=> Building mail/smtprc Started : Friday, 8 MAR 2019 at 17:43:16 UTC Platform: 5.5-DEVELOPMENT DragonFly v5.5.0.192.g15ae7f0-DEVELOPMENT #34: Tue Feb 19 09:07:07 PST 2019 root@pkgbox64.dragonflybsd.org:/usr/obj/usr/src/sys/X86_64_GENERIC x86_64 -------------------------------------------------- -- Environment -------------------------------------------------- UNAME_r=5.5-SYNTH UNAME_m=x86_64 UNAME_p=x86_64 UNAME_v=DragonFly 5.5-SYNTH UNAME_s=DragonFly PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin SSL_NO_VERIFY_PEER=1 TERM=dumb PKG_CACHEDIR=/var/cache/pkg8 PKG_DBDIR=/var/db/pkg8 PORTSDIR=/xports LANG=C HOME=/root USER=root -------------------------------------------------- -- Options -------------------------------------------------- ===> The following configuration options are available for smtprc-2.0.3: DOCS=on: Build and/or install documentation GUI=off: GUI (Graphical User Interface) support ===> Use 'make config' to modify these settings -------------------------------------------------- -- CONFIGURE_ENV -------------------------------------------------- XDG_DATA_HOME=/construction/mail/smtprc XDG_CONFIG_HOME=/construction/mail/smtprc HOME=/construction/mail/smtprc TMPDIR="/tmp" PATH=/construction/mail/smtprc/.bin:/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin SHELL=/bin/sh CONFIG_SHELL=/bin/sh CCVER=gcc80 -------------------------------------------------- -- CONFIGURE_ARGS -------------------------------------------------- -------------------------------------------------- -- MAKE_ENV -------------------------------------------------- XDG_DATA_HOME=/construction/mail/smtprc XDG_CONFIG_HOME=/construction/mail/smtprc HOME=/construction/mail/smtprc TMPDIR="/tmp" PATH=/construction/mail/smtprc/.bin:/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin NO_PIE=yes MK_DEBUG_FILES=no MK_KERNEL_SYMBOLS=no SHELL=/bin/sh NO_LINT=YES CCVER=gcc80 PREFIX=/usr/local LOCALBASE=/usr/local NOPROFILE=1 CC="cc" CFLAGS="-pipe -O2 -fno-strict-aliasing " CPP="cpp" CPPFLAGS="" LDFLAGS=" " LIBS="" CXX="c++" CXXFLAGS=" -pipe -O2 -fno-strict-aliasing " MANPREFIX="/usr/local" BSD_INSTALL_PROGRAM="install -s -m 555" BSD_INSTALL_LIB="install -s -m 0644" BSD_INSTALL_SCRIPT="install -m 555" BSD_INSTALL_DATA="install -m 0644" BSD_INSTALL_MAN="install -m 444" -------------------------------------------------- -- MAKE_ARGS -------------------------------------------------- DESTDIR=/construction/mail/smtprc/stage -------------------------------------------------- -- PLIST_SUB -------------------------------------------------- PORTDOCS="" WITHGUI="@comment " OSREL=5.5 PREFIX=%D LOCALBASE=/usr/local RESETPREFIX=/usr/local LIB32DIR=lib PROFILE="@comment " DOCSDIR="share/doc/smtprc" EXAMPLESDIR="share/examples/smtprc" DATADIR="share/smtprc" WWWDIR="www/smtprc" ETCDIR="etc/smtprc" -------------------------------------------------- -- SUB_LIST -------------------------------------------------- PREFIX=/usr/local LOCALBASE=/usr/local DATADIR=/usr/local/share/smtprc DOCSDIR=/usr/local/share/doc/smtprc EXAMPLESDIR=/usr/local/share/examples/smtprc WWWDIR=/usr/local/www/smtprc ETCDIR=/usr/local/etc/smtprc -------------------------------------------------- -- /etc/make.conf -------------------------------------------------- SYNTHPROFILE=Release-BE USE_PACKAGE_DEPENDS_ONLY=yes PACKAGE_BUILDING=yes BATCH=yes PKG_CREATE_VERBOSE=yes PORTSDIR=/xports DISTDIR=/distfiles WRKDIRPREFIX=/construction PORT_DBDIR=/options PACKAGES=/packages MAKE_JOBS_NUMBER_LIMIT=5 LICENSES_ACCEPTED= NONE HAVE_COMPAT_IA32_KERN= CONFIGURE_MAX_CMD_LEN=262144 _PERL5_FROM_BIN=5.26.2 _ALTCCVERSION_921dbbb2=none _OBJC_ALTCCVERSION_921dbbb2=none _SMP_CPUS=8 UID=0 ARCH=x86_64 OPSYS=DragonFly DFLYVERSION=500500 OSVERSION=9999999 OSREL=5.5 _OSRELEASE=5.5-SYNTH PYTHONBASE=/usr/local _PKG_CHECKED=1 -------------------------------------------------------------------------------- -- Phase: check-sanity -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- -- Phase: pkg-depends -------------------------------------------------------------------------------- ===> smtprc-2.0.3 depends on file: /usr/local/sbin/pkg - not found ===> Installing existing package /packages/All/pkg-1.10.5_5.txz Installing pkg-1.10.5_5... Extracting pkg-1.10.5_5: .......... done ===> smtprc-2.0.3 depends on file: /usr/local/sbin/pkg - found ===> Returning to build of smtprc-2.0.3 -------------------------------------------------------------------------------- -- Phase: fetch-depends -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- -- Phase: fetch -------------------------------------------------------------------------------- Press ctrl-c now, and define WITH_GUI for GUI ===> Fetching all distfiles required by smtprc-2.0.3 for building -------------------------------------------------------------------------------- -- Phase: checksum -------------------------------------------------------------------------------- Press ctrl-c now, and define WITH_GUI for GUI ===> Fetching all distfiles required by smtprc-2.0.3 for building => SHA256 Checksum OK for smtprc-2.0.3.tgz. -------------------------------------------------------------------------------- -- Phase: extract-depends -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- -- Phase: extract -------------------------------------------------------------------------------- Press ctrl-c now, and define WITH_GUI for GUI ===> Fetching all distfiles required by smtprc-2.0.3 for building ===> Extracting for smtprc-2.0.3 => SHA256 Checksum OK for smtprc-2.0.3.tgz. -------------------------------------------------------------------------------- -- Phase: patch-depends -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- -- Phase: patch -------------------------------------------------------------------------------- ===> Patching for smtprc-2.0.3 -------------------------------------------------------------------------------- -- Phase: build-depends -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- -- Phase: lib-depends -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- -- Phase: configure -------------------------------------------------------------------------------- ===> Configuring for smtprc-2.0.3 -------------------------------------------------------------------------------- -- Phase: build -------------------------------------------------------------------------------- ===> Building for