The source project of this merge request has been removed.
Avoid integer overflows during memory allocation.
It is possible to overflow integers during memory allocation with insanely large "key bytes" specified in a LUKS header.
Although it could be argued to properly validate LUKS headers while parsing them, it's still a good idea to fix any form of possible overflow attacks against cryptsetup in these allocation functions.