# x86_64 cet hwe
lp-1927161-1-x86-Add-endbranch-to-indirect-branch-targets-fo.patch
lp-1927161-2-Use-swapcontext-for-Intel-CET.patch
lp-1927161-3-x86-Always-generate-note-gnu-property-section-f.patch
lp-1927161-4-x86_64-Always-generate-note-gnu-property-sectio.patch
lp-1927161-5-x86_64-Add-endbranch-at-function-entries-for-In.patch
# s390x hwe
0001-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch
0002-s390x-assembly-pack-add-OPENSSL_s390xcap-man-page.patch
0003-s390x-assembly-pack-perlasm-support.patch
0004-crypto-chacha-asm-chacha-s390x.pl-add-vx-code-path.patch
0005-crypto-poly1305-asm-poly1305-s390x.pl-add-vx-code-pa.patch
0006-s390x-assembly-pack-fix-formal-interface-bug-in-chac.patch
0007-s390x-assembly-pack-import-chacha-from-cryptogams-re.patch
0008-s390x-assembly-pack-import-poly-from-cryptogams-repo.patch
0009-s390x-assembly-pack-allow-alignment-hints-for-vector.patch
0010-s390x-assembly-pack-update-perlasm-module.patch
0011-s390x-assembly-pack-remove-chacha20-dependency-on-no.patch
0012-s390x-assembly-pack-remove-poly1305-dependency-on-no.patch
0013-fix-strict-warnings-build.patch
0014-s390x-assembly-pack-add-support-for-pcc-and-kma-inst.patch
0015-Place-return-values-after-examples-in-doc.patch
0016-s390x-assembly-pack-update-OPENSSL_s390xcap-3.patch
0017-s390xcpuid.pl-fix-comment.patch
0018-s390x-assembly-pack-accelerate-scalar-multiplication.patch
0019-Enable-curve-spefific-ECDSA-implementations-via-EC_M.patch
0020-s390x-assembly-pack-accelerate-ECDSA.patch
0021-OPENSSL_s390xcap.pod-list-msa9-facility-bit-155.patch
0022-s390x-assembly-pack-fix-msa3-stfle-bit-detection.patch
0023-s390x-assembly-pack-fix-OPENSSL_s390xcap-z15-cpu-mas.patch
0024-s390x-assembly-pack-accelerate-X25519-X448-Ed25519-a.patch
0025-Add-self-generated-test-vector-for-x448-non-canonica.patch
# Debian patches
debian-targets.patch
man-section.patch
no-symbolic.patch
pic.patch
c_rehash-compat.patch
# Remove Set-systemwide-default-settings-for-libssl-users.patch, this is done differently
# Ubuntu patches
tests-use-seclevel-1.patch
tls1.2-min-seclevel2.patch
CVE-2021-3449-1.patch
CVE-2021-3449-2.patch
CVE-2021-3449-3.patch
CVE-2021-3449-4.patch
CVE-2021-3450-1.patch
CVE-2021-3450-2.patch
lp1931994-s390x-evp-init-fix.patch
CVE-2021-3711-1.patch
CVE-2021-3711-2.patch
CVE-2021-3711-3.patch
CVE-2021-3712.patch
CVE-2021-3712-2.patch
CVE-2021-3712-3.patch
CVE-2021-3712-4.patch
CVE-2021-3712-5.patch
CVE-2021-3712-6.patch
CVE-2021-3712-7.patch
CVE-2021-3712-8.patch
CVE-2021-3712-9.patch
CVE-2021-3712-10.patch
CVE-2021-3712-11.patch
CVE-2021-3712-12.patch
CVE-2021-3712-13.patch
CVE-2021-3712-14.patch
double-engine-load.patch
double-engine-load-test.patch

