====>> Building security/pam_google_authenticator build started at Fri Aug 26 13:01:07 BST 2016 port directory: /usr/ports/security/pam_google_authenticator building for: FreeBSD 110amd64-system-job-01 11.0-RC2 FreeBSD 11.0-RC2 amd64 maintained by: jnlin@freebsd.cs.nctu.edu.tw Makefile ident: $FreeBSD: head/security/pam_google_authenticator/Makefile 410661 2016-03-08 20:45:15Z pi $ Poudriere version: 3.1.10 Host OSVERSION: 1100122 Jail OSVERSION: 1100122 ---Begin Environment--- SHELL=/bin/csh OSVERSION=1100122 UNAME_v=FreeBSD 11.0-RC2 UNAME_r=11.0-RC2 BLOCKSIZE=K MAIL=/var/mail/root STATUS=1 SAVED_TERM=screen MASTERMNT=/space/poudriere/poudriere_data/.m/110amd64-system/ref FORCE_PACKAGE=yes PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin:/root/bin POUDRIERE_BUILD_TYPE=bulk PKGNAME=pam_google_authenticator-1.01.20160208_1,1 OLDPWD=/ PWD=/space/poudriere/poudriere_data/.m/110amd64-system/ref/.p/pool MASTERNAME=110amd64-system SCRIPTPREFIX=/usr/local/share/poudriere USER=root HOME=/root POUDRIERE_VERSION=3.1.10 SCRIPTPATH=/usr/local/share/poudriere/bulk.sh LIBEXECPREFIX=/usr/local/libexec/poudriere LOCALBASE=/usr/local PACKAGE_BUILDING=yes ---End Environment--- ---Begin OPTIONS List--- ---End OPTIONS List--- --CONFIGURE_ARGS-- --prefix=/usr/local ${_LATE_CONFIGURE_ARGS} --End CONFIGURE_ARGS-- --CONFIGURE_ENV-- MAKE=gmake XDG_DATA_HOME=/wrkdirs/usr/ports/security/pam_google_authenticator/work XDG_CONFIG_HOME=/wrkdirs/usr/ports/security/pam_google_authenticator/work HOME=/wrkdirs/usr/ports/security/pam_google_authenticator/work TMPDIR="/tmp" SHELL=/bin/sh CONFIG_SHELL=/bin/sh CONFIG_SITE=/usr/ports/Templates/config.site lt_cv_sys_max_cmd_len=262144 --End CONFIGURE_ENV-- --MAKE_ENV-- XDG_DATA_HOME=/wrkdirs/usr/ports/security/pam_google_authenticator/work XDG_CONFIG_HOME=/wrkdirs/usr/ports/security/pam_google_authenticator/work HOME=/wrkdirs/usr/ports/security/pam_google_authenticator/work TMPDIR="/tmp" NO_PIE=yes MK_DEBUG_FILES=no MK_KERNEL_SYMBOLS=no SHELL=/bin/sh NO_LINT=YES PREFIX=/usr/local LOCALBASE=/usr/local LIBDIR="/usr/lib" CC="cc" CFLAGS="-O2 -pipe -fstack-protector -fno-strict-aliasing" CPP="cpp" CPPFLAGS="" LDFLAGS=" -fstack-protector" LIBS="" CXX="c++" CXXFLAGS="-O2 -pipe -fstack-protector -fno-strict-aliasing " MANPREFIX="/usr/local" BSD_INSTALL_PROGRAM="install -s -m 555" BSD_INSTALL_LIB="install -s -m 444" BSD_INSTALL_SCRIPT="install -m 555" BSD_INSTALL_DATA="install -m 0644" BSD_INSTALL_MAN="install -m 444" --End MAKE_ENV-- --PLIST_SUB-- OSREL=11.0 PREFIX=%D LOCALBASE=/usr/local RESETPREFIX=/usr/local PORTDOCS="" PORTEXAMPLES="" LIB32DIR=lib DOCSDIR="share/doc/pam_google_authenticator" EXAMPLESDIR="share/examples/pam_google_authenticator" DATADIR="share/pam_google_authenticator" WWWDIR="www/pam_google_authenticator" ETCDIR="etc/pam_google_authenticator" --End PLIST_SUB-- --SUB_LIST-- PREFIX=/usr/local LOCALBASE=/usr/local DATADIR=/usr/local/share/pam_google_authenticator DOCSDIR=/usr/local/share/doc/pam_google_authenticator EXAMPLESDIR=/usr/local/share/examples/pam_google_authenticator WWWDIR=/usr/local/www/pam_google_authenticator ETCDIR=/usr/local/etc/pam_google_authenticator --End SUB_LIST-- ---Begin make.conf--- USE_PACKAGE_DEPENDS=yes BATCH=yes WRKDIRPREFIX=/wrkdirs PORTSDIR=/usr/ports PACKAGES=/packages DISTDIR=/distfiles DISABLE_MAKE_JOBS=poudriere ---End make.conf--- =================================================== ===> License APACHE20 accepted by the user =========================================================================== =================================================== ===> pam_google_authenticator-1.01.20160208_1,1 depends on file: /usr/local/sbin/pkg - not found ===> Installing existing package /packages/All/pkg-1.8.7_1.txz [110amd64-system-job-01] Installing pkg-1.8.7_1... [110amd64-system-job-01] Extracting pkg-1.8.7_1: .......... done ===> pam_google_authenticator-1.01.20160208_1,1 depends on file: /usr/local/sbin/pkg - found ===> Returning to