Drop dh->q in bssl_shim when -use-sparse-dh-prime is passed. Otherwise it still thinks this is an RFC 5114 prime and kicks in the (now incorrect) validity check. Change-Id: Ie78514211927f1f2d2549958621cb7896f68b5ce Reviewed-on: https://boringssl-review.googlesource.com/7050 Reviewed-by: Adam Langley <agl@google.com>
diff --git a/ssl/test/bssl_shim.cc b/ssl/test/bssl_shim.cc index 74674a4..dde25b4 100644 --- a/ssl/test/bssl_shim.cc +++ b/ssl/test/bssl_shim.cc
@@ -747,6 +747,8 @@ !BN_set_word(dh->g, 2)) { return nullptr; } + BN_free(dh->q); + dh->q = NULL; dh->priv_length = 0; }