# x86_64 cet hwe
lp-1927161-1-x86-Add-endbranch-to-indirect-branch-targets-fo.patch
lp-1927161-2-Use-swapcontext-for-Intel-CET.patch
lp-1927161-3-x86-Always-generate-note-gnu-property-section-f.patch
lp-1927161-4-x86_64-Always-generate-note-gnu-property-sectio.patch
lp-1927161-5-x86_64-Add-endbranch-at-function-entries-for-In.patch
# s390x hwe
0001-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch
0002-s390x-assembly-pack-add-OPENSSL_s390xcap-man-page.patch
0003-s390x-assembly-pack-perlasm-support.patch
0004-crypto-chacha-asm-chacha-s390x.pl-add-vx-code-path.patch
0005-crypto-poly1305-asm-poly1305-s390x.pl-add-vx-code-pa.patch
0006-s390x-assembly-pack-fix-formal-interface-bug-in-chac.patch
0007-s390x-assembly-pack-import-chacha-from-cryptogams-re.patch
0008-s390x-assembly-pack-import-poly-from-cryptogams-repo.patch
0009-s390x-assembly-pack-allow-alignment-hints-for-vector.patch
0010-s390x-assembly-pack-update-perlasm-module.patch
0011-s390x-assembly-pack-remove-chacha20-dependency-on-no.patch
0012-s390x-assembly-pack-remove-poly1305-dependency-on-no.patch
0013-fix-strict-warnings-build.patch
0014-s390x-assembly-pack-add-support-for-pcc-and-kma-inst.patch
0015-Place-return-values-after-examples-in-doc.patch
0016-s390x-assembly-pack-update-OPENSSL_s390xcap-3.patch
0017-s390xcpuid.pl-fix-comment.patch
0018-s390x-assembly-pack-accelerate-scalar-multiplication.patch
0019-Enable-curve-spefific-ECDSA-implementations-via-EC_M.patch
0020-s390x-assembly-pack-accelerate-ECDSA.patch
0021-OPENSSL_s390xcap.pod-list-msa9-facility-bit-155.patch
0022-s390x-assembly-pack-fix-msa3-stfle-bit-detection.patch
0023-s390x-assembly-pack-fix-OPENSSL_s390xcap-z15-cpu-mas.patch
0024-s390x-assembly-pack-accelerate-X25519-X448-Ed25519-a.patch
0025-Add-self-generated-test-vector-for-x448-non-canonica.patch
# Debian patches
debian-targets.patch
man-section.patch
no-symbolic.patch
pic.patch
# Remove Set-systemwide-default-settings-for-libssl-users.patch, this is done differently
# Ubuntu patches
tests-use-seclevel-1.patch
tls1.2-min-seclevel2.patch
double-engine-load-test.patch
double-engine-load.patch
CVE-2022-0778-1.patch
CVE-2022-0778-2.patch
CVE-2022-0778-3.patch

lp1978093/0001-Update-expired-SCT-certificates.patch
lp1978093/0002-ct_test.c-Update-the-epoch-time.patch
lp1978093/0003-Update-further-expiring-certificates-that-affect-tes.patch

lp1947588.patch

CVE-2022-1292.patch
CVE-2022-2068.patch
c_rehash-compat.patch

CVE-2022-2097-1.patch
CVE-2022-2097-2.patch
