# x86_64 cet hwe
lp-1927161-1-x86-Add-endbranch-to-indirect-branch-targets-fo.patch
lp-1927161-2-Use-swapcontext-for-Intel-CET.patch
lp-1927161-3-x86-Always-generate-note-gnu-property-section-f.patch
lp-1927161-4-x86_64-Always-generate-note-gnu-property-sectio.patch
lp-1927161-5-x86_64-Add-endbranch-at-function-entries-for-In.patch
# s390x hwe
0001-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch
0002-s390x-assembly-pack-add-OPENSSL_s390xcap-man-page.patch
0003-s390x-assembly-pack-perlasm-support.patch
0004-crypto-chacha-asm-chacha-s390x.pl-add-vx-code-path.patch
0005-crypto-poly1305-asm-poly1305-s390x.pl-add-vx-code-pa.patch
0006-s390x-assembly-pack-fix-formal-interface-bug-in-chac.patch
0007-s390x-assembly-pack-import-chacha-from-cryptogams-re.patch
0008-s390x-assembly-pack-import-poly-from-cryptogams-repo.patch
0009-s390x-assembly-pack-allow-alignment-hints-for-vector.patch
0010-s390x-assembly-pack-update-perlasm-module.patch
0011-s390x-assembly-pack-remove-chacha20-dependency-on-no.patch
0012-s390x-assembly-pack-remove-poly1305-dependency-on-no.patch
0013-fix-strict-warnings-build.patch
0014-s390x-assembly-pack-add-support-for-pcc-and-kma-inst.patch
0015-Place-return-values-after-examples-in-doc.patch
0016-s390x-assembly-pack-update-OPENSSL_s390xcap-3.patch
0017-s390xcpuid.pl-fix-comment.patch
0018-s390x-assembly-pack-accelerate-scalar-multiplication.patch
0019-Enable-curve-spefific-ECDSA-implementations-via-EC_M.patch
0020-s390x-assembly-pack-accelerate-ECDSA.patch
0021-OPENSSL_s390xcap.pod-list-msa9-facility-bit-155.patch
0022-s390x-assembly-pack-fix-msa3-stfle-bit-detection.patch
0023-s390x-assembly-pack-fix-OPENSSL_s390xcap-z15-cpu-mas.patch
0024-s390x-assembly-pack-accelerate-X25519-X448-Ed25519-a.patch
0025-Add-self-generated-test-vector-for-x448-non-canonica.patch
# Debian patches
debian-targets.patch
man-section.patch
no-symbolic.patch
pic.patch
c_rehash-compat.patch
# Remove Set-systemwide-default-settings-for-libssl-users.patch, this is done differently

# Ubuntu patches
tests-use-seclevel-1.patch
tls1.2-min-seclevel2.patch
CVE-2020-1967-1.patch
CVE-2020-1967-2.patch
CVE-2020-1967-3.patch
CVE-2020-1967-4.patch
# Upstream cherry-picks
11767.patch
# Fix RNG
9cc834d966ea5afc38fb829bfe498aed4c5d498d.patch
0d011f540400b425aba1c3e59624ad9dbabe83cb.patch
53eb05bdf00d7237e3b12976c2ac38d68206eb13.patch
e6a80cbad28ee748830815634917efe96948f2f3.patch
CVE-2020-1971-1.patch
CVE-2020-1971-2.patch
CVE-2020-1971-3.patch
CVE-2020-1971-4.patch
CVE-2020-1971-5.patch
CVE-2020-1971-6.patch
CVE-2021-23840.patch
CVE-2021-23841.patch
CVE-2021-3449-1.patch
CVE-2021-3449-2.patch
CVE-2021-3449-3.patch
CVE-2021-3449-4.patch
lp-1926254-1-Allow-certificates-with-Basic-Constraints-CA-fa.patch
lp-1926254-2-Set-X509_V_ERR_INVALID_EXTENSION-error-for-inva.patch
lp-1926254-3-Add-test-cases-for-the-non-CA-certificate-with-.patch