build of pam_google_authenticator-1.01.20160208_1,1 =========================================================================== =================================================== =========================================================================== =================================================== ===> License APACHE20 accepted by the user ===> Fetching all distfiles required by pam_google_authenticator-1.01.20160208_1,1 for building =========================================================================== =================================================== ===> License APACHE20 accepted by the user ===> Fetching all distfiles required by pam_google_authenticator-1.01.20160208_1,1 for building => SHA256 Checksum OK for google-google-authenticator-1.01.20160208-195ddc1_GH0.tar.gz. =========================================================================== =================================================== =========================================================================== =================================================== ===> License APACHE20 accepted by the user ===> Fetching all distfiles required by pam_google_authenticator-1.01.20160208_1,1 for building ===> Extracting for pam_google_authenticator-1.01.20160208_1,1 => SHA256 Checksum OK for google-google-authenticator-1.01.20160208-195ddc1_GH0.tar.gz. =========================================================================== =================================================== =========================================================================== =================================================== ===> Patching for pam_google_authenticator-1.01.20160208_1,1 =========================================================================== =================================================== ===> pam_google_authenticator-1.01.20160208_1,1 depends on executable: autoconf-2.69 - not found ===> Installing existing package /packages/All/autoconf-2.69_1.txz [110amd64-system-job-01] Installing autoconf-2.69_1... [110amd64-system-job-01] `-- Installing indexinfo-0.2.4... [110amd64-system-job-01] `-- Extracting indexinfo-0.2.4: .... done [110amd64-system-job-01] `-- Installing autoconf-wrapper-20131203... [110amd64-system-job-01] `-- Extracting autoconf-wrapper-20131203: ........ done [110amd64-system-job-01] `-- Installing perl5-5.20.3_15... [110amd64-system-job-01] `-- Extracting perl5-5.20.3_15: .......... done [110amd64-system-job-01] `-- Installing m4-1.4.17_1,1... [110amd64-system-job-01] `-- Extracting m4-1.4.17_1,1: .......... done [110amd64-system-job-01] Extracting autoconf-2.69_1: .......... done Message from perl5-5.20.3_15: The /usr/bin/perl symlink has been removed starting with Perl 5.20. For shebangs, you should either use: #!/usr/local/bin/perl or #!/usr/bin/env perl The first one will only work if you have a /usr/local/bin/perl, the second will work as long as perl is in PATH. ===> pam_google_authenticator-1.01.20160208_1,1 depends on executable: autoconf-2.69 - found ===> Returning to build of pam_google_authenticator-1.01.20160208_1,1 ===> pam_google_authenticator-1.01.20160208_1,1 depends on executable: autoheader-2.69 - found ===> pam_google_authenticator-1.01.20160208_1,1 depends on executable: autoreconf-2.69 - found ===> pam_google_authenticator-1.01.20160208_1,1 depends on executable: aclocal-1.15 - not found ===> Installing existing package /packages/All/automake-1.15_1.txz [110amd64-system-job-01] Installing automake-1.15_1... [110amd64-system-job-01] `-- Installing automake-wrapper-20131203... [110amd64-system-job-01] `-- Extracting automake-wrapper-20131203: ... done [110amd64-system-job-01] Extracting automake-1.15_1: .......... done ===> pam_google_authenticator-1.01.20160208_1,1 depends on executable: aclocal-1.15 - found ===> Returning to build of pam_google_authenticator-1.01.20160208_1,1 ===> pam_google_authenticator-1.01.20160208_1,1 depends on executable: automake-1.15 - found ===> pam_google_authenticator-1.01.20160208_1,1 depends on executable: libtoolize - not found ===> Installing existing package /packages/All/libtool-2.4.6.txz [110amd64-system-job-01] Installing libtool-2.4.6... [110amd64-system-job-01] Extracting libtool-2.4.6: .......... done ===> pam_google_authenticator-1.01.20160208_1,1 depends on executable: libtoolize - found ===> Returning to build of pam_google_authenticator-1.01.20160208_1,1 ===> pam_google_authenticator-1.01.20160208_1,1 depends on executable: gmake - not found ===> Installing existing package /packages/All/gmake-4.2.1_1.txz [110amd64-system-job-01] Installing gmake-4.2.1_1... [110amd64-system-job-01] `-- Installing gettext-runtime-0.19.8.1... [110amd64-system-job-01] `-- Extracting gettext-runtime-0.19.8.1: .......... done [110amd64-system-job-01] Extracting gmake-4.2.1_1: .......... done ===> pam_google_authenticator-1.01.20160208_1,1 depends on executable: gmake - found ===> Returning to build of pam_google_authenticator-1.01.20160208_1,1 =========================================================================== =================================================== =========================================================================== =================================================== ===> Configuring for pam_google_authenticator-1.01.20160208_1,1 aclocal-1.15: warning: couldn't open directory 'm4': No such file or directory libtoolize: putting auxiliary files in '.'. libtoolize: copying file './ltmain.sh' libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. libtoolize: copying file 'm4/libtool.m4' libtoolize: copying file 'm4/ltoptions.m4' libtoolize: copying file 'm4/ltsugar.m4' libtoolize: copying file 'm4/ltversion.m4' libtoolize: copying file 'm4/lt~obsolete.m4' libtoolize: Consider adding '-I m4' to ACLOCAL_AMFLAGS in Makefile.am. configure.ac:3: installing './compile' configure.ac:4: installing './config.guess' configure.ac:4: installing './config.sub' configure.ac:7: installing './install-sh' configure.ac:7: installing './missing' Makefile.am: installing './depcomp' parallel-tests: installing './test-driver' configure: loading site script /usr/ports/Templates/config.site checking for gcc... cc checking whether the C compiler works... yes checking for C compiler default output file name... a.out checking for suffix of executables... checking whether we are cross compiling... no checking for suffix of object files... o checking whether we are using the GNU C compiler... yes checking whether cc accepts -g... yes checking for cc option to accept ISO C89... none needed checking whether cc understands -c and -o together... yes checking how to run the C preprocessor... cpp checking for grep that handles long lines and -e... (cached) /usr/bin/grep checking for egrep... (cached) /usr/bin/egrep checking for ANSI C header files... (cached) yes checking for sys/types.h... (cached) yes checking for sys/stat.h... (cached) yes checking for stdlib.h... (cached) yes checking for string.h... (cached) yes checking for memory.h... (cached) yes checking for strings.h... (cached) yes checking for inttypes.h... (cached) yes checking for stdint.h... (cached) yes checking for unistd.h... (cached) yes checking for minix/config.h... (cached) no checking whether it is safe to define __EXTENSIONS__... yes checking build system type... amd64-portbld-freebsd11.0 checking host system type... amd64-portbld-freebsd11.0 checking how to print strings... printf checking for a sed that does not truncate output... (cached) /usr/bin/sed checking for fgrep... (cached) /usr/bin/fgrep checking for ld used by cc... /usr/bin/ld checking if the linker (/usr/bin/ld) is GNU ld... yes checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm checking the name lister (/usr/bin/nm) interface... BSD nm checking whether ln -s works... yes checking the maximum length of command line arguments... (cached) 262144 checking how to convert amd64-portbld-freebsd11.0 file names to amd64-portbld-freebsd11.0 