forked from pool/strongswan
cf104ead60
Copy from network:vpn/strongswan based on submit request 33800 from user mtomaschewski OBS-URL: https://build.opensuse.org/request/show/33800 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/strongswan?expand=0&rev=19
53 lines
1.8 KiB
Diff
53 lines
1.8 KiB
Diff
--- src/starter/klips.c
|
|
+++ src/starter/klips.c 2010/03/02 16:43:05
|
|
@@ -34,7 +34,7 @@ starter_klips_init(void)
|
|
/* ipsec module makes the pf_key proc interface visible */
|
|
if (stat(PROC_MODULES, &stb) == 0)
|
|
{
|
|
- ignore_result(system("modprobe -qv ipsec"));
|
|
+ ignore_result(system("modprobe -s ipsec"));
|
|
}
|
|
|
|
/* now test again */
|
|
@@ -48,9 +48,9 @@ starter_klips_init(void)
|
|
}
|
|
|
|
/* load crypto algorithm modules */
|
|
- ignore_result(system("modprobe -qv ipsec_aes"));
|
|
- ignore_result(system("modprobe -qv ipsec_blowfish"));
|
|
- ignore_result(system("modprobe -qv ipsec_sha2"));
|
|
+ ignore_result(system("modprobe -s ipsec_aes"));
|
|
+ ignore_result(system("modprobe -s ipsec_blowfish"));
|
|
+ ignore_result(system("modprobe -s ipsec_sha2"));
|
|
|
|
DBG(DBG_CONTROL,
|
|
DBG_log("Found KLIPS IPsec stack")
|
|
--- src/starter/netkey.c
|
|
+++ src/starter/netkey.c 2010/03/02 16:43:05
|
|
@@ -34,7 +34,7 @@ starter_netkey_init(void)
|
|
/* af_key module makes the netkey proc interface visible */
|
|
if (stat(PROC_MODULES, &stb) == 0)
|
|
{
|
|
- ignore_result(system("modprobe -qv af_key"));
|
|
+ ignore_result(system("modprobe -s af_key"));
|
|
}
|
|
|
|
/* now test again */
|
|
@@ -50,11 +50,11 @@ starter_netkey_init(void)
|
|
/* make sure that all required IPsec modules are loaded */
|
|
if (stat(PROC_MODULES, &stb) == 0)
|
|
{
|
|
- ignore_result(system("modprobe -qv ah4"));
|
|
- ignore_result(system("modprobe -qv esp4"));
|
|
- ignore_result(system("modprobe -qv ipcomp"));
|
|
- ignore_result(system("modprobe -qv xfrm4_tunnel"));
|
|
- ignore_result(system("modprobe -qv xfrm_user"));
|
|
+ ignore_result(system("modprobe -s ah4"));
|
|
+ ignore_result(system("modprobe -s esp4"));
|
|
+ ignore_result(system("modprobe -s ipcomp"));
|
|
+ ignore_result(system("modprobe -s xfrm4_tunnel"));
|
|
+ ignore_result(system("modprobe -s xfrm_user"));
|
|
}
|
|
|
|
DBG(DBG_CONTROL,
|