcwd... (cached) yes checking for getgrouplist... yes checking for getnameinfo... yes checking for getopt... yes checking for getpeereid... no checking for getpeerucred... no checking for _getpty... no checking for getrlimit... yes checking for getttyent... yes checking for glob... yes checking for inet_aton... yes checking for inet_ntoa... (cached) yes checking for inet_ntop... yes checking for innetgr... yes checking for login_getcapbool... no checking for md5_crypt... no checking for memmove... (cached) yes checking for mkdtemp... yes checking for mmap... yes checking for ngetaddrinfo... no checking for nsleep... no checking for ogetaddrinfo... no checking for openlog_r... no checking for poll... yes checking for prctl... yes checking for pstat... no checking for readpassphrase... no checking for realpath... (cached) yes checking for recvmsg... yes checking for rresvport_af... yes checking for sendmsg... yes checking for setdtablesize... no checking for setegid... yes checking for setenv... (cached) yes checking for seteuid... yes checking for setgroups... yes checking for setlogin... no checking for setpcred... no checking for setproctitle... no checking for setregid... yes checking for setreuid... yes checking for setrlimit... yes checking for setsid... yes checking for setvbuf... yes checking for sigaction... yes checking for sigvec... no checking for snprintf... yes checking for socketpair... yes checking for strdup... (cached) yes checking for strerror... (cached) yes checking for strlcat... no checking for strlcpy... no checking for strmode... no checking for strnvis... (cached) no checking for strtonum... no checking for strtoll... yes checking for strtoul... (cached) yes checking for swap32... no checking for sysconf... yes checking for tcgetpgrp... yes checking for truncate... yes checking for unsetenv... yes checking for updwtmpx... yes checking for vasprintf... yes checking for vhangup... yes checking for vsnprintf... yes checking for waitpid... yes checking for gai_strerror... yes checking for library containing nanosleep... none required checking whether getrusage is declared... no checking whether strsep is declared... yes checking for strsep... yes checking whether tcsendbreak is declared... yes checking whether h_errno is declared... yes checking whether SHUT_RD is declared... yes checking whether O_NONBLOCK is declared... yes checking whether writev is declared... yes checking whether MAXSYMLINKS is declared... yes checking whether offsetof is declared... yes checking for setresuid... yes checking if setresuid seems to work... yes checking for setresgid... yes checking if setresgid seems to work... yes checking for gettimeofday... (cached) yes checking for time... yes checking for endutent... yes checking for getutent... yes checking for getutid... yes checking for getutline... yes checking for pututline... yes checking for setutent... yes checking for utmpname... yes checking for endutxent... yes checking for getutxent... yes checking for getutxid... yes checking for getutxline... yes checking for pututxline... yes checking for setutxent... yes checking for utmpxname... yes checking for daemon... yes checking for getpagesize... (cached) yes checking whether snprintf correctly terminates long strings... yes checking whether snprintf can declare const char *fmt... yes checking whether system supports SO_PEERCRED getsockopt... yes checking for (overly) strict mkstemp... yes checking if openpty correctly handles controlling tty... yes checking whether getpgrp requires zero arguments... yes checking OpenSSL header version... 30000080 (OpenSSL 3.0.8 7 Feb 2023) checking OpenSSL library version... 30000080 (OpenSSL 3.0.8 7 Feb 2023) checking whether OpenSSL's headers match the library... no configure: WARNING: Your OpenSSL headers do not match your library. Check config.log for details. Also see contrib/findssl.sh for help identifying header/library mismatches. checking if programs using OpenSSL functions will link... no checking if programs using OpenSSL need -ldl... no checking whether OpenSSL has crippled AES support... no checking for crypt in -lcrypt... yes checking for SHA256_Update... yes checking for EVP_sha256... yes checking for ia_openinfo in -liaf... no checking whether OpenSSL's PRNG is internally seeded... yes checking whether pam_strerror takes only one argument... no checking for ls... /bin/ls checking for netstat... no checking for arp... no checking for ifconfig... no checking for jstat... no checking for ps... no checking for sar... no checking for w... no checking for who... /usr/bin/who checking for last... /usr/bin/last checking for lastlog... /usr/bin/lastlog checking for df... /bin/df checking for vmstat... no checking for uptime... no checking for ipcs... /usr/bin/ipcs checking for tail... /usr/bin/tail checking for long long... yes checking for unsigned long long... yes checking for long double... yes checking size of char... 1 checking size of short int... 2 checking size of int... 4 checking size of long int... 4 checking size of long long int... 8 checking for u_int type... yes checking for intXX_t types... yes checking for int64_t type... yes checking for u_intXX_t types... yes checking for u_int64_t types... yes checking for uintXX_t types in stdint.h... yes checking for u_char... yes checking for socklen_t... yes checking for sig_atomic_t... yes checking for in_addr_t... yes checking for size_t... yes checking for ssize_t... yes checking for clock_t... yes checking for sa_family_t... yes checking for pid_t... yes checking for mode_t... yes checking for struct sockaddr_storage... yes checking for struct sockaddr_in6... yes checking for struct in6_addr... yes checking for struct addrinfo... yes checking for struct timeval... yes checking for struct timespec... yes checking for ut_host field in utmp.h... yes checking for ut_host field in utmpx.h... yes checking for syslen field in utmpx.h... no checking for ut_pid field in utmp.h... yes checking for ut_type field in utmp.h... yes checking for ut_type field in utmpx.h... yes checking for ut_tv field in utmp.h... yes checking for ut_id field in utmp.h... yes checking for ut_id field in utmpx.h... yes checking for ut_addr field in utmp.h... yes checking for ut_addr field in utmpx.h... yes checking for ut_addr_v6 field in utmp.h... yes checking for ut_addr_v6 field in utmpx.h... yes checking for ut_exit field in utmp.h... yes checking for ut_time field in utmp.h... no checking for ut_time field in utmpx.h... no checking for ut_tv field in utmpx.h... yes checking for struct stat.st_blksize... yes checking for struct __res_state.retrans... yes checking for ss_family field in struct sockaddr_storage... yes checking for __ss_family field in struct sockaddr_storage... no checking for pw_class field in struct passwd... no checking for pw_expire field in struct passwd... no checking for pw_change field in struct passwd... no checking for msg_accrights field in struct msghdr... no checking for msg_control field in struct msghdr... yes checking if libc defines __progname... yes checking whether gcc implements __FUNCTION__... yes checking whether gcc implements __func__... yes checking whether va_copy exists... yes checking whether __va_copy exists... yes checking whether getopt has optreset support... no checking if libc defines sys_errlist... no checking if libc defines sys_nerr... no checking for library containing getrrsetbyname... no checking for library containing res_query... none required checking for library containing dn_expand... none required checking if res_query will link... yes checking for _getshort... no checking for _getlong... no checking whether _getshort is declared... no checking whether _getlong is declared... no checking for HEADER.ad... yes checking if struct __res_state _res is an extern... yes checking for "/dev/ptc"... no configure: creating ./config.status config.status: creating Makefile config.status: creating openbsd-compat/Makefile config.status: creating openbsd-compat/regress/Makefile config.status: creating config.h Manpage format: man SELinux support: no Host: arm-unknown-linux-gnueabihf Compiler: gcc Compiler flags: -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all Preprocessor flags: -Wdate-time -D_FORTIFY_SOURCE=2 Linker flags: -Wl,-z,relro -fstack-protector-all Libraries: -lcrypto -lpam -lcrypt make[1]: Leaving directory '/build/pam-ssh-agent-auth-0.10.3' dh_auto_build dh_auto_build: warning: Compatibility levels before 10 are deprecated (level 9 in use) make -j1 make[1]: Entering directory '/build/pam-ssh-agent-auth-0.10.3' pod2man --section=8 --release=v0.10.3 --name=pam_ssh_agent_auth --official --center "PAM" pam_ssh_agent_auth.pod > pam_ssh_agent_auth.8 (cd openbsd-compat && make) make[2]: Entering directory '/build/pam-ssh-agent-auth-0.10.3/openbsd-compat' gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-arc4random.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-asprintf.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-closefrom.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-cray.