format... func_convert_file_noop checking how to convert amd64-portbld-freebsd11.0 file names to toolchain format... func_convert_file_noop checking for /usr/bin/ld option to reload object files... -r checking for objdump... objdump checking how to recognize dependent libraries... pass_all checking for dlltool... no checking how to associate runtime and link libraries... printf %s\n checking for ar... ar checking for archiver @FILE support... no checking for strip... strip checking for ranlib... ranlib checking for gawk... (cached) /usr/bin/awk checking command to parse /usr/bin/nm output from cc object... ok checking for sysroot... no checking for a working dd... /bin/dd checking how to truncate binary pipes... /bin/dd bs=4096 count=1 checking for mt... mt checking if mt is a manifest tool... no checking for dlfcn.h... (cached) yes checking for objdir... .libs checking if cc supports -fno-rtti -fno-exceptions... yes checking for cc option to produce PIC... -fPIC -DPIC checking if cc PIC flag -fPIC -DPIC works... yes checking if cc static flag -static works... yes checking if cc supports -c -o file.o... yes checking if cc supports -c -o file.o... (cached) yes checking whether the cc linker (/usr/bin/ld) supports shared libraries... yes checking whether -lc should be explicitly linked in... no checking dynamic linker characteristics... freebsd11.0 ld.so checking how to hardcode library paths into programs... immediate checking whether stripping libraries is possible... yes checking if libtool supports shared libraries... yes checking whether to build shared libraries... yes checking whether to build static libraries... yes checking for a BSD-compatible install... /usr/bin/install -c checking whether build environment is sane... yes checking for a thread-safe mkdir -p... (cached) /bin/mkdir -p checking whether gmake sets $(MAKE)... yes checking for style of include used by gmake... GNU checking whether gmake supports nested variables... yes checking dependency style of cc... gcc3 checking whether to enable maintainer-specific portions of Makefiles... yes checking for gcc... (cached) cc checking whether we are using the GNU C compiler... (cached) yes checking whether cc accepts -g... (cached) yes checking for cc option to accept ISO C89... (cached) none needed checking whether cc understands -c and -o together... (cached) yes checking for cc option to accept ISO C99... none needed checking for cc option to accept ISO Standard C... (cached) none needed checking sys/fsuid.h usability... no checking sys/fsuid.h presence... no checking for sys/fsuid.h... no checking for setfsuid... no checking for security/pam_appl.h... (cached) yes checking for security/pam_modules.h... yes checking for pam_get_user in -lpam... yes checking whether certain PAM functions require const arguments... yes checking for library containing dlopen... none required checking that generated files are newer than configure... done configure: creating ./config.status config.status: creating Makefile config.status: creating config.h config.status: executing libtool commands config.status: executing depfiles commands google-authenticator version 1.01 Prefix.........: /usr/local Debug Build....: C Compiler.....: cc -O2 -pipe -fstack-protector -fno-strict-aliasing Linker.........: /usr/bin/ld -fstack-protector =========================================================================== =================================================== ===> Building for pam_google_authenticator-1.01.20160208_1,1 gmake[1]: Entering directory '/wrkdirs/usr/ports/security/pam_google_authenticator/work/google-authenticator-195ddc1/libpam' gmake all-am gmake[2]: Entering directory '/wrkdirs/usr/ports/security/pam_google_authenticator/work/google-authenticator-195ddc1/libpam' /bin/sh ./libtool --tag=CC --mode=compile cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT pam_google_authenticator_la-pam_google_authenticator.lo -MD -MP -MF .deps/pam_google_authenticator_la-pam_google_authenticator.Tpo -c -o pam_google_authenticator_la-pam_google_authenticator.lo `test -f 'pam_google_authenticator.c' || echo './'`pam_google_authenticator.c libtool: compile: cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT pam_google_authenticator_la-pam_google_authenticator.lo -MD -MP -MF .deps/pam_google_authenticator_la-pam_google_authenticator.Tpo -c pam_google_authenticator.c -fPIC -DPIC -o .libs/pam_google_authenticator_la-pam_google_authenticator.o pam_google_authenticator.c:838:49: warning: initializing 'char *' with an expression of type 'const char *' discards qualifiers [-Wincompatible-pointer-types-discards-qualifiers] .msg = prompt }; ^~~~~~ pam_google_authenticator.c:1045:44: warning: adding 'int' to a string does not append to the string [-Wstring-plus-int] sprintf(strrchr(disallow, '\000'), " %d" + !*disallow, tm); ~~~~~~^~~~~~~~~~~~ pam_google_authenticator.c:1045:44: note: use array indexing to silence this warning sprintf(strrchr(disallow, '\000'), " %d" + !*disallow, tm); ^ & [ ] pam_google_authenticator.c:1204:48: warning: adding 'int' to a string does not append to the string [-Wstring-plus-int] sprintf(strrchr(reset, '\000'), " %d%+d" + !*reset, tms[i], skews[i]); ~~~~~~~~~^~~~~~~~~ pam_google_authenticator.c:1204:48: note: use array indexing to silence this warning sprintf(strrchr(reset, '\000'), " %d%+d" + !*reset, tms[i], skews[i]); ^ & [ ] 3 warnings generated. libtool: compile: cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT pam_google_authenticator_la-pam_google_authenticator.lo -MD -MP -MF .deps/pam_google_authenticator_la-pam_google_authenticator.Tpo -c pam_google_authenticator.c -o pam_google_authenticator_la-pam_google_authenticator.o >/dev/null 2>&1 mv -f .deps/pam_google_authenticator_la-pam_google_authenticator.Tpo .deps/pam_google_authenticator_la-pam_google_authenticator.Plo /bin/sh ./libtool --tag=CC --mode=compile cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT pam_google_authenticator_la-base32.lo -MD -MP -MF .deps/pam_google_authenticator_la-base32.Tpo -c -o pam_google_authenticator_la-base32.lo `test -f 'base32.c' || echo './'`base32.c libtool: compile: cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT pam_google_authenticator_la-base32.lo -MD -MP -MF .deps/pam_google_authenticator_la-base32.Tpo -c base32.c -fPIC -DPIC -o .libs/pam_google_authenticator_la-base32.o libtool: compile: cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT pam_google_authenticator_la-base32.lo -MD -MP -MF .deps/pam_google_authenticator_la-base32.Tpo -c base32.c -o pam_google_authenticator_la-base32.o >/dev/null 2>&1 mv -f .deps/pam_google_authenticator_la-base32.Tpo .deps/pam_google_authenticator_la-base32.Plo /bin/sh ./libtool --tag=CC --mode=compile cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT pam_google_authenticator_la-hmac.lo -MD -MP -MF .deps/pam_google_authenticator_la-hmac.Tpo -c -o pam_google_authenticator_la-hmac.lo `test -f 'hmac.c' || echo './'`hmac.c libtool: compile: cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT pam_google_authenticator_la-hmac.lo -MD -MP -MF .deps/pam_google_authenticator_la-hmac.Tpo -c hmac.c -fPIC -DPIC -o .libs/pam_google_authenticator_la-hmac.o libtool: compile: cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT pam_google_authenticator_la-hmac.lo -MD -MP -MF .deps/pam_google_authenticator_la-hmac.Tpo -c hmac.c -o pam_google_authenticator_la-hmac.o >/dev/null 2>&1 mv -f .deps/pam_google_authenticator_la-hmac.Tpo .deps/pam_google_authenticator_la-hmac.Plo /bin/sh ./libtool --tag=CC --mode=compile cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT pam_google_authenticator_la-sha1.lo -MD -MP -MF .deps/pam_google_authenticator_la-sha1.Tpo -c -o pam_google_authenticator_la-sha1.lo `test -f 'sha1.c' || echo './'`sha1.c libtool: compile: cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT pam_google_authenticator_la-sha1.lo -MD -MP -MF .deps/pam_google_authenticator_la-sha1.Tpo -c sha1.c -fPIC -DPIC -o .libs/pam_google_authenticator_la-sha1.o libtool: compile: cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT pam_google_authenticator_la-sha1.lo -MD -MP -MF .deps/pam_google_authenticator_la-sha1.Tpo -c sha1.c -o pam_google_authenticator_la-sha1.o >/dev/null 2>&1 mv -f .deps/pam_google_authenticator_la-sha1.Tpo .deps/pam_google_authenticator_la-sha1.Plo /bin/sh ./libtool --tag=CC --mode=link cc -O2 -pipe -fstack-protector -fno-strict-aliasing -avoid-version -module -shared -export-dynamic -export-symbols-regex "pam_sm_(setcred|open_session|authenticate)" -fstack-protector -o pam_google_authenticator.la -rpath /usr/local/lib pam_google_authenticator_la-pam_google_authenticator.lo pam_google_authenticator_la-base32.lo pam_google_authenticator_la-hmac.lo pam_google_authenticator_la-sha1.lo -lpam libtool: link: /usr/bin/nm .libs/pam_google_authenticator_la-pam_google_authenticator.o .libs/pam_google_authenticator_la-base32.o .libs/pam_google_authenticator_la-hmac.o .libs/pam_google_authenticator_la-sha1.o | sed -n -e 's/^.*[ ]\([BCDEGRST][BCDEGRST]*\)[ ][ ]*\([_A-Za-z][_A-Za-z0-9]*\)$/\1 \2 \2/p' | sed '/ __gnu_lto/d' | /usr/bin/sed 's/.* //' | sort | uniq > .libs/pam_google_authenticator.exp libtool: link: /usr/bin/egrep -e "pam_sm_(setcred|open_session|authenticate)" ".libs/pam_google_authenticator.exp" > ".libs/pam_google_authenticator.expT" libtool: link: mv -f ".libs/pam_google_authenticator.expT" ".libs/pam_google_authenticator.exp" libtool: link: echo "{ global:" > .libs/pam_google_authenticator.so-ver libtool: link: sed -e "s|$|;|" < .libs/pam_google_authenticator.exp >> .libs/pam_google_authenticator.so-ver libtool: link: echo "local: *; };" >> .libs/pam_google_authenticator.so-ver libtool: link: cc -shared -fPIC -DPIC .libs/pam_google_authenticator_la-pam_google_authenticator.o .libs/pam_google_authenticator_la-base32.o .libs/pam_google_authenticator_la-hmac.o .libs/pam_google_authenticator_la-sha1.o -lpam -O2 -fstack-protector -fstack-protector -Wl,-soname -Wl,pam_google_authenticator.so -Wl,-version-script -Wl,.libs/pam_google_authenticator.so-ver -o .libs/pam_google_authenticator.so libtool: link: ( cd ".libs" && rm -f "pam_google_authenticator.la" && ln -s "../pam_google_authenticator.la" "pam_google_authenticator.la" ) depbase=`echo google-authenticator.o | sed 's|[^/]*$|.deps/&|;s|\.o$||'`;\ cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT google-authenticator.o -MD -MP -MF $depbase.Tpo -c -o google-authenticator.o google-authenticator.c &&\ mv -f $depbase.Tpo $depbase.Po depbase=`echo base32.o | sed 's|[^/]*$|.deps/&|;s|\.o$||'`;\ cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT base32.o -MD -MP -MF $depbase.Tpo -c -o base32.o base32.c &&\ mv -f $depbase.Tpo $depbase.Po depbase=`echo hmac.o | sed 's|[^/]*$|.deps/&|;s|\.o$||'`;\ cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT hmac.o -MD -MP -MF $depbase.Tpo -c -o hmac.o hmac.c &&\ mv -f $depbase.Tpo $depbase.Po depbase=`echo sha1.o | sed 's|[^/]*$|.deps/&|;s|\.o$||'`;\ cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT sha1.o -MD -MP -MF $depbase.Tpo -c -o sha1.o sha1.c &&\ mv -f $depbase.Tpo $depbase.Po /bin/sh ./libtool --tag=CC --mode=link cc -O2 -pipe -fstack-protector -fno-strict-aliasing -fstack-protector -o google-authenticator google-authenticator.o base32.o hmac.o sha1.o libtool: link: cc -O2 -pipe -fstack-protector -fno-strict-aliasing -fstack-protector -o google-authenticator google-authenticator.o base32.o hmac.o sha1.o cc -DHAVE_CONFIG_H -I. -DDEMO=1 -O2 -pipe -fstack-protector -fno-strict-aliasing -MT demo-pam_google_authenticator.o -MD -MP -MF .deps/demo-pam_google_authenticator.Tpo -c -o demo-pam_google_authenticator.o `test -f 'pam_google_authenticator.c' || echo './'`pam_google_authenticator.c pam_google_authenticator.c:838:49: warning: initializing 'char *' with an expression of type 'const char *' discards qualifiers [-Wincompatible-pointer-types-discards-qualifiers] .msg = prompt }; ^~~~~~ pam_google_authenticator.c:1045:44: warning: adding 'int' to a string does not append to the string [-Wstring-plus-int] sprintf(strrchr(disallow, '\000'), " %d" + !