Input buildinfo: https://buildinfos.debian.net/buildinfo-pool/p/pam-ssh-agent-auth/pam-ssh-agent-auth_0.10.3-3.1+b1_amd64.buildinfo Use metasnap for getting required timestamps New buildinfo file: /tmp/pam-ssh-agent-auth-0.10.3-3.1+b19dlwz7ca/pam-ssh-agent-auth_0.10.3-3.1+b1_amd64.buildinfo Get source package info: pam-ssh-agent-auth=0.10.3-3.1 Source URL: http://snapshot.notset.fr/mr/package/pam-ssh-agent-auth/0.10.3-3.1/srcfiles?fileinfo=1 env -i PATH=/usr/sbin:/usr/bin:/sbin:/bin TMPDIR=/tmp mmdebstrap --arch=amd64 --include=autoconf=2.71-2 automake=1:1.16.5-1.3 autopoint=0.21-6 autotools-dev=20220109.1 base-files=12.2 base-passwd=3.5.52 bash=5.1-6+b1 binutils=2.38-4 binutils-common=2.38-4 binutils-x86-64-linux-gnu=2.38-4 bsdextrautils=2.38-4 bsdutils=1:2.38-4 build-essential=12.9 bzip2=1.0.8-5 coreutils=8.32-4.1 cpp=4:11.2.0-2 cpp-11=11.3.0-1 dash=0.5.11+git20210903+057cd650a4ed-8 debconf=1.5.79 debhelper=13.7.1 debianutils=5.7-0.2 dh-autoreconf=20 dh-strip-nondeterminism=1.13.0-1 diffutils=1:3.7-5 dpkg=1.21.7 dpkg-dev=1.21.7 dwz=0.14-1 file=1:5.41-4 findutils=4.9.0-3 g++=4:11.2.0-2 g++-11=11.3.0-1 gcc=4:11.2.0-2 gcc-11=11.3.0-1 gcc-11-base=11.3.0-1 gcc-12-base=12.1.0-1 gettext=0.21-6 gettext-base=0.21-6 grep=3.7-1 groff-base=1.22.4-8 gzip=1.12-1 hostname=3.23 init-system-helpers=1.62 intltool-debian=0.35.0+20060710.5 libacl1=2.3.1-1 libarchive-zip-perl=1.68-1 libasan6=11.3.0-1 libatomic1=12.1.0-1 libattr1=1:2.5.1-1 libaudit-common=1:3.0.7-1 libaudit1=1:3.0.7-1+b1 libbinutils=2.38-4 libblkid1=2.38-4 libbz2-1.0=1.0.8-5 libc-bin=2.33-7 libc-dev-bin=2.33-7 libc6=2.33-7 libc6-dev=2.33-7 libcap-ng0=0.7.9-2.2+b2 libcap2=1:2.44-1 libcc1-0=12.1.0-1 libcom-err2=1.46.5-2 libcrypt-dev=1:4.4.27-1.1 libcrypt1=1:4.4.27-1.1 libctf-nobfd0=2.38-4 libctf0=2.38-4 libdb5.3=5.3.28+dfsg1-0.8 libdebconfclient0=0.262 libdebhelper-perl=13.7.1 libdpkg-perl=1.21.7 libelf1=0.187-1 libfile-stripnondeterminism-perl=1.13.0-1 libgcc-11-dev=11.3.0-1 libgcc-s1=12.1.0-1 libgcrypt20=1.10.1-2 libgdbm-compat4=1.23-1 libgdbm6=1.23-1 libgmp10=2:6.2.1+dfsg-3 libgomp1=12.1.0-1 libgpg-error0=1.45-2 libgssapi-krb5-2=1.19.2-2+b1 libicu71=71.1-3 libisl23=0.24-2 libitm1=12.1.0-1 libk5crypto3=1.19.2-2+b1 libkeyutils1=1.6.1-3 libkrb5-3=1.19.2-2+b1 libkrb5support0=1.19.2-2+b1 liblsan0=12.1.0-1 liblz4-1=1.9.3-2 liblzma5=5.2.5-2.1 libmagic-mgc=1:5.41-4 libmagic1=1:5.41-4 libmount1=2.38-4 libmpc3=1.2.1-2 libmpfr6=4.1.0-3 libnsl-dev=1.3.0-2 libnsl2=1.3.0-2 libpam-modules=1.4.0-13 libpam-modules-bin=1.4.0-13 libpam-runtime=1.4.0-13 libpam0g=1.4.0-13 libpam0g-dev=1.4.0-13 libpcre2-8-0=10.40-1 libpcre3=2:8.39-14 libperl5.34=5.34.0-4 libpipeline1=1.5.6-1 libquadmath0=12.1.0-1 libseccomp2=2.5.4-1 libselinux1=3.3-1+b2 libsigsegv2=2.14-1 libsmartcols1=2.38-4 libssl-dev=3.0.3-2 libssl1.1=1.1.1o-1 libssl3=3.0.3-2 libstdc++-11-dev=11.3.0-1 libstdc++6=12.1.0-1 libsub-override-perl=0.09-2 libsystemd0=250.4-1 libtinfo6=6.3+20220423-2 libtirpc-common=1.3.2-2 libtirpc-dev=1.3.2-2 libtirpc3=1.3.2-2 libtool=2.4.7-4 libtsan0=11.3.0-1 libubsan1=12.1.0-1 libuchardet0=0.0.7-1 libudev1=250.4-1 libunistring2=1.0-1 libuuid1=2.38-4 libxml2=2.9.14+dfsg-1 libzstd1=1.5.2+dfsg-1 linux-libc-dev=5.17.3-1 login=1:4.11.1+dfsg1-2 lsb-base=11.1.0 m4=1.4.18-5 make=4.3-4.1 man-db=2.10.2-1 mawk=1.3.4.20200120-3+b1 ncurses-base=6.3+20220423-2 ncurses-bin=6.3+20220423-2 patch=2.7.6-7 perl=5.34.0-4 perl-base=5.34.0-4 perl-modules-5.34=5.34.0-4 po-debconf=1.0.21+nmu1 rpcsvc-proto=1.4.2-4 sed=4.8-1 sensible-utils=0.0.17 sysvinit-utils=3.03-1 tar=1.34+dfsg-1 util-linux=2.38-4 util-linux-extra=2.38-4 xz-utils=5.2.5-2.1 zlib1g=1:1.2.11.dfsg-4 --variant=apt --aptopt=Acquire::Check-Valid-Until "false" --aptopt=Acquire::http::Dl-Limit "1000"; --aptopt=Acquire::https::Dl-Limit "1000"; --aptopt=Acquire::Retries "5"; --aptopt=APT::Get::allow-downgrades "true"; --keyring=/usr/share/keyrings/ --essential-hook=chroot "$1" sh -c "apt-get --yes install fakeroot util-linux" --essential-hook=copy-in /usr/share/keyrings/debian-archive-bullseye-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-security-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-stable.gpg /usr/share/keyrings/debian-archive-buster-automatic.gpg /usr/share/keyrings/debian-archive-buster-security-automatic.gpg /usr/share/keyrings/debian-archive-buster-stable.gpg /usr/share/keyrings/debian-archive-keyring.gpg /usr/share/keyrings/debian-archive-removed-keys.gpg /usr/share/keyrings/debian-archive-stretch-automatic.gpg /usr/share/keyrings/debian-archive-stretch-security-automatic.gpg /usr/share/keyrings/debian-archive-stretch-stable.gpg /usr/share/keyrings/debian-ports-archive-keyring-removed.gpg /usr/share/keyrings/debian-ports-archive-keyring.gpg /usr/share/keyrings/debian-keyring.gpg /etc/apt/trusted.gpg.d/ --essential-hook=chroot "$1" sh -c "rm /etc/apt/sources.list && echo 'deb http://snapshot.notset.fr/archive/debian/20220111T024807Z/ bookworm main deb-src http://snapshot.notset.fr/archive/debian/20220111T024807Z/ bookworm main deb http://snapshot.notset.fr/archive/debian/20220514T220115Z/ unstable main deb http://snapshot.notset.fr/archive/debian/20220511T204932Z/ unstable main' >> /etc/apt/sources.list && apt-get update" --customize-hook=chroot "$1" useradd --no-create-home -d /nonexistent -p "" builduser -s /bin/bash --customize-hook=chroot "$1" env sh -c "apt-get source --only-source -d pam-ssh-agent-auth=0.10.3-3.1 && mkdir -p /build/pam-ssh-agent-auth-GiAZ3T && dpkg-source --no-check -x /*.dsc /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3 && cd /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3 && { printf '%s' 'pam-ssh-agent-auth (0.10.3-3.1+b1) sid; urgency=low, binary-only=yes * Binary-only non-maintainer upload for amd64; no source changes. * Rebuild against libssl3 -- all / amd64 / i386 Build Daemon (x86-conova-01) Sat, 14 May 2022 03:47:04 +0000 '; cat debian/changelog; } > debian/changelog.debrebuild && mv debian/changelog.debrebuild debian/changelog && chown -R builduser:builduser /build/pam-ssh-agent-auth-GiAZ3T" --customize-hook=chroot "$1" env --unset=TMPDIR runuser builduser -c "cd /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3 && env DEB_BUILD_OPTIONS="parallel=4" LC_ALL="C.UTF-8" LC_COLLATE="C.UTF-8" SOURCE_DATE_EPOCH="1652500024" DEB_BUILD_OPTIONS=nocheck dpkg-buildpackage -uc -a amd64 --build=any" --customize-hook=sync-out /build/pam-ssh-agent-auth-GiAZ3T /tmp/pam-ssh-agent-auth-0.10.3-3.1+b19dlwz7ca bookworm /dev/null deb http://snapshot.notset.fr/archive/debian/20220511T204932Z unstable main I: automatically chosen mode: root I: chroot architecture amd64 is equal to the host's architecture I: automatically chosen format: null I: using /tmp/mmdebstrap.Ma2H475UfM as tempdir I: running apt-get update... I: downloading packages with apt... I: extracting archives... I: installing essential packages... I: running --essential-hook in shell: sh -c 'chroot "$1" sh -c "apt-get --yes install fakeroot util-linux"' exec /tmp/mmdebstrap.Ma2H475UfM Reading package lists... Building dependency tree... util-linux is already the newest version (2.38-4). The following NEW packages will be installed: fakeroot libfakeroot 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded. Need to get 135 kB of archives. After this operation, 406 kB of additional disk space will be used. Get:1 http://snapshot.notset.fr/archive/debian/20220511T204932Z unstable/main amd64 libfakeroot amd64 1.28-1 [48.2 kB] Get:2 http://snapshot.notset.fr/archive/debian/20220511T204932Z unstable/main amd64 fakeroot amd64 1.28-1 [87.2 kB] debconf: delaying package configuration, since apt-utils is not installed Fetched 135 kB in 0s (1012 kB/s) Selecting previously unselected package libfakeroot:amd64. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 4628 files and directories currently installed.) Preparing to unpack .../libfakeroot_1.28-1_amd64.deb ... Unpacking libfakeroot:amd64 (1.28-1) ... Selecting previously unselected package fakeroot. Preparing to unpack .../fakeroot_1.28-1_amd64.deb ... Unpacking fakeroot (1.28-1) ... Setting up libfakeroot:amd64 (1.28-1) ... Setting up fakeroot (1.28-1) ... update-alternatives: using /usr/bin/fakeroot-sysv to provide /usr/bin/fakeroot (fakeroot) in auto mode Processing triggers for libc-bin (2.33-7) ... I: running special hook: copy-in /usr/share/keyrings/debian-archive-bullseye-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-security-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-stable.gpg /usr/share/keyrings/debian-archive-buster-automatic.gpg /usr/share/keyrings/debian-archive-buster-security-automatic.gpg /usr/share/keyrings/debian-archive-buster-stable.gpg /usr/share/keyrings/debian-archive-keyring.gpg /usr/share/keyrings/debian-archive-removed-keys.gpg /usr/share/keyrings/debian-archive-stretch-automatic.gpg /usr/share/keyrings/debian-archive-stretch-security-automatic.gpg /usr/share/keyrings/debian-archive-stretch-stable.gpg /usr/share/keyrings/debian-ports-archive-keyring-removed.gpg /usr/share/keyrings/debian-ports-archive-keyring.gpg /usr/share/keyrings/debian-keyring.gpg /etc/apt/trusted.gpg.d/ I: running --essential-hook in shell: sh -c 'chroot "$1" sh -c "rm /etc/apt/sources.list && echo 'deb http://snapshot.notset.fr/archive/debian/20220111T024807Z/ bookworm main deb-src http://snapshot.notset.fr/archive/debian/20220111T024807Z/ bookworm main deb http://snapshot.notset.fr/archive/debian/20220514T220115Z/ unstable main deb http://snapshot.notset.fr/archive/debian/20220511T204932Z/ unstable main' >> /etc/apt/sources.list && apt-get update"' exec /tmp/mmdebstrap.Ma2H475UfM Get:1 http://snapshot.notset.fr/archive/debian/20220111T024807Z bookworm InRelease [129 kB] Get:2 http://snapshot.notset.fr/archive/debian/20220514T220115Z unstable InRelease [165 kB] Hit:3 http://snapshot.notset.fr/archive/debian/20220511T204932Z unstable InRelease Ign:4 http://snapshot.notset.fr/archive/debian/20220111T024807Z bookworm/main Sources Ign:5 http://snapshot.notset.fr/archive/debian/20220111T024807Z bookworm/main amd64 Packages Ign:4 http://snapshot.notset.fr/archive/debian/20220111T024807Z bookworm/main Sources Ign:5 http://snapshot.notset.fr/archive/debian/20220111T024807Z bookworm/main amd64 Packages Ign:4 http://snapshot.notset.fr/archive/debian/20220111T024807Z bookworm/main Sources Ign:5 http://snapshot.notset.fr/archive/debian/20220111T024807Z bookworm/main amd64 Packages Get:4 http://snapshot.notset.fr/archive/debian/20220111T024807Z bookworm/main Sources [11.7 MB] Get:5 http://snapshot.notset.fr/archive/debian/20220111T024807Z bookworm/main amd64 Packages [11.2 MB] Ign:6 http://snapshot.notset.fr/archive/debian/20220514T220115Z unstable/main amd64 Packages Err:6 http://snapshot.notset.fr/archive/debian/20220514T220115Z unstable/main amd64 Packages 404 Not Found [IP: 10.13.0.253 80] Ign:6 http://snapshot.notset.fr/archive/debian/20220514T220115Z unstable/main amd64 Packages Get:6 http://snapshot.notset.fr/archive/debian/20220514T220115Z unstable/main amd64 Packages [12.4 MB] Fetched 35.6 MB in 29s (1213 kB/s) Reading package lists... I: installing remaining packages inside the chroot... I: running --customize-hook in shell: sh -c 'chroot "$1" useradd --no-create-home -d /nonexistent -p "" builduser -s /bin/bash' exec /tmp/mmdebstrap.Ma2H475UfM I: running --customize-hook in shell: sh -c 'chroot "$1" env sh -c "apt-get source --only-source -d pam-ssh-agent-auth=0.10.3-3.1 && mkdir -p /build/pam-ssh-agent-auth-GiAZ3T && dpkg-source --no-check -x /*.dsc /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3 && cd /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3 && { printf '%s' 'pam-ssh-agent-auth (0.10.3-3.1+b1) sid; urgency=low, binary-only=yes * Binary-only non-maintainer upload for amd64; no source changes. * Rebuild against libssl3 -- all / amd64 / i386 Build Daemon (x86-conova-01) Sat, 14 May 2022 03:47:04 +0000 '; cat debian/changelog; } > debian/changelog.debrebuild && mv debian/changelog.debrebuild debian/changelog && chown -R builduser:builduser /build/pam-ssh-agent-auth-GiAZ3T"' exec /tmp/mmdebstrap.Ma2H475UfM Reading package lists... Need to get 1083 kB of source archives. Get:1 http://snapshot.notset.fr/archive/debian/20220111T024807Z bookworm/main pam-ssh-agent-auth 0.10.3-3.1 (dsc) [1902 B] Get:2 http://snapshot.notset.fr/archive/debian/20220111T024807Z bookworm/main pam-ssh-agent-auth 0.10.3-3.1 (tar) [1066 kB] Get:3 http://snapshot.notset.fr/archive/debian/20220111T024807Z bookworm/main pam-ssh-agent-auth 0.10.3-3.1 (diff) [14.2 kB] Fetched 1083 kB in 1s (1194 kB/s) Download complete and in download only mode W: Download is performed unsandboxed as root as file 'pam-ssh-agent-auth_0.10.3-3.1.dsc' couldn't be accessed by user '_apt'. - pkgAcquire::Run (13: Permission denied) dpkg-source: info: extracting