smtprc-2.0.3 --- check_mail_file.o --- --- connect.o --- --- display_screen.o --- --- smtprc.o --- --- parse_config_files.o --- --- check_mail_file.o --- cc -pipe -O2 -fno-strict-aliasing -c check_mail_file.c --- display_screen.o --- cc -pipe -O2 -fno-strict-aliasing -c display_screen.c --- connect.o --- cc -pipe -O2 -fno-strict-aliasing -c connect.c --- smtprc.o --- cc -pipe -O2 -fno-strict-aliasing -c smtprc.c --- parse_config_files.o --- cc -pipe -O2 -fno-strict-aliasing -c parse_config_files.c --- parse_mailbox.o --- cc -pipe -O2 -fno-strict-aliasing -c parse_mailbox.c --- scan_engine.o --- cc -pipe -O2 -fno-strict-aliasing -c scan_engine.c --- utils.o --- cc -pipe -O2 -fno-strict-aliasing -c utils.c --- parse_mailbox.o --- parse_mailbox.c: In function 'get_sender_address': parse_mailbox.c:185:4: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(address, word, strlen(word)+2); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_mailbox.c:185:27: note: length computed here strncpy(address, word, strlen(word)+2); ^~~~~~~~~~~~ --- scan_engine.o --- scan_engine.c: In function 'cleaner_start': scan_engine.c:151:7: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] if((int)o.tid[x]) { ^ scan_engine.c: In function 'thread_start': scan_engine.c:188:9: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] return(int)(NULL); ^ scan_engine.c:227:8: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] return(int)(NULL); ^ --- display_html.o --- cc -pipe -O2 -fno-strict-aliasing -c display_html.c --- scan_engine.o --- scan_engine.c:201:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->hostname, hostnamer, strlen(hostnamer)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --- display_text.o --- --- options.o --- --- display_text.o --- cc -pipe -O2 -fno-strict-aliasing -c display_text.c --- options.o --- cc -pipe -O2 -fno-strict-aliasing -c options.c --- parse_config_files.o --- parse_config_files.c: In function 'get_ip_range': parse_config_files.c:85:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(iprange2, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_config_files.c:188:10: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[hostnames]->ip_address, hostnamet, strlen(hostnamet)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --- options.o --- options.c: In function 'validate_options': options.c:58:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.html_path, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ options.c:67:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.text_path, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ options.c:76:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.machine_path, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ options.c:85:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.xml_path, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --- utils.o --- utils.c: In function 'check_file_path': utils.c:243:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(fn, filename, strlen(filename)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --- relay_check.o --- cc -pipe -O2 -fno-strict-aliasing -c relay_check.c --- smtprc_error.o --- cc -pipe -O2 -fno-strict-aliasing -c smtprc_error.c --- parse_config_files.o --- parse_config_files.c: In function 'parse_config': parse_config_files.c:284:4: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(rules[i]->helo, buf2[0], strlen(buf2[0])); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_config_files.c:289:4: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(rules[i]->mail_from, buf2[1], strlen(buf2[1])); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_config_files.c:294:4: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(rules[i]->rcpt_to, buf2[2], strlen(buf2[2])); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --- display_machine.o --- cc -pipe -O2 -fno-strict-aliasing -c display_machine.c --- display_xml.o --- cc -pipe -O2 -fno-strict-aliasing -c display_xml.c --- parse_args.o --- cc -pipe -O2 -fno-strict-aliasing -c parse_args.c --- display_html.o --- display_html.c: In function 'escape_html_chars': display_html.c:766:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(s, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~ --- relay_check_funcs.o --- cc -pipe -O2 -fno-strict-aliasing -c relay_check_funcs.c --- usage.o --- cc -pipe -O2 -fno-strict-aliasing -c usage.c --- display_html.o --- display_html.c: In function 'display_html': display_html.c:63:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(boo, o.html_file, strlen(o.html_file)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ display_html.c:80:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(failed_file, s, strlen(s)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ display_html.c:76:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(failed_file, o.html_file, strlen(o.html_file)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --- parse_config_files.o --- parse_config_files.c: In function 'get_email_file': parse_config_files.c:544:2: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(temp, o.email, strlen(o.email)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_config_files.c:575:2: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.email, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --- parse_args.o --- parse_args.c: In function 'parse_args': parse_args.c:156:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.machine_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:141:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.xml_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:149:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.email_template, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:134:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.html_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:125:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.mailbox, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:118:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.ip_range, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:103:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.machine_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:88:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.generate_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:82:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.auto_config_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:76:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.ip_list, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:67:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.text_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:60:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.mailbox, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:50:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.config_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:41:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.email_address, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c: