diff options
author | Matt Caswell <matt@openssl.org> | 2018-06-06 09:51:12 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2018-06-07 09:41:50 +0100 |
commit | ac52f42aca9fe0933f7564581268ac50c826bd39 (patch) | |
tree | b23c34b7cd5f30032b0ed9e650e3cfb9a9fc2077 /apps/req.c | |
parent | 316d527ff9b6597105df399fc222ea328cd827bf (diff) |
Fix no-dsa
Broken by 0336df2fa.
Reviewed-by: Tim Hudson <tjh@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6427)
Diffstat (limited to 'apps/req.c')
-rw-r--r-- | apps/req.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/apps/req.c b/apps/req.c index 59baa89bcf..7e7b994f0d 100644 --- a/apps/req.c +++ b/apps/req.c @@ -523,11 +523,13 @@ int req_main(int argc, char **argv) " Your key size is %ld! Larger key size may behave not as expected.\n", OPENSSL_RSA_MAX_MODULUS_BITS, newkey); +#ifndef OPENSSL_NO_DSA if (pkey_type == EVP_PKEY_DSA && newkey > OPENSSL_DSA_MAX_MODULUS_BITS) BIO_printf(bio_err, "Warning: It is not recommended to use more than %d bit for DSA keys.\n" " Your key size is %ld! Larger key size may behave not as expected.\n", OPENSSL_DSA_MAX_MODULUS_BITS, newkey); +#endif if (genctx == NULL) { genctx = set_keygen_ctx(NULL, &pkey_type, &newkey, |