pam-ssh-agent-auth in /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3 dpkg-source: info: unpacking pam-ssh-agent-auth_0.10.3.orig.tar.bz2 dpkg-source: info: unpacking pam-ssh-agent-auth_0.10.3-3.1.debian.tar.xz dpkg-source: info: using patch list from debian/patches/series dpkg-source: info: applying 0001-authfd.c-check-return-value-of-seteuid-2.patch dpkg-source: info: applying openssl-1.1.1-1.patch dpkg-source: info: applying openssl-1.1.1-2.patch dpkg-source: info: applying 0002-fix-segfault-when-using-ECDSA-keys.patch I: running --customize-hook in shell: sh -c 'chroot "$1" env --unset=TMPDIR runuser builduser -c "cd /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3 && env DEB_BUILD_OPTIONS="parallel=4" LC_ALL="C.UTF-8" LC_COLLATE="C.UTF-8" SOURCE_DATE_EPOCH="1652500024" DEB_BUILD_OPTIONS=nocheck dpkg-buildpackage -uc -a amd64 --build=any"' exec /tmp/mmdebstrap.Ma2H475UfM dpkg-buildpackage: info: source package pam-ssh-agent-auth dpkg-buildpackage: info: source version 0.10.3-3.1+b1 dpkg-buildpackage: info: source distribution sid dpkg-buildpackage: info: source changed by all / amd64 / i386 Build Daemon (x86-conova-01) dpkg-source --before-build . dpkg-buildpackage: info: host architecture amd64 fakeroot debian/rules clean dh clean dh: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_clean dh_clean: warning: Compatibility levels before 10 are deprecated (level 9 in use) debian/rules build-arch dh build-arch dh: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_update_autotools_config -a debian/rules override_dh_auto_configure make[1]: Entering directory '/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3' dh_auto_configure -- \ --libexecdir=/lib/x86_64-linux-gnu/security \ --with-mantype=man \ --without-openssl-header-check dh_auto_configure: warning: Compatibility levels before 10 are deprecated (level 9 in use) ./configure --build=x86_64-linux-gnu --prefix=/usr --includedir=\${prefix}/include --mandir=\${prefix}/share/man --infodir=\${prefix}/share/info --sysconfdir=/etc --localstatedir=/var --disable-option-checking --disable-silent-rules --libdir=\${prefix}/lib/x86_64-linux-gnu --libexecdir=\${prefix}/lib/x86_64-linux-gnu --disable-maintainer-mode --disable-dependency-tracking --libexecdir=/lib/x86_64-linux-gnu/security --with-mantype=man --without-openssl-header-check checking for gcc... gcc checking whether the C compiler works... yes checking for C compiler default output file name... a.out checking for suffix of executables... checking whether we are cross compiling... no checking for suffix of object files... o checking whether we are using the GNU C compiler... yes checking whether gcc accepts -g... yes checking for gcc option to accept ISO C89... none needed checking how to run the C preprocessor... gcc -E checking for grep that handles long lines and -e... /bin/grep checking for egrep... /bin/grep -E checking for ANSI C header files... yes checking for sys/types.h... yes checking for sys/stat.h... yes checking for stdlib.h... yes checking for string.h... yes checking for memory.h... yes checking for strings.h... yes checking for inttypes.h... yes checking for stdint.h... yes checking for unistd.h... yes checking minix/config.h usability... no checking minix/config.h presence... no checking for minix/config.h... no checking whether it is safe to define __EXTENSIONS__... yes checking for gcc... (cached) gcc checking whether we are using the GNU C compiler... (cached) yes checking whether gcc accepts -g... (cached) yes checking for gcc option to accept ISO C89... (cached) none needed checking for inline... inline checking build system type... x86_64-pc-linux-gnu checking host system type... x86_64-pc-linux-gnu checking whether byte ordering is bigendian... no checking for gawk... no checking for mawk... mawk checking how to run the C preprocessor... gcc -E checking for ranlib... ranlib checking for a BSD-compatible install... /usr/bin/install -c checking for egrep... (cached) /bin/grep -E checking for ar... /usr/bin/ar checking for cat... /bin/cat checking for kill... no checking for perl5... no checking for perl... /usr/bin/perl checking for sed... /bin/sed checking for ent... no checking for bash... /bin/bash checking for ksh... (cached) /bin/bash checking for sh... (cached) /bin/bash checking for sh... /bin/sh checking for groupadd... /usr/sbin/groupadd checking for useradd... /usr/sbin/useradd checking for pkgmk... no checking for uid_t in sys/types.h... yes checking for unistd.h... (cached) yes checking for working chown... yes checking for dirent.h that defines DIR... yes checking for library containing opendir... none required checking whether closedir returns void... no checking for pid_t... yes checking vfork.h usability... no checking vfork.h presence... no checking for vfork.h... no checking for fork... yes checking for vfork... yes checking for working fork... yes checking for working vfork... (cached) yes checking whether gcc needs -traditional... no checking whether lstat correctly handles trailing slash... yes checking whether lstat accepts an empty string... no checking whether lstat correctly handles trailing slash... (cached) yes checking for stdlib.h... (cached) yes checking for GNU libc compatible malloc... yes checking for working memcmp... yes checking for stdlib.h... (cached) yes checking for unistd.h... (cached) yes checking for sys/param.h... yes checking for utime.h... yes checking for getpagesize... yes checking for working mmap... yes checking for stdlib.h... (cached) yes checking for GNU libc compatible realloc... yes checking sys/select.h usability... yes checking sys/select.h presence... yes checking for sys/select.h... yes checking sys/socket.h usability... yes checking sys/socket.h presence... yes checking for sys/socket.h... yes checking types of arguments for select... int,fd_set *,struct timeval * checking return type of signal handlers... void checking whether stat accepts an empty string... no checking for working strnlen... yes checking whether utime accepts a null argument... yes checking for dup2... yes checking for endgrent... yes checking for ftruncate... yes checking for getcwd... yes checking for gethostbyaddr... yes checking for gethostbyname... yes checking for getpass... yes checking for getspnam... yes checking for gettimeofday... yes checking for inet_ntoa... yes checking for isascii... yes checking for memmove... yes checking for memset... yes checking for mkdir... yes checking for realpath... yes checking for rmdir... yes checking for select... yes checking for setenv... yes checking for socket... yes checking for strcasecmp... yes checking for strchr... yes checking for strdup... yes checking for strerror... yes checking for strncasecmp... yes checking for strpbrk... yes checking for strrchr... yes checking for strspn... yes checking for strstr... yes checking for strtol... yes checking for strtoul... yes checking for uname... yes checking for utime... yes checking for strnlen... yes checking for gethostname... yes checking for openpty... no checking for openpty in -lutil... yes checking for forkpty... yes checking for special C compiler options needed for large files... no checking for _FILE_OFFSET_BITS value needed for large files... no checking for login... /bin/login checking for passwd... /usr/bin/passwd checking whether LLONG_MAX is declared... yes checking if gcc supports -fstack-protector-all... yes checking if -fstack-protector-all works... yes checking bstring.h usability... no checking bstring.h presence... no checking for bstring.h... no checking crypt.h usability... yes checking crypt.h presence... yes checking for crypt.h... yes checking crypto/sha2.h usability... no checking crypto/sha2.h presence... no checking for crypto/sha2.h... no checking dirent.h usability... yes checking dirent.h presence... yes checking for dirent.h... yes checking endian.h usability... yes checking endian.h presence... yes checking for endian.h... yes checking features.h usability... yes checking features.h presence... yes checking for features.h... yes checking fcntl.h usability... yes checking fcntl.h presence... yes checking for fcntl.h... yes checking floatingpoint.h usability... no checking floatingpoint.h presence... no checking for floatingpoint.h... no checking getopt.h usability... yes checking getopt.h presence... yes checking for getopt.h... yes checking glob.h usability... yes checking glob.h presence... yes checking for glob.h... yes checking ia.h usability... no checking ia.h presence... no checking for ia.h... no checking iaf.h usability... no checking iaf.h presence... no checking for iaf.h... no checking limits.h usability... yes checking limits.h presence... yes checking for limits.h... yes checking login.h usability... no checking login.h presence... no checking for login.h... no checking maillock.h usability... no checking maillock.h presence... no checking for maillock.h... no checking ndir.h usability... no checking ndir.h presence... no checking for ndir.h... no checking net/if_tun.h usability... no checking net/if_tun.h presence... no checking for net/if_tun.h... no checking netdb.h usability... yes checking netdb.h presence... yes checking for netdb.h... yes checking netgroup.h usability... no checking netgroup.h presence... no checking for netgroup.h... no checking pam/pam_appl.h usability... no checking pam/pam_appl.h presence... no checking for pam/pam_appl.h... no checking paths.h usability... yes checking paths.h presence... yes checking for paths.h... yes checking poll.h usability... yes checking poll.h presence... yes checking for poll.h... yes checking pty.h usability... yes checking pty.h presence... yes checking for pty.h... yes checking readpassphrase.h usability... no checking readpassphrase.h presence... no checking for readpassphrase.h... no checking rpc/types.h usability... no checking rpc/types.h presence... no checking for rpc/types.h... no checking security/pam_appl.h usability... yes checking security/pam_appl.h presence... yes checking for security/pam_appl.h... yes checking sha2.h usability... no checking sha2.h presence... no checking for sha2.h... no checking shadow.h usability... yes checking shadow.h presence... yes checking for shadow.h... yes checking stddef.h usability... yes checking stddef.h presence... yes checking for stddef.h... yes checking for stdint.h... (cached) yes checking for string.h... (cached) yes checking for strings.h... (cached) yes checking sys/audit.h usability... no checking sys/audit.h presence... no checking for sys/audit.h... no checking sys/bitypes.h usability... yes checking sys/bitypes.h presence... yes checking for sys/bitypes.h... yes checking sys/bsdtty.h usability... no checking sys/bsdtty.h presence... no checking for sys/bsdtty.h... no checking sys/cdefs.h usability... yes checking sys/cdefs.h presence... yes checking for sys/cdefs.h... yes checking sys/dir.h usability... yes checking sys/dir.h presence... yes checking for sys/dir.h... yes checking sys/mman.h usability... yes checking sys/mman.h presence... yes checking for sys/mman.h... yes checking sys/ndir.h usability... no checking sys/ndir.h presence... no checking for sys/ndir.h... no checking sys/poll.h usability... yes checking sys/poll.h presence... yes checking for sys/poll.h... yes checking sys/prctl.h usability... yes checking sys/prctl.h presence... yes checking for sys/prctl.h... yes checking sys/pstat.h usability... no checking sys/pstat.h presence... no checking for sys/pstat.h... no checking for sys/select.h... (cached) yes checking for sys/stat.h... (cached) yes checking sys/stream.h usability... no checking sys/stream.h presence... no checking for sys/stream.h... no checking sys/stropts.h usability... no checking sys/stropts.h presence... no checking for sys/stropts.h... no checking sys/strtio.h usability... no checking sys/strtio.h presence... no checking for sys/strtio.h... no checking sys/sysmacros.h usability... yes checking sys/sysmacros.h presence... yes checking for sys/sysmacros.h... yes checking sys/time.h usability... yes checking sys/time.h presence... yes checking for sys/time.h... yes checking sys/timers.h usability... no checking sys/timers.h presence... no checking for sys/timers.h... no checking sys/un.h usability... yes checking sys/un.h presence... yes checking for sys/un.h... yes checking time.h usability... yes checking time.h presence... yes checking for time.h... yes checking tmpdir.h usability... no checking tmpdir.h presence... no checking for tmpdir.h... no checking ttyent.h usability... yes checking ttyent.h presence... yes checking for ttyent.h... yes checking ucred.h usability... no checking ucred.h presence... no checking for ucred.h... no checking for unistd.h... (cached) yes checking usersec.h usability... no