mirror of
https://gitlab.com/cryptsetup/cryptsetup.git
synced 2025-12-12 03:10:08 +01:00
While adding new unbound key there is a check whether the passed key parameter matches current volume key or not. If it matches the existing volume key we handle the LUKS2 keyslot addition as an ordinary LUKS2 keyslot (not unbound). If the check failed we continued with the operation of adding LUKS2 unbound keyslot. But we did not check if the error was not a more general issue for example with in-memory metadata. Let's contine with the operation only if the return code is expected -EPERM (not matching digest) or -ENOENT (not matching any existing unbound key).
206 KiB
206 KiB