Fix no-dsa
authorMatt Caswell <matt@openssl.org>
Wed, 6 Jun 2018 08:51:12 +0000 (09:51 +0100)
committerMatt Caswell <matt@openssl.org>
Thu, 7 Jun 2018 08:41:50 +0000 (09:41 +0100)
Broken by 0336df2fa.

Reviewed-by: Tim Hudson <tjh@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6427)

apps/req.c

index 59baa89bcf16cfb232b81e45f9975a148ee01892..7e7b994f0d4f1ad2d38eec491e70f9084e743acd 100644 (file)
@@ -523,11 +523,13 @@ int req_main(int argc, char **argv)
                        "         Your key size is %ld! Larger key size may behave not as expected.\n",
                        OPENSSL_RSA_MAX_MODULUS_BITS, newkey);
 
+#ifndef OPENSSL_NO_DSA
         if (pkey_type == EVP_PKEY_DSA && newkey > OPENSSL_DSA_MAX_MODULUS_BITS)
             BIO_printf(bio_err,
                        "Warning: It is not recommended to use more than %d bit for DSA keys.\n"
                        "         Your key size is %ld! Larger key size may behave not as expected.\n",
                        OPENSSL_DSA_MAX_MODULUS_BITS, newkey);
+#endif
 
         if (genctx == NULL) {
             genctx = set_keygen_ctx(NULL, &pkey_type, &newkey,