=> Bootstrap dependency digest>=20211023: found digest-20220214 ===> Skipping vulnerability checks. WARNING: No /usr/pkg/pkgdb/pkg-vulnerabilities file found. WARNING: To fix run: `/usr/sbin/pkg_admin -K /usr/pkg/pkgdb fetch-pkg-vulnerabilities'. ===> Building for bnc-2.9.4nb7 --- sbuf.o --- --- bnc.o --- --- conf.o --- --- sbuf.o --- gcc -O2 -mieee -I/usr/include -include config.h -c sbuf.c --- bnc.o --- gcc -O2 -mieee -I/usr/include -include config.h -c bnc.c --- conf.o --- gcc -O2 -mieee -I/usr/include -include config.h -c conf.c --- cmds.o --- gcc -O2 -mieee -I/usr/include -include config.h -c cmds.c --- ctcp.o --- gcc -O2 -mieee -I/usr/include -include config.h -c ctcp.c --- server.o --- gcc -O2 -mieee -I/usr/include -include config.h -c server.c --- send.o --- gcc -O2 -mieee -I/usr/include -include config.h -c send.c --- server.o --- server.c: In function 'send_queued': server.c:406:34: warning: passing argument 2 of 'sbuf_pagemap' from incompatible pointer type [-Wincompatible-pointer-types] msg = sbuf_pagemap(&ls->sendq, &length); ^ In file included from server.c:36:0: sbuf.h:33:7: note: expected 'size_t * {aka long unsigned int *}' but argument is of type 'int *' void *sbuf_pagemap(struct sbuf *record, size_t *length); ^~~~~~~~~~~~ server.c: In function 'dccsend': server.c:1123:29: warning: passing argument 2 of 'sbuf_pagemap' from incompatible pointer type [-Wincompatible-pointer-types] msg = sbuf_pagemap(sendq, &length); ^ In file included from server.c:36:0: sbuf.h:33:7: note: expected 'size_t * {aka long unsigned int *}' but argument is of type 'int *' void *sbuf_pagemap(struct sbuf *record, size_t *length); ^~~~~~~~~~~~ --- mkpasswd --- gcc -O2 -mieee -I/usr/include -include config.h -o mkpasswd mkpasswd.c -lssl -lresolv -lgnumalloc -lcrypt -lssl -lcrypto -L/usr/lib -Wl,-R/usr/lib -Wl,-R/usr/pkg/lib --- bnc --- gcc -o bnc bnc.o conf.o server.o cmds.o ctcp.o sbuf.o send.o -lssl -lresolv -lgnumalloc -lcrypt -lssl -lcrypto -L/usr/lib -Wl,-R/usr/lib -Wl,-R/usr/pkg/lib