Blame SOURCES/openssl-mingw64-dont-use-secure-getenv.patch

e62613
diff --git a/crypto/asn1/a_verify.c b/crypto/asn1/a_verify.c
e62613
index 23271be..f57ca72 100644
e62613
--- a/crypto/asn1/a_verify.c
e62613
+++ b/crypto/asn1/a_verify.c
e62613
@@ -143,7 +143,7 @@ static int is_md_legacy_disallowed(int mdnid)
e62613
 {
e62613
     int i;
e62613
 
e62613
-    if (mdnid == NID_md5 && secure_getenv("OPENSSL_ENABLE_MD5_VERIFY") != NULL)
e62613
+    if (mdnid == NID_md5 && getenv("OPENSSL_ENABLE_MD5_VERIFY") != NULL)
e62613
         return 0;
e62613
 
e62613
     for (i = 0; legacy_mds[i] != 0; ++i) {
e62613
diff --git a/ssl/ssl_ciph.c b/ssl/ssl_ciph.c
e62613
index 732804f..8f845f7 100644
e62613
--- a/ssl/ssl_ciph.c
e62613
+++ b/ssl/ssl_ciph.c
e62613
@@ -486,7 +486,7 @@ static void load_builtin_compressions(void)
e62613
             MemCheck_off();
e62613
             ssl_comp_methods = sk_SSL_COMP_new(sk_comp_cmp);
e62613
             if (ssl_comp_methods != NULL
e62613
-                && secure_getenv("OPENSSL_DEFAULT_ZLIB") != NULL) {
e62613
+                && getenv("OPENSSL_DEFAULT_ZLIB") != NULL) {
e62613
                 comp = (SSL_COMP *)OPENSSL_malloc(sizeof(SSL_COMP));
e62613
                 if (comp != NULL) {
e62613
                     comp->method = COMP_zlib();