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-cygwin_util.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-getpeereid.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-misc.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-nextstep.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-openpty.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-poll.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-snprintf.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-waitpid.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c openssl-compat.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c xcrypt.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c xmmap.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c base64.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c basename.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c daemon.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c dirname.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c fake-rfc2553.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c getcwd.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c getgrouplist.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c getopt.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c getrrsetbyname.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c glob.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c inet_aton.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c inet_ntoa.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c inet_ntop.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c mktemp.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c port-aix.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c port-irix.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c port-linux.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c port-solaris.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c port-uw.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c realpath.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c rresvport.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c setenv.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c setproctitle.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c sha2.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c sigact.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c strlcat.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c strlcpy.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c strmode.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c strsep.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c strtoll.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c strtonum.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c strtoul.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c vis.c /usr/bin/ar rv libopenbsd-compat.a bsd-arc4random.o bsd-asprintf.o bsd-closefrom.o bsd-cray.o bsd-cygwin_util.o bsd-getpeereid.o bsd-misc.o bsd-nextstep.o bsd-openpty.o bsd-poll.o bsd-snprintf.o bsd-waitpid.o openssl-compat.o xcrypt.o xmmap.o base64.o basename.o daemon.o dirname.o fake-rfc2553.o getcwd.o getgrouplist.o getopt.o getrrsetbyname.o glob.o inet_aton.o inet_ntoa.o inet_ntop.o mktemp.o port-aix.o port-irix.o port-linux.o port-solaris.o port-uw.o realpath.o rresvport.o setenv.o setproctitle.o sha2.o sigact.o strlcat.o strlcpy.o strmode.o strsep.o strtoll.o strtonum.o strtoul.o vis.o port-aix.o port-irix.o port-linux.o port-solaris.o port-uw.o /usr/bin/ar: creating libopenbsd-compat.a a - bsd-arc4random.o a - bsd-asprintf.o a - bsd-closefrom.o a - bsd-cray.o a - bsd-cygwin_util.o a - bsd-getpeereid.o a - bsd-misc.o a - bsd-nextstep.o a - bsd-openpty.o a - bsd-poll.o a - bsd-snprintf.o a - bsd-waitpid.o a - openssl-compat.o a - xcrypt.o a - xmmap.o a - base64.o a - basename.o a - daemon.o a - dirname.o a - fake-rfc2553.o a - getcwd.o a - getgrouplist.o a - getopt.o a - getrrsetbyname.o a - glob.o a - inet_aton.o a - inet_ntoa.o a - inet_ntop.o a - mktemp.o a - port-aix.o a - port-irix.o a - port-linux.o a - port-solaris.o a - port-uw.o a - realpath.o a - rresvport.o a - setenv.o a - setproctitle.o a - sha2.o a - sigact.o a - strlcat.o a - strlcpy.o a - strmode.o a - strsep.o a - strtoll.o a - strtonum.o a - strtoul.o a - vis.o a - port-aix.o a - port-irix.o a - port-linux.o a - port-solaris.o a - port-uw.o ranlib libopenbsd-compat.a make[2]: Leaving directory '/build/pam-ssh-agent-auth-0.10.3/openbsd-compat' gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c xmalloc.c -o xmalloc.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c atomicio.c -o atomicio.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c authfd.c -o authfd.o authfd.c: In function 'ssh_get_authentication_socket': authfd.c:149:5: warning: this 'if' clause does not guard... [-Wmisleading-indentation] 149 | if (seteuid(uid) < 0) | ^~ authfd.c:152:9: note: ...this statement, but the latter is misleadingly indented as if it were guarded by the 'if' 152 | if (connect(sock, (struct sockaddr *)&sunaddr, sizeof sunaddr) < 0) { | ^~ authfd.c:160:5: warning: this 'if' clause does not guard... [-Wmisleading-indentation] 160 | if (seteuid(0) < 0) | ^~ authfd.c:163:9: note: ...this statement, but the latter is misleadingly indented as if it were guarded by the 'if' 163 | agent_present = 1; | ^~~~~~~~~~~~~ authfd.c: In function 'ssh_get_next_identity': authfd.c:384:17: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 384 | pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_e(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ authfd.c:384:70: warning: passing argument 2 of 'pamsshagentauth_buffer_get_bignum' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 384 | pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_e(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~ In file included from entropy.h:30, from includes.h:174, from authfd.c:42: buffer.h:53:53: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 53 | void pamsshagentauth_buffer_get_bignum(Buffer *, BIGNUM *); | ^~~~~~~~ authfd.c:385:17: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 385 | pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_n(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c:385:70: warning: passing argument 2 of 'pamsshagentauth_buffer_get_bignum' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 385 | pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_n(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~ buffer.h:53:53: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 53 | void pamsshagentauth_buffer_get_bignum(Buffer *, BIGNUM *); | ^~~~~~~~ authfd.c:387:17: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 387 | keybits = BN_num_bits(RSA_get0_n(key->rsa)); | ^~~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c:390:29: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 390 | BN_num_bits(RSA_get0_n(key->rsa)), bits); | ^~~~~~~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c: In function 'ssh_decrypt_challenge': authfd.c:440:9: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 440 | pamsshagentauth_buffer_put_int(&buffer, BN_num_bits(RSA_get0_n(key->rsa))); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c:441:9: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 441 | pamsshagentauth_buffer_put_bignum(&buffer, RSA_get0_e(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ authfd.c:442:9: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 442 | pamsshagentauth_buffer_put_bignum(&buffer, RSA_get0_n(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c: In function 'ssh_encode_identity_rsa1': authfd.c:530:9: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 530 | pamsshagentauth_buffer_put_int(b, BN_num_bits(RSA_get0_n(key))); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c:531:9: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 531 | pamsshagentauth_buffer_put_bignum(b, RSA_get0_n(key)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c:532:9: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 532 | pamsshagentauth_buffer_put_bignum(b, RSA_get0_e(key)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ authfd.c:533:9: warning: 'RSA_get0_d' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 533 | pamsshagentauth_buffer_put_bignum(b, RSA_get0_d(key)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:234:37: note: declared here 234 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_d(const RSA *d); | ^~~~~~~~~~ authfd.c:535:9: warning: 'RSA_get0_iqmp' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 535 | pamsshagentauth_buffer_put_bignum(b, RSA_get0_iqmp(key)); /* ssh key->u */ | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:239:37: note: declared here 239 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_iqmp(const RSA *r); | ^~~~~~~~~~~~~ authfd.c:536:9: warning: 'RSA_get0_q' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 536 | pamsshagentauth_buffer_put_bignum(b, RSA_get0_q(key)); /* ssh key->p, SSL key->q */ | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:236:37: note: declared here 236 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_q(const RSA *d); | ^~~~~~~~~~ authfd.c:537:9: warning: 'RSA_get0_p' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 537 | pamsshagentauth_buffer_put_bignum(b, RSA_get0_p(key)); /* ssh key->q, SSL key->p */ | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:235:37: note: declared here 235 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_p(const RSA *d); | ^~~~~~~~~~ authfd.c: In function 'ssh_encode_identity_ssh2': authfd.c:556:17: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 556 | pamsshagentauth_buffer_put_bignum2(b, RSA_get0_n(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c:557:17: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 557 | pamsshagentauth_buffer_put_bignum2(b, RSA_get0_e(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ authfd.c:558:17: warning: 'RSA_get0_d' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 558 | pamsshagentauth_buffer_put_bignum2(b, RSA_get0_d(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:234:37: note: declared here 234 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_d(const RSA *d); | ^~~~~~~~~~ authfd.c:559:17: warning: 'RSA_get0_iqmp' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 559 | pamsshagentauth_buffer_put_bignum2(b, RSA_get0_iqmp(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:239:37: note: declared here 239 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_iqmp(const RSA *r); | ^~~~~~~~~~~~~ authfd.c:560:17: warning: 'RSA_get0_p' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 560 | pamsshagentauth_buffer_put_bignum2(b, RSA_get0_p(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:235:37: note: declared here 235 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_p(const RSA *d); | ^~~~~~~~~~ authfd.c:561:17: warning: 'RSA_get0_q' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 561 | pamsshagentauth_buffer_put_bignum2(b, RSA_get0_q(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:236:37: note: declared here 236 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_q(const RSA *d); | ^~~~~~~~~~ authfd.c:572:17: warning: 'DSA_get0_p' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 572 | pamsshagentauth_buffer_put_bignum2(b, DSA_get0_p(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:30, from authfd.c:65: /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ authfd.c:573:17: warning: 'DSA_get0_q' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 573 | pamsshagentauth_buffer_put_bignum2(b, DSA_get0_q(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ authfd.c:574:17: warning: 'DSA_get0_g' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 574 | pamsshagentauth_buffer_put_bignum2(b, DSA_get0_g(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ authfd.c:575:17: warning: 'DSA_get0_pub_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 575 | pamsshagentauth_buffer_put_bignum2(b, DSA_get0_pub_key(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ authfd.c:576:17: warning: 'DSA_get0_priv_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 576 | pamsshagentauth_buffer_put_bignum2(b, DSA_get0_priv_key(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/dsa.h:212:37: note: declared here 212 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_priv_key(const DSA *d); | ^~~~~~~~~~~~~~~~~ authfd.c: In function 'ssh_remove_identity': authfd.c:662:17: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 662 | pamsshagentauth_buffer_put_int(&msg, BN_num_bits(RSA_get0_n(key->rsa))); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c:663:17: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 663 | pamsshagentauth_buffer_put_bignum(&msg, RSA_get0_e(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ authfd.c:664:17: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 664 | pamsshagentauth_buffer_put_bignum(&msg, RSA_get0_n(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bufaux.c -o bufaux.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bufbn.c -o bufbn.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c buffer.c -o buffer.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c cleanup.c -o cleanup.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c entropy.c -o entropy.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c fatal.c -o fatal.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c key.c -o key.o key.c: In function 'pamsshagentauth_key_new': key.c:78:17: warning: 'RSA_new' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 78 | if ((rsa = RSA_new()) == NULL) | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:201:28: note: declared here 201 | OSSL_DEPRECATEDIN_3_0 RSA *RSA_new(void); | ^~~~~~~ key.c:86:17: warning: 'RSA_set0_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 86 | if (RSA_set0_key(rsa, BN_new(), BN_new(), NULL) != 1) | ^~ /usr/include/openssl/rsa.h:207:27: note: declared here 207 | OSSL_DEPRECATEDIN_3_0 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); | ^~~~~~~~~~~~ key.c:92:17: warning: 'DSA_new' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 92 | if ((dsa = DSA_new()) == NULL) | ^~ In file included from key.h:30: /usr/include/openssl/dsa.h:125:28: note: declared here 125 | OSSL_DEPRECATEDIN_3_0 DSA *DSA_new(void); | ^~~~~~~ key.c:104:17: warning: 'DSA_set0_pqg' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 104 | if (DSA_set0_pqg(dsa, BN_new(), BN_new(), BN_new()) != 1) | ^~ /usr/include/openssl/dsa.h:203:27: note: declared here 203 | OSSL_DEPRECATEDIN_3_0 int DSA_set0_pqg(DSA *d, BIGNUM *p, BIGNUM *q, BIGNUM *g); | ^~~~~~~~~~~~ key.c:106:17: warning: 'DSA_set0_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 106 | if (DSA_set0_key(dsa, BN_new(), NULL) != 1) | ^~ /usr/include/openssl/dsa.h:206:27: note: declared here 206 | OSSL_DEPRECATEDIN_3_0 int DSA_set0_key(DSA *d, BIGNUM *pub_key, | ^~~~~~~~~~~~ key.c:68:18: warning: unused variable 'ed25519' [-Wunused-variable] 68 | ED25519 *ed25519; | ^~~~~~~ key.c: In function 'pamsshagentauth_key_new_private': key.c:147:17: warning: 'RSA_set0_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 147 | if (RSA_set0_key(k->rsa, NULL, NULL, BN_new()) != 1) | ^~ /usr/include/openssl/rsa.h:207:27: note: declared here 207 | OSSL_DEPRECATEDIN_3_0 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); | ^~~~~~~~~~~~ key.c:149:17: warning: 'RSA_set0_crt_params' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 149 | if (RSA_set0_crt_params(k->rsa, BN_new(), BN_new(), BN_new()) != 1) | ^~ /usr/include/openssl/rsa.h:209:27: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 int RSA_set0_crt_params(RSA *r, | ^~~~~~~~~~~~~~~~~~~ key.c:151:17: warning: 'RSA_set0_factors' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 151 | if (RSA_set0_factors(k->rsa, BN_new(), BN_new()) != 1) | ^~ /usr/include/openssl/rsa.h:208:27: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q); | ^~~~~~~~~~~~~~~~ key.c:160:17: warning: 'DSA_set0_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 160 | if (DSA_set0_key(k->dsa, NULL, BN_new()) != 1) | ^~ /usr/include/openssl/dsa.h:206:27: note: declared here 206 | OSSL_DEPRECATEDIN_3_0 int DSA_set0_key(DSA *d, BIGNUM *pub_key, | ^~~~~~~~~~~~ key.c: In function 'pamsshagentauth_key_free': key.c:191:25: warning: 'RSA_free' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 191 | RSA_free(k->rsa); | ^~~~~~~~ /usr/include/openssl/rsa.h:293:28: note: declared here 293 | OSSL_DEPRECATEDIN_3_0 void RSA_free(RSA *r); | ^~~~~~~~ key.c:196:25: warning: 'DSA_free' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 196 | DSA_free(k->dsa); | ^~~~~~~~ /usr/include/openssl/dsa.h:127:28: note: declared here 127 | OSSL_DEPRECATEDIN_3_0 void DSA_free(DSA *r); | ^~~~~~~~ key.c:201:25: warning: 'EC_KEY_free' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 201 | EC_KEY_free(k->ecdsa); | ^~~~~~~~~~~ In file included from key.h:31: /usr/include/openssl/ec.h:1003:28: note: declared here 1003 | OSSL_DEPRECATEDIN_3_0 void EC_KEY_free(EC_KEY *key); | ^~~~~~~~~~~ key.c: In function 'pamsshagentauth_key_equal': key.c:231:21: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 231 | BN_cmp(RSA_get0_e(a->rsa), RSA_get0_e(b->rsa)) == 0 && | ^~~~~~ /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:231:21: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 231 | BN_cmp(RSA_get0_e(a->rsa), RSA_get0_e(b->rsa)) == 0 && | ^~~~~~ /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:232:21: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 232 | BN_cmp(RSA_get0_n(a->rsa), RSA_get0_n(b->rsa)) == 0; | ^~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:232:21: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 232 | BN_cmp(RSA_get0_n(a->rsa), RSA_get0_n(b->rsa)) == 0; | ^~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:242:21: warning: 'DSA_get0_p' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 242 | BN_cmp(DSA_get0_p(a->dsa), DSA_get0_p(b->dsa)) == 0 && | ^~~~~~ /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:242:21: warning: 'DSA_get0_p' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 242 | BN_cmp(DSA_get0_p(a->dsa), DSA_get0_p(b->dsa)) == 0 && | ^~~~~~ /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:243:21: warning: 'DSA_get0_q' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 243 | BN_cmp(DSA_get0_q(a->dsa), DSA_get0_q(b->dsa)) == 0 && | ^~~~~~ /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ key.c:243:21: warning: 'DSA_get0_q' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 243 | BN_cmp(DSA_get0_q(a->dsa), DSA_get0_q(b->dsa)) == 0 && | ^~~~~~ /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ key.c:244:21: warning: 'DSA_get0_g' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 244 | BN_cmp(DSA_get0_g(a->dsa), DSA_get0_g(b->dsa)) == 0 && | ^~~~~~ /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ key.c:244:21: warning: 'DSA_get0_g' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 244 | BN_cmp(DSA_get0_g(a->dsa), DSA_get0_g(b->dsa)) == 0 && | ^~~~~~ /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ key.c:245:21: warning: 'DSA_get0_pub_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 245 | BN_cmp(DSA_get0_pub_key(a->dsa), DSA_get0_pub_key(b->dsa)) == 0; | ^~~~~~ /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ key.c:245:21: warning: 'DSA_get0_pub_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 245 | BN_cmp(DSA_get0_pub_key(a->dsa), DSA_get0_pub_key(b->dsa)) == 0; | ^~~~~~ /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ key.c:249:25: warning: 'EC_KEY_check_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 249 | EC_KEY_check_key(a->ecdsa) == 1 && | ^~~~~~~~~~~~~~~~ /usr/include/openssl/ec.h:1107:27: note: declared here 1107 | OSSL_DEPRECATEDIN_3_0 int EC_KEY_check_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~ key.c:250:25: warning: 'EC_KEY_check_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 250 | EC_KEY_check_key(b->ecdsa) == 1 && | ^~~~~~~~~~~~~~~~ /usr/include/openssl/ec.h:1107:27: note: declared here 1107 | OSSL_DEPRECATEDIN_3_0 int EC_KEY_check_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~ key.c:251:25: warning: 'EC_KEY_get0_group' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 251 | EC_GROUP_cmp(EC_KEY_get0_group(a->ecdsa), | ^~~~~~~~~~~~ /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c:252:33: warning: 'EC_KEY_get0_group' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 252 | EC_KEY_get0_group(a->ecdsa), NULL) == 0 && | ^~~~~~~~~~~~~~~~~ /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c:253:25: warning: 'EC_KEY_get0_group' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 253 | EC_POINT_cmp(EC_KEY_get0_group(a->ecdsa), | ^~~~~~~~~~~~ /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c:254:33: warning: 'EC_KEY_get0_public_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 254 | EC_KEY_get0_public_key(a->ecdsa), | ^~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/ec.h:1062:39: note: declared here 1062 | OSSL_DEPRECATEDIN_3_0 const EC_POINT *EC_KEY_get0_public_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~~~~~~ key.c:255:33: warning: 'EC_KEY_get0_public_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 255 | EC_KEY_get0_public_key(b->ecdsa), NULL) == 0 && | ^~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/ec.h:1062:39: note: declared here 1062 | OSSL_DEPRECATEDIN_3_0 const EC_POINT *EC_KEY_get0_public_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~~~~~~ key.c:256:25: warning: 'EC_KEY_get0_private_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 256 | BN_cmp(EC_KEY_get0_private_key(a->ecdsa), | ^~~~~~ /usr/include/openssl/ec.h:1048:37: note: declared here 1048 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *EC_KEY_get0_private_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~~~~~~~ key.c:257:33: warning: 'EC_KEY_get0_private_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 257 | EC_KEY_get0_private_key(b->ecdsa)) == 0; | ^~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/ec.h:1048:37: note: declared here 1048 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *EC_KEY_get0_private_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~~~~~~~ key.c: In function 'pamsshagentauth_key_fingerprint_raw': key.c:304:17: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 304 | nlen = BN_num_bytes(RSA_get0_n(k->rsa)); | ^~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:305:17: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 305 | elen = BN_num_bytes(RSA_get0_e(k->rsa)); | ^~~~ /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:308:17: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 308 | BN_bn2bin(RSA_get0_n(k->rsa), blob); | ^~~~~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:309:17: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 309 | BN_bn2bin(RSA_get0_e(k->rsa), blob + nlen); | ^~~~~~~~~ /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c: In function 'pamsshagentauth_key_read': key.c:519:17: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 519 | if (!read_bignum(cpp, RSA_get0_e(ret->rsa))) | ^~ /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:519:39: warning: passing argument 2 of 'read_bignum' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 519 | if (!read_bignum(cpp, RSA_get0_e(ret->rsa))) | ^~~~~~~~~~~~~~~~~~~~ key.c:440:34: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 440 | read_bignum(char **cpp, BIGNUM * value) | ~~~~~~~~~^~~~~ key.c:521:17: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 521 | if (!read_bignum(cpp, RSA_get0_n(ret->rsa))) | ^~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:521:39: warning: passing argument 2 of 'read_bignum' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 521 | if (!read_bignum(cpp, RSA_get0_n(ret->rsa))) | ^~~~~~~~~~~~~~~~~~~~ key.c:440:34: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 440 | read_bignum(char **cpp, BIGNUM * value) | ~~~~~~~~~^~~~~ key.c:578:33: warning: 'RSA_free' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 578 | RSA_free(ret->rsa); | ^~~~~~~~ /usr/include/openssl/rsa.h:293:28: note: declared here 293 | OSSL_DEPRECATEDIN_3_0 void RSA_free(RSA *r); | ^~~~~~~~ key.c:588:33: warning: 'DSA_free' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 588 | DSA_free(ret->dsa); | ^~~~~~~~ /usr/include/openssl/dsa.h:127:28: note: declared here 127 | OSSL_DEPRECATEDIN_3_0 void DSA_free(DSA *r); | ^~~~~~~~ key.c:598:33: warning: 'EC_KEY_free' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 598 | EC_KEY_free(ret->ecdsa); | ^~~~~~~~~~~ /usr/include/openssl/ec.h:1003:28: note: declared here 1003 | OSSL_DEPRECATEDIN_3_0 void EC_KEY_free(EC_KEY *key); | ^~~~~~~~~~~ key.c: In function 'pamsshagentauth_key_write': key.c:652:17: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 652 | bits = BN_num_bits(RSA_get0_n(key->rsa)); | ^~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:654:17: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 654 | if (write_bignum(f, RSA_get0_e(key->rsa)) && | ^~ /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:654:37: warning: passing argument 2 of 'write_bignum' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 654 | if (write_bignum(f, RSA_get0_e(key->rsa)) && | ^~~~~~~~~~~~~~~~~~~~ key.c:477:31: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 477 | write_bignum(FILE *f, BIGNUM *num) | ~~~~~~~~^~~ key.c:655:21: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 655 | write_bignum(f, RSA_get0_n(key->rsa))) { | ^~~~~~~~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:655:37: warning: passing argument 2 of 'write_bignum' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 655 | write_bignum(f, RSA_get0_n(key->rsa))) { | ^~~~~~~~~~~~~~~~~~~~ key.c:477:31: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 477 | write_bignum(FILE *f, BIGNUM *num) | ~~~~~~~~^~~ key.c: In function 'key_ssh_name': key.c:704:17: warning: 'EC_KEY_get0_group' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 704 | int nid = EC_GROUP_get_curve_name(EC_KEY_get0_group(k->ecdsa)); | ^~~ /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c: In function 'group_ssh_name': key.c:726:17: warning: 'EC_KEY_get0_group' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 726 | int nid = EC_GROUP_get_curve_name(EC_KEY_get0_group(k->ecdsa)); | ^~~ /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c: In function 'pamsshagentauth_key_size': key.c:752:17: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 752 | return BN_num_bits(RSA_get0_n(k->rsa)); | ^~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:754:17: warning: 'DSA_get0_p' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 754 | return BN_num_bits(DSA_get0_p(k->dsa)); | ^~~~~~ /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:758:17: warning: 'EC_KEY_get0_group' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 758 | int nid = EC_GROUP_get_curve_name(EC_KEY_get0_group(k->ecdsa)); | ^~~ /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c: In function 'rsa_generate_private_key': key.c:779:9: warning: 'RSA_generate_key' is deprecated: Since OpenSSL 0.9.8 [-Wdeprecated-declarations] 779 | private = RSA_generate_key(bits, 35, NULL, NULL); | ^~~~~~~ /usr/include/openssl/rsa.h:253:30: note: declared here 253 | OSSL_DEPRECATEDIN_0_9_8 