In function 'get_domain': parse_args.c:176:2: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(email, o.email_address, sizeof(email)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:173:13: note: length computed here char email[strlen(o.email_address)+1]; ^~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:205:2: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.domain, t, strlen(t)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:208:2: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.name, o.email_address, strlen(o.email_address)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --- relay_check_funcs.o --- relay_check_funcs.c: In function 'check_banner': relay_check_funcs.c:119:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_banner, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:110:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_banner, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:101:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_banner, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:92:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_banner, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c: In function 'check_helo': relay_check_funcs.c:143:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->helo, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:183:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_helo, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:174:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_helo, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:165:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_helo, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c: In function 'check_mail_from': relay_check_funcs.c:205:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->mail_from, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:231:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_mail_from, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:258:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_mail_from, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:249:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_mail_from, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:240:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_mail_from, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:224:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_mail_from, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c: In function 'check_rcpt_to': relay_check_funcs.c:280:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->rcpt_to, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:310:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_rcpt_to, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:344:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_rcpt_to, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:335:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_rcpt_to, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:326:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_rcpt_to, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:317:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_rcpt_to, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:303:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_rcpt_to, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c: In function 'check_send_data_start': relay_check_funcs.c:385:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_start, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:412:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_start, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:403:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_start, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:394:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_start, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:378:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_start, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c: In function 'check_send_data': relay_check_funcs.c:488:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_end, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:479:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_end, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:470:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_end, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:461:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_end, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:454:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_end, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:447:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_end, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c: In function 'reset_smtp': relay_check_funcs.c:539:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_reset, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:533:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_reset, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c: In function 'quit_smtp': relay_check_funcs.c:583:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->r_quit, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:577:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->r_quit, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --- freebsd_build --- cc -pipe -O2 -fno-strict-aliasing -c check_mail_file.c connect.c display_screen.c smtprc.c parse_config_files.c parse_mailbox.c scan_engine.c utils.c display_html.c display_text.c options.c relay_check.c smtprc_error.c display_machine.c display_xml.c parse_args.c relay_check_funcs.c usage.c -pthread parse_config_files.c: In function 