checking usersec.h presence... no checking for usersec.h... no checking util.h usability... no checking util.h presence... no checking for util.h... no checking for utime.h... (cached) yes checking utmp.h usability... yes checking utmp.h presence... yes checking for utmp.h... yes checking utmpx.h usability... yes checking utmpx.h presence... yes checking for utmpx.h... yes checking vis.h usability... no checking vis.h presence... no checking for vis.h... no checking for time.h... (cached) yes checking for unistd.h... (cached) yes checking for strnvis... no checking for lastlog.h... yes checking for sys/ptms.h... no checking for login_cap.h... no checking linux/if_tun.h usability... yes checking linux/if_tun.h presence... yes checking for linux/if_tun.h... yes checking compiler and flags for sanity... yes checking for setsockopt... yes checking for dirname... yes checking libgen.h usability... yes checking libgen.h presence... yes checking for libgen.h... yes checking for /proc/pid/fd directory... yes checking for getspnam... (cached) yes checking for library containing basename... none required checking for dlopen in -ldl... yes checking for pam_set_item in -lpam... yes checking for pam_getenvlist... yes checking for pam_putenv... yes checking for pam_get_item... yes checking for strcasecmp... (cached) yes checking for utimes... yes checking for logout... yes checking for updwtmp... yes checking for logwtmp... yes checking for strftime... yes checking for GLOB_ALTDIRFUNC support... yes checking for gl_matchc field in glob_t... no checking whether GLOB_NOMATCH is declared... yes checking whether struct dirent allocates space for d_name... yes checking for /proc/pid/fd directory... yes checking for arc4random... no checking for asprintf... yes checking for b64_ntop... no checking for __b64_ntop... no checking for b64_pton... no checking for __b64_pton... no checking for bcopy... yes checking for bindresvport_sa... no checking for clock... yes checking for closefrom... no checking for dirfd... yes checking for fchmod... yes checking for fchown... yes checking for freeaddrinfo... yes checking for futimes... yes checking for getaddrinfo... yes checking for getcwd... (cached) yes checking for getgrouplist... yes checking for getnameinfo... yes checking for getopt... yes checking for getpeereid... no checking for getpeerucred... no checking for _getpty... no checking for getrlimit... yes checking for getttyent... yes checking for glob... yes checking for inet_aton... yes checking for inet_ntoa... (cached) yes checking for inet_ntop... yes checking for innetgr... yes checking for login_getcapbool... no checking for md5_crypt... no checking for memmove... (cached) yes checking for mkdtemp... yes checking for mmap... yes checking for ngetaddrinfo... no checking for nsleep... no checking for ogetaddrinfo... no checking for openlog_r... no checking for poll... yes checking for prctl... yes checking for pstat... no checking for readpassphrase... no checking for realpath... (cached) yes checking for recvmsg... yes checking for rresvport_af... yes checking for sendmsg... yes checking for setdtablesize... no checking for setegid... yes checking for setenv... (cached) yes checking for seteuid... yes checking for setgroups... yes checking for setlogin... no checking for setpcred... no checking for setproctitle... no checking for setregid... yes checking for setreuid... yes checking for setrlimit... yes checking for setsid... yes checking for setvbuf... yes checking for sigaction... yes checking for sigvec... no checking for snprintf... yes checking for socketpair... yes checking for strdup... (cached) yes checking for strerror... (cached) yes checking for strlcat... no checking for strlcpy... no checking for strmode... no checking for strnvis... (cached) no checking for strtonum... no checking for strtoll... yes checking for strtoul... (cached) yes checking for swap32... no checking for sysconf... yes checking for tcgetpgrp... yes checking for truncate... yes checking for unsetenv... yes checking for updwtmpx... yes checking for vasprintf... yes checking for vhangup... yes checking for vsnprintf... yes checking for waitpid... yes checking for gai_strerror... yes checking for library containing nanosleep... none required checking whether getrusage is declared... no checking whether strsep is declared... yes checking for strsep... yes checking whether tcsendbreak is declared... yes checking whether h_errno is declared... yes checking whether SHUT_RD is declared... yes checking whether O_NONBLOCK is declared... yes checking whether writev is declared... yes checking whether MAXSYMLINKS is declared... yes checking whether offsetof is declared... yes checking for setresuid... yes checking if setresuid seems to work... yes checking for setresgid... yes checking if setresgid seems to work... yes checking for gettimeofday... (cached) yes checking for time... yes checking for endutent... yes checking for getutent... yes checking for getutid... yes checking for getutline... yes checking for pututline... yes checking for setutent... yes checking for utmpname... yes checking for endutxent... yes checking for getutxent... yes checking for getutxid... yes checking for getutxline... yes checking for pututxline... yes checking for setutxent... yes checking for utmpxname... yes checking for daemon... yes checking for getpagesize... (cached) yes checking whether snprintf correctly terminates long strings... yes checking whether snprintf can declare const char *fmt... yes checking whether system supports SO_PEERCRED getsockopt... yes checking for (overly) strict mkstemp... yes checking if openpty correctly handles controlling tty... yes checking whether getpgrp requires zero arguments... yes checking OpenSSL header version... 30000030 (OpenSSL 3.0.3 3 May 2022) checking OpenSSL library version... 30000030 (OpenSSL 3.0.3 3 May 2022) checking whether OpenSSL's headers match the library... no configure: WARNING: Your OpenSSL headers do not match your library. Check config.log for details. Also see contrib/findssl.sh for help identifying header/library mismatches. checking if programs using OpenSSL functions will link... no checking if programs using OpenSSL need -ldl... no checking whether OpenSSL has crippled AES support... no checking for crypt in -lcrypt... yes checking for SHA256_Update... yes checking for EVP_sha256... yes checking for ia_openinfo in -liaf... no checking whether OpenSSL's PRNG is internally seeded... yes checking whether pam_strerror takes only one argument... no checking for ls... /bin/ls checking for netstat... no checking for arp... no checking for ifconfig... no checking for jstat... no checking for ps... no checking for sar... no checking for w... no checking for who... /usr/bin/who checking for last... /usr/bin/last checking for lastlog... /usr/bin/lastlog checking for df... /bin/df checking for vmstat... no checking for uptime... no checking for ipcs... /usr/bin/ipcs checking for tail... /usr/bin/tail checking for long long... yes checking for unsigned long long... yes checking for long double... yes checking size of char... 1 checking size of short int... 2 checking size of int... 4 checking size of long int... 8 checking size of long long int... 8 checking for u_int type... yes checking for intXX_t types... yes checking for int64_t type... yes checking for u_intXX_t types... yes checking for u_int64_t types... yes checking for uintXX_t types in stdint.h... yes checking for u_char... yes checking for socklen_t... yes checking for sig_atomic_t... yes checking for in_addr_t... yes checking for size_t... yes checking for ssize_t... yes checking for clock_t... yes checking for sa_family_t... yes checking for pid_t... yes checking for mode_t... yes checking for struct sockaddr_storage... yes checking for struct sockaddr_in6... yes checking for struct in6_addr... yes checking for struct addrinfo... yes checking for struct timeval... yes checking for struct timespec... yes checking for ut_host field in utmp.h... yes checking for ut_host field in utmpx.h... yes checking for syslen field in utmpx.h... no checking for ut_pid field in utmp.h... yes checking for ut_type field in utmp.h... yes checking for ut_type field in utmpx.h... yes checking for ut_tv field in utmp.h... yes checking for ut_id field in utmp.h... yes checking for ut_id field in utmpx.h... yes checking for ut_addr field in utmp.h... yes checking for ut_addr field in utmpx.h... yes checking for ut_addr_v6 field in utmp.h... yes checking for ut_addr_v6 field in utmpx.h... yes checking for ut_exit field in utmp.h... yes checking for ut_time field in utmp.h... no checking for ut_time field in utmpx.h... no checking for ut_tv field in utmpx.h... yes checking for struct stat.st_blksize... yes checking for struct __res_state.retrans... yes checking for ss_family field in struct sockaddr_storage... yes checking for __ss_family field in struct sockaddr_storage... no checking for pw_class field in struct passwd... no checking for pw_expire field in struct passwd... no checking for pw_change field in struct passwd... no checking for msg_accrights field in struct msghdr... no checking for msg_control field in struct msghdr... yes checking if libc defines __progname... yes checking whether gcc implements __FUNCTION__... yes checking whether gcc implements __func__... yes checking whether va_copy exists... yes checking whether __va_copy exists... yes checking whether getopt has optreset support... no checking if libc defines sys_errlist... no checking if libc defines sys_nerr... no checking for library containing getrrsetbyname... no checking for library containing res_query... no checking for library containing dn_expand... no checking if res_query will link... no checking for res_query in -lresolv... yes checking for _getshort... yes checking for _getlong... yes checking whether _getshort is declared... no checking whether _getlong is declared... no checking for HEADER.ad... yes checking if struct __res_state _res is an extern... yes checking for "/dev/ptc"... no configure: creating ./config.status config.status: creating Makefile config.status: creating openbsd-compat/Makefile config.status: creating openbsd-compat/regress/Makefile config.status: creating config.h Manpage format: man SELinux support: no Host: x86_64-pc-linux-gnu Compiler: gcc Compiler flags: -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all Preprocessor flags: -Wdate-time -D_FORTIFY_SOURCE=2 Linker flags: -Wl,-z,relro -fstack-protector-all Libraries: -lcrypto -lutil -lpam -lcrypt -lresolv -lresolv make[1]: Leaving directory '/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3' dh_auto_build -a dh_auto_build: warning: Compatibility levels before 10 are deprecated (level 9 in use) make -j1 make[1]: Entering directory '/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3' pod2man --section=8 --release=v0.10.3 --name=pam_ssh_agent_auth --official --center "PAM" pam_ssh_agent_auth.pod > pam_ssh_agent_auth.8 (cd openbsd-compat && make) make[2]: Entering directory '/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/openbsd-compat' gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-arc4random.c bsd-arc4random.c: In function ‘pamsshagentauth_arc4random’: bsd-arc4random.c:54:9: warning: ‘RC4’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 54 | RC4(&rc4, sizeof(r), (unsigned char *)&r, (unsigned char *)&r); | ^~~ In file included from bsd-arc4random.c:29: /usr/include/openssl/rc4.h:37:28: note: declared here 37 | OSSL_DEPRECATEDIN_3_0 void RC4(RC4_KEY *key, size_t len, | ^~~ bsd-arc4random.c: In function ‘pamsshagentauth_arc4random_stir’: bsd-arc4random.c:72:9: warning: ‘RC4_set_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 72 | RC4_set_key(&rc4, sizeof(rand_buf), rand_buf); | ^~~~~~~~~~~ In file included from bsd-arc4random.c:29: /usr/include/openssl/rc4.h:35:28: note: declared here 35 | OSSL_DEPRECATEDIN_3_0 void RC4_set_key(RC4_KEY *key, int len, | ^~~~~~~~~~~ bsd-arc4random.c:79:17: warning: ‘RC4’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 79 | RC4(&rc4, sizeof(rand_buf), rand_buf, rand_buf); | ^~~ In file included from bsd-arc4random.c:29: /usr/include/openssl/rc4.h:37:28: note: declared here 37 | OSSL_DEPRECATEDIN_3_0 void RC4(RC4_KEY *key, size_t len, | ^~~ gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-asprintf.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-closefrom.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-cray.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-cygwin_util.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-getpeereid.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-misc.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-nextstep.