RSA *RSA_generate_key(int bits, unsigned long e, void | ^~~~~~~~~~~~~~~~ key.c: In function 'dsa_generate_private_key': key.c:788:9: warning: 'DSA_generate_parameters' is deprecated: Since OpenSSL 0.9.8 [-Wdeprecated-declarations] 788 | DSA *private = DSA_generate_parameters(bits, NULL, 0, NULL, NULL, NULL, NULL); | ^~~ /usr/include/openssl/dsa.h:159:6: note: declared here 159 | DSA *DSA_generate_parameters(int bits, unsigned char *seed, int seed_len, | ^~~~~~~~~~~~~~~~~~~~~~~ key.c:792:9: warning: 'DSA_generate_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 792 | if (!DSA_generate_key(private)) | ^~ /usr/include/openssl/dsa.h:174:27: note: declared here 174 | OSSL_DEPRECATEDIN_3_0 int DSA_generate_key(DSA *a); | ^~~~~~~~~~~~~~~~ key.c: In function 'pamsshagentauth_key_from_private': key.c:852:17: warning: 'DSA_get0_p' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 852 | if ((BN_copy(DSA_get0_p(n->dsa), DSA_get0_p(k->dsa)) == NULL) || | ^~ /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:852:17: warning: 'DSA_get0_p' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 852 | if ((BN_copy(DSA_get0_p(n->dsa), DSA_get0_p(k->dsa)) == NULL) || | ^~ /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:852:30: warning: passing argument 1 of 'BN_copy' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 852 | if ((BN_copy(DSA_get0_p(n->dsa), DSA_get0_p(k->dsa)) == NULL) || | ^~~~~~~~~~~~~~~~~~ In file included from buffer.h:49, from entropy.h:30, from includes.h:174, from key.c:41: /usr/include/openssl/bn.h:241:25: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 241 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b); | ~~~~~~~~^ key.c:853:21: warning: 'DSA_get0_q' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 853 | (BN_copy(DSA_get0_q(n->dsa), DSA_get0_q(k->dsa)) == NULL) || | ^ /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ key.c:853:21: warning: 'DSA_get0_q' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 853 | (BN_copy(DSA_get0_q(n->dsa), DSA_get0_q(k->dsa)) == NULL) || | ^ /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ key.c:853:30: warning: passing argument 1 of 'BN_copy' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 853 | (BN_copy(DSA_get0_q(n->dsa), DSA_get0_q(k->dsa)) == NULL) || | ^~~~~~~~~~~~~~~~~~ /usr/include/openssl/bn.h:241:25: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 241 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b); | ~~~~~~~~^ key.c:854:21: warning: 'DSA_get0_g' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 854 | (BN_copy(DSA_get0_g(n->dsa), DSA_get0_g(k->dsa)) == NULL) || | ^ /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ key.c:854:21: warning: 'DSA_get0_g' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 854 | (BN_copy(DSA_get0_g(n->dsa), DSA_get0_g(k->dsa)) == NULL) || | ^ /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ key.c:854:30: warning: passing argument 1 of 'BN_copy' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 854 | (BN_copy(DSA_get0_g(n->dsa), DSA_get0_g(k->dsa)) == NULL) || | ^~~~~~~~~~~~~~~~~~ /usr/include/openssl/bn.h:241:25: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 241 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b); | ~~~~~~~~^ key.c:855:21: warning: 'DSA_get0_pub_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 855 | (BN_copy(DSA_get0_pub_key(n->dsa), DSA_get0_pub_key(k->dsa)) == NULL)) | ^ /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ key.c:855:21: warning: 'DSA_get0_pub_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 855 | (BN_copy(DSA_get0_pub_key(n->dsa), DSA_get0_pub_key(k->dsa)) == NULL)) | ^ /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ key.c:855:30: warning: passing argument 1 of 'BN_copy' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 855 | (BN_copy(DSA_get0_pub_key(n->dsa), DSA_get0_pub_key(k->dsa)) == NULL)) | ^~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/bn.h:241:25: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 241 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b); | ~~~~~~~~^ key.c:866:17: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 866 | if ((BN_copy(RSA_get0_n(n->rsa), RSA_get0_n(k->rsa)) == NULL) || | ^~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:866:17: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 866 | if ((BN_copy(RSA_get0_n(n->rsa), RSA_get0_n(k->rsa)) == NULL) || | ^~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:866:30: warning: passing argument 1 of 'BN_copy' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 866 | if ((BN_copy(RSA_get0_n(n->rsa), RSA_get0_n(k->rsa)) == NULL) || | ^~~~~~~~~~~~~~~~~~ /usr/include/openssl/bn.h:241:25: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 241 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b); | ~~~~~~~~^ key.c:867:21: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 867 | (BN_copy(RSA_get0_e(n->rsa), RSA_get0_e(k->rsa)) == NULL)) | ^ /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:867:21: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 867 | (BN_copy(RSA_get0_e(n->rsa), RSA_get0_e(k->rsa)) == NULL)) | ^ /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:867:30: warning: passing argument 1 of 'BN_copy' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 867 | (BN_copy(RSA_get0_e(n->rsa), RSA_get0_e(k->rsa)) == NULL)) | ^~~~~~~~~~~~~~~~~~ /usr/include/openssl/bn.h:241:25: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 241 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b); | ~~~~~~~~^ key.c:873:17: warning: 'EC_KEY_copy' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 873 | if (EC_KEY_copy(n->ecdsa, k->ecdsa) == NULL) | ^~ /usr/include/openssl/ec.h:1010:31: note: declared here 1010 | OSSL_DEPRECATEDIN_3_0 EC_KEY *EC_KEY_copy(EC_KEY *dst, const EC_KEY *src); | ^~~~~~~~~~~ key.c: In function 'pamsshagentauth_key_from_blob': key.c:974:17: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 974 | if (pamsshagentauth_buffer_get_bignum2_ret(&b, RSA_get0_e(key->rsa)) == -1 || | ^~ /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:974:64: warning: passing argument 2 of 'pamsshagentauth_buffer_get_bignum2_ret' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 974 | if (pamsshagentauth_buffer_get_bignum2_ret(&b, RSA_get0_e(key->rsa)) == -1 || | ^~~~~~~~~~~~~~~~~~~~ buffer.h:78:58: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 78 | int pamsshagentauth_buffer_get_bignum2_ret(Buffer *, BIGNUM *); | ^~~~~~~~ key.c:975:21: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 975 | pamsshagentauth_buffer_get_bignum2_ret(&b, RSA_get0_n(key->rsa)) == -1) { | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:975:64: warning: passing argument 2 of 'pamsshagentauth_buffer_get_bignum2_ret' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 975 | pamsshagentauth_buffer_get_bignum2_ret(&b, RSA_get0_n(key->rsa)) == -1) { | ^~~~~~~~~~~~~~~~~~~~ buffer.h:78:58: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 78 | int pamsshagentauth_buffer_get_bignum2_ret(Buffer *, BIGNUM *); | ^~~~~~~~ key.c:994:17: warning: 'DSA_get0_p' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 994 | if (pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_p(key->dsa)) == -1 || | ^~ /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:994:64: warning: passing argument 2 of 'pamsshagentauth_buffer_get_bignum2_ret' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 994 | if (pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_p(key->dsa)) == -1 || | ^~~~~~~~~~~~~~~~~~~~ buffer.h:78:58: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 78 | int pamsshagentauth_buffer_get_bignum2_ret(Buffer *, BIGNUM *); | ^~~~~~~~ key.c:995:21: warning: 'DSA_get0_q' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 995 | pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_q(key->dsa)) == -1 || | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ key.c:995:64: warning: passing argument 2 of 'pamsshagentauth_buffer_get_bignum2_ret' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 995 | pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_q(key->dsa)) == -1 || | ^~~~~~~~~~~~~~~~~~~~ buffer.h:78:58: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 78 | int pamsshagentauth_buffer_get_bignum2_ret(Buffer *, BIGNUM *); | ^~~~~~~~ key.c:996:21: warning: 'DSA_get0_g' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 996 | pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_g(key->dsa)) == -1 || | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ key.c:996:64: warning: passing argument 2 of 'pamsshagentauth_buffer_get_bignum2_ret' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 996 | pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_g(key->dsa)) == -1 || | ^~~~~~~~~~~~~~~~~~~~ buffer.h:78:58: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 78 | int pamsshagentauth_buffer_get_bignum2_ret(Buffer *, BIGNUM *); | ^~~~~~~~ key.c:997:21: warning: 'DSA_get0_pub_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 997 | pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_pub_key(key->dsa)) == -1) { | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ key.c:997:64: warning: passing argument 2 of 'pamsshagentauth_buffer_get_bignum2_ret' discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers] 997 | pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_pub_key(key->dsa)) == -1) { | ^~~~~~~~~~~~~~~~~~~~~~~~~~ buffer.h:78:58: note: expected 'BIGNUM *' {aka 'struct bignum_st *'} but argument is of type 'const BIGNUM *' {aka 'const struct bignum_st *'} 78 | int pamsshagentauth_buffer_get_bignum2_ret(Buffer *, BIGNUM *); | ^~~~~~~~ key.c:1020:17: warning: 'EC_KEY_new_by_curve_name' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1020 | if ((ecdsa = EC_KEY_new_by_curve_name(pamsshagentauth_ec_group_from_name(identifier))) == NULL) { | ^~ /usr/include/openssl/ec.h:998:31: note: declared here 998 | OSSL_DEPRECATEDIN_3_0 EC_KEY *EC_KEY_new_by_curve_name(int nid); | ^~~~~~~~~~~~~~~~~~~~~~~~ key.c:1035:17: warning: 'EC_KEY_get0_group' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1035 | if ((p = EC_POINT_new(EC_KEY_get0_group(key->ecdsa))) == NULL) { | ^~ /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c:1043:17: warning: 'EC_KEY_get0_group' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1043 | if (EC_POINT_oct2point(EC_KEY_get0_group(key->ecdsa), p, octets, len, NULL) == -1) { | ^~ /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c:1052:17: warning: 'EC_KEY_set_public_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1052 | EC_KEY_set_public_key(key->ecdsa, p); | ^~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/ec.h:1070:27: note: declared here 1070 | OSSL_DEPRECATEDIN_3_0 int EC_KEY_set_public_key(EC_KEY *key, const EC_POINT *pub); | ^~~~~~~~~~~~~~~~~~~~~ key.c:1055:17: warning: 'EC_KEY_check_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1055 | if (!EC_KEY_check_key(key->ecdsa)) { | ^~ /usr/include/openssl/ec.h:1107:27: note: declared here 1107 | OSSL_DEPRECATEDIN_3_0 int EC_KEY_check_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~ key.c: In function 'pamsshagentauth_key_to_blob': key.c:1132:17: warning: 'DSA_get0_p' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1132 | pamsshagentauth_buffer_put_bignum2(&b, DSA_get0_p(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:1133:17: warning: 'DSA_get0_q' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1133 | pamsshagentauth_buffer_put_bignum2(&b, DSA_get0_q(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ key.c:1134:17: warning: 'DSA_get0_g' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1134 | pamsshagentauth_buffer_put_bignum2(&b, DSA_get0_g(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ key.c:1135:17: warning: 'DSA_get0_pub_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1135 | pamsshagentauth_buffer_put_bignum2(&b, DSA_get0_pub_key(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ key.c:1139:17: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1139 | pamsshagentauth_buffer_put_bignum2(&b, RSA_get0_e(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:1140:17: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1140 | pamsshagentauth_buffer_put_bignum2(&b, RSA_get0_n(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:1151:17: warning: 'EC_KEY_get0_group' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1151 | if ((l = EC_POINT_point2oct(EC_KEY_get0_group(key->ecdsa), | ^~ /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c:1152:73: warning: 'EC_KEY_get0_public_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1152 | EC_KEY_get0_public_key(key->ecdsa), | ^~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/ec.h:1062:39: note: declared here 1062 | OSSL_DEPRECATEDIN_3_0 const EC_POINT *EC_KEY_get0_public_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~~~~~~ key.c:1155:25: warning: 'EC_KEY_get0_group' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1155 | (l = EC_POINT_point2oct(EC_KEY_get0_group(key->ecdsa), | ^ /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c:1156:73: warning: 'EC_KEY_get0_public_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1156 | EC_KEY_get0_public_key(key->ecdsa), | ^~~~~~~~~~~~~~~~~~~~~~ /usr/include/openssl/ec.h:1062:39: note: declared here 1062 | OSSL_DEPRECATEDIN_3_0 const EC_POINT *EC_KEY_get0_public_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~~~~~~ key.c: In function 'pamsshagentauth_key_demote': key.c:1252:17: warning: 'RSA_new' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1252 | if ((pk->rsa = RSA_new()) == NULL) | ^~ /usr/include/openssl/rsa.h:201:28: note: declared here 201 | OSSL_DEPRECATEDIN_3_0 RSA *RSA_new(void); | ^~~~~~~ key.c:1260:17: warning: 'RSA_set0_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1260 | if (RSA_set0_key(pk->rsa, BN_dup(RSA_get0_n(k->rsa)), BN_dup(RSA_get0_e(k->rsa)), NULL) != 1) | ^~ /usr/include/openssl/rsa.h:207:27: note: declared here 207 | OSSL_DEPRECATEDIN_3_0 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); | ^~~~~~~~~~~~ key.c:1260:17: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1260 | if (RSA_set0_key(pk->rsa, BN_dup(RSA_get0_n(k->rsa)), BN_dup(RSA_get0_e(k->rsa)), NULL) != 1) | ^~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:1260:17: warning: 'RSA_get0_e' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1260 | if (RSA_set0_key(pk->rsa, BN_dup(RSA_get0_n(k->rsa)), BN_dup(RSA_get0_e(k->rsa)), NULL) != 1) | ^~ /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:1265:17: warning: 'DSA_new' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1265 | if ((pk->dsa = DSA_new()) == NULL) | ^~ /usr/include/openssl/dsa.h:125:28: note: declared here 125 | OSSL_DEPRECATEDIN_3_0 DSA *DSA_new(void); | ^~~~~~~ key.c:1277:17: warning: 'DSA_set0_pqg' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1277 | if (DSA_set0_pqg(pk->dsa, BN_dup(DSA_get0_p(k->dsa)), BN_dup(DSA_get0_q(k->dsa)), BN_dup(DSA_get0_g(k->dsa))) != 1) | ^~ /usr/include/openssl/dsa.h:203:27: note: declared here 203 | OSSL_DEPRECATEDIN_3_0 int DSA_set0_pqg(DSA *d, BIGNUM *p, BIGNUM *q, BIGNUM *g); | ^~~~~~~~~~~~ key.c:1277:17: warning: 'DSA_get0_p' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1277 | if (DSA_set0_pqg(pk->dsa, BN_dup(DSA_get0_p(k->dsa)), BN_dup(DSA_get0_q(k->dsa)), BN_dup(DSA_get0_g(k->dsa))) != 1) | ^~ /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:1277:17: warning: 'DSA_get0_q' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1277 | if (DSA_set0_pqg(pk->dsa, BN_dup(DSA_get0_p(k->dsa)), BN_dup(DSA_get0_q(k->dsa)), BN_dup(DSA_get0_g(k->dsa))) != 1) | ^~ /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ key.c:1277:17: warning: 'DSA_get0_g' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1277 | if (DSA_set0_pqg(pk->dsa, BN_dup(DSA_get0_p(k->dsa)), BN_dup(DSA_get0_q(k->dsa)), BN_dup(DSA_get0_g(k->dsa))) != 1) | ^~ /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ key.c:1279:17: warning: 'DSA_set0_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1279 | if (DSA_set0_key(pk->dsa, BN_dup(DSA_get0_pub_key(k->dsa)), NULL) != 1) | ^~ /usr/include/openssl/dsa.h:206:27: note: declared here 206 | OSSL_DEPRECATEDIN_3_0 int DSA_set0_key(DSA *d, BIGNUM *pub_key, | ^~~~~~~~~~~~ key.c:1279:17: warning: 'DSA_get0_pub_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1279 | if (DSA_set0_key(pk->dsa, BN_dup(DSA_get0_pub_key(k->dsa)), NULL) != 1) | ^~ /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c log.c -o log.o log.c: In function 'pamsshagentauth_do_log': log.c:371:52: warning: ' This incident has been rep...' directive output may be truncated writing 54 bytes into a region of size between 1 and 1024 [-Wformat-truncation=] 371 | snprintf(msgbuf, sizeof msgbuf, "%s\r\nThis incident has been reported to the authorities\r\n", fmtbuf); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from /usr/include/stdio.h:906, from /usr/include/resolv.h:58, from openbsd-compat/getrrsetbyname.h:59, from openbsd-compat/openbsd-compat.h:44, from includes.h:171, from log.c:37: In function 'snprintf', inlined from 'pamsshagentauth_do_log' at log.c:371:3: /usr/include/arm-linux-gnueabihf/bits/stdio2.h:54:10: note: '__builtin___snprintf_chk' output between 55 and 1078 bytes into a destination of size 1024 54 | return __builtin___snprintf_chk (__s, __n, __USE_FORTIFY_LEVEL - 1, | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 55 | __glibc_objsize (__s), __fmt, | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 56 | __va_arg_pack ()); | ~~~~~~~~~~~~~~~~~ log.c: In function 'pamsshagentauth_do_log': log.c:378:52: warning: ' ' directive output may be truncated writing 2 bytes into a region of size between 1 and 1024 [-Wformat-truncation=] 378 | snprintf(msgbuf, sizeof msgbuf, "%s\r\n", fmtbuf); | ^~~~ In function 'snprintf', inlined from 'pamsshagentauth_do_log' at log.c:378:3: /usr/include/arm-linux-gnueabihf/bits/stdio2.h:54:10: note: '__builtin___snprintf_chk' output between 3 and 1026 bytes into a destination of size 1024 54 | return __builtin___snprintf_chk (__s, __n, __USE_FORTIFY_LEVEL - 1, | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 55 | __glibc_objsize (__s), __fmt, | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 56 | __va_arg_pack ()); | ~~~~~~~~~~~~~~~~~ gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c misc.c -o misc.