=>> Building security/snortsam build started at Thu Oct 2 10:42:53 EDT 2025 port directory: /usr/ports/security/snortsam package name: snortsam-2.70_1 building for: FreeBSD pkg.DaveG.ca 15.0-ALPHA3 FreeBSD 15.0-ALPHA3 1500064 amd64 maintained by: urisso@bsd.com.br Makefile datestamp: -rw-r--r-- 1 root wheel 2520 Aug 27 2024 /usr/ports/security/snortsam/Makefile Ports top last git commit: a936fb9b16ba Ports top unclean checkout: no Port dir last git commit: fb16dfecae4a Port dir unclean checkout: no Poudriere version: poudriere-git-3.4.2 Host OSVERSION: 1500064 Jail OSVERSION: 1500064 Job Id: 03 ---Begin Environment--- SHELL=/bin/sh OSVERSION=1500064 UNAME_v=FreeBSD 15.0-ALPHA3 1500064 UNAME_r=15.0-ALPHA3 BLOCKSIZE=K MAIL=/var/mail/root MM_CHARSET=UTF-8 LANG=C.UTF-8 STATUS=1 HOME=/root PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin:/root/bin MAKE_OBJDIR_CHECK_WRITABLE=0 LOCALBASE=/usr/local USER=root POUDRIERE_NAME=poudriere-git LIBEXECPREFIX=/usr/local/libexec/poudriere POUDRIERE_VERSION=3.4.2 MASTERMNT=/usr/local/poudriere/data/.m/freebsd_15_c_x64-HEAD-ALL/ref LC_COLLATE=C POUDRIERE_BUILD_TYPE=bulk PACKAGE_BUILDING=yes SAVED_TERM=tmux-256color OUTPUT_REDIRECTED_STDERR=4 OUTPUT_REDIRECTED=1 PWD=/usr/local/poudriere/data/.m/freebsd_15_c_x64-HEAD-ALL/03/.p OUTPUT_REDIRECTED_STDOUT=3 P_PORTS_FEATURES=FLAVORS SUBPACKAGES SELECTED_OPTIONS MASTERNAME=freebsd_15_c_x64-HEAD-ALL SCRIPTPREFIX=/usr/local/share/poudriere SCRIPTNAME=bulk.sh OLDPWD=/usr/local/poudriere/data/.m/freebsd_15_c_x64-HEAD-ALL/ref/.p/pool POUDRIERE_PKGNAME=poudriere-git-3.4.2 SCRIPTPATH=/usr/local/share/poudriere/bulk.sh POUDRIEREPATH=/usr/local/bin/poudriere ---End Environment--- ---Begin Poudriere Port Flags/Env--- PORT_FLAGS= PKGENV= FLAVOR= MAKE_ARGS= ---End Poudriere Port Flags/Env--- ---Begin OPTIONS List--- ===> The following configuration options are available for snortsam-2.70_1: DEBUG=off: Build with debugging support DOCS=on: Build and/or install documentation IPFW=on: checks if configured tables are available SAMTOOL=on: install samtool ===> Use 'make config' to modify these settings ---End OPTIONS List--- --MAINTAINER-- urisso@bsd.com.br --End MAINTAINER-- --CONFIGURE_ARGS-- --End CONFIGURE_ARGS-- --CONFIGURE_ENV-- XDG_DATA_HOME=/wrkdirs/usr/ports/security/snortsam/work XDG_CONFIG_HOME=/wrkdirs/usr/ports/security/snortsam/work XDG_CACHE_HOME=/wrkdirs/usr/ports/security/snortsam/work/.cache HOME=/wrkdirs/usr/ports/security/snortsam/work TMPDIR="/tmp" PATH=/wrkdirs/usr/ports/security/snortsam/work/.bin:/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin:/root/bin PKG_CONFIG_LIBDIR=/wrkdirs/usr/ports/security/snortsam/work/.pkgconfig:/usr/local/libdata/pkgconfig:/usr/local/share/pkgconfig:/usr/libdata/pkgconfig SHELL=/bin/sh CONFIG_SHELL=/bin/sh --End CONFIGURE_ENV-- --MAKE_ENV-- XDG_DATA_HOME=/wrkdirs/usr/ports/security/snortsam/work XDG_CONFIG_HOME=/wrkdirs/usr/ports/security/snortsam/work XDG_CACHE_HOME=/wrkdirs/usr/ports/security/snortsam/work/.cache HOME=/wrkdirs/usr/ports/security/snortsam/work TMPDIR="/tmp" PATH=/wrkdirs/usr/ports/security/snortsam/work/.bin:/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin:/root/bin PKG_CONFIG_LIBDIR=/wrkdirs/usr/ports/security/snortsam/work/.pkgconfig:/usr/local/libdata/pkgconfig:/usr/local/share/pkgconfig:/usr/libdata/pkgconfig MK_DEBUG_FILES=no MK_KERNEL_SYMBOLS=no SHELL=/bin/sh NO_LINT=YES PREFIX=/usr/local LOCALBASE=/usr/local CC="cc" CFLAGS="-O2 -pipe -fstack-protector-strong -fno-strict-aliasing " CPP="cpp" CPPFLAGS="" LDFLAGS=" " LIBS="" CXX="c++" CXXFLAGS="-O2 -pipe -fstack-protector-strong -fno-strict-aliasing " BSD_INSTALL_PROGRAM="install -s -m 555" BSD_INSTALL_LIB="install -s -m 0644" BSD_INSTALL_SCRIPT="install -m 555" BSD_INSTALL_DATA="install -m 0644" BSD_INSTALL_MAN="install -m 444" --End MAKE_ENV-- --PLIST_SUB-- PORTDOCS="" OSREL=15.0 PREFIX=%D LOCALBASE=/usr/local RESETPREFIX=/usr/local LIB32DIR=lib DOCSDIR="share/doc/snortsam" EXAMPLESDIR="share/examples/snortsam" DATADIR="share/snortsam" WWWDIR="www/snortsam" ETCDIR="etc/snortsam" --End PLIST_SUB-- --SUB_LIST-- PREFIX=/usr/local LOCALBASE=/usr/local DATADIR=/usr/local/share/snortsam DOCSDIR=/usr/local/share/doc/snortsam EXAMPLESDIR=/usr/local/share/examples/snortsam WWWDIR=/usr/local/www/snortsam ETCDIR=/usr/local/etc/snortsam --End SUB_LIST-- ---Begin make.conf--- DEFAULT_VERSIONS+=pgsql=15 DEFAULT_VERSIONS+=php=82 DISABLE_LICENSES=yes SELECTED_OPTIONS+=OPENBLAS ARCHDEF=AMD64K10h64SSE3 USE_PACKAGE_DEPENDS=yes BATCH=yes WRKDIRPREFIX=/wrkdirs PORTSDIR=/usr/ports PACKAGES=/packages DISTDIR=/distfiles FORCE_PACKAGE=yes PACKAGE_BUILDING=yes PACKAGE_BUILDING_FLAVORS=yes #### #### DEFAULT_VERSIONS+=pgsql=15 DEFAULT_VERSIONS+=php=82 DISABLE_LICENSES=yes SELECTED_OPTIONS+=OPENBLAS ARCHDEF=AMD64K10h64SSE3 WITH_CCACHE_BUILD=yes CCACHE_DIR=/root/.ccache #### Misc Poudriere #### .include "/etc/make.conf.ports_env" GID=0 UID=0 ---End make.conf--- --Resource limits-- cpu time (seconds, -t) unlimited file size (512-blocks, -f) unlimited data seg size (kbytes, -d) 33554432 stack size (kbytes, -s) 524288 core file size (512-blocks, -c) unlimited max memory size (kbytes, -m) unlimited locked memory (kbytes, -l) unlimited max user processes (-u) 89999 open files (-n) 8192 virtual mem size (kbytes, -v) unlimited swap limit (kbytes, -w) unlimited socket buffer size (bytes, -b) unlimited pseudo-terminals (-p) unlimited kqueues (-k) unlimited umtx shared locks (-o) unlimited pipebuf (-y) unlimited --End resource limits-- =================================================== ===== env: NO_DEPENDS=yes USER=root UID=0 GID=0 =========================================================================== =================================================== ===== env: USE_PACKAGE_DEPENDS_ONLY=1 USER=root UID=0 GID=0 ===> snortsam-2.70_1 depends on file: /usr/local/sbin/pkg - not found ===> Installing existing package /packages/All/pkg-2.3.1.pkg [pkg.DaveG.ca] Installing pkg-2.3.1... [pkg.DaveG.ca] Extracting pkg-2.3.1: .......... done ===> snortsam-2.70_1 depends on file: /usr/local/sbin/pkg - found ===> Returning to build of snortsam-2.70_1 =========================================================================== =================================================== ===== env: USE_PACKAGE_DEPENDS_ONLY=1 USER=root UID=0 GID=0 =========================================================================== =================================================== ===== env: NO_DEPENDS=yes USER=root UID=0 GID=0 ===> Fetching all distfiles required by snortsam-2.70_1 for building =========================================================================== =================================================== ===== env: NO_DEPENDS=yes USER=root UID=0 GID=0 ===> Fetching all distfiles required by snortsam-2.70_1 for building => SHA256 Checksum OK for snortsam-src-2.70.tar.gz. =========================================================================== =================================================== ===== env: USE_PACKAGE_DEPENDS_ONLY=1 USER=root UID=0 GID=0 =========================================================================== =================================================== ===== env: NO_DEPENDS=yes USER=root UID=0 GID=0 ===> Fetching all distfiles required by snortsam-2.70_1 for building ===> Extracting for snortsam-2.70_1 => SHA256 Checksum OK for snortsam-src-2.70.tar.gz. =========================================================================== =================================================== ===== env: USE_PACKAGE_DEPENDS_ONLY=1 USER=root UID=0 GID=0 =========================================================================== =================================================== ===== env: NO_DEPENDS=yes USER=root UID=0 GID=0 ===> Patching for snortsam-2.70_1 ===> Applying FreeBSD patches for snortsam-2.70_1 from /usr/ports/security/snortsam/files =========================================================================== =================================================== ===== env: USE_PACKAGE_DEPENDS_ONLY=1 USER=root UID=0 GID=0 ===> snortsam-2.70_1 depends on file: /usr/local/bin/ccache - not found ===> Installing existing package /packages/All/ccache-3.7.12_8.pkg [pkg.DaveG.ca] Installing ccache-3.7.12_8... [pkg.DaveG.ca] Extracting ccache-3.7.12_8: ......... done Create compiler links... create symlink for cc create symlink for cc (world) create symlink for c++ create symlink for c++ (world) create symlink for CC create symlink for CC (world) create symlink for clang create symlink for clang (world) create symlink for clang++ create symlink for clang++ (world) ===== Message from ccache-3.7.12_8: -- NOTE: Please read /usr/local/share/doc/ccache/ccache-howto-freebsd.txt for information on using ccache with FreeBSD ports and src. ===> snortsam-2.70_1 depends on file: /usr/local/bin/ccache - found ===> Returning to build of snortsam-2.70_1 =========================================================================== =================================================== ===== env: USE_PACKAGE_DEPENDS_ONLY=1 USER=root UID=0 GID=0 =========================================================================== =================================================== ===== env: NO_DEPENDS=yes USER=root UID=0 GID=0 ===> Configuring for snortsam-2.70_1 =========================================================================== =================================================== ===== env: NO_DEPENDS=yes USER=root UID=0 GID=0 ===> Building for snortsam-2.70_1 case "`uname`" in OpenBSD*) what=obsd;; *BSD) what=bsd;; Linux) what=linux;; SunOS) what=sunos;; esac && make snortsam-$what make snortsam "CFLAGS=-O2 -D`uname` -DBSD" "LDFLAGS= -lpthread" "OBJS=snortsam.o twofish.o ssp_fwexec.o ssp_ciscoacl.o ssp_cisco_nullroute.o ssp_email.o ssp_opsec.o ssp_fwsam.o ssp_pix.o ssp_netscreen.o ssp_wgrd.o ssp_snmp_interface_down.o ssp_forward.o ssp_cisco_nullroute2.o ssp_ipf.o ssp_ipfw2.o ssp_pf2.o" cc -O2 -DFreeBSD -DBSD -c snortsam.c snortsam.c:903:14: warning: using the result of an assignment as a condition without parentheses [-Wparentheses] 903 | { if(hoste=gethostbyname(val)) | ~~~~~^~~~~~~~~~~~~~~~~~~ snortsam.c:903:14: note: place parentheses around the assignment to silence this warning 903 | { if(hoste=gethostbyname(val)) | ^ | ( ) snortsam.c:903:14: note: use '==' to turn this assignment into an equality comparison 903 | { if(hoste=gethostbyname(val)) | ^ | == snortsam.c:941:14: warning: using the result of an assignment as a condition without parentheses [-Wparentheses] 941 | { if(hoste=gethostbyname(val)) | ~~~~~^~~~~~~~~~~~~~~~~~~ snortsam.c:941:14: note: place parentheses around the assignment to silence this warning 941 | { if(hoste=gethostbyname(val)) | ^ | ( ) snortsam.c:941:14: note: use '==' to turn this assignment into an equality comparison 941 | { if(hoste=gethostbyname(val)) | ^ | == snortsam.c:986:14: warning: using the result of an assignment as a condition without parentheses [-Wparentheses] 986 | { if(hoste=gethostbyname(val)) | ~~~~~^~~~~~~~~~~~~~~~~~~ snortsam.c:986:14: note: place parentheses around the assignment to silence this warning 986 | { if(hoste=gethostbyname(val)) | ^ | ( ) snortsam.c:986:14: note: use '==' to turn this assignment into an equality comparison 986 | { if(hoste=gethostbyname(val)) | ^ | == snortsam.c:1063:14: warning: passing 'unsigned char[34]' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 