# x86_64 cet hwe
lp-1927161-1-x86-Add-endbranch-to-indirect-branch-targets-fo.patch
lp-1927161-2-Use-swapcontext-for-Intel-CET.patch
lp-1927161-3-x86-Always-generate-note-gnu-property-section-f.patch
lp-1927161-4-x86_64-Always-generate-note-gnu-property-sectio.patch
lp-1927161-5-x86_64-Add-endbranch-at-function-entries-for-In.patch
# s390x hwe
0001-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch
0002-s390x-assembly-pack-add-OPENSSL_s390xcap-man-page.patch
0003-s390x-assembly-pack-perlasm-support.patch
0004-crypto-chacha-asm-chacha-s390x.pl-add-vx-code-path.patch
0005-crypto-poly1305-asm-poly1305-s390x.pl-add-vx-code-pa.patch
0006-s390x-assembly-pack-fix-formal-interface-bug-in-chac.patch
0007-s390x-assembly-pack-import-chacha-from-cryptogams-re.patch
0008-s390x-assembly-pack-import-poly-from-cryptogams-repo.patch
0009-s390x-assembly-pack-allow-alignment-hints-for-vector.patch
0010-s390x-assembly-pack-update-perlasm-module.patch
0011-s390x-assembly-pack-remove-chacha20-dependency-on-no.patch
0012-s390x-assembly-pack-remove-poly1305-dependency-on-no.patch
0013-fix-strict-warnings-build.patch
0014-s390x-assembly-pack-add-support-for-pcc-and-kma-inst.patch
0015-Place-return-values-after-examples-in-doc.patch
0016-s390x-assembly-pack-update-OPENSSL_s390xcap-3.patch
0017-s390xcpuid.pl-fix-comment.patch
0018-s390x-assembly-pack-accelerate-scalar-multiplication.patch
0019-Enable-curve-spefific-ECDSA-implementations-via-EC_M.patch
0020-s390x-assembly-pack-accelerate-ECDSA.patch
0021-OPENSSL_s390xcap.pod-list-msa9-facility-bit-155.patch
0022-s390x-assembly-pack-fix-msa3-stfle-bit-detection.patch
0023-s390x-assembly-pack-fix-OPENSSL_s390xcap-z15-cpu-mas.patch
0024-s390x-assembly-pack-accelerate-X25519-X448-Ed25519-a.patch
0025-Add-self-generated-test-vector-for-x448-non-canonica.patch
# Debian patches
debian-targets.patch
man-section.patch
no-symbolic.patch
pic.patch
c_rehash-compat.patch
# Remove Set-systemwide-default-settings-for-libssl-users.patch, this is done differently
# Ubuntu patches
tests-use-seclevel-1.patch
tls1.2-min-seclevel2.patch
skip-tls-1.1-tests-for-ubuntu.patch

CVE-2023-5678.patch
CVE-2024-0727.patch
openssl-1.1.1-pkcs1-implicit-rejection.patch
CVE-2024-2511.patch
CVE-2024-4741.patch
CVE-2024-5535.patch
CVE-2024-9143.patch
CVE-2024-13176.patch
CVE-2025-9230.patch
CVE-2025-68160.patch
CVE-2025-69418.patch
CVE-2025-69419.patch
CVE-2025-69420.patch
CVE-2025-69421.patch
CVE-2026-2279x.patch
CVE-2026-28387.patch
CVE-2026-28388-1.patch
CVE-2026-28388-2.patch
CVE-2026-28389.patch
CVE-2026-28390.patch