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c secure_filename.c -o secure_filename.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c ssh-dss.c -o ssh-dss.o ssh-dss.c: In function 'ssh_dss_sign': ssh-dss.c:68:9: warning: 'DSA_do_sign' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 68 | sig = DSA_do_sign(digest, dlen, key->dsa); | ^~~ In file included from key.h:30, from ssh-dss.c:40: /usr/include/openssl/dsa.h:113:32: note: declared here 113 | OSSL_DEPRECATEDIN_3_0 DSA_SIG *DSA_do_sign(const unsigned char *dgst, int dlen, | ^~~~~~~~~~~ ssh-dss.c: In function 'ssh_dss_verify': ssh-dss.c:211:9: warning: 'DSA_do_verify' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 211 | ret = DSA_do_verify(digest, dlen, sig, key->dsa); | ^~~ /usr/include/openssl/dsa.h:115:27: note: declared here 115 | OSSL_DEPRECATEDIN_3_0 int DSA_do_verify(const unsigned char *dgst, int dgst_len, | ^~~~~~~~~~~~~ ssh-dss.c: In function 'ssh_dss_sign': ssh-dss.c:81:9: warning: 'r' may be used uninitialized [-Wmaybe-uninitialized] 81 | DSA_SIG_get0((const DSA_SIG *)sig, (const BIGNUM **)r, (const BIGNUM **)s); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ssh-dss.c:56:23: note: 'r' was declared here 56 | const BIGNUM *r, *s; | ^ ssh-dss.c:81:9: warning: 's' may be used uninitialized [-Wmaybe-uninitialized] 81 | DSA_SIG_get0((const DSA_SIG *)sig, (const BIGNUM **)r, (const BIGNUM **)s); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ssh-dss.c:56:27: note: 's' was declared here 56 | const BIGNUM *r, *s; | ^ gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c ssh-ecdsa.c -o ssh-ecdsa.o ssh-ecdsa.c: In function 'evp_from_key': ssh-ecdsa.c:24:9: warning: 'EC_KEY_get0_group' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 24 | int nid = EC_GROUP_get_curve_name(EC_KEY_get0_group(key->ecdsa)); | ^~~ In file included from /usr/include/openssl/ecdsa.h:10, from ssh-ecdsa.c:6: /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ ssh-ecdsa.c: In function 'ssh_ecdsa_sign': ssh-ecdsa.c:62:5: warning: 'ECDSA_do_sign' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 62 | sig = ECDSA_do_sign(digest, dlen, key->ecdsa); | ^~~ /usr/include/openssl/ec.h:1365:34: note: declared here 1365 | OSSL_DEPRECATEDIN_3_0 ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, | ^~~~~~~~~~~~~ ssh-ecdsa.c:76:18: warning: passing argument 1 of 'DSA_SIG_get0' from incompatible pointer type [-Wincompatible-pointer-types] 76 | DSA_SIG_get0(sig, &r, &s); | ^~~ | | | ECDSA_SIG * {aka struct ECDSA_SIG_st *} In file included from key.h:30, from ssh-ecdsa.c:16: /usr/include/openssl/dsa.h:65:34: note: expected 'const DSA_SIG *' {aka 'const struct DSA_SIG_st *'} but argument is of type 'ECDSA_SIG *' {aka 'struct ECDSA_SIG_st *'} 65 | void DSA_SIG_get0(const DSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps); | ~~~~~~~~~~~~~~~^~~ ssh-ecdsa.c:76:23: warning: passing argument 2 of 'DSA_SIG_get0' from incompatible pointer type [-Wincompatible-pointer-types] 76 | DSA_SIG_get0(sig, &r, &s); | ^~ | | | BIGNUM ** {aka struct bignum_st **} /usr/include/openssl/dsa.h:65:54: note: expected 'const BIGNUM **' {aka 'const struct bignum_st **'} but argument is of type 'BIGNUM **' {aka 'struct bignum_st **'} 65 | void DSA_SIG_get0(const DSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps); | ~~~~~~~~~~~~~~~^~ ssh-ecdsa.c:76:27: warning: passing argument 3 of 'DSA_SIG_get0' from incompatible pointer type [-Wincompatible-pointer-types] 76 | DSA_SIG_get0(sig, &r, &s); | ^~ | | | BIGNUM ** {aka struct bignum_st **} /usr/include/openssl/dsa.h:65:73: note: expected 'const BIGNUM **' {aka 'const struct bignum_st **'} but argument is of type 'BIGNUM **' {aka 'struct bignum_st **'} 65 | void DSA_SIG_get0(const DSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps); | ~~~~~~~~~~~~~~~^~ ssh-ecdsa.c: In function 'ssh_ecdsa_verify': ssh-ecdsa.c:172:5: warning: 'ECDSA_do_verify' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 172 | ret = ECDSA_do_verify(digest, dlen, sig, key->ecdsa); | ^~~ /usr/include/openssl/ec.h:1391:27: note: declared here 1391 | OSSL_DEPRECATEDIN_3_0 int ECDSA_do_verify(const unsigned char *dgst, int dgst_len, | ^~~~~~~~~~~~~~~ gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c ssh-ed25519.c -o ssh-ed25519.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c ssh-rsa.c -o ssh-rsa.o ssh-rsa.c: In function 'ssh_rsa_sign': ssh-rsa.c:59:24: warning: passing argument 1 of 'EVP_DigestInit' from incompatible pointer type [-Wincompatible-pointer-types] 59 | EVP_DigestInit(&md, evp_md); | ^~~ | | | EVP_MD_CTX ** {aka struct evp_md_ctx_st **} In file included from ssh-rsa.c:22: /usr/include/openssl/evp.h:722:39: note: expected 'EVP_MD_CTX *' {aka 'struct evp_md_ctx_st *'} but argument is of type 'EVP_MD_CTX **' {aka 'struct evp_md_ctx_st **'} 722 | __owur int EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type); | ~~~~~~~~~~~~^~~ ssh-rsa.c:60:26: warning: passing argument 1 of 'EVP_DigestUpdate' from incompatible pointer type [-Wincompatible-pointer-types] 60 | EVP_DigestUpdate(&md, data, datalen); | ^~~ | | | EVP_MD_CTX ** {aka struct evp_md_ctx_st **} /usr/include/openssl/evp.h:710:41: note: expected 'EVP_MD_CTX *' {aka 'struct evp_md_ctx_st *'} but argument is of type 'EVP_MD_CTX **' {aka 'struct evp_md_ctx_st **'} 710 | __owur int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *d, | ~~~~~~~~~~~~^~~ ssh-rsa.c:61:25: warning: passing argument 1 of 'EVP_DigestFinal' from incompatible pointer type [-Wincompatible-pointer-types] 61 | EVP_DigestFinal(&md, digest, &dlen); | ^~~ | | | EVP_MD_CTX ** {aka struct evp_md_ctx_st **} /usr/include/openssl/evp.h:723:40: note: expected 'EVP_MD_CTX *' {aka 'struct evp_md_ctx_st *'} but argument is of type 'EVP_MD_CTX **' {aka 'struct evp_md_ctx_st **'} 723 | __owur int EVP_DigestFinal(EVP_MD_CTX *ctx, unsigned char *md, | ~~~~~~~~~~~~^~~ ssh-rsa.c:63:9: warning: 'RSA_size' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 63 | slen = RSA_size(key->rsa); | ^~~~ In file included from key.h:29, from ssh-rsa.c:31: /usr/include/openssl/rsa.h:204:27: note: declared here 204 | OSSL_DEPRECATEDIN_3_0 int RSA_size(const RSA *rsa); | ^~~~~~~~ ssh-rsa.c:66:9: warning: 'RSA_sign' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 66 | ok = RSA_sign(nid, digest, dlen, sig, &len, key->rsa); | ^~ /usr/include/openssl/rsa.h:348:27: note: declared here 348 | OSSL_DEPRECATEDIN_3_0 int RSA_sign(int type, const unsigned char *m, | ^~~~~~~~ ssh-rsa.c: In function 'ssh_rsa_verify': ssh-rsa.c:125:9: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 125 | if (BN_num_bits(RSA_get0_n(key->rsa)) < SSH_RSA_MINIMUM_MODULUS_SIZE) { | ^~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ ssh-rsa.c:131:21: warning: 'RSA_get0_n' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 131 | BN_num_bits(RSA_get0_n(key->rsa)), SSH_RSA_MINIMUM_MODULUS_SIZE); | ^~~~~~~~~~~ /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ ssh-rsa.c:154:9: warning: 'RSA_size' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 154 | modlen = RSA_size(key->rsa); | ^~~~~~ /usr/include/openssl/rsa.h:204:27: note: declared here 204 | OSSL_DEPRECATEDIN_3_0 int RSA_size(const RSA *rsa); | ^~~~~~~~ ssh-rsa.c: In function 'openssh_RSA_verify': ssh-rsa.c:246:9: warning: 'RSA_size' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 246 | rsasize = RSA_size(rsa); | ^~~~~~~ /usr/include/openssl/rsa.h:204:27: note: declared here 204 | OSSL_DEPRECATEDIN_3_0 int RSA_size(const RSA *rsa); | ^~~~~~~~ ssh-rsa.c:252:9: warning: 'RSA_public_decrypt' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 252 | if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, | ^~ /usr/include/openssl/rsa.h:288:5: note: declared here 288 | int RSA_public_decrypt(int flen, const unsigned char *from, unsigned char *to, | ^~~~~~~~~~~~~~~~~~ gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c uuencode.c -o uuencode.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c compat.c -o compat.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c uidswap.c -o uidswap.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c ed25519-donna/ed25519.c -o ed25519-donna/ed25519.o In file included from ed25519-donna/ed25519.c:20: ed25519-donna/ed25519-hash.h: In function 'ed25519_hash_init': ed25519-donna/ed25519-hash.h:200:9: warning: 'SHA512_Init' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 200 | SHA512_Init(ctx); | ^~~~~~~~~~~ In file included from ed25519-donna/ed25519-hash.h:194: /usr/include/openssl/sha.h:123:27: note: declared here 123 | OSSL_DEPRECATEDIN_3_0 int SHA512_Init(SHA512_CTX *c); | ^~~~~~~~~~~ ed25519-donna/ed25519-hash.h: In function 'ed25519_hash_update': ed25519-donna/ed25519-hash.h:205:9: warning: 'SHA512_Update' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 205 | SHA512_Update(ctx, in, inlen); | ^~~~~~~~~~~~~ /usr/include/openssl/sha.h:124:27: note: declared here 124 | OSSL_DEPRECATEDIN_3_0 int SHA512_Update(SHA512_CTX *c, | ^~~~~~~~~~~~~ ed25519-donna/ed25519-hash.h: In function 'ed25519_hash_final': ed25519-donna/ed25519-hash.h:210:9: warning: 'SHA512_Final' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 210 | SHA512_Final(hash, ctx); | ^~~~~~~~~~~~ /usr/include/openssl/sha.h:126:27: note: declared here 126 | OSSL_DEPRECATEDIN_3_0 int SHA512_Final(unsigned char *md, SHA512_CTX *c); | ^~~~~~~~~~~~ gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c pam_user_key_allowed2.c -o pam_user_key_allowed2.