*disallow, tm); ~~~~~~^~~~~~~~~~~~ pam_google_authenticator.c:1045:44: note: use array indexing to silence this warning sprintf(strrchr(disallow, '\000'), " %d" + !*disallow, tm); ^ & [ ] pam_google_authenticator.c:1204:48: warning: adding 'int' to a string does not append to the string [-Wstring-plus-int] sprintf(strrchr(reset, '\000'), " %d%+d" + !*reset, tms[i], skews[i]); ~~~~~~~~~^~~~~~~~~ pam_google_authenticator.c:1204:48: note: use array indexing to silence this warning sprintf(strrchr(reset, '\000'), " %d%+d" + !*reset, tms[i], skews[i]); ^ & [ ] 3 warnings generated. mv -f .deps/demo-pam_google_authenticator.Tpo .deps/demo-pam_google_authenticator.Po cc -DHAVE_CONFIG_H -I. -DDEMO=1 -O2 -pipe -fstack-protector -fno-strict-aliasing -MT demo-demo.o -MD -MP -MF .deps/demo-demo.Tpo -c -o demo-demo.o `test -f 'demo.c' || echo './'`demo.c demo.c:91:37: warning: 'memcpy' call operates on objects of type 'const char [26]' while the size is based on a different type 'const char (*)[26]' [-Wsizeof-pointer-memaccess] memcpy(item, &service, sizeof(&service)); ~~~~~~~~ ^~~~~~~~ demo.c:91:37: note: did you mean to remove the addressof in the argument to 'sizeof' (and multiply it by the number of elements)? memcpy(item, &service, sizeof(&service)); ^~~~~~~~ demo.c:96:34: warning: 'memcpy' call operates on objects of type 'char *' while the size is based on a different type 'char **' [-Wsizeof-pointer-memaccess] memcpy(item, &user, sizeof(&user)); ~~~~~ ^~~~~ demo.c:96:34: note: did you mean to remove the addressof in the argument to 'sizeof' (and multiply it by the number of elements)? memcpy(item, &user, sizeof(&user)); ^~~~~ 2 warnings generated. mv -f .deps/demo-demo.Tpo .deps/demo-demo.Po cc -DHAVE_CONFIG_H -I. -DDEMO=1 -O2 -pipe -fstack-protector -fno-strict-aliasing -MT demo-base32.o -MD -MP -MF .deps/demo-base32.Tpo -c -o demo-base32.o `test -f 'base32.c' || echo './'`base32.c mv -f .deps/demo-base32.Tpo .deps/demo-base32.Po cc -DHAVE_CONFIG_H -I. -DDEMO=1 -O2 -pipe -fstack-protector -fno-strict-aliasing -MT demo-hmac.o -MD -MP -MF .deps/demo-hmac.Tpo -c -o demo-hmac.o `test -f 'hmac.c' || echo './'`hmac.c mv -f .deps/demo-hmac.Tpo .deps/demo-hmac.Po cc -DHAVE_CONFIG_H -I. -DDEMO=1 -O2 -pipe -fstack-protector -fno-strict-aliasing -MT demo-sha1.o -MD -MP -MF .deps/demo-sha1.Tpo -c -o demo-sha1.o `test -f 'sha1.c' || echo './'`sha1.c mv -f .deps/demo-sha1.Tpo .deps/demo-sha1.Po /bin/sh ./libtool --tag=CC --mode=link cc -DDEMO=1 -O2 -pipe -fstack-protector -fno-strict-aliasing -fstack-protector -o demo demo-pam_google_authenticator.o demo-demo.o demo-base32.o demo-hmac.o demo-sha1.o libtool: link: cc -DDEMO=1 -O2 -pipe -fstack-protector -fno-strict-aliasing -fstack-protector -o demo demo-pam_google_authenticator.o demo-demo.o demo-base32.o demo-hmac.o demo-sha1.o depbase=`echo pam_google_authenticator_unittest.o | sed 's|[^/]*$|.deps/&|;s|\.o$||'`;\ cc -DHAVE_CONFIG_H -I. -O2 -pipe -fstack-protector -fno-strict-aliasing -MT pam_google_authenticator_unittest.o -MD -MP -MF $depbase.Tpo -c -o pam_google_authenticator_unittest.o pam_google_authenticator_unittest.c &&\ mv -f $depbase.Tpo $depbase.Po pam_google_authenticator_unittest.c:75:37: warning: 'memcpy' call operates on objects of type 'const char *' while the size is based on a different type 'const char **' [-Wsizeof-pointer-memaccess] memcpy(item, &service, sizeof(&service)); ~~~~~~~~ ^~~~~~~~ pam_google_authenticator_unittest.c:75:37: note: did you mean to remove the addressof in the argument to 'sizeof' (and multiply it by the number of elements)? memcpy(item, &service, sizeof(&service)); ^~~~~~~~ pam_google_authenticator_unittest.c:80:34: warning: 'memcpy' call operates on objects of type 'char *' while the size