summaryrefslogtreecommitdiff
path: root/package/strongswan/patches/320-no-modprobe.patch
blob: cbd720a6a33f6e44bde7c9845d077a04b2895a41 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
diff -ruN strongswan-2.8.1-orig/programs/starter/klips.c strongswan-2.8.1/programs/starter/klips.c
--- strongswan-2.8.1-orig/programs/starter/klips.c	2006-02-15 13:33:57.000000000 -0500
+++ strongswan-2.8.1/programs/starter/klips.c	2007-01-16 23:57:19.107972109 -0500
@@ -44,7 +44,7 @@
 	    unsetenv("MODPATH");
 	    unsetenv("MODULECONF");
 	    system("depmod -a >/dev/null 2>&1");
-	    system("modprobe -qv ipsec");
+	    system("insmod -qv ipsec");
 	}
 	if (stat(PROC_IPSECVERSION, &stb) == 0)
 	{
@@ -62,11 +62,11 @@
     /* make sure that all available crypto algorithms are loaded */
     if (stat(PROC_MODULES, &stb) == 0)
     {
-	system("modprobe -qv ipsec_aes");
-	system("modprobe -qv ipsec_serpent");
-	system("modprobe -qv ipsec_twofish");
-	system("modprobe -qv ipsec_blowfish");
-	system("modprobe -qv ipsec_sha2");
+	system("insmod -qv ipsec_aes");
+	system("insmod -qv ipsec_serpent");
+	system("insmod -qv ipsec_twofish");
+	system("insmod -qv ipsec_blowfish");
+	system("insmod -qv ipsec_sha2");
     }
 
     starter_klips_clear();
diff -ruN strongswan-2.8.1-orig/programs/starter/netkey.c strongswan-2.8.1/programs/starter/netkey.c
--- strongswan-2.8.1-orig/programs/starter/netkey.c	2006-02-15 13:33:57.000000000 -0500
+++ strongswan-2.8.1/programs/starter/netkey.c	2007-01-16 23:57:28.094204186 -0500
@@ -36,7 +36,7 @@
 	/* af_key module makes the netkey proc interface visible */
 	if (stat(PROC_MODULES, &stb) == 0)
 	{
-	    system("modprobe -qv af_key");
+	    system("insmod -qv af_key");
 	}
 
 	/* now test again */
@@ -52,11 +52,11 @@
     /* make sure that all required IPsec modules are loaded */
     if (stat(PROC_MODULES, &stb) == 0)
     {
-	system("modprobe -qv ah4");
-	system("modprobe -qv esp4");
-	system("modprobe -qv ipcomp");
-	system("modprobe -qv xfrm4_tunnel");
-	system("modprobe -qv xfrm_user");
+	system("insmod -qv ah4");
+	system("insmod -qv esp4");
+	system("insmod -qv ipcomp");
+	system("insmod -qv xfrm4_tunnel");
+	system("insmod -qv xfrm_user");
     }
 
     DBG(DBG_CONTROL,
diff -ruN strongswan-2.8.1-orig/programs/_startklips/_startklips.in strongswan-2.8.1/programs/_startklips/_startklips.in
--- strongswan-2.8.1-orig/programs/_startklips/_startklips.in	2005-05-06 18:11:33.000000000 -0400
+++ strongswan-2.8.1/programs/_startklips/_startklips.in	2007-01-17 00:04:11.189627735 -0500
@@ -249,7 +249,7 @@
 
 if test ! -f $ipsecversion && test ! -f $netkey
 then
-	modprobe -v af_key
+	insmod -v af_key
 fi
 
 if test -f $netkey
@@ -257,11 +257,11 @@
 	klips=false
 	if test -f $modules
 	then
-		modprobe -qv ah4
-		modprobe -qv esp4
-		modprobe -qv ipcomp
-		modprobe -qv xfrm4_tunnel
-		modprobe -qv xfrm_user
+		insmod -qv ah4
+		insmod -qv esp4
+		insmod -qv ipcomp
+		insmod -qv xfrm4_tunnel
+		insmod -qv xfrm_user
 	fi
 fi
 
@@ -272,7 +272,7 @@
                 setmodule
                 unset MODPATH MODULECONF        # no user overrides!
                 depmod -a >/dev/null 2>&1
-                modprobe -v ipsec
+                insmod -v ipsec
         fi
         if test ! -f $ipsecversion
         then
@@ -288,7 +288,7 @@
 	do
 		if test -f $moduleinstplace/alg/ipsec_$alg.o
 		then
-			modprobe ipsec_$alg
+			insmod ipsec_$alg
 		fi
 	done
 fi