1063 | safecopy(al->initialkey,val3); | ^~~~~~~~~~~~~~ ./snortsam.h:218:36: note: expanded from macro 'safecopy' 218 | #define safecopy(dst,src) _safecp(dst,sizeof(dst),src) | ^~~ snortsam.c:208:20: note: passing argument to parameter 'dst' here 208 | void _safecp(char *dst,unsigned long max,char *src) | ^ snortsam.c:1709:11: warning: passing 'unsigned char[34]' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 1709 | safecopy(sens->currentkey,ap->initialkey); /* set the key to the initial key as defined in accept list */ | ^~~~~~~~~~~~~~~~ ./snortsam.h:218:36: note: expanded from macro 'safecopy' 218 | #define safecopy(dst,src) _safecp(dst,sizeof(dst),src) | ^~~ snortsam.c:208:20: note: passing argument to parameter 'dst' here 208 | void _safecp(char *dst,unsigned long max,char *src) | ^ snortsam.c:1709:28: warning: passing 'unsigned char[34]' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 1709 | safecopy(sens->currentkey,ap->initialkey); /* set the key to the initial key as defined in accept list */ | ^~~~~~~~~~~~~~ ./snortsam.h:218:52: note: expanded from macro 'safecopy' 218 | #define safecopy(dst,src) _safecp(dst,sizeof(dst),src) | ^~~ snortsam.c:208:48: note: passing argument to parameter 'src' here 208 | void _safecp(char *dst,unsigned long max,char *src) | ^ snortsam.c:1710:30: warning: passing 'unsigned char[34]' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 1710 | sens->snortfish=TwoFishInit(sens->currentkey); /* create a TwoFish for the sensor */ | ^~~~~~~~~~~~~~~~ ./twofish.h:133:28: note: passing argument to parameter 'userkey' here 133 | TWOFISH *TwoFishInit(char *userkey); | ^ snortsam.c:1748:10: warning: passing 'unsigned char *' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 1748 | strncpy(newkey+6,snortbox->currentkey,TwoFish_KEY_LENGTH-6); /* append old key */ | ^~~~~~~~ /usr/include/string.h:117:34: note: passing argument to parameter here 117 | char *(strncpy)(char * __restrict, const char * __restrict, size_t); | ^ snortsam.c:1748:19: warning: passing 'unsigned char[34]' to parameter of type 'const char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 1748 | strncpy(newkey+6,snortbox->currentkey,TwoFish_KEY_LENGTH-6); /* append old key */ | ^~~~~~~~~~~~~~~~~~~~ /usr/include/string.h:117:59: note: passing argument to parameter here 117 | char *(strncpy)(char * __restrict, const char * __restrict, size_t); | ^ snortsam.c:1764:11: warning: passing 'unsigned char[34]' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 1764 | safecopy(snortbox->currentkey,newkey); /* update key string */ | ^~~~~~~~~~~~~~~~~~~~ ./snortsam.h:218:36: note: expanded from macro 'safecopy' 218 | #define safecopy(dst,src) _safecp(dst,sizeof(dst),src) | ^~~ snortsam.c:208:20: note: passing argument to parameter 'dst' here 208 | void _safecp(char *dst,unsigned long max,char *src) | ^ snortsam.c:1764:32: warning: passing 'unsigned char[34]' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 1764 | safecopy(snortbox->currentkey,newkey); /* update key string */ | ^~~~~~ ./snortsam.h:218:52: note: expanded from macro 'safecopy' 218 | #define safecopy(dst,src) _safecp(dst,sizeof(dst),src) | ^~~ snortsam.c:208:48: note: passing argument to parameter 'src' here 208 | void _safecp(char *dst,unsigned long max,char *src) | ^ snortsam.c:1766:34: warning: passing 'unsigned char[34]' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 1766 | snortbox->snortfish=TwoFishInit(newkey); /* generate new TwoFish */ | ^~~~~~ ./twofish.h:133:28: note: passing argument to parameter 'userkey' here 133 | TWOFISH *TwoFishInit(char *userkey); | ^ snortsam.c:2162:13: warning: if statement has empty body [-Wempty-body] 2162 | if(p>buf); | ^ snortsam.c:2162:13: note: put the semicolon on a separate line to silence