Skip to content

Commit 4cc393a

Browse files
committed
OXT-389: use a bigger RSA certificate to match the bigger key
Signed-off-by: Jed <lejosnej@ainfosec.com>
1 parent ec585b1 commit 4cc393a

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

part2/stages/Set-password

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -131,13 +131,14 @@ else
131131
exit ${Abort}
132132
fi
133133

134+
dialog --infobox "Generating RSA keys, please wait..." 3 40
134135
if [ "${PLAIN_TEXT_PASSWORD}" ] ; then
135136

136137
# Generate recovery public/private key using plain text password
137138
# as a passphrase.
138139
echo -n "${PLAIN_TEXT_PASSWORD}" | \
139140
openssl genrsa -des3 -out "${RECOVERY_PRIVATE_KEY_CONF}" \
140-
-passout stdin 2048 || \
141+
-passout stdin 8192 || \
141142
exit ${Abort}
142143

143144
echo -n "${PLAIN_TEXT_PASSWORD}" | \
@@ -148,7 +149,7 @@ else
148149
elif [ "${DEFER_PASSWORD}" = "true" ] ; then
149150

150151
# Generate recovery public/private key without a passphrase.
151-
openssl genrsa -out "${RECOVERY_PRIVATE_KEY_CONF}" 2048 || \
152+
openssl genrsa -out "${RECOVERY_PRIVATE_KEY_CONF}" 8192 || \
152153
exit ${Abort}
153154

154155
openssl rsa -pubout -out "${RECOVERY_PUBLIC_KEY_CONF}" \

0 commit comments

Comments
 (0)