File strongswan_modprobe_syslog.patch of Package strongswan

--- src/starter/klips.c
+++ src/starter/klips.c	2012/10/30 17:07:23
@@ -30,7 +30,7 @@ bool starter_klips_init(void)
 		/* ipsec module makes the pf_key proc interface visible */
 		if (stat(PROC_MODULES, &stb) == 0)
 		{
-			ignore_result(system("modprobe -qv ipsec"));
+			ignore_result(system("modprobe -s ipsec"));
 		}
 
 		/* now test again */
@@ -42,9 +42,9 @@ bool starter_klips_init(void)
 	}
 
 	/* load crypto algorithm modules */
-	ignore_result(system("modprobe -qv ipsec_aes"));
-	ignore_result(system("modprobe -qv ipsec_blowfish"));
-	ignore_result(system("modprobe -qv ipsec_sha2"));
+	ignore_result(system("modprobe -s ipsec_aes"));
+	ignore_result(system("modprobe -s ipsec_blowfish"));
+	ignore_result(system("modprobe -s ipsec_sha2"));
 
 	DBG2(DBG_APP, "found KLIPS IPsec stack");
 	return TRUE;
--- src/starter/netkey.c
+++ src/starter/netkey.c	2012/10/30 17:07:02
@@ -31,7 +31,7 @@ bool starter_netkey_init(void)
 		/* af_key module makes the netkey proc interface visible */
 		if (stat(PROC_MODULES, &stb) == 0)
 		{
-			ignore_result(system("modprobe -qv af_key"));
+			ignore_result(system("modprobe -s af_key"));
 		}
 
 		/* now test again */
@@ -45,11 +45,11 @@ bool starter_netkey_init(void)
 	/* make sure that all required IPsec modules are loaded */
 	if (stat(PROC_MODULES, &stb) == 0)
 	{
-		ignore_result(system("modprobe -qv ah4"));
-		ignore_result(system("modprobe -qv esp4"));
-		ignore_result(system("modprobe -qv ipcomp"));
-		ignore_result(system("modprobe -qv xfrm4_tunnel"));
-		ignore_result(system("modprobe -qv xfrm_user"));
+		ignore_result(system("modprobe -s ah4"));
+		ignore_result(system("modprobe -s esp4"));
+		ignore_result(system("modprobe -s ipcomp"));
+		ignore_result(system("modprobe -s xfrm4_tunnel"));
+		ignore_result(system("modprobe -s xfrm_user"));
 	}
 
 	DBG2(DBG_APP, "found netkey IPsec stack");
openSUSE Build Service is sponsored by