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-openpty.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-poll.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-snprintf.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bsd-waitpid.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c openssl-compat.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c xcrypt.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c xmmap.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c base64.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c basename.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c daemon.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c dirname.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c fake-rfc2553.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c getcwd.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c getgrouplist.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c getopt.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c getrrsetbyname.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c glob.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c inet_aton.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c inet_ntoa.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c inet_ntop.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c mktemp.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c port-aix.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c port-irix.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c port-linux.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c port-solaris.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c port-uw.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c realpath.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c rresvport.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c setenv.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c setproctitle.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c sha2.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c sigact.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c strlcat.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c strlcpy.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c strmode.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c strsep.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c strtoll.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c strtonum.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c strtoul.c gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I.. -I. -I./.. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c vis.c /usr/bin/ar rv libopenbsd-compat.a bsd-arc4random.o bsd-asprintf.o bsd-closefrom.o bsd-cray.o bsd-cygwin_util.o bsd-getpeereid.o bsd-misc.o bsd-nextstep.o bsd-openpty.o bsd-poll.o bsd-snprintf.o bsd-waitpid.o openssl-compat.o xcrypt.o xmmap.o base64.o basename.o daemon.o dirname.o fake-rfc2553.o getcwd.o getgrouplist.o getopt.o getrrsetbyname.o glob.o inet_aton.o inet_ntoa.o inet_ntop.o mktemp.o port-aix.o port-irix.o port-linux.o port-solaris.o port-uw.o realpath.o rresvport.o setenv.o setproctitle.o sha2.o sigact.o strlcat.o strlcpy.o strmode.o strsep.o strtoll.o strtonum.o strtoul.o vis.o port-aix.o port-irix.o port-linux.o port-solaris.o port-uw.o /usr/bin/ar: creating libopenbsd-compat.a a - bsd-arc4random.o a - bsd-asprintf.o a - bsd-closefrom.o a - bsd-cray.o a - bsd-cygwin_util.o a - bsd-getpeereid.o a - bsd-misc.o a - bsd-nextstep.o a - bsd-openpty.o a - bsd-poll.o a - bsd-snprintf.o a - bsd-waitpid.o a - openssl-compat.o a - xcrypt.o a - xmmap.o a - base64.o a - basename.o a - daemon.o a - dirname.o a - fake-rfc2553.o a - getcwd.o a - getgrouplist.o a - getopt.o a - getrrsetbyname.o a - glob.o a - inet_aton.o a - inet_ntoa.o a - inet_ntop.o a - mktemp.o a - port-aix.o a - port-irix.o a - port-linux.o a - port-solaris.o a - port-uw.o a - realpath.o a - rresvport.o a - setenv.o a - setproctitle.o a - sha2.o a - sigact.o a - strlcat.o a - strlcpy.o a - strmode.o a - strsep.o a - strtoll.o a - strtonum.o a - strtoul.o a - vis.o a - port-aix.o a - port-irix.o a - port-linux.o a - port-solaris.o a - port-uw.o ranlib libopenbsd-compat.a make[2]: Leaving directory '/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/openbsd-compat' gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c xmalloc.c -o xmalloc.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c atomicio.c -o atomicio.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c authfd.c -o authfd.o authfd.c: In function ‘ssh_get_authentication_socket’: authfd.c:149:5: warning: this ‘if’ clause does not guard... [-Wmisleading-indentation] 149 | if (seteuid(uid) < 0) | ^~ authfd.c:152:9: note: ...this statement, but the latter is misleadingly indented as if it were guarded by the ‘if’ 152 | if (connect(sock, (struct sockaddr *)&sunaddr, sizeof sunaddr) < 0) { | ^~ authfd.c:160:5: warning: this ‘if’ clause does not guard... [-Wmisleading-indentation] 160 | if (seteuid(0) < 0) | ^~ authfd.c:163:9: note: ...this statement, but the latter is misleadingly indented as if it were guarded by the ‘if’ 163 | agent_present = 1; | ^~~~~~~~~~~~~ authfd.c: In function ‘ssh_get_next_identity’: authfd.c:384:17: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 384 | pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_e(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ authfd.c:384:70: warning: passing argument 2 of ‘pamsshagentauth_buffer_get_bignum’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 384 | pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_e(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~ In file included from entropy.h:30, from includes.h:174, from authfd.c:42: buffer.h:53:53: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 53 | void pamsshagentauth_buffer_get_bignum(Buffer *, BIGNUM *); | ^~~~~~~~ authfd.c:385:17: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 385 | pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_n(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c:385:70: warning: passing argument 2 of ‘pamsshagentauth_buffer_get_bignum’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 385 | pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_n(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~ In file included from entropy.h:30, from includes.h:174, from authfd.c:42: buffer.h:53:53: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 53 | void pamsshagentauth_buffer_get_bignum(Buffer *, BIGNUM *); | ^~~~~~~~ authfd.c:387:17: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 387 | keybits = BN_num_bits(RSA_get0_n(key->rsa)); | ^~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c:390:29: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 390 | BN_num_bits(RSA_get0_n(key->rsa)), bits); | ^~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c: In function ‘ssh_decrypt_challenge’: authfd.c:440:9: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 440 | pamsshagentauth_buffer_put_int(&buffer, BN_num_bits(RSA_get0_n(key->rsa))); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c:441:9: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 441 | pamsshagentauth_buffer_put_bignum(&buffer, RSA_get0_e(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ authfd.c:442:9: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 442 | pamsshagentauth_buffer_put_bignum(&buffer, RSA_get0_n(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c: In function ‘ssh_encode_identity_rsa1’: authfd.c:530:9: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 530 | pamsshagentauth_buffer_put_int(b, BN_num_bits(RSA_get0_n(key))); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c:531:9: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 531 | pamsshagentauth_buffer_put_bignum(b, RSA_get0_n(key)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c:532:9: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 532 | pamsshagentauth_buffer_put_bignum(b, RSA_get0_e(key)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ authfd.c:533:9: warning: ‘RSA_get0_d’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 533 | pamsshagentauth_buffer_put_bignum(b, RSA_get0_d(key)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:234:37: note: declared here 234 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_d(const RSA *d); | ^~~~~~~~~~ authfd.c:535:9: warning: ‘RSA_get0_iqmp’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 535 | pamsshagentauth_buffer_put_bignum(b, RSA_get0_iqmp(key)); /* ssh key->u */ | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:239:37: note: declared here 239 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_iqmp(const RSA *r); | ^~~~~~~~~~~~~ authfd.c:536:9: warning: ‘RSA_get0_q’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 536 | pamsshagentauth_buffer_put_bignum(b, RSA_get0_q(key)); /* ssh key->p, SSL key->q */ | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:236:37: note: declared here 236 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_q(const RSA *d); | ^~~~~~~~~~ authfd.c:537:9: warning: ‘RSA_get0_p’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 537 | pamsshagentauth_buffer_put_bignum(b, RSA_get0_p(key)); /* ssh key->q, SSL key->p */ | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:235:37: note: declared here 235 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_p(const RSA *d); | ^~~~~~~~~~ authfd.c: In function ‘ssh_encode_identity_ssh2’: authfd.c:556:17: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 556 | pamsshagentauth_buffer_put_bignum2(b, RSA_get0_n(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c:557:17: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 557 | pamsshagentauth_buffer_put_bignum2(b, RSA_get0_e(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ authfd.c:558:17: warning: ‘RSA_get0_d’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 558 | pamsshagentauth_buffer_put_bignum2(b, RSA_get0_d(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:234:37: note: declared here 234 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_d(const RSA *d); | ^~~~~~~~~~ authfd.c:559:17: warning: ‘RSA_get0_iqmp’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 559 | pamsshagentauth_buffer_put_bignum2(b, RSA_get0_iqmp(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:239:37: note: declared here 239 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_iqmp(const RSA *r); | ^~~~~~~~~~~~~ authfd.c:560:17: warning: ‘RSA_get0_p’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 560 | pamsshagentauth_buffer_put_bignum2(b, RSA_get0_p(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:235:37: note: declared here 235 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_p(const RSA *d); | ^~~~~~~~~~ authfd.c:561:17: warning: ‘RSA_get0_q’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 561 | pamsshagentauth_buffer_put_bignum2(b, RSA_get0_q(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:236:37: note: declared here 236 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_q(const RSA *d); | ^~~~~~~~~~ authfd.c:572:17: warning: ‘DSA_get0_p’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 572 | pamsshagentauth_buffer_put_bignum2(b, DSA_get0_p(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:30, from authfd.c:65: /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ authfd.c:573:17: warning: ‘DSA_get0_q’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 573 | pamsshagentauth_buffer_put_bignum2(b, DSA_get0_q(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:30, from authfd.c:65: /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ authfd.c:574:17: warning: ‘DSA_get0_g’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 574 | pamsshagentauth_buffer_put_bignum2(b, DSA_get0_g(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:30, from authfd.c:65: /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ authfd.c:575:17: warning: ‘DSA_get0_pub_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 575 | pamsshagentauth_buffer_put_bignum2(b, DSA_get0_pub_key(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:30, from authfd.c:65: /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ authfd.c:576:17: warning: ‘DSA_get0_priv_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 576 | pamsshagentauth_buffer_put_bignum2(b, DSA_get0_priv_key(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:30, from authfd.c:65: /usr/include/openssl/dsa.h:212:37: note: declared here 212 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_priv_key(const DSA *d); | ^~~~~~~~~~~~~~~~~ authfd.c: In function ‘ssh_remove_identity’: authfd.c:662:17: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 662 | pamsshagentauth_buffer_put_int(&msg, BN_num_bits(RSA_get0_n(key->rsa))); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ authfd.c:663:17: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 663 | pamsshagentauth_buffer_put_bignum(&msg, RSA_get0_e(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ authfd.c:664:17: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 664 | pamsshagentauth_buffer_put_bignum(&msg, RSA_get0_n(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from rsa.h:20, from authfd.c:63: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bufaux.c -o bufaux.