summaryrefslogtreecommitdiffstats
path: root/apps/req.c
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2018-06-06 09:51:12 +0100
committerMatt Caswell <matt@openssl.org>2018-06-07 09:41:50 +0100
commitac52f42aca9fe0933f7564581268ac50c826bd39 (patch)
treeb23c34b7cd5f30032b0ed9e650e3cfb9a9fc2077 /apps/req.c
parent316d527ff9b6597105df399fc222ea328cd827bf (diff)
Fix no-dsa
Broken by 0336df2fa. Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/6427)
Diffstat (limited to 'apps/req.c')
-rw-r--r--apps/req.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/apps/req.c b/apps/req.c
index 59baa89bcf..7e7b994f0d 100644
--- a/apps/req.c
+++ b/apps/req.c
@@ -523,11 +523,13 @@ int req_main(int argc, char **argv)
" Your key size is %ld! Larger key size may behave not as expected.\n",
OPENSSL_RSA_MAX_MODULUS_BITS, newkey);
+#ifndef OPENSSL_NO_DSA
if (pkey_type == EVP_PKEY_DSA && newkey > OPENSSL_DSA_MAX_MODULUS_BITS)
BIO_printf(bio_err,
"Warning: It is not recommended to use more than %d bit for DSA keys.\n"
" Your key size is %ld! Larger key size may behave not as expected.\n",
OPENSSL_DSA_MAX_MODULUS_BITS, newkey);
+#endif
if (genctx == NULL) {
genctx = set_keygen_ctx(NULL, &pkey_type, &newkey,