Kernel crypto patches (including Blowfish support)
--------------------------------------------------
How to use:
  - patch the kernel and mount

  - recompile both (/usr/include/linux MUST be from
    the patched kernel in order to compile mount!)

  - use it (without reboot when using modules :-))

changes from initial version:
  - modularized loop encryptions

  - added kerneld support

  - added Blowfish support

  - made mount and losetup a lot more secure (mlockall() & 
    overwrite passwords)

  - made it possible to read passwords from pipes

When you patch your kernel and compile the things as modules (and
you don't have loop support compiled into your running kernel), you
don't need to reboot to use the crypto patches.  Simply insert the
modules and use the patched mount.


9-23-1998: finished first Blowfish supporting version

fixed bugs and changes:
9-24-1998
  - mount uses permutation for blowfish for better results of
    splitting key (a^n mod m method on pass phrase bits)

9-25-1998
  - 2.0.36pre12 version

9-26-1998
  - compilation problems on Alpha (hopefully fixed)

  - in monolithic kernel: loop_xor_init was called twice instead
    of once _xor_ and once _des_ (resulting in DES not being usable)

9-28-1998
  - removed printks used for testing
  
  - re-arranged some #defines to make standalone compilation possible
    again
