# Debian patches
debian-targets.patch
man-section.patch
no-symbolic.patch
pic.patch
# Set-systemwide-default-settings-for-libssl-users is only partially applied in Ubuntu
Set-systemwide-default-settings-for-libssl-users.patch
TEST-Provide-a-default-openssl.cnf-for-tests.patch
Configure-allow-to-enable-ktls-if-target-does-not-start-w.patch
# Ubuntu patches
tests-use-seclevel-1.patch
tls1.2-min-seclevel2.patch
skip_tls1.1_seclevel3_tests.patch

lp1968997/0001-Public-API-functions-OPENSSL_str-n-casecmp.patch
lp1968997/0002-FIPS-provider-modifications.patch
lp1968997/0003-Minimal-test-checking-we-can-get-public-key-in-Turki.patch
lp1968997/0004-str-n-casecmp-OPENSSL_strncasecmp.patch
lp1968997/0005-Ensure-we-initialized-the-locale-before-evp_pkey_nam.patch

lp1974037/0001-EVP_PKEY_Q_keygen-Call-OPENSSL_init_crypto-to-init-s.patch
lp1974037/0002-Fix-build-on-OPENSSL_SYS_TANDEM-and-older-POSIXes.patch
lp1974037/0003-Include-the-e_os.h-before-string.h.patch
lp1974037/0004-int_ctx_new-Revert-extra-ossl_init_casecmp-call.patch
lp1974037/0005-Move-OPENSSL_strcasecmp-and-related-to-o_str.c.patch
lp1974037/0006-Avoid-code-duplication-for-locale-initialization.patch
lp1974037/0007-Add-fallback-in-case-of-locale-initialization-failur.patch
lp1974037/0008-Always-try-locale-initialization-from-OPENSSL_strcas.patch
lp1974037/0009-tolower-refine-the-tolower-code-to-avoid-a-memory-ac.patch
lp1974037/0010-strcasecmp-implement-strcasecmp-and-strncasecmp.patch
lp1974037/0011-Drop-the-last-ossl_init_casecmp-call.patch

CVE-2022-1343-1.patch
CVE-2022-1343-2.patch
CVE-2022-1434.patch
CVE-2022-1473.patch

lp1947588.patch

lp1978093/0001-Update-expired-SCT-issuer-certificate.patch
lp1978093/0002-Update-further-expiring-certificates-that-affect-tes.patch

CVE-2022-1292.patch
CVE-2022-2068-1.patch
CVE-2022-2068-2.patch
c_rehash-compat.patch
CVE-2022-2097-1.patch
CVE-2022-2097-2.patch
CVE-2022-3602-1.patch
CVE-2022-3602-2.patch
CVE-2022-3358.patch
CVE-2022-4203-1.patch
CVE-2022-4203-2.patch
CVE-2022-4304.patch
CVE-2022-4450-1.patch
CVE-2022-4450-2.patch
CVE-2023-0215-1.patch
CVE-2023-0215-2.patch
CVE-2023-0216-1.patch
CVE-2023-0216-2.patch
CVE-2023-0217-1.patch
CVE-2023-0217-2.patch
CVE-2023-0217-3.patch
CVE-2023-0286.patch
CVE-2023-0401-1.patch
CVE-2023-0401-2.patch
CVE-2022-3996-1.patch
CVE-2022-3996-2.patch
CVE-2023-0464-1.patch
CVE-2023-0464-2.patch
CVE-2023-0464-3.patch
CVE-2023-0465-1.patch
CVE-2023-0465-2.patch
CVE-2023-0465-3.patch
CVE-2023-0466.patch
CVE-2023-1255.patch
CVE-2023-2650.patch
CVE-2023-3446.patch
CVE-2023-3817.patch
CVE-2023-2975.patch
CVE-2023-5363-1.patch
CVE-2023-5363-2.patch

# September 2023 SRU for Jammy with the large series for performance

## LP #2023545 (ibmca engine dumps core)
lp2023545/0001-Release-the-drbg-in-the-global-default-context-befor.patch

## LP #1994165 (Ignored S/MIME signature errors)
lp1994165/0001-REGRESSION-CMS_final-do-not-ignore-CMS_dataFinal-res.patch

## LP #2033422 (performance series)
lp2033422/0001-Drop-ossl_provider_clear_all_operation_bits-and-all-.patch
lp2033422/0002-Refactor-method-construction-pre-and-post-condition.patch
lp2033422/0003-Don-t-empty-the-method-store-when-flushing-the-query.patch
lp2033422/0004-Make-it-possible-to-remove-methods-by-the-provider-t.patch
lp2033422/0005-Complete-the-cleanup-of-an-algorithm-in-OSSL_METHOD_.patch
lp2033422/0006-For-child-libctx-provider-don-t-count-self-reference.patch
lp2033422/0007-Add-method-store-cache-flush-and-method-removal-to-n.patch
CVE-2023-5678.patch
CVE-2023-6129.patch
CVE-2023-6237.patch
CVE-2024-0727.patch
openssl-pkcs1-implicit-rejection.patch
CVE-2022-40735-1.patch
CVE-2022-40735-2.patch
CVE-2022-40735-3.patch
CVE-2022-40735-4.patch
CVE-2024-2511.patch
CVE-2024-4603.patch
CVE-2024-4741.patch
CVE-2024-5535.patch
CVE-2024-6119.patch
CVE-2024-9143.patch
CVE-2024-13176.patch
CVE-2025-9230.patch