'get_ip_range': parse_config_files.c:85:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(iprange2, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_config_files.c:188:10: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[hostnames]->ip_address, hostnamet, strlen(hostnamet)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_config_files.c: In function 'parse_config': parse_config_files.c:284:4: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(rules[i]->helo, buf2[0], strlen(buf2[0])); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_config_files.c:289:4: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(rules[i]->mail_from, buf2[1], strlen(buf2[1])); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_config_files.c:294:4: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(rules[i]->rcpt_to, buf2[2], strlen(buf2[2])); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_config_files.c: In function 'get_email_file': parse_config_files.c:544:2: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(temp, o.email, strlen(o.email)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_config_files.c:575:2: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.email, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_mailbox.c: In function 'get_sender_address': parse_mailbox.c:185:4: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(address, word, strlen(word)+2); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_mailbox.c:185:27: note: length computed here strncpy(address, word, strlen(word)+2); ^~~~~~~~~~~~ scan_engine.c: In function 'cleaner_start': scan_engine.c:151:7: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] if((int)o.tid[x]) { ^ scan_engine.c: In function 'thread_start': scan_engine.c:188:9: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] return(int)(NULL); ^ scan_engine.c:227:8: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast] return(int)(NULL); ^ scan_engine.c:201:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->hostname, hostnamer, strlen(hostnamer)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ utils.c: In function 'check_file_path': utils.c:243:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(fn, filename, strlen(filename)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ display_html.c: In function 'escape_html_chars': display_html.c:766:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(s, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~ display_html.c: In function 'display_html': display_html.c:63:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(boo, o.html_file, strlen(o.html_file)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ display_html.c:80:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(failed_file, s, strlen(s)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ display_html.c:76:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(failed_file, o.html_file, strlen(o.html_file)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ options.c: In function 'validate_options': options.c:58:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.html_path, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ options.c:67:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.text_path, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ options.c:76:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.machine_path, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ options.c:85:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.xml_path, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c: In function 'parse_args': parse_args.c:156:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.machine_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:141:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.xml_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:149:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.email_template, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:134:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.html_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:125:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.mailbox, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:118:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.ip_range, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:103:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.machine_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:88:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.generate_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:82:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.auto_config_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:76:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.ip_list, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:67:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.text_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:60:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.mailbox, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:50:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.config_file, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:41:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.email_address, optarg, strlen(optarg)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c: In function 'get_domain': parse_args.c:176:2: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(email, o.email_address, sizeof(email)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:173:13: note: length computed here char email[strlen(o.email_address)+1]; ^~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:205:2: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.domain, t, strlen(t)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ parse_args.c:208:2: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(o.name, o.email_address, strlen(o.email_address)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c: In function 'check_banner': relay_check_funcs.c:119:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_banner, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:110:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_banner, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:101:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_banner, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:92:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_banner, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c: In function 'check_helo': relay_check_funcs.c:143:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->helo, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:183:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_helo, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:174:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_helo, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:165:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_helo, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c: In function 'check_mail_from': relay_check_funcs.c:205:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->mail_from, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:231:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_mail_from, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:258:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_mail_from, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:249:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_mail_from, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:240:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_mail_from, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:224:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_mail_from, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c: In function 'check_rcpt_to': relay_check_funcs.c:280:3: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->rcpt_to, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:310:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_rcpt_to, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:344:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_rcpt_to, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:335:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_rcpt_to, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:326:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_rcpt_to, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:317:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_rcpt_to, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:303:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_rcpt_to, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c: In function 'check_send_data_start': relay_check_funcs.c:385:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_start, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:412:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_start, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:403:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_start, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:394:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_start, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:378:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_start, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c: In function 'check_send_data': relay_check_funcs.c:488:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_end, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:479:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_end, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:470:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_end, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:461:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_end, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:454:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_end, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:447:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_data_end, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c: In function 'reset_smtp': relay_check_funcs.c:539:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_reset, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:533:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->smtp_check[rule]->r_reset, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c: In function 'quit_smtp': relay_check_funcs.c:583:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->r_quit, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ relay_check_funcs.c:577:5: warning: 'strncpy' specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(hosts[cur_host]->r_quit, buf, strlen(buf)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ cc -o smtprc check_mail_file.o connect.o display_screen.o smtprc.o parse_config_files.o parse_mailbox.o scan_engine.o utils.o display_html.o display_text.o options.o relay_check.o smtprc_error.o display_machine.o display_xml.o parse_args.o relay_check_funcs.o usage.o -pthread -------------------------------------------------------------------------------- -- Phase: run-depends -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- -- Phase: stage -------------------------------------------------------------------------------- ===> Staging for smtprc-2.0.3 ===> Generating temporary packing list install -s -m 555 /construction/mail/smtprc/smtprc-2.0.3/smtprc /construction/mail/smtprc/stage/usr/local/bin /bin/mkdir -p /construction/mail/smtprc/stage/usr/local/etc/smtprc install -m 0644 /construction/mail/smtprc/smtprc-2.0.3/auto.conf /construction/mail/smtprc/stage/usr/local/etc/smtprc/auto.conf.sample install -m 0644 /construction/mail/smtprc/smtprc-2.0.3/email.tmpl /construction/mail/smtprc/stage/usr/local/etc/smtprc/email.tmpl.sample install -m 0644 /construction/mail/smtprc/smtprc-2.0.3/rcheck.conf /construction/mail/smtprc/stage/usr/local/etc/smtprc/rcheck.conf.sample install -m 444 /construction/mail/smtprc/smtprc-2.0.3/smtprc.1 /construction/mail/smtprc/stage/usr/local/man/man1 /bin/mkdir -p /construction/mail/smtprc/stage/usr/local/share/doc/smtprc install -m 0644 /construction/mail/smtprc/smtprc-2.0.3/README /construction/mail/smtprc/stage/usr/local/share/doc/smtprc/README ====> Compressing man pages (compress-man) -------------------------------------------------------------------------------- -- Phase: package -------------------------------------------------------------------------------- ===> Building package for smtprc-2.0.3 file sizes/checksums [6]: . done packing files [6]: . done packing directories [0]: . done -------------------------------------------------- -- Termination -------------------------------------------------- Finished: Friday, 8 MAR 2019 at 17:43:26 UTC Duration: 00:00:09