is based on a different type 'char **' [-Wsizeof-pointer-memaccess] memcpy(item, &user, sizeof(&user)); ~~~~~ ^~~~~ pam_google_authenticator_unittest.c:80:34: note: did you mean to remove the addressof in the argument to 'sizeof' (and multiply it by the number of elements)? memcpy(item, &user, sizeof(&user)); ^~~~~ 2 warnings generated. /bin/sh ./libtool --tag=CC --mode=link cc -O2 -pipe -fstack-protector -fno-strict-aliasing -export-dynamic -fstack-protector -o pam_google_authenticator_unittest pam_google_authenticator_unittest.o base32.o hmac.o sha1.o libtool: link: cc -O2 -pipe -fstack-protector -fno-strict-aliasing -fstack-protector -o pam_google_authenticator_unittest pam_google_authenticator_unittest.o base32.o hmac.o sha1.o -Wl,--export-dynamic gmake[2]: Leaving directory '/wrkdirs/usr/ports/security/pam_google_authenticator/work/google-authenticator-195ddc1/libpam' gmake[1]: Leaving directory '/wrkdirs/usr/ports/security/pam_google_authenticator/work/google-authenticator-195ddc1/libpam' =========================================================================== =================================================== =========================================================================== =================================================== ===> Staging for pam_google_authenticator-1.01.20160208_1,1 ===> Generating temporary packing list gmake[1]: Entering directory '/wrkdirs/usr/ports/security/pam_google_authenticator/work/google-authenticator-195ddc1/libpam' gmake[2]: Entering directory '/wrkdirs/usr/ports/security/pam_google_authenticator/work/google-authenticator-195ddc1/libpam' /bin/mkdir -p '/wrkdirs/usr/ports/security/pam_google_authenticator/work/stage/usr/local/bin' /bin/sh ./libtool --mode=install install -s -m 555 google-authenticator '/wrkdirs/usr/ports/security/pam_google_authenticator/work/stage/usr/local/bin' libtool: install: install -m 555 -s google-authenticator /wrkdirs/usr/ports/security/pam_google_authenticator/work/stage/usr/local/bin/google-authenticator /bin/mkdir -p '/wrkdirs/usr/ports/security/pam_google_authenticator/work/stage/usr/local/share/doc/google-authenticator' install -m 0644 FILEFORMAT README.md '/wrkdirs/usr/ports/security/pam_google_authenticator/work/stage/usr/local/share/doc/google-authenticator' /bin/mkdir -p '/wrkdirs/usr/ports/security/pam_google_authenticator/work/stage/usr/local/share/doc/google-authenticator' install -m 0644 totp.html '/wrkdirs/usr/ports/security/pam_google_authenticator/work/stage/usr/local/share/doc/google-authenticator' /bin/mkdir -p '/wrkdirs/usr/ports/security/pam_google_authenticator/work/stage/usr/local/lib' /bin/sh ./libtool --mode=install /usr/bin/install -c pam_google_authenticator.la '/wrkdirs/usr/ports/security/pam_google_authenticator/work/stage/usr/local/lib' libtool: install: /usr/bin/install -c .libs/pam_google_authenticator.so /wrkdirs/usr/ports/security/pam_google_authenticator/work/stage/usr/local/lib/pam_google_authenticator.so libtool: install: /usr/bin/install -c .libs/pam_google_authenticator.lai /wrkdirs/usr/ports/security/pam_google_authenticator/work/stage/usr/local/lib/pam_google_authenticator.la libtool: warning: remember to run 'libtool --finish /usr/local/lib' gmake[2]: Leaving directory '/wrkdirs/usr/ports/security/pam_google_authenticator/work/google-authenticator-195ddc1/libpam' gmake[1]: Leaving directory '/wrkdirs/usr/ports/security/pam_google_authenticator/work/google-authenticator-195ddc1/libpam' ====> Compressing man pages (compress-man) =========================================================================== =================================================== ===> Building package for pam_google_authenticator-1.01.20160208_1,1 =========================================================================== ====>> Cleaning up wrkdir ===> Cleaning for pam_google_authenticator-1.01.20160208_1,1 build of security/pam_google_authenticator ended at Fri Aug 26 13:01:32 BST 2016 build time: 00:00:25