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c iterate_ssh_agent_keys.c -o iterate_ssh_agent_keys.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c userauth_pubkey_from_id.c -o userauth_pubkey_from_id.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c pam_user_authorized_keys.c -o pam_user_authorized_keys.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c get_command_line.c -o get_command_line.o get_command_line.c: In function 'proc_pid_cmdline': get_command_line.c:65:17: warning: case label value is less than minimum value for type [-Wswitch-outside-range] 65 | case EOF: | ^~~~ gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c pam_ssh_agent_auth.c -o pam_ssh_agent_auth.o gcc -shared -o pam_ssh_agent_auth.so xmalloc.o atomicio.o authfd.o bufaux.o bufbn.o buffer.o cleanup.o entropy.o fatal.o key.o log.o misc.o secure_filename.o ssh-dss.o ssh-ecdsa.o ssh-ed25519.o ssh-rsa.o uuencode.o compat.o uidswap.o ed25519-donna/ed25519.o pam_user_key_allowed2.o iterate_ssh_agent_keys.o userauth_pubkey_from_id.o pam_user_authorized_keys.o get_command_line.o -L. -Lopenbsd-compat/ -Wl,-z,relro -fstack-protector-all -lopenbsd-compat pam_ssh_agent_auth.o -lcrypto -lpam -lcrypt -lpam make[1]: Leaving directory '/build/pam-ssh-agent-auth-0.10.3' dh_auto_test dh_auto_test: warning: Compatibility levels before 10 are deprecated (level 9 in use) fakeroot debian/rules binary dh binary dh: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_testroot dh_prep dh_auto_install --destdir=debian/libpam-ssh-agent-auth/ dh_auto_install: warning: Compatibility levels before 10 are deprecated (level 9 in use) make -j1 install DESTDIR=/build/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth AM_UPDATE_INFO_DIR=no make[1]: Entering directory '/build/pam-ssh-agent-auth-0.10.3' (cd openbsd-compat && make) make[2]: Entering directory '/build/pam-ssh-agent-auth-0.10.3/openbsd-compat' make[2]: Nothing to be done for 'all'. make[2]: Leaving directory '/build/pam-ssh-agent-auth-0.10.3/openbsd-compat' ./mkinstalldirs /build/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/lib/arm-linux-gnueabihf/security mkdir /build/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/lib mkdir /build/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/lib/arm-linux-gnueabihf mkdir /build/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/lib/arm-linux-gnueabihf/security ./mkinstalldirs /build/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/usr/share/man/man8 mkdir /build/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/usr mkdir /build/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/usr/share mkdir /build/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/usr/share/man mkdir /build/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/usr/share/man/man8 /usr/bin/install -c -m 644 pam_ssh_agent_auth.8 /build/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/usr/share/man/man8/pam_ssh_agent_auth.8 /usr/bin/install -c -m 755 pam_ssh_agent_auth.so /build/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/lib/arm-linux-gnueabihf/security/pam_ssh_agent_auth.so make[1]: Leaving directory '/build/pam-ssh-agent-auth-0.10.3' dh_installdocs dh_installdocs: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_installchangelogs dh_installchangelogs: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_installman dh_installman: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_perl dh_link dh_strip_nondeterminism dh_compress dh_compress: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_fixperms dh_missing dh_missing: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_strip dh_strip: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_makeshlibs dh_makeshlibs: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_shlibdeps dh_shlibdeps: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_installdeb dh_installdeb: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_gencontrol dh_md5sums dh_builddeb dpkg-deb: building package 'libpam-ssh-agent-auth' in '../libpam-ssh-agent-auth_0.10.3-4_armhf.deb'. dpkg-deb: building package 'libpam-ssh-agent-auth-dbgsym' in '../libpam-ssh-agent-auth-dbgsym_0.10.3-4_armhf.deb'. dpkg-genbuildinfo --build=binary -O../pam-ssh-agent-auth_0.10.3-4_armhf.buildinfo dpkg-genchanges --build=binary -O../pam-ssh-agent-auth_0.10.3-4_armhf.changes dpkg-genchanges: info: binary-only upload (no source code included) dpkg-source --after-build . dpkg-buildpackage: info: binary-only upload (no source included) dpkg-genchanges: info: not including original source code in upload I: copying local configuration I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env I: removing directory /srv/workspace/pbuilder/32766 and its subdirectories I: Current time: Sun May 21 14:37:10 -12 2023 I: pbuilder-time-stamp: 1684723030 Mon May 22 02:37:32 UTC 2023 I: 1st build successful. Starting 2nd build on remote node virt32a-armhf-rb.debian.net. Mon May 22 02:37:32 UTC 2023 I: Preparing to do remote build '2' on virt32a-armhf-rb.debian.net. Mon May 22 02:44:22 UTC 2023 I: Deleting $TMPDIR on virt32a-armhf-rb.debian.net. Mon May 22 02:44:30 UTC 2023 I: pam-ssh-agent-auth_0.10.3-4_armhf.changes: Format: 1.8 Date: Sat, 12 Nov 2022 15:55:52 -0300 Source: pam-ssh-agent-auth Binary: libpam-ssh-agent-auth libpam-ssh-agent-auth-dbgsym Architecture: armhf Version: 0.10.3-4 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Marcos Talau Description: libpam-ssh-agent-auth - PAM Authentication via forwarded ssh-agent Changes: pam-ssh-agent-auth (0.10.3-4) unstable; urgency=medium . * QA upload. * Set maintainer to Debian QA Group . (see: #1003602) Checksums-Sha1: 0d3e6f4c080a166e079c4bddf5017b799f269384 169900 libpam-ssh-agent-auth-dbgsym_0.10.3-4_armhf.deb da8332be6e52dbc83fafea54e7be861043dd0759 90136 libpam-ssh-agent-auth_0.10.3-4_armhf.deb 748b2c21564f7a4eb8c6207cf25a295b005945e6 5152 pam-ssh-agent-auth_0.10.3-4_armhf.buildinfo Checksums-Sha256: d80562610089b5de969ee23697680d0e8075733c642f974508148bfd88310918 169900 libpam-ssh-agent-auth-dbgsym_0.10.3-4_armhf.deb 3e40236d31efb574ad0aca1900b8791837bfe33546d70d4c71dd87df7ce3fcd5 90136 libpam-ssh-agent-auth_0.10.3-4_armhf.deb 494eb422e4f6307a08e67ba1ed2afa3d5ba77637b6bfe9f02d3bc53c94e9026d 5152 pam-ssh-agent-auth_0.10.3-4_armhf.buildinfo Files: 07f967c7261c83a5bb70dc477020f384 169900 debug optional libpam-ssh-agent-auth-dbgsym_0.10.3-4_armhf.deb c646eafd84d2ecf0898888c253a69574 90136 admin optional libpam-ssh-agent-auth_0.10.3-4_armhf.deb 2b63e4ce66e19cedb170bf12c4015d34 5152 libs optional pam-ssh-agent-auth_0.10.3-4_armhf.buildinfo Mon May 22 02:44:31 UTC 2023 I: diffoscope 242 will be used to compare the two builds: # Profiling output for: /usr/bin/diffoscope --timeout 7200 --html /srv/reproducible-results/rbuild-debian/r-b-build.zKWStvMk/pam-ssh-agent-auth_0.10.3-4.diffoscope.html --text /srv/reproducible-results/rbuild-debian/r-b-build.zKWStvMk/pam-ssh-agent-auth_0.10.3-4.diffoscope.txt --json /srv/reproducible-results/rbuild-debian/r-b-build.zKWStvMk/pam-ssh-agent-auth_0.10.3-4.diffoscope.json --profile=- /srv/reproducible-results/rbuild-debian/r-b-build.zKWStvMk/b1/pam-ssh-agent-auth_0.10.3-4_armhf.changes /srv/reproducible-results/rbuild-debian/r-b-build.zKWStvMk/b2/pam-ssh-agent-auth_0.10.3-4_armhf.changes ## command (total time: 0.000s) 0.000s 1 call cmp (internal) ## has_same_content_as (total time: 0.000s) 0.000s 1 call abc.DotChangesFile ## main (total time: 0.301s) 0.301s 2 calls outputs 0.000s 1 call cleanup ## recognizes (total time: 0.017s) 0.017s 12 calls diffoscope.comparators.binary.FilesystemFile 0.000s 10 calls abc.DotChangesFile ## specialize (total time: 0.000s) 0.000s 1 call specialize Mon May 22 02:44:33 UTC 2023 I: diffoscope 242 found no differences in the changes files, and a .buildinfo file also exists. Mon May 22 02:44:33 UTC 2023 I: pam-ssh-agent-auth from bookworm built successfully and reproducibly on armhf. Mon May 22 02:44:34 UTC 2023 I: Submitting .buildinfo files to external archives: Mon May 22 02:44:34 UTC 2023 I: Submitting 8.0K b1/pam-ssh-agent-auth_0.10.3-4_armhf.buildinfo.asc Mon May 22 02:44:34 UTC 2023 I: Submitting 8.0K b2/pam-ssh-agent-auth_0.10.3-4_armhf.buildinfo.asc Mon May 22 02:44:35 UTC 2023 I: Done submitting .buildinfo files to http://buildinfo.debian.net/api/submit. Mon May 22 02:44:35 UTC 2023 I: Done submitting .buildinfo files. Mon May 22 02:44:35 UTC 2023 I: Removing signed pam-ssh-agent-auth_0.10.3-4_armhf.buildinfo.asc files: removed './b1/pam-ssh-agent-auth_0.10.3-4_armhf.buildinfo.asc' removed './b2/pam-ssh-agent-auth_0.10.3-4_armhf.buildinfo.asc'