# s390x hwe
0001-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch
0002-s390x-assembly-pack-add-OPENSSL_s390xcap-man-page.patch
0003-s390x-assembly-pack-perlasm-support.patch
0004-crypto-chacha-asm-chacha-s390x.pl-add-vx-code-path.patch
0005-crypto-poly1305-asm-poly1305-s390x.pl-add-vx-code-pa.patch
0006-s390x-assembly-pack-fix-formal-interface-bug-in-chac.patch
0007-s390x-assembly-pack-import-chacha-from-cryptogams-re.patch
0008-s390x-assembly-pack-import-poly-from-cryptogams-repo.patch
0009-s390x-assembly-pack-allow-alignment-hints-for-vector.patch
0010-s390x-assembly-pack-update-perlasm-module.patch
0011-s390x-assembly-pack-remove-chacha20-dependency-on-no.patch
0012-s390x-assembly-pack-remove-poly1305-dependency-on-no.patch
0013-fix-strict-warnings-build.patch
0014-s390x-assembly-pack-add-support-for-pcc-and-kma-inst.patch
0015-Place-return-values-after-examples-in-doc.patch
0016-s390x-assembly-pack-update-OPENSSL_s390xcap-3.patch
0017-s390xcpuid.pl-fix-comment.patch
0018-s390x-assembly-pack-accelerate-scalar-multiplication.patch
0019-Enable-curve-spefific-ECDSA-implementations-via-EC_M.patch
0020-s390x-assembly-pack-accelerate-ECDSA.patch
0021-OPENSSL_s390xcap.pod-list-msa9-facility-bit-155.patch
0022-s390x-assembly-pack-fix-msa3-stfle-bit-detection.patch
0023-s390x-assembly-pack-fix-OPENSSL_s390xcap-z15-cpu-mas.patch
0024-s390x-assembly-pack-accelerate-X25519-X448-Ed25519-a.patch
0025-Add-self-generated-test-vector-for-x448-non-canonica.patch
# Debian patches
debian-targets.patch
man-section.patch
no-symbolic.patch
pic.patch
# Remove Set-systemwide-default-settings-for-libssl-users.patch, this is done differently

# Ubuntu patches
tests-use-seclevel-1.patch
tls1.2-min-seclevel2.patch
CVE-2020-1967-1.patch
CVE-2020-1967-2.patch
CVE-2020-1967-3.patch
CVE-2020-1967-4.patch
CVE-2020-1971-1.patch
CVE-2020-1971-2.patch
CVE-2020-1971-3.patch
CVE-2020-1971-4.patch
CVE-2020-1971-5.patch
CVE-2020-1971-6.patch
CVE-2021-23840.patch
CVE-2021-23841.patch
CVE-2021-3449-1.patch
CVE-2021-3449-2.patch
CVE-2021-3449-3.patch
CVE-2021-3449-4.patch
lp-1926254-1-Allow-certificates-with-Basic-Constraints-CA-fa.patch
lp-1926254-2-Set-X509_V_ERR_INVALID_EXTENSION-error-for-inva.patch
lp-1926254-3-Add-test-cases-for-the-non-CA-certificate-with-.patch
lp1931994-s390x-evp-init-fix.patch
CVE-2021-3711-1.patch
CVE-2021-3711-2.patch
CVE-2021-3711-3.patch
CVE-2021-3712.patch
CVE-2021-3712-2.patch
CVE-2021-3712-3.patch
CVE-2021-3712-4.patch
CVE-2021-3712-5.patch
CVE-2021-3712-6.patch
CVE-2021-3712-7.patch
CVE-2021-3712-8.patch
CVE-2021-3712-9.patch
CVE-2021-3712-10.patch
CVE-2021-3712-11.patch
CVE-2021-3712-12.patch
CVE-2021-3712-13.patch
CVE-2021-3712-14.patch
lp-1940656-1-srp-fix-double-free.patch
lp-1940656-2-ts-fix-double-free-on-error-path.patch
lp-1940656-3-engine-fix-double-free-on-error-path.patch
lp-1940656-4-Prevent-use-after-free-of-global_engine_lock.patch
double-engine-load.patch
more-testing-dgst.patch
double-engine-load-test.patch
lp-1960863-crypto-poly1305-asm-fix-armv8-pointer-authenticat.patch
CVE-2022-0778-1.patch
CVE-2022-0778-2.patch
CVE-2022-0778-3.patch

lp1978093/0001-Update-expired-SCT-certificates.patch
lp1978093/0002-ct_test.c-Update-the-epoch-time.patch
lp1978093/0003-Update-further-expiring-certificates-that-affect-tes.patch

lp1947588.patch

CVE-2022-1292.patch
CVE-2022-2068.patch
c_rehash-compat.patch

CVE-2022-2097-1.patch
CVE-2022-2097-2.patch
CVE-2022-4450-1.patch
CVE-2022-4450-2.patch
CVE-2023-0215-1.patch
CVE-2023-0215-2.patch
CVE-2023-0286.patch
CVE-2023-0464-1.patch
CVE-2023-0464-2.patch
CVE-2023-0464-3.patch
CVE-2023-0465-1.patch
CVE-2023-0465-2.patch
CVE-2023-0465-3.patch
CVE-2023-0466.patch
CVE-2022-4304-1.patch
CVE-2022-4304-2.patch
CVE-2023-2650.patch
CVE-2023-3446.patch
CVE-2023-3817.patch
CVE-2023-5678.patch
CVE-2024-0727.patch
openssl-1.1.1-pkcs1-implicit-rejection.patch
CVE-2024-2511.patch
CVE-2024-4741.patch
CVE-2024-5535.patch
CVE-2024-9143.patch
CVE-2024-13176.patch
