From: Matt Caswell Date: Wed, 6 Jun 2018 08:51:12 +0000 (+0100) Subject: Fix no-dsa X-Git-Tag: OpenSSL_1_1_1-pre8~67 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=ac52f42aca9fe0933f7564581268ac50c826bd39;p=openssl Fix no-dsa Broken by 0336df2fa. Reviewed-by: Tim Hudson (Merged from https://github.com/openssl/openssl/pull/6427) --- diff --git a/apps/req.c b/apps/req.c index 59baa89bcf..7e7b994f0d 100644 --- a/apps/req.c +++ b/apps/req.c @@ -523,11 +523,13 @@ int req_main(int argc, char **argv) " Your key size is %ld! Larger key size may behave not as expected.\n", OPENSSL_RSA_MAX_MODULUS_BITS, newkey); +#ifndef OPENSSL_NO_DSA if (pkey_type == EVP_PKEY_DSA && newkey > OPENSSL_DSA_MAX_MODULUS_BITS) BIO_printf(bio_err, "Warning: It is not recommended to use more than %d bit for DSA keys.\n" " Your key size is %ld! Larger key size may behave not as expected.\n", OPENSSL_DSA_MAX_MODULUS_BITS, newkey); +#endif if (genctx == NULL) { genctx = set_keygen_ctx(NULL, &pkey_type, &newkey,