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c bufbn.c -o bufbn.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c buffer.c -o buffer.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c cleanup.c -o cleanup.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c entropy.c -o entropy.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c fatal.c -o fatal.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c key.c -o key.o key.c: In function ‘pamsshagentauth_key_new’: key.c:78:17: warning: ‘RSA_new’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 78 | if ((rsa = RSA_new()) == NULL) | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:201:28: note: declared here 201 | OSSL_DEPRECATEDIN_3_0 RSA *RSA_new(void); | ^~~~~~~ key.c:86:17: warning: ‘RSA_set0_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 86 | if (RSA_set0_key(rsa, BN_new(), BN_new(), NULL) != 1) | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:207:27: note: declared here 207 | OSSL_DEPRECATEDIN_3_0 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); | ^~~~~~~~~~~~ key.c:92:17: warning: ‘DSA_new’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 92 | if ((dsa = DSA_new()) == NULL) | ^~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:125:28: note: declared here 125 | OSSL_DEPRECATEDIN_3_0 DSA *DSA_new(void); | ^~~~~~~ key.c:104:17: warning: ‘DSA_set0_pqg’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 104 | if (DSA_set0_pqg(dsa, BN_new(), BN_new(), BN_new()) != 1) | ^~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:203:27: note: declared here 203 | OSSL_DEPRECATEDIN_3_0 int DSA_set0_pqg(DSA *d, BIGNUM *p, BIGNUM *q, BIGNUM *g); | ^~~~~~~~~~~~ key.c:106:17: warning: ‘DSA_set0_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 106 | if (DSA_set0_key(dsa, BN_new(), NULL) != 1) | ^~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:206:27: note: declared here 206 | OSSL_DEPRECATEDIN_3_0 int DSA_set0_key(DSA *d, BIGNUM *pub_key, | ^~~~~~~~~~~~ key.c:68:18: warning: unused variable ‘ed25519’ [-Wunused-variable] 68 | ED25519 *ed25519; | ^~~~~~~ key.c: In function ‘pamsshagentauth_key_new_private’: key.c:147:17: warning: ‘RSA_set0_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 147 | if (RSA_set0_key(k->rsa, NULL, NULL, BN_new()) != 1) | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:207:27: note: declared here 207 | OSSL_DEPRECATEDIN_3_0 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); | ^~~~~~~~~~~~ key.c:149:17: warning: ‘RSA_set0_crt_params’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 149 | if (RSA_set0_crt_params(k->rsa, BN_new(), BN_new(), BN_new()) != 1) | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:209:27: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 int RSA_set0_crt_params(RSA *r, | ^~~~~~~~~~~~~~~~~~~ key.c:151:17: warning: ‘RSA_set0_factors’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 151 | if (RSA_set0_factors(k->rsa, BN_new(), BN_new()) != 1) | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:208:27: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q); | ^~~~~~~~~~~~~~~~ key.c:160:17: warning: ‘DSA_set0_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 160 | if (DSA_set0_key(k->dsa, NULL, BN_new()) != 1) | ^~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:206:27: note: declared here 206 | OSSL_DEPRECATEDIN_3_0 int DSA_set0_key(DSA *d, BIGNUM *pub_key, | ^~~~~~~~~~~~ key.c: In function ‘pamsshagentauth_key_free’: key.c:191:25: warning: ‘RSA_free’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 191 | RSA_free(k->rsa); | ^~~~~~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:293:28: note: declared here 293 | OSSL_DEPRECATEDIN_3_0 void RSA_free(RSA *r); | ^~~~~~~~ key.c:196:25: warning: ‘DSA_free’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 196 | DSA_free(k->dsa); | ^~~~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:127:28: note: declared here 127 | OSSL_DEPRECATEDIN_3_0 void DSA_free(DSA *r); | ^~~~~~~~ key.c:201:25: warning: ‘EC_KEY_free’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 201 | EC_KEY_free(k->ecdsa); | ^~~~~~~~~~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1003:28: note: declared here 1003 | OSSL_DEPRECATEDIN_3_0 void EC_KEY_free(EC_KEY *key); | ^~~~~~~~~~~ key.c: In function ‘pamsshagentauth_key_equal’: key.c:231:21: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 231 | BN_cmp(RSA_get0_e(a->rsa), RSA_get0_e(b->rsa)) == 0 && | ^~~~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:231:21: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 231 | BN_cmp(RSA_get0_e(a->rsa), RSA_get0_e(b->rsa)) == 0 && | ^~~~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:232:21: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 232 | BN_cmp(RSA_get0_n(a->rsa), RSA_get0_n(b->rsa)) == 0; | ^~~~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:232:21: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 232 | BN_cmp(RSA_get0_n(a->rsa), RSA_get0_n(b->rsa)) == 0; | ^~~~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:242:21: warning: ‘DSA_get0_p’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 242 | BN_cmp(DSA_get0_p(a->dsa), DSA_get0_p(b->dsa)) == 0 && | ^~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:242:21: warning: ‘DSA_get0_p’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 242 | BN_cmp(DSA_get0_p(a->dsa), DSA_get0_p(b->dsa)) == 0 && | ^~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:243:21: warning: ‘DSA_get0_q’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 243 | BN_cmp(DSA_get0_q(a->dsa), DSA_get0_q(b->dsa)) == 0 && | ^~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ key.c:243:21: warning: ‘DSA_get0_q’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 243 | BN_cmp(DSA_get0_q(a->dsa), DSA_get0_q(b->dsa)) == 0 && | ^~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ key.c:244:21: warning: ‘DSA_get0_g’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 244 | BN_cmp(DSA_get0_g(a->dsa), DSA_get0_g(b->dsa)) == 0 && | ^~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ key.c:244:21: warning: ‘DSA_get0_g’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 244 | BN_cmp(DSA_get0_g(a->dsa), DSA_get0_g(b->dsa)) == 0 && | ^~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ key.c:245:21: warning: ‘DSA_get0_pub_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 245 | BN_cmp(DSA_get0_pub_key(a->dsa), DSA_get0_pub_key(b->dsa)) == 0; | ^~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ key.c:245:21: warning: ‘DSA_get0_pub_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 245 | BN_cmp(DSA_get0_pub_key(a->dsa), DSA_get0_pub_key(b->dsa)) == 0; | ^~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ key.c:249:25: warning: ‘EC_KEY_check_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 249 | EC_KEY_check_key(a->ecdsa) == 1 && | ^~~~~~~~~~~~~~~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1107:27: note: declared here 1107 | OSSL_DEPRECATEDIN_3_0 int EC_KEY_check_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~ key.c:250:25: warning: ‘EC_KEY_check_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 250 | EC_KEY_check_key(b->ecdsa) == 1 && | ^~~~~~~~~~~~~~~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1107:27: note: declared here 1107 | OSSL_DEPRECATEDIN_3_0 int EC_KEY_check_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~ key.c:251:25: warning: ‘EC_KEY_get0_group’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 251 | EC_GROUP_cmp(EC_KEY_get0_group(a->ecdsa), | ^~~~~~~~~~~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c:252:33: warning: ‘EC_KEY_get0_group’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 252 | EC_KEY_get0_group(a->ecdsa), NULL) == 0 && | ^~~~~~~~~~~~~~~~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c:253:25: warning: ‘EC_KEY_get0_group’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 253 | EC_POINT_cmp(EC_KEY_get0_group(a->ecdsa), | ^~~~~~~~~~~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c:254:33: warning: ‘EC_KEY_get0_public_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 254 | EC_KEY_get0_public_key(a->ecdsa), | ^~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1062:39: note: declared here 1062 | OSSL_DEPRECATEDIN_3_0 const EC_POINT *EC_KEY_get0_public_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~~~~~~ key.c:255:33: warning: ‘EC_KEY_get0_public_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 255 | EC_KEY_get0_public_key(b->ecdsa), NULL) == 0 && | ^~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1062:39: note: declared here 1062 | OSSL_DEPRECATEDIN_3_0 const EC_POINT *EC_KEY_get0_public_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~~~~~~ key.c:256:25: warning: ‘EC_KEY_get0_private_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 256 | BN_cmp(EC_KEY_get0_private_key(a->ecdsa), | ^~~~~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1048:37: note: declared here 1048 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *EC_KEY_get0_private_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~~~~~~~ key.c:257:33: warning: ‘EC_KEY_get0_private_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 257 | EC_KEY_get0_private_key(b->ecdsa)) == 0; | ^~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1048:37: note: declared here 1048 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *EC_KEY_get0_private_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~~~~~~~ key.c: In function ‘pamsshagentauth_key_fingerprint_raw’: key.c:304:17: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 304 | nlen = BN_num_bytes(RSA_get0_n(k->rsa)); | ^~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:305:17: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 305 | elen = BN_num_bytes(RSA_get0_e(k->rsa)); | ^~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:308:17: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 308 | BN_bn2bin(RSA_get0_n(k->rsa), blob); | ^~~~~~~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:309:17: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 309 | BN_bn2bin(RSA_get0_e(k->rsa), blob + nlen); | ^~~~~~~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c: In function ‘pamsshagentauth_key_read’: key.c:519:17: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 519 | if (!read_bignum(cpp, RSA_get0_e(ret->rsa))) | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:519:39: warning: passing argument 2 of ‘read_bignum’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 519 | if (!read_bignum(cpp, RSA_get0_e(ret->rsa))) | ^~~~~~~~~~~~~~~~~~~~ key.c:440:34: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 440 | read_bignum(char **cpp, BIGNUM * value) | ~~~~~~~~~^~~~~ key.c:521:17: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 521 | if (!read_bignum(cpp, RSA_get0_n(ret->rsa))) | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:521:39: warning: passing argument 2 of ‘read_bignum’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 521 | if (!read_bignum(cpp, RSA_get0_n(ret->rsa))) | ^~~~~~~~~~~~~~~~~~~~ key.c:440:34: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 440 | read_bignum(char **cpp, BIGNUM * value) | ~~~~~~~~~^~~~~ key.c:578:33: warning: ‘RSA_free’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 578 | RSA_free(ret->rsa); | ^~~~~~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:293:28: note: declared here 293 | OSSL_DEPRECATEDIN_3_0 void RSA_free(RSA *r); | ^~~~~~~~ key.c:588:33: warning: ‘DSA_free’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 588 | DSA_free(ret->dsa); | ^~~~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:127:28: note: declared here 127 | OSSL_DEPRECATEDIN_3_0 void DSA_free(DSA *r); | ^~~~~~~~ key.c:598:33: warning: ‘EC_KEY_free’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 598 | EC_KEY_free(ret->ecdsa); | ^~~~~~~~~~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1003:28: note: declared here 1003 | OSSL_DEPRECATEDIN_3_0 void EC_KEY_free(EC_KEY *key); | ^~~~~~~~~~~ key.c: In function ‘pamsshagentauth_key_write’: key.c:652:17: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 652 | bits = BN_num_bits(RSA_get0_n(key->rsa)); | ^~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:654:17: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 