this warning snortsam.c:2457:13: warning: passing 'unsigned char[34]' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 2457 | { safecopy(snortbox->currentkey,acceptp->initialkey); /* try intial key */ | ^~~~~~~~~~~~~~~~~~~~ ./snortsam.h:218:36: note: expanded from macro 'safecopy' 218 | #define safecopy(dst,src) _safecp(dst,sizeof(dst),src) | ^~~ snortsam.c:208:20: note: passing argument to parameter 'dst' here 208 | void _safecp(char *dst,unsigned long max,char *src) | ^ snortsam.c:2457:34: warning: passing 'unsigned char[34]' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 2457 | { safecopy(snortbox->currentkey,acceptp->initialkey); /* try intial key */ | ^~~~~~~~~~~~~~~~~~~ ./snortsam.h:218:52: note: expanded from macro 'safecopy' 218 | #define safecopy(dst,src) _safecp(dst,sizeof(dst),src) | ^~~ snortsam.c:208:48: note: passing argument to parameter 'src' here 208 | void _safecp(char *dst,unsigned long max,char *src) | ^ snortsam.c:2459:35: warning: passing 'unsigned char[34]' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 2459 | snortbox->snortfish=TwoFishInit(snortbox->currentkey); /* get a new TwoFish */ | ^~~~~~~~~~~~~~~~~~~~ ./twofish.h:133:28: note: passing argument to parameter 'userkey' here 133 | TWOFISH *TwoFishInit(char *userkey); | ^ snortsam.c:2811:27: warning: adding 'int' to a string does not append to the string [-Wstring-plus-int] 2811 | safecopy(buf,SNORTSAM_REV+11); | ~~~~~~~~~~~~~~~~~~~~~~~~~^~~~ ./snortsam.h:218:52: note: expanded from macro 'safecopy' 218 | #define safecopy(dst,src) _safecp(dst,sizeof(dst),src) | ^~~ snortsam.c:2811:27: note: use array indexing to silence this warning 2811 | safecopy(buf,SNORTSAM_REV+11); | ^ | & [ ./snortsam.h:218:52: note: expanded from macro 'safecopy' 218 | #define safecopy(dst,src) _safecp(dst,sizeof(dst),src) | ^ snortsam.c:2812:25: warning: adding 'int' to a string does not append to the string [-Wstring-plus-int] 2812 | buf[strlen(SNORTSAM_REV+11)-2]=0; | ~~~~~~~~~~~~^~~ snortsam.c:2812:25: note: use array indexing to silence this warning 2812 | buf[strlen(SNORTSAM_REV+11)-2]=0; | ^ | & [ ] snortsam.c:2904:13: warning: passing 'unsigned char[34]' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 2904 | safecopy(acceptp->initialkey,defaultkey); | ^~~~~~~~~~~~~~~~~~~ ./snortsam.h:218:36: note: expanded from macro 'safecopy' 218 | #define safecopy(dst,src) _safecp(dst,sizeof(dst),src) | ^~~ snortsam.c:208:20: note: passing argument to parameter 'dst' here 208 | void _safecp(char *dst,unsigned long max,char *src) | ^ snortsam.c:3012:59: warning: passing 'int *' to parameter of type 'socklen_t *' (aka 'unsigned int *') converts between pointers to integer types with different sign [-Wpointer-sign] 3012 | callersock=accept(mysock,(struct sockaddr *)&(sockaddr),&i); /* Check if someone called (new connections) */ | ^~ /usr/include/sys/socket.h:701:69: note: passing argument to parameter here 701 | int accept(int, struct sockaddr * __restrict, socklen_t * __restrict); | ^ snortsam.c:3112:17: warning: using the result of an assignment as a condition without parentheses [-Wparentheses] 3112 | while(snortbox=*snortboxpointer) | ~~~~~~~~^~~~~~~~~~~~~~~~~ snortsam.c:3112:17: note: place parentheses around the assignment to silence this warning 3112 | while(snortbox=*snortboxpointer) | ^ | ( ) snortsam.c:3112:17: note: use '==' to turn this assignment into an equality comparison 3112 | while(snortbox=*snortboxpointer) | ^ | == 21 warnings generated. cc -O2 -DFreeBSD -DBSD -c twofish.c twofish.c:228:24: warning: passing 'char *' to parameter of type 'u_int8_t *' (aka 'unsigned char *') converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 228 | { _TwoFish_BlockCrypt(in,out,TwoFish_BLOCK_SIZE,decrypt,tfdata); /* de/encrypt it. */ | ^~ ./twofish.h:267:36: note: passing argument to parameter 'in' here 267 | void _TwoFish_BlockCrypt(u_int8_t *in,u_int8_t *out,unsigned long size,int decrypt,TWOFISH *tfdata); | ^ twofish.c:228:27: warning: passing 'char *' to parameter of type 'u_int8_t *' (aka 'unsigned char *') converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 228 | { _TwoFish_BlockCrypt(in,out,TwoFish_BLOCK_SIZE,decrypt,tfdata); /* de/encrypt it. */ | ^~~ ./twofish.h:267:49: note: passing argument to parameter 'out' here 267 | void _TwoFish_BlockCrypt(u_int8_t *in,u_int8_t *out,unsigned long size,int decrypt,TWOFISH *tfdata); | ^ twofish.c:234:23: warning: passing 'char *' to parameter of type 'u_int8_t *' (aka 'unsigned char *') converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 234 | _TwoFish_BlockCrypt(in,out,len,decrypt,tfdata); /* ...then we de/encrypt that too. */ | ^~ ./twofish.h:267:36: note: passing argument to parameter 'in' here 267 | void _TwoFish_BlockCrypt(u_int8_t *in,u_int8_t *out,unsigned long size,int decrypt,TWOFISH *tfdata); | ^ twofish.c:234:26: warning: passing 'char *' to parameter of type 'u_int8_t *' (aka 'unsigned char *') converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 234 | _TwoFish_BlockCrypt(in,out,len,decrypt,tfdata); /* ...then we de/encrypt that too. */ | ^~~ ./twofish.h:267:49: note: passing argument to parameter 'out' here 267 | void _TwoFish_BlockCrypt(u_int8_t *in,u_int8_t *out,unsigned long size,int decrypt,TWOFISH *tfdata); | ^ twofish.c:280:16: warning: assigning to 'u_int8_t *' (aka 'unsigned char *') from 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 280 | tfdata->output=out; /* output straight into output buffer. */ | ^~~~ twofish.c:301:16: warning: assigning to 'u_int8_t *' (aka 'unsigned char *') from 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 301 | tfdata->output=out; /* output straight into output buffer. */ | ^~~~ twofish.c:333:17: warning: assigning to 'u_int8_t *' (aka 'unsigned char *') from 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 333 | { tfdata->output=outp; /* (do we really need a function for this?) */ | ^~~~~ twofish.c:440:19: warning: assigning to 'u_int8_t *' (aka 'unsigned char *') from 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 440 | { tfdata->output=*out; /* set output buffer. */ | ^~~~~ twofish.c:449:54: warning: passing 'char *' to parameter of type 'u_int8_t *' (aka 'unsigned char *') converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 449 | _TwoFish_BlockCrypt((u_int8_t *)&(tfdata->header),*out,olen,FALSE,tfdata); /* encrypt first block (without flush on 16 byte boundary). */ | ^~~~ ./twofish.h:267:49: note: passing argument to parameter 'out' here 267 | void _TwoFish_BlockCrypt(u_int8_t *in,u_int8_t *out,unsigned long size,int decrypt,TWOFISH *tfdata); | ^ twofish.c:452:22: warning: passing 'char *' to parameter of type 'u_int8_t *' (aka 'unsigned char *') converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 452 | { _TwoFish_BinHex(*out,olen,TRUE); /* ...convert output to binhex... */ | ^~~~ twofish.c:366:32: note: passing argument to parameter 'buf' here 366 | void _TwoFish_BinHex(u_int8_t *buf,unsigned long len,bool bintohex) | ^ twofish.c:455:18: warning: assigning to 'u_int8_t *' (aka 'unsigned char *') from 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 455 | tfdata->output=*out; | ^~~~~ twofish.c:503:22: warning: passing 'char *' to parameter of type 'u_int8_t *' (aka 'unsigned char *') converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 503 | { _TwoFish_BinHex(in,ilen,FALSE); /* ...convert input to values... */ | ^~ twofish.c:366:32: note: passing argument to parameter 'buf' here 366 | void _TwoFish_BinHex(u_int8_t *buf,unsigned long len,bool bintohex) | ^ twofish.c:513:33: warning: passing 'u_int8_t *' (aka 'unsigned char *') to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 513 | olen=_TwoFish_CryptRawCBC(in,tbuf,ilen,TRUE,tfdata)-TwoFish_BLOCK_SIZE; /* decrypt the whole thing. */ | ^~~~ twofish.c:223:51: note: passing argument to parameter 'out' here 223 | unsigned long _TwoFish_CryptRawCBC(char *in,char *out,unsigned long len,bool decrypt,TWOFISH *tfdata) | ^ twofish.c:515:18: warning: assigning to 'u_int8_t *' (aka 'unsigned char *') from 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 515 | tfdata->output=*out; | ^~~~~ 14 warnings generated. cc -O2 -DFreeBSD -DBSD -c ssp_fwexec.c cc -O2 -DFreeBSD -DBSD -c ssp_ciscoacl.c cc -O2 -DFreeBSD -DBSD -c ssp_cisco_nullroute.c cc -O2 -DFreeBSD -DBSD -c ssp_email.c cc -O2 -DFreeBSD -DBSD -c ssp_opsec.c cc -O2 -DFreeBSD -DBSD -c ssp_fwsam.c ssp_fwsam.c:158:9: warning: passing 'unsigned char *' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 158 | strcpy(CPpacket+CP_MODSTR,"All"); /* set modules to ALL (add individual FW modules later) */ | ^~~~~~~~~~~~~~~~~~ /usr/include/string.h:92:33: note: passing argument to parameter here 92 | char *(strcpy)(char * __restrict, const char * __restrict); | ^ 1 warning generated. cc -O2 -DFreeBSD -DBSD -c ssp_pix.c cc -O2 -DFreeBSD -DBSD -c ssp_netscreen.c cc -O2 -DFreeBSD -DBSD -c ssp_wgrd.c ssp_wgrd.c:162:13: warning: address of array 'wgrdp->command' will always evaluate to 'true' [-Wpointer-bool-conversion] 162 | if(wgrdp->command) | ~~ ~~~~~~~^~~~~~~ 1 warning generated. cc -O2 -DFreeBSD -DBSD -c ssp_snmp_interface_down.c cc -O2 -DFreeBSD -DBSD -c ssp_forward.c ssp_forward.c:69:10: warning: passing 'unsigned char *' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 69 | strncpy(newkey+6,station->stationkey,TwoFish_KEY_LENGTH-6); /* append old key */ | ^~~~~~~~ /usr/include/string.h:117:34: note: passing argument to parameter here 117 | char *(strncpy)(char * __restrict, const char * __restrict, size_t); | ^ ssp_forward.c:85:31: warning: passing 'unsigned char[34]' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 85 | safecopy(station->stationkey,newkey); | ^~~~~~ ./snortsam.h:218:52: note: expanded from macro 'safecopy' 218 | #define safecopy(dst,src) _safecp(dst,sizeof(dst),src) | ^~~ ./snortsam.h:460:48: note: passing argument to parameter 'src' here 460 | void _safecp(char *dst,unsigned long max,char *src); | ^ ssp_forward.c:87:35: warning: passing 'unsigned char[34]' to parameter of type 'char *' converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] 87 | station->stationfish=TwoFishInit(newkey); | ^~~~~~ ./twofish.h:133:28: note: passing argument to parameter 'userkey' here 133 | TWOFISH *TwoFishInit(char *userkey); | ^ 3 warnings generated. cc -O2 -DFreeBSD -DBSD -c ssp_cisco_nullroute2.c cc -O2 -DFreeBSD -DBSD -c ssp_ipf.c ssp_ipf.c:125:35: warning: & has lower precedence than ==; == will be evaluated first [-Wparentheses] 125 | { case FWSAM_HOW_IN: if(bd->mode&FWSAM_WHO == FWSAM_WHO_SRC) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~ ssp_ipf.c:125:35: note: place parentheses around the '==' expression to silence this warning 125 | { case FWSAM_HOW_IN: if(bd->mode&FWSAM_WHO == FWSAM_WHO_SRC) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~ ssp_ipf.c:125:35: note: place parentheses around the & expression to evaluate it first 125 | { case FWSAM_HOW_IN: if(bd->mode&FWSAM_WHO == FWSAM_WHO_SRC) | ~~~~~~~~^~~~~~~~~~ ssp_ipf.c:137:37: warning: & has lower precedence than ==; == will be evaluated first [-Wparentheses] 137 | case FWSAM_HOW_OUT: if(bd->mode&FWSAM_WHO == FWSAM_WHO_SRC) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~ ssp_ipf.c:137:37: note: place parentheses around the '==' expression to silence this warning 137 | case FWSAM_HOW_OUT: if(bd->mode&FWSAM_WHO == FWSAM_WHO_SRC) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~ ssp_ipf.c:137:37: note: place parentheses around the & expression to evaluate it first 137 | case FWSAM_HOW_OUT: if(bd->mode&FWSAM_WHO == FWSAM_WHO_SRC) | ~~~~~~~~^~~~~~~~~~ ssp_ipf.c:150:22: warning: & has lower precedence than ==; == will be evaluated first [-Wparentheses] 150 | { if(bd->mode&FWSAM_WHO == FWSAM_WHO_SRC) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~ ssp_ipf.c:150:22: note: place parentheses around the '==' expression to silence this warning 150 | { if(bd->mode&FWSAM_WHO == FWSAM_WHO_SRC) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~ ssp_ipf.c:150:22: note: place parentheses around the & expression to evaluate it first 150 | { if(bd->mode&FWSAM_WHO == FWSAM_WHO_SRC) | ~~~~~~~~^~~~~~~~~~ ssp_ipf.c:162:22: warning: & has lower precedence than ==; == will be evaluated first [-Wparentheses] 162 | { if(bd->mode&FWSAM_WHO == FWSAM_WHO_SRC) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~ ssp_ipf.c:162:22: note: place parentheses around the '==' expression to silence this warning 162 | { if(bd->mode&FWSAM_WHO == FWSAM_WHO_SRC) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~ ssp_ipf.c:162:22: note: place parentheses around the & expression to evaluate it first 162 | { if(bd->mode&FWSAM_WHO == FWSAM_WHO_SRC) | ~~~~~~~~^~~~~~~~~~ 4 warnings generated. cc -O2 -DFreeBSD -DBSD -c ssp_ipfw2.c ssp_ipfw2.c:169:25: warning: use of logical '&&' with constant operand [-Wconstant-logical-operand] 169 | if ((system(ipfw2cmd) && 0xff) ) | ^ ~~~~ ssp_ipfw2.c:169:25: note: use '&' for a bitwise operation 169 | if ((system(ipfw2cmd) && 0xff) ) | ^~ | & ssp_ipfw2.c:169:25: note: remove constant to silence this warning 169 | if ((system(ipfw2cmd) && 0xff) ) | ^~~~~~~ 1 warning generated. cc -O2 -DFreeBSD -DBSD -c ssp_pf2.c ssp_pf2.c:90:7: warning: add explicit braces to avoid dangling else [-Wdangling-else] 90 | else | ^ ssp_pf2.c:270:37: warning: format string is not a string literal (potentially insecure) [-Wformat-security] 270 | snprintf(ipsrc, sizeof(ipsrc) - 1, inettoa(bd->blockip)); | ^~~~~~~~~~~~~~~~~~~~ ssp_pf2.c:270:37: note: treat the string as an argument to avoid this 270 | snprintf(ipsrc, sizeof(ipsrc) - 1, inettoa(bd->blockip)); | ^ | "%s", ssp_pf2.c:295:19: error: use of undeclared identifier 'DIOCGETSTATUS' 295 | if (ioctl(pfdev, DIOCGETSTATUS, &status)) { | ^ ssp_pf2.c:313:4: warning: call to undeclared function 'change_table'; ISO C99 and later do not support implicit function declarations [-Wimplicit-function-declaration] 313 | change_table(pfdev, 1, pfp->tablein, pfp->anchorname, ipsrc); | ^ ssp_pf2.c:330:4: warning: call to undeclared function 'change_table'; ISO C99 and later do not support implicit function declarations [-Wimplicit-function-declaration] 330 | change_table(pfdev, 0, pfp->tablein, pfp->anchorname, ipsrc); | ^ ssp_pf2.c:420:19: error: use of undeclared identifier 'DIOCKILLSTATES' 420 | if (ioctl(pfdev, DIOCKILLSTATES, &psk)) { | ^ ssp_pf2.c:442:19: error: use of undeclared identifier 'DIOCKILLSTATES' 442 | if (ioctl(pfdev, DIOCKILLSTATES, &psk)) { | ^ 4 warnings and 3 errors generated. *** Error code 1 Stop. make[3]: stopped making "snortsam" in /wrkdirs/usr/ports/security/snortsam/work/snortsam-src-2.70/src *** Error code 1 Stop. make[2]: stopped making "snortsam-bsd" in /wrkdirs/usr/ports/security/snortsam/work/snortsam-src-2.70/src *** Error code 1 Stop. make[1]: stopped making "all" in /wrkdirs/usr/ports/security/snortsam/work/snortsam-src-2.70/src *** Error code 1 Stop. make: stopped making "build" in /usr/ports/security/snortsam =>> Cleaning up wrkdir ===> Cleaning for snortsam-2.70_1 build of security/snortsam | snortsam-2.70_1 ended at Thu Oct 2 10:44:27 EDT 2025 build time: 00:01:44 !!! build failure encountered !!!