--- Molle Bestefich <molle.bestefich@xxxxxxxxx> wrote: > Use loop-aes, it's absolutely fabulous. > > It works great with 2.4 as well as 2.6. > > Instructions here. > http://loop-aes.sourceforge.net/loop-AES.README > Thanks for the suggestion. Now I've the following two issues: 1. The target device is fat filesystem formatted. The target kernel image do not contain the fat filesystem module. The target device [ i.e. /dev/md0 ] is mounted by the host through USB interface. Hence, in this case the host's fat filesystem code is used. Will loop-aes work in this situation. 2. We were asked to use blow_fish algorithm instead. So, how to go about it, are there any modules like loop-aes or should I consider the hooks raid5_make_request and raid5_end_read_request for encryption and decryption Please suggest a solution. Regards Chaitanya.. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com - To unsubscribe from this list: send the line "unsubscribe linux-raid" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html