654 | if (write_bignum(f, RSA_get0_e(key->rsa)) && | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:654:37: warning: passing argument 2 of ‘write_bignum’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 654 | if (write_bignum(f, RSA_get0_e(key->rsa)) && | ^~~~~~~~~~~~~~~~~~~~ key.c:477:31: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 477 | write_bignum(FILE *f, BIGNUM *num) | ~~~~~~~~^~~ key.c:655:21: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 655 | write_bignum(f, RSA_get0_n(key->rsa))) { | ^~~~~~~~~~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:655:37: warning: passing argument 2 of ‘write_bignum’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 655 | write_bignum(f, RSA_get0_n(key->rsa))) { | ^~~~~~~~~~~~~~~~~~~~ key.c:477:31: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 477 | write_bignum(FILE *f, BIGNUM *num) | ~~~~~~~~^~~ key.c: In function ‘key_ssh_name’: key.c:704:17: warning: ‘EC_KEY_get0_group’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 704 | int nid = EC_GROUP_get_curve_name(EC_KEY_get0_group(k->ecdsa)); | ^~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c: In function ‘group_ssh_name’: key.c:726:17: warning: ‘EC_KEY_get0_group’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 726 | int nid = EC_GROUP_get_curve_name(EC_KEY_get0_group(k->ecdsa)); | ^~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c: In function ‘pamsshagentauth_key_size’: key.c:752:17: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 752 | return BN_num_bits(RSA_get0_n(k->rsa)); | ^~~~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:754:17: warning: ‘DSA_get0_p’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 754 | return BN_num_bits(DSA_get0_p(k->dsa)); | ^~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:758:17: warning: ‘EC_KEY_get0_group’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 758 | int nid = EC_GROUP_get_curve_name(EC_KEY_get0_group(k->ecdsa)); | ^~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c: In function ‘rsa_generate_private_key’: key.c:779:9: warning: ‘RSA_generate_key’ is deprecated: Since OpenSSL 0.9.8 [-Wdeprecated-declarations] 779 | private = RSA_generate_key(bits, 35, NULL, NULL); | ^~~~~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:253:30: note: declared here 253 | OSSL_DEPRECATEDIN_0_9_8 RSA *RSA_generate_key(int bits, unsigned long e, void | ^~~~~~~~~~~~~~~~ key.c: In function ‘dsa_generate_private_key’: key.c:788:9: warning: ‘DSA_generate_parameters’ is deprecated: Since OpenSSL 0.9.8 [-Wdeprecated-declarations] 788 | DSA *private = DSA_generate_parameters(bits, NULL, 0, NULL, NULL, NULL, NULL); | ^~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:159:6: note: declared here 159 | DSA *DSA_generate_parameters(int bits, unsigned char *seed, int seed_len, | ^~~~~~~~~~~~~~~~~~~~~~~ key.c:792:9: warning: ‘DSA_generate_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 792 | if (!DSA_generate_key(private)) | ^~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:174:27: note: declared here 174 | OSSL_DEPRECATEDIN_3_0 int DSA_generate_key(DSA *a); | ^~~~~~~~~~~~~~~~ key.c: In function ‘pamsshagentauth_key_from_private’: key.c:852:17: warning: ‘DSA_get0_p’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 852 | if ((BN_copy(DSA_get0_p(n->dsa), DSA_get0_p(k->dsa)) == NULL) || | ^~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:852:17: warning: ‘DSA_get0_p’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 852 | if ((BN_copy(DSA_get0_p(n->dsa), DSA_get0_p(k->dsa)) == NULL) || | ^~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:852:30: warning: passing argument 1 of ‘BN_copy’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 852 | if ((BN_copy(DSA_get0_p(n->dsa), DSA_get0_p(k->dsa)) == NULL) || | ^~~~~~~~~~~~~~~~~~ In file included from buffer.h:49, from entropy.h:30, from includes.h:174, from key.c:41: /usr/include/openssl/bn.h:241:25: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 241 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b); | ~~~~~~~~^ key.c:853:21: warning: ‘DSA_get0_q’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 853 | (BN_copy(DSA_get0_q(n->dsa), DSA_get0_q(k->dsa)) == NULL) || | ^ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ key.c:853:21: warning: ‘DSA_get0_q’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 853 | (BN_copy(DSA_get0_q(n->dsa), DSA_get0_q(k->dsa)) == NULL) || | ^ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ key.c:853:30: warning: passing argument 1 of ‘BN_copy’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 853 | (BN_copy(DSA_get0_q(n->dsa), DSA_get0_q(k->dsa)) == NULL) || | ^~~~~~~~~~~~~~~~~~ In file included from buffer.h:49, from entropy.h:30, from includes.h:174, from key.c:41: /usr/include/openssl/bn.h:241:25: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 241 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b); | ~~~~~~~~^ key.c:854:21: warning: ‘DSA_get0_g’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 854 | (BN_copy(DSA_get0_g(n->dsa), DSA_get0_g(k->dsa)) == NULL) || | ^ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ key.c:854:21: warning: ‘DSA_get0_g’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 854 | (BN_copy(DSA_get0_g(n->dsa), DSA_get0_g(k->dsa)) == NULL) || | ^ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ key.c:854:30: warning: passing argument 1 of ‘BN_copy’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 854 | (BN_copy(DSA_get0_g(n->dsa), DSA_get0_g(k->dsa)) == NULL) || | ^~~~~~~~~~~~~~~~~~ In file included from buffer.h:49, from entropy.h:30, from includes.h:174, from key.c:41: /usr/include/openssl/bn.h:241:25: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 241 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b); | ~~~~~~~~^ key.c:855:21: warning: ‘DSA_get0_pub_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 855 | (BN_copy(DSA_get0_pub_key(n->dsa), DSA_get0_pub_key(k->dsa)) == NULL)) | ^ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ key.c:855:21: warning: ‘DSA_get0_pub_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 855 | (BN_copy(DSA_get0_pub_key(n->dsa), DSA_get0_pub_key(k->dsa)) == NULL)) | ^ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ key.c:855:30: warning: passing argument 1 of ‘BN_copy’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 855 | (BN_copy(DSA_get0_pub_key(n->dsa), DSA_get0_pub_key(k->dsa)) == NULL)) | ^~~~~~~~~~~~~~~~~~~~~~~~ In file included from buffer.h:49, from entropy.h:30, from includes.h:174, from key.c:41: /usr/include/openssl/bn.h:241:25: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 241 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b); | ~~~~~~~~^ key.c:866:17: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 866 | if ((BN_copy(RSA_get0_n(n->rsa), RSA_get0_n(k->rsa)) == NULL) || | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:866:17: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 866 | if ((BN_copy(RSA_get0_n(n->rsa), RSA_get0_n(k->rsa)) == NULL) || | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:866:30: warning: passing argument 1 of ‘BN_copy’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 866 | if ((BN_copy(RSA_get0_n(n->rsa), RSA_get0_n(k->rsa)) == NULL) || | ^~~~~~~~~~~~~~~~~~ In file included from buffer.h:49, from entropy.h:30, from includes.h:174, from key.c:41: /usr/include/openssl/bn.h:241:25: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 241 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b); | ~~~~~~~~^ key.c:867:21: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 867 | (BN_copy(RSA_get0_e(n->rsa), RSA_get0_e(k->rsa)) == NULL)) | ^ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:867:21: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 867 | (BN_copy(RSA_get0_e(n->rsa), RSA_get0_e(k->rsa)) == NULL)) | ^ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:867:30: warning: passing argument 1 of ‘BN_copy’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 867 | (BN_copy(RSA_get0_e(n->rsa), RSA_get0_e(k->rsa)) == NULL)) | ^~~~~~~~~~~~~~~~~~ In file included from buffer.h:49, from entropy.h:30, from includes.h:174, from key.c:41: /usr/include/openssl/bn.h:241:25: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 241 | BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b); | ~~~~~~~~^ key.c:873:17: warning: ‘EC_KEY_copy’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 873 | if (EC_KEY_copy(n->ecdsa, k->ecdsa) == NULL) | ^~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1010:31: note: declared here 1010 | OSSL_DEPRECATEDIN_3_0 EC_KEY *EC_KEY_copy(EC_KEY *dst, const EC_KEY *src); | ^~~~~~~~~~~ key.c: In function ‘pamsshagentauth_key_from_blob’: key.c:974:17: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 974 | if (pamsshagentauth_buffer_get_bignum2_ret(&b, RSA_get0_e(key->rsa)) == -1 || | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:974:64: warning: passing argument 2 of ‘pamsshagentauth_buffer_get_bignum2_ret’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 974 | if (pamsshagentauth_buffer_get_bignum2_ret(&b, RSA_get0_e(key->rsa)) == -1 || | ^~~~~~~~~~~~~~~~~~~~ In file included from entropy.h:30, from includes.h:174, from key.c:41: buffer.h:78:58: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 78 | int pamsshagentauth_buffer_get_bignum2_ret(Buffer *, BIGNUM *); | ^~~~~~~~ key.c:975:21: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 975 | pamsshagentauth_buffer_get_bignum2_ret(&b, RSA_get0_n(key->rsa)) == -1) { | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:975:64: warning: passing argument 2 of ‘pamsshagentauth_buffer_get_bignum2_ret’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 975 | pamsshagentauth_buffer_get_bignum2_ret(&b, RSA_get0_n(key->rsa)) == -1) { | ^~~~~~~~~~~~~~~~~~~~ In file included from entropy.h:30, from includes.h:174, from key.c:41: buffer.h:78:58: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 78 | int pamsshagentauth_buffer_get_bignum2_ret(Buffer *, BIGNUM *); | ^~~~~~~~ key.c:994:17: warning: ‘DSA_get0_p’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 994 | if (pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_p(key->dsa)) == -1 || | ^~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:994:64: warning: passing argument 2 of ‘pamsshagentauth_buffer_get_bignum2_ret’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 994 | if (pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_p(key->dsa)) == -1 || | ^~~~~~~~~~~~~~~~~~~~ In file included from entropy.h:30, from includes.h:174, from key.c:41: buffer.h:78:58: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 78 | int pamsshagentauth_buffer_get_bignum2_ret(Buffer *, BIGNUM *); | ^~~~~~~~ key.c:995:21: warning: ‘DSA_get0_q’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 995 | pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_q(key->dsa)) == -1 || | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ key.c:995:64: warning: passing argument 2 of ‘pamsshagentauth_buffer_get_bignum2_ret’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 995 | pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_q(key->dsa)) == -1 || | ^~~~~~~~~~~~~~~~~~~~ In file included from entropy.h:30, from includes.h:174, from key.c:41: buffer.h:78:58: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 78 | int pamsshagentauth_buffer_get_bignum2_ret(Buffer *, BIGNUM *); | ^~~~~~~~ key.c:996:21: warning: ‘DSA_get0_g’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 996 | pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_g(key->dsa)) == -1 || | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ key.c:996:64: warning: passing argument 2 of ‘pamsshagentauth_buffer_get_bignum2_ret’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 996 | pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_g(key->dsa)) == -1 || | ^~~~~~~~~~~~~~~~~~~~ In file included from entropy.h:30, from includes.h:174, from key.c:41: buffer.h:78:58: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 78 | int pamsshagentauth_buffer_get_bignum2_ret(Buffer *, BIGNUM *); | ^~~~~~~~ key.c:997:21: warning: ‘DSA_get0_pub_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 997 | pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_pub_key(key->dsa)) == -1) { | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ key.c:997:64: warning: passing argument 2 of ‘pamsshagentauth_buffer_get_bignum2_ret’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers] 997 | pamsshagentauth_buffer_get_bignum2_ret(&b, DSA_get0_pub_key(key->dsa)) == -1) { | ^~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from entropy.h:30, from includes.h:174, from key.c:41: buffer.h:78:58: note: expected ‘BIGNUM *’ {aka ‘struct bignum_st *’} but