summaryrefslogtreecommitdiffstats
path: root/package/strongswan/patches/320-no-modprobe.patch
blob: d8c3648baff422ec406a091b8d536ac1f7991e44 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
Index: strongswan-2.8.2/programs/starter/klips.c
===================================================================
--- strongswan-2.8.2.orig/programs/starter/klips.c	2007-06-04 13:23:04.544043096 +0200
+++ strongswan-2.8.2/programs/starter/klips.c	2007-06-04 13:23:07.238633456 +0200
@@ -44,7 +44,7 @@
 	    unsetenv("MODPATH");
 	    unsetenv("MODULECONF");
 	    system("depmod -a >/dev/null 2>&1");
-	    system("modprobe -qv ipsec");
+	    system("insmod -qv ipsec");
 	}
 	if (stat(PROC_IPSECVERSION, &stb) == 0)
 	{
@@ -62,11 +62,11 @@
     /* make sure that all available crypto algorithms are loaded */
     if (stat(PROC_MODULES, &stb) == 0)
     {
-	system("modprobe -qv ipsec_aes");
-	system("modprobe -qv ipsec_serpent");
-	system("modprobe -qv ipsec_twofish");
-	system("modprobe -qv ipsec_blowfish");
-	system("modprobe -qv ipsec_sha2");
+	system("insmod -qv ipsec_aes");
+	system("insmod -qv ipsec_serpent");
+	system("insmod -qv ipsec_twofish");
+	system("insmod -qv ipsec_blowfish");
+	system("insmod -qv ipsec_sha2");
     }
 
     starter_klips_clear();
Index: strongswan-2.8.2/programs/starter/netkey.c
===================================================================
--- strongswan-2.8.2.orig/programs/starter/netkey.c	2007-06-04 13:23:04.551042032 +0200
+++ strongswan-2.8.2/programs/starter/netkey.c	2007-06-04 13:23:07.238633456 +0200
@@ -36,7 +36,7 @@
 	/* af_key module makes the netkey proc interface visible */
 	if (stat(PROC_MODULES, &stb) == 0)
 	{
-	    system("modprobe -qv af_key");
+	    system("insmod -qv af_key");
 	}
 
 	/* now test again */
@@ -52,11 +52,11 @@
     /* make sure that all required IPsec modules are loaded */
     if (stat(PROC_MODULES, &stb) == 0)
     {
-	system("modprobe -qv ah4");
-	system("modprobe -qv esp4");
-	system("modprobe -qv ipcomp");
-	system("modprobe -qv xfrm4_tunnel");
-	system("modprobe -qv xfrm_user");
+	system("insmod -qv ah4");
+	system("insmod -qv esp4");
+	system("insmod -qv ipcomp");
+	system("insmod -qv xfrm4_tunnel");
+	system("insmod -qv xfrm_user");
     }
 
     DBG(DBG_CONTROL,
Index: strongswan-2.8.2/programs/_startklips/_startklips.in
===================================================================
--- strongswan-2.8.2.orig/programs/_startklips/_startklips.in	2007-06-04 13:23:04.560040664 +0200
+++ strongswan-2.8.2/programs/_startklips/_startklips.in	2007-06-04 13:23:07.238633456 +0200
@@ -249,7 +249,7 @@
 
 if test ! -f $ipsecversion && test ! -f $netkey
 then
-	modprobe -v af_key
+	insmod -v af_key
 fi
 
 if test -f $netkey
@@ -257,11 +257,11 @@
 	klips=false
 	if test -f $modules
 	then
-		modprobe -qv ah4
-		modprobe -qv esp4
-		modprobe -qv ipcomp
-		modprobe -qv xfrm4_tunnel
-		modprobe -qv xfrm_user
+		insmod -qv ah4
+		insmod -qv esp4
+		insmod -qv ipcomp
+		insmod -qv xfrm4_tunnel
+		insmod -qv xfrm_user
 	fi
 fi
 
@@ -272,7 +272,7 @@
                 setmodule
                 unset MODPATH MODULECONF        # no user overrides!
                 depmod -a >/dev/null 2>&1
-                modprobe -v ipsec
+                insmod -v ipsec
         fi
         if test ! -f $ipsecversion
         then
@@ -288,7 +288,7 @@
 	do
 		if test -f $moduleinstplace/alg/ipsec_$alg.o
 		then
-			modprobe ipsec_$alg
+			insmod ipsec_$alg
 		fi
 	done
 fi