argument is of type ‘const BIGNUM *’ {aka ‘const struct bignum_st *’} 78 | int pamsshagentauth_buffer_get_bignum2_ret(Buffer *, BIGNUM *); | ^~~~~~~~ key.c:1020:17: warning: ‘EC_KEY_new_by_curve_name’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1020 | if ((ecdsa = EC_KEY_new_by_curve_name(pamsshagentauth_ec_group_from_name(identifier))) == NULL) { | ^~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:998:31: note: declared here 998 | OSSL_DEPRECATEDIN_3_0 EC_KEY *EC_KEY_new_by_curve_name(int nid); | ^~~~~~~~~~~~~~~~~~~~~~~~ key.c:1035:17: warning: ‘EC_KEY_get0_group’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1035 | if ((p = EC_POINT_new(EC_KEY_get0_group(key->ecdsa))) == NULL) { | ^~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c:1043:17: warning: ‘EC_KEY_get0_group’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1043 | if (EC_POINT_oct2point(EC_KEY_get0_group(key->ecdsa), p, octets, len, NULL) == -1) { | ^~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c:1052:17: warning: ‘EC_KEY_set_public_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1052 | EC_KEY_set_public_key(key->ecdsa, p); | ^~~~~~~~~~~~~~~~~~~~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1070:27: note: declared here 1070 | OSSL_DEPRECATEDIN_3_0 int EC_KEY_set_public_key(EC_KEY *key, const EC_POINT *pub); | ^~~~~~~~~~~~~~~~~~~~~ key.c:1055:17: warning: ‘EC_KEY_check_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1055 | if (!EC_KEY_check_key(key->ecdsa)) { | ^~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1107:27: note: declared here 1107 | OSSL_DEPRECATEDIN_3_0 int EC_KEY_check_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~ key.c: In function ‘pamsshagentauth_key_to_blob’: key.c:1132:17: warning: ‘DSA_get0_p’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1132 | pamsshagentauth_buffer_put_bignum2(&b, DSA_get0_p(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:1133:17: warning: ‘DSA_get0_q’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1133 | pamsshagentauth_buffer_put_bignum2(&b, DSA_get0_q(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ key.c:1134:17: warning: ‘DSA_get0_g’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1134 | pamsshagentauth_buffer_put_bignum2(&b, DSA_get0_g(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ key.c:1135:17: warning: ‘DSA_get0_pub_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1135 | pamsshagentauth_buffer_put_bignum2(&b, DSA_get0_pub_key(key->dsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ key.c:1139:17: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1139 | pamsshagentauth_buffer_put_bignum2(&b, RSA_get0_e(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:1140:17: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1140 | pamsshagentauth_buffer_put_bignum2(&b, RSA_get0_n(key->rsa)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:1151:17: warning: ‘EC_KEY_get0_group’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1151 | if ((l = EC_POINT_point2oct(EC_KEY_get0_group(key->ecdsa), | ^~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c:1152:73: warning: ‘EC_KEY_get0_public_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1152 | EC_KEY_get0_public_key(key->ecdsa), | ^~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1062:39: note: declared here 1062 | OSSL_DEPRECATEDIN_3_0 const EC_POINT *EC_KEY_get0_public_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~~~~~~ key.c:1155:25: warning: ‘EC_KEY_get0_group’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1155 | (l = EC_POINT_point2oct(EC_KEY_get0_group(key->ecdsa), | ^ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ key.c:1156:73: warning: ‘EC_KEY_get0_public_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1156 | EC_KEY_get0_public_key(key->ecdsa), | ^~~~~~~~~~~~~~~~~~~~~~ In file included from key.h:31, from key.c:54: /usr/include/openssl/ec.h:1062:39: note: declared here 1062 | OSSL_DEPRECATEDIN_3_0 const EC_POINT *EC_KEY_get0_public_key(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~~~~~~ key.c: In function ‘pamsshagentauth_key_demote’: key.c:1252:17: warning: ‘RSA_new’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1252 | if ((pk->rsa = RSA_new()) == NULL) | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:201:28: note: declared here 201 | OSSL_DEPRECATEDIN_3_0 RSA *RSA_new(void); | ^~~~~~~ key.c:1260:17: warning: ‘RSA_set0_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1260 | if (RSA_set0_key(pk->rsa, BN_dup(RSA_get0_n(k->rsa)), BN_dup(RSA_get0_e(k->rsa)), NULL) != 1) | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:207:27: note: declared here 207 | OSSL_DEPRECATEDIN_3_0 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); | ^~~~~~~~~~~~ key.c:1260:17: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1260 | if (RSA_set0_key(pk->rsa, BN_dup(RSA_get0_n(k->rsa)), BN_dup(RSA_get0_e(k->rsa)), NULL) != 1) | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ key.c:1260:17: warning: ‘RSA_get0_e’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1260 | if (RSA_set0_key(pk->rsa, BN_dup(RSA_get0_n(k->rsa)), BN_dup(RSA_get0_e(k->rsa)), NULL) != 1) | ^~ In file included from key.h:29, from key.c:54: /usr/include/openssl/rsa.h:233:37: note: declared here 233 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_e(const RSA *d); | ^~~~~~~~~~ key.c:1265:17: warning: ‘DSA_new’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1265 | if ((pk->dsa = DSA_new()) == NULL) | ^~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:125:28: note: declared here 125 | OSSL_DEPRECATEDIN_3_0 DSA *DSA_new(void); | ^~~~~~~ key.c:1277:17: warning: ‘DSA_set0_pqg’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1277 | if (DSA_set0_pqg(pk->dsa, BN_dup(DSA_get0_p(k->dsa)), BN_dup(DSA_get0_q(k->dsa)), BN_dup(DSA_get0_g(k->dsa))) != 1) | ^~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:203:27: note: declared here 203 | OSSL_DEPRECATEDIN_3_0 int DSA_set0_pqg(DSA *d, BIGNUM *p, BIGNUM *q, BIGNUM *g); | ^~~~~~~~~~~~ key.c:1277:17: warning: ‘DSA_get0_p’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1277 | if (DSA_set0_pqg(pk->dsa, BN_dup(DSA_get0_p(k->dsa)), BN_dup(DSA_get0_q(k->dsa)), BN_dup(DSA_get0_g(k->dsa))) != 1) | ^~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:208:37: note: declared here 208 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_p(const DSA *d); | ^~~~~~~~~~ key.c:1277:17: warning: ‘DSA_get0_q’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1277 | if (DSA_set0_pqg(pk->dsa, BN_dup(DSA_get0_p(k->dsa)), BN_dup(DSA_get0_q(k->dsa)), BN_dup(DSA_get0_g(k->dsa))) != 1) | ^~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:209:37: note: declared here 209 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_q(const DSA *d); | ^~~~~~~~~~ key.c:1277:17: warning: ‘DSA_get0_g’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1277 | if (DSA_set0_pqg(pk->dsa, BN_dup(DSA_get0_p(k->dsa)), BN_dup(DSA_get0_q(k->dsa)), BN_dup(DSA_get0_g(k->dsa))) != 1) | ^~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:210:37: note: declared here 210 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_g(const DSA *d); | ^~~~~~~~~~ key.c:1279:17: warning: ‘DSA_set0_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1279 | if (DSA_set0_key(pk->dsa, BN_dup(DSA_get0_pub_key(k->dsa)), NULL) != 1) | ^~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:206:27: note: declared here 206 | OSSL_DEPRECATEDIN_3_0 int DSA_set0_key(DSA *d, BIGNUM *pub_key, | ^~~~~~~~~~~~ key.c:1279:17: warning: ‘DSA_get0_pub_key’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 1279 | if (DSA_set0_key(pk->dsa, BN_dup(DSA_get0_pub_key(k->dsa)), NULL) != 1) | ^~ In file included from key.h:30, from key.c:54: /usr/include/openssl/dsa.h:211:37: note: declared here 211 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *DSA_get0_pub_key(const DSA *d); | ^~~~~~~~~~~~~~~~ gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c log.c -o log.o log.c: In function ‘pamsshagentauth_do_log’: log.c:371:52: warning: ‘ This incident has been rep...’ directive output may be truncated writing 54 bytes into a region of size between 1 and 1024 [-Wformat-truncation=] 371 | snprintf(msgbuf, sizeof msgbuf, "%s\r\nThis incident has been reported to the authorities\r\n", fmtbuf); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In file included from /usr/include/stdio.h:866, from /usr/include/resolv.h:58, from openbsd-compat/getrrsetbyname.h:59, from openbsd-compat/openbsd-compat.h:44, from includes.h:171, from log.c:37: /usr/include/x86_64-linux-gnu/bits/stdio2.h:71:10: note: ‘__builtin___snprintf_chk’ output between 55 and 1078 bytes into a destination of size 1024 71 | return __builtin___snprintf_chk (__s, __n, __USE_FORTIFY_LEVEL - 1, | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 72 | __glibc_objsize (__s), __fmt, | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 73 | __va_arg_pack ()); | ~~~~~~~~~~~~~~~~~ log.c:378:52: warning: ‘ ’ directive output may be truncated writing 2 bytes into a region of size between 1 and 1024 [-Wformat-truncation=] 378 | snprintf(msgbuf, sizeof msgbuf, "%s\r\n", fmtbuf); | ^~~~ In file included from /usr/include/stdio.h:866, from /usr/include/resolv.h:58, from openbsd-compat/getrrsetbyname.h:59, from openbsd-compat/openbsd-compat.h:44, from includes.h:171, from log.c:37: /usr/include/x86_64-linux-gnu/bits/stdio2.h:71:10: note: ‘__builtin___snprintf_chk’ output between 3 and 1026 bytes into a destination of size 1024 71 | return __builtin___snprintf_chk (__s, __n, __USE_FORTIFY_LEVEL - 1, | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 72 | __glibc_objsize (__s), __fmt, | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 73 | __va_arg_pack ()); | ~~~~~~~~~~~~~~~~~ gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c misc.c -o misc.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c secure_filename.c -o secure_filename.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c ssh-dss.c -o ssh-dss.o ssh-dss.c: In function ‘ssh_dss_sign’: ssh-dss.c:68:9: warning: ‘DSA_do_sign’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 68 | sig = DSA_do_sign(digest, dlen, key->dsa); | ^~~ In file included from key.h:30, from ssh-dss.c:40: /usr/include/openssl/dsa.h:113:32: note: declared here 113 | OSSL_DEPRECATEDIN_3_0 DSA_SIG *DSA_do_sign(const unsigned char *dgst, int dlen, | ^~~~~~~~~~~ ssh-dss.c: In function ‘ssh_dss_verify’: ssh-dss.c:211:9: warning: ‘DSA_do_verify’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 211 | ret = DSA_do_verify(digest, dlen, sig, key->dsa); | ^~~ In file included from key.h:30, from ssh-dss.c:40: /usr/include/openssl/dsa.h:115:27: note: declared here 115 | OSSL_DEPRECATEDIN_3_0 int DSA_do_verify(const unsigned char *dgst, int dgst_len, | ^~~~~~~~~~~~~ ssh-dss.c: In function ‘ssh_dss_sign’: ssh-dss.c:81:9: warning: ‘r’ may be used uninitialized [-Wmaybe-uninitialized] 81 | DSA_SIG_get0((const DSA_SIG *)sig, (const BIGNUM **)r, (const BIGNUM **)s); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ssh-dss.c:81:9: warning: ‘s’ may be used uninitialized [-Wmaybe-uninitialized] gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c ssh-ecdsa.c -o ssh-ecdsa.o ssh-ecdsa.c: In function ‘evp_from_key’: ssh-ecdsa.c:24:9: warning: ‘EC_KEY_get0_group’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 24 | int nid = EC_GROUP_get_curve_name(EC_KEY_get0_group(key->ecdsa)); | ^~~ In file included from /usr/include/openssl/ecdsa.h:10, from ssh-ecdsa.c:6: /usr/include/openssl/ec.h:1034:39: note: declared here 1034 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); | ^~~~~~~~~~~~~~~~~ ssh-ecdsa.c: In function ‘ssh_ecdsa_sign’: ssh-ecdsa.c:62:5: warning: ‘ECDSA_do_sign’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 62 | sig = ECDSA_do_sign(digest, dlen, key->ecdsa); | ^~~ In file included from /usr/include/openssl/ecdsa.h:10, from ssh-ecdsa.c:6: /usr/include/openssl/ec.h:1365:34: note: declared here 1365 | OSSL_DEPRECATEDIN_3_0 ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, | ^~~~~~~~~~~~~ ssh-ecdsa.c:76:18: warning: passing argument 1 of ‘DSA_SIG_get0’ from incompatible pointer type [-Wincompatible-pointer-types] 76 | DSA_SIG_get0(sig, &r, &s); | ^~~ | | | ECDSA_SIG * {aka struct ECDSA_SIG_st *} In file included from key.h:30, from ssh-ecdsa.c:16: /usr/include/openssl/dsa.h:65:34: note: expected ‘const DSA_SIG *’ {aka ‘const struct DSA_SIG_st *’} but argument is of type ‘ECDSA_SIG *’ {aka ‘struct ECDSA_SIG_st *’} 65 | void DSA_SIG_get0(const DSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps); | ~~~~~~~~~~~~~~~^~~ ssh-ecdsa.c:76:23: warning: passing argument 2 of ‘DSA_SIG_get0’ from incompatible pointer type [-Wincompatible-pointer-types] 76 | DSA_SIG_get0(sig, &r, &s); | ^~ | | | BIGNUM ** {aka struct bignum_st **} In file included from key.h:30, from ssh-ecdsa.c:16: /usr/include/openssl/dsa.h:65:54: note: expected ‘const BIGNUM **’ {aka ‘const struct bignum_st **’} but argument is of type ‘BIGNUM **’ {aka ‘struct bignum_st **’} 65 | void DSA_SIG_get0(const DSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps); | ~~~~~~~~~~~~~~~^~ ssh-ecdsa.c:76:27: warning: passing argument 3 of ‘DSA_SIG_get0’ from incompatible pointer type [-Wincompatible-pointer-types] 76 | DSA_SIG_get0(sig, &r, &s); | ^~ | | | BIGNUM ** {aka struct bignum_st **} In file included from key.h:30, from ssh-ecdsa.c:16: /usr/include/openssl/dsa.h:65:73: note: expected ‘const BIGNUM **’ {aka ‘const struct bignum_st **’} but argument is of type ‘BIGNUM **’ {aka ‘struct bignum_st **’} 65 | void DSA_SIG_get0(const DSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps); | ~~~~~~~~~~~~~~~^~ ssh-ecdsa.c: In function ‘ssh_ecdsa_verify’: ssh-ecdsa.c:172:5: warning: ‘ECDSA_do_verify’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 172 | ret = ECDSA_do_verify(digest, dlen, sig, key->ecdsa); | ^~~ In file included from /usr/include/openssl/ecdsa.h:10, from ssh-ecdsa.c:6: /usr/include/openssl/ec.h:1391:27: note: declared here 1391 | OSSL_DEPRECATEDIN_3_0 int ECDSA_do_verify(const unsigned char *dgst, int dgst_len, | ^~~~~~~~~~~~~~~ gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c ssh-ed25519.c -o ssh-ed25519.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c ssh-rsa.c -o ssh-rsa.o ssh-rsa.c: In function ‘ssh_rsa_sign’: ssh-rsa.c:59:24: warning: passing argument 1 of ‘EVP_DigestInit’ from incompatible pointer type [-Wincompatible-pointer-types] 59 | EVP_DigestInit(&md, evp_md); | ^~~ | | | EVP_MD_CTX ** {aka struct evp_md_ctx_st **} In file included from ssh-rsa.c:22: /usr/include/openssl/evp.h:722:39: note: expected ‘EVP_MD_CTX *’ {aka ‘struct evp_md_ctx_st *’} but argument is of type ‘EVP_MD_CTX **’ {aka ‘struct evp_md_ctx_st **’} 722 | __owur int EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type); | ~~~~~~~~~~~~^~~ ssh-rsa.c:60:26: warning: passing argument 1 of ‘EVP_DigestUpdate’ from incompatible pointer type [-Wincompatible-pointer-types] 60 | EVP_DigestUpdate(&md, data, datalen); | ^~~ | | | EVP_MD_CTX ** {aka struct evp_md_ctx_st **} In file included from ssh-rsa.c:22: /usr/include/openssl/evp.h:710:41: note: expected ‘EVP_MD_CTX *’ {aka ‘struct evp_md_ctx_st *’} but argument is of type ‘EVP_MD_CTX **’ {aka ‘struct evp_md_ctx_st **’} 710 | __owur int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *d, | ~~~~~~~~~~~~^~~ ssh-rsa.c:61:25: warning: passing argument 1 of ‘EVP_DigestFinal’ from incompatible pointer type [-Wincompatible-pointer-types] 61 | EVP_DigestFinal(&md, digest, &dlen); | ^~~ | | | EVP_MD_CTX ** {aka struct evp_md_ctx_st **} In file included from ssh-rsa.c:22: /usr/include/openssl/evp.h:723:40: note: expected ‘EVP_MD_CTX *’ {aka ‘struct evp_md_ctx_st *’} but argument is of type ‘EVP_MD_CTX **’ {aka ‘struct evp_md_ctx_st **’} 723 | __owur int EVP_DigestFinal(EVP_MD_CTX *ctx, unsigned char *md, | ~~~~~~~~~~~~^~~ ssh-rsa.c:63:9: warning: ‘RSA_size’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 63 | slen = RSA_size(key->rsa); | ^~~~ In file included from key.h:29, from ssh-rsa.c:31: /usr/include/openssl/rsa.h:204:27: note: declared here 204 | OSSL_DEPRECATEDIN_3_0 int RSA_size(const RSA *rsa); | ^~~~~~~~ ssh-rsa.c:66:9: warning: ‘RSA_sign’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 66 | ok = RSA_sign(nid, digest, dlen, sig, &len, key->rsa); | ^~ In file included from key.h:29, from ssh-rsa.c:31: /usr/include/openssl/rsa.h:348:27: note: declared here 348 | OSSL_DEPRECATEDIN_3_0 int RSA_sign(int type, const unsigned char *m, | ^~~~~~~~ ssh-rsa.c: In function ‘ssh_rsa_verify’: ssh-rsa.c:125:9: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 125 | if (BN_num_bits(RSA_get0_n(key->rsa)) < SSH_RSA_MINIMUM_MODULUS_SIZE) { | ^~ In file included from key.h:29, from ssh-rsa.c:31: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ ssh-rsa.c:131:21: warning: ‘RSA_get0_n’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 131 | BN_num_bits(RSA_get0_n(key->rsa)), SSH_RSA_MINIMUM_MODULUS_SIZE); | ^~~~~~~~~~~ In file included from key.h:29, from ssh-rsa.c:31: /usr/include/openssl/rsa.h:232:37: note: declared here 232 | OSSL_DEPRECATEDIN_3_0 const BIGNUM *RSA_get0_n(const RSA *d); | ^~~~~~~~~~ ssh-rsa.c:154:9: warning: ‘RSA_size’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 154 | modlen = RSA_size(key->rsa); | ^~~~~~ In file included from key.h:29, from ssh-rsa.c:31: /usr/include/openssl/rsa.h:204:27: note: declared here 204 | OSSL_DEPRECATEDIN_3_0 int RSA_size(const RSA *rsa); | ^~~~~~~~ ssh-rsa.c: In function ‘openssh_RSA_verify’: ssh-rsa.c:246:9: warning: ‘RSA_size’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 246 | rsasize = RSA_size(rsa); | ^~~~~~~ In file included from key.h:29, from ssh-rsa.c:31: /usr/include/openssl/rsa.h:204:27: note: declared here 204 | OSSL_DEPRECATEDIN_3_0 int RSA_size(const RSA *rsa); | ^~~~~~~~ ssh-rsa.c:252:9: warning: ‘RSA_public_decrypt’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 252 | if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, | ^~ In file included from key.h:29, from ssh-rsa.c:31: /usr/include/openssl/rsa.h:288:5: note: declared here 288 | int RSA_public_decrypt(int flen, const unsigned char *from, unsigned char *to, | ^~~~~~~~~~~~~~~~~~ gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c uuencode.c -o uuencode.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c compat.c -o compat.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c uidswap.c -o uidswap.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c ed25519-donna/ed25519.c -o ed25519-donna/ed25519.o In file included from ed25519-donna/ed25519.c:20: ed25519-donna/ed25519-hash.h: In function ‘ed25519_hash_init’: ed25519-donna/ed25519-hash.h:200:9: warning: ‘SHA512_Init’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 200 | SHA512_Init(ctx); | ^~~~~~~~~~~ In file included from ed25519-donna/ed25519-hash.h:194, from ed25519-donna/ed25519.c:20: /usr/include/openssl/sha.h:123:27: note: declared here 123 | OSSL_DEPRECATEDIN_3_0 int SHA512_Init(SHA512_CTX *c); | ^~~~~~~~~~~ In file included from ed25519-donna/ed25519.c:20: ed25519-donna/ed25519-hash.h: In function ‘ed25519_hash_update’: ed25519-donna/ed25519-hash.h:205:9: warning: ‘SHA512_Update’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 205 | SHA512_Update(ctx, in, inlen); | ^~~~~~~~~~~~~ In file included from ed25519-donna/ed25519-hash.h:194, from ed25519-donna/ed25519.c:20: /usr/include/openssl/sha.h:124:27: note: declared here 124 | OSSL_DEPRECATEDIN_3_0 int SHA512_Update(SHA512_CTX *c, | ^~~~~~~~~~~~~ In file included from ed25519-donna/ed25519.c:20: ed25519-donna/ed25519-hash.h: In function ‘ed25519_hash_final’: ed25519-donna/ed25519-hash.h:210:9: warning: ‘SHA512_Final’ is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations] 210 | SHA512_Final(hash, ctx); | ^~~~~~~~~~~~ In file included from ed25519-donna/ed25519-hash.h:194, from ed25519-donna/ed25519.c:20: /usr/include/openssl/sha.h:126:27: note: declared here 126 | OSSL_DEPRECATEDIN_3_0 int SHA512_Final(unsigned char *md, SHA512_CTX *c); | ^~~~~~~~~~~~ gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c pam_user_key_allowed2.c -o pam_user_key_allowed2.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c iterate_ssh_agent_keys.c -o iterate_ssh_agent_keys.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c userauth_pubkey_from_id.c -o userauth_pubkey_from_id.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c pam_user_authorized_keys.c -o pam_user_authorized_keys.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c get_command_line.c -o get_command_line.o gcc -g -O2 -ffile-prefix-map=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wall -Wpointer-arith -Wuninitialized -fstack-protector-all -I. -I. -Wdate-time -D_FORTIFY_SOURCE=2 -DHAVE_CONFIG_H -c pam_ssh_agent_auth.c -o pam_ssh_agent_auth.o gcc -shared -o pam_ssh_agent_auth.so xmalloc.o atomicio.o authfd.o bufaux.o bufbn.o buffer.o cleanup.o entropy.o fatal.o key.o log.o misc.o secure_filename.o ssh-dss.o ssh-ecdsa.o ssh-ed25519.o ssh-rsa.o uuencode.o compat.o uidswap.o ed25519-donna/ed25519.o pam_user_key_allowed2.o iterate_ssh_agent_keys.o userauth_pubkey_from_id.o pam_user_authorized_keys.o get_command_line.o -L. -Lopenbsd-compat/ -Wl,-z,relro -fstack-protector-all -lopenbsd-compat pam_ssh_agent_auth.o -lcrypto -lutil -lpam -lcrypt -lresolv -lresolv -lpam make[1]: Leaving directory '/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3' dh_auto_test -a dh_auto_test: warning: Compatibility levels before 10 are deprecated (level 9 in use) fakeroot debian/rules binary-arch dh binary-arch dh: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_auto_test -a dh_auto_test: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_testroot -a dh_prep -a dh_auto_install --destdir=debian/libpam-ssh-agent-auth/ -a dh_auto_install: warning: Compatibility levels before 10 are deprecated (level 9 in use) make -j1 install DESTDIR=/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth AM_UPDATE_INFO_DIR=no make[1]: Entering directory '/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3' (cd openbsd-compat && make) make[2]: Entering directory '/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/openbsd-compat' make[2]: Nothing to be done for 'all'. make[2]: Leaving directory '/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/openbsd-compat' ./mkinstalldirs /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/lib/x86_64-linux-gnu/security mkdir /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/lib mkdir /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/lib/x86_64-linux-gnu mkdir /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/lib/x86_64-linux-gnu/security ./mkinstalldirs /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/usr/share/man/man8 mkdir /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/usr mkdir /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/usr/share mkdir /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/usr/share/man mkdir /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/usr/share/man/man8 /usr/bin/install -c -m 644 pam_ssh_agent_auth.8 /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/usr/share/man/man8/pam_ssh_agent_auth.8 /usr/bin/install -c -m 755 pam_ssh_agent_auth.so /build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3/debian/libpam-ssh-agent-auth/lib/x86_64-linux-gnu/security/pam_ssh_agent_auth.so make[1]: Leaving directory '/build/pam-ssh-agent-auth-GiAZ3T/pam-ssh-agent-auth-0.10.3' dh_installdocs -a dh_installdocs: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_installchangelogs -a dh_installchangelogs: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_installman -a dh_installman: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_perl -a dh_link -a dh_strip_nondeterminism -a dh_compress -a dh_compress: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_fixperms -a dh_missing -a dh_missing: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_strip -a dh_strip: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_makeshlibs -a dh_makeshlibs: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_shlibdeps -a dh_shlibdeps: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_installdeb -a dh_installdeb: warning: Compatibility levels before 10 are deprecated (level 9 in use) dh_gencontrol -a dh_md5sums -a dh_builddeb -a dpkg-deb: building package 'libpam-ssh-agent-auth-dbgsym' in '../libpam-ssh-agent-auth-dbgsym_0.10.3-3.1+b1_amd64.deb'. dpkg-deb: building package 'libpam-ssh-agent-auth' in '../libpam-ssh-agent-auth_0.10.3-3.1+b1_amd64.deb'. dpkg-genbuildinfo --build=any -O../pam-ssh-agent-auth_0.10.3-3.1+b1_amd64.buildinfo dpkg-genchanges --build=any -O../pam-ssh-agent-auth_0.10.3-3.1+b1_amd64.changes dpkg-genchanges: info: binary-only arch-specific upload (source code and arch-indep packages not included) dpkg-source --after-build . dpkg-buildpackage: info: binary-only upload (no source included) I: running special hook: sync-out /build/pam-ssh-agent-auth-GiAZ3T /tmp/pam-ssh-agent-auth-0.10.3-3.1+b19dlwz7ca I: cleaning package lists and apt cache... I: removing tempdir /tmp/mmdebstrap.Ma2H475UfM... I: success in 361.3365 seconds md5: libpam-ssh-agent-auth-dbgsym_0.10.3-3.1+b1_amd64.deb: OK md5: libpam-ssh-agent-auth_0.10.3-3.1+b1_amd64.deb: OK sha1: libpam-ssh-agent-auth-dbgsym_0.10.3-3.1+b1_amd64.deb: OK sha1: libpam-ssh-agent-auth_0.10.3-3.1+b1_amd64.deb: OK sha256: libpam-ssh-agent-auth-dbgsym_0.10.3-3.1+b1_amd64.deb: OK sha256: libpam-ssh-agent-auth_0.10.3-3.1+b1_amd64.deb: OK Checksums: OK