debian-targets.patch
man-section.patch
no-symbolic.patch
pic.patch
c_rehash-compat.patch
Set-systemwide-default-settings-for-libssl-users.patch
Define-AESNI_ASM-if-AESNI-assembler-is-included-and-use-i.patch
Add-test-for-CVE-2020-1967.patch
Fix-NULL-dereference-in-SSL_check_chain-for-TLS-1.3.patch
DirectoryString-is-a-CHOICE-type-and-therefore-uses-expli.patch
Correctly-compare-EdiPartyName-in-GENERAL_NAME_cmp.patch
Check-that-multi-strings-CHOICE-types-don-t-use-implicit-.patch
Complain-if-we-are-attempting-to-encode-with-an-invalid-A.patch
Add-a-test-for-GENERAL_NAME_cmp.patch
Add-a-test-for-encoding-decoding-using-an-invalid-ASN.1-T.patch
deepin-CVE-2019-1551.patch
0001-feat-support-sm2-sm3-sm4-with-engine-mode-for-hygonccp.patch
0002-feat-add-choice-HYGON_CCP.patch
0003-opensource-add-.gitignore.patch
0004-bugfix-fix-make-update.patch
0005-feat-support-sm2-encryption-test-for-openssl-s.patch
0006-feat-support-sm2-sign-for-openssl-speed.patch
0007-bugfix-fix-undefined-reference-to-_kcapi_md_update-i.patch
0008-fix-remove-wrong-object-mac.patch
0009-bugfix-Running-crash-on-other-platforms.patch
gmtls-0001-add-sm2-oid-1.2.156.10197.1.501.patch
gmtls-0001-fix-openssl-s_client-debug-support-gm-version.patch
gmtls-0001-fix-set-gm-cert-key-pair-bug.patch
gmtls-0002-openssl-internal-add-sm2-3-4-symbol.patch
gmtls-0003-sm2-EVP_PKEY-use-sm2_pmeth-replace-ec_pmeth.patch
gmtls-0003-fix-sm2-EVP_PKEY-use-sm2_pmeth-replace-ec_pmeth.patch
gmtls-0004-init-params-for-ssl-vpn.patch
gmtls-0005-add-gmvpn-SSL_METHOD-param.patch
gmtls-0006-set-sm2-sign-enc-cert.patch
gmtls-0007-supprot-GM-T-0024-2014-0xE013-cipher-suit.patch
gmtls-0008-support-openssl-commands-using-CAfile-verify-cert.patch
gmtls-0009-support-use-SSL_ctrl-set-gm-version.patch
gmtls-0010-tls-add-gm-ciphersuit-and-support-negotiate.patch
gmtls-0011-gm-version-no-sent-ems-ext.patch
gmtls-0012-fix-e013-cipher-suit-name.patch
gmtls-0013-fix-make-test-error.patch
gmtls-0014-fix-security-level-for-gmtls.patch
gmtls-0015-fix-make-update-error.patch
gmtls-0016-feat-let-sm2-sm3-sm4-open-to-developers.patch
gmtls-0017-feat-add-helpful-info.patch
gmtls-0018-fix-adjust-api-and-man-ciphers.patch
0001-bugfix-arm-platform-cannot-be-compiled.patch
deepin-sw64-porting-001.patch
Fix-Null-pointer-deref-in-X509_issuer_and_serial_hash.patch
Don-t-overflow-the-output-length-in-EVP_CipherUpdate-call.patch
Teach-TLSProxy-how-to-encrypt-TLSv1.2-ETM-records.patch
Add-a-test-for-CVE-2021-3449.patch
ssl-sigalg-extension-fix-NULL-pointer-dereference.patch
Ensure-buffer-length-pairs-are-always-in-sync.patch
Correctly-calculate-the-length-of-SM2-plaintext-given-the.patch
Extend-tests-for-SM2-decryption.patch
Check-the-plaintext-buffer-is-large-enough-when-decryptin.patch
Integer-overflow-in-ASN1_STRING_set.patch
Fix-a-read-buffer-overrun-in-X509_aux_print.patch
Fix-i2v_GENERAL_NAME-to-not-assume-NUL-terminated-strings.patch
Fix-POLICYINFO-printing-to-not-assume-NUL-terminated-stri.patch
Fix-printing-of-PROXY_CERT_INFO_EXTENSION-to-not-assume-N.patch
Fix-the-name-constraints-code-to-not-assume-NUL-terminate.patch
Fix-test-code-to-not-assume-NUL-terminated-strings.patch
Fix-append_ia5-function-to-not-assume-NUL-terminated-stri.patch
Fix-NETSCAPE_SPKI_print-function-to-not-assume-NUL-termin.patch
Fix-EC_GROUP_new_from_ecparameters-to-check-the-base-leng.patch
Allow-fuzz-builds-to-detect-string-overruns.patch
Fix-the-error-handling-in-i2v_AUTHORITY_KEYID.patch
fixup-Allow-fuzz-builds-to-detect-string-overruns.patch
fixup-Fix-the-name-constraints-code-to-not-assume-NUL-ter.patch
fixup-Fix-i2v_GENERAL_NAME-to-not-assume-NUL-terminated-s.patch
0010-Add-loongarch-support.patch
crypto-poly1305-asm-fix-armv8-pointer-authentication.patch
Fix-possible-infinite-loop-in-BN_mod_sqrt.patch
Add-documentation-of-BN_mod_sqrt.patch
Add-a-negative-testcase-for-BN_mod_sqrt.patch
Fix-a-carry-overflow-bug-in-bn_sqr_comba4-8-for-mips-32-b.patch
c_rehash-Do-not-use-shell-to-invoke-openssl.patch
Fix-file-operations-in-c_rehash.patch
Update-expired-SCT-certificates.patch
ct_test.c-Update-the-epoch-time.patch
Update-further-expiring-certificates-that-affect-tests.patch
deepin-0001-fix-a-error-after-making-update.patch
deepin-0002-feat-add-phytium-scto-engine-to-support-shangmi.patch
0001-add-ZhaoXin-GMI-of-SM3-and-SM4-instructions-support.patch
0066-feat-update-haiguan-openssl-patch.patch
uniontech-CVE-2022-4450.patch
uniontech-CVE-2023-0215.patch
uniontech-CVE-2023-0286.patch
#uniontech-CVE-2022-4304.patch
uniontech-CVE-2022-4304.patch
uniontech-CVE-2022-2097.patch

# CVE-2023-0464
x509-excessive-resource-use-verifying-policy-constraints.patch
# CVE-2023-0465
Ensure-that-EXFLAG_INVALID_POLICY-is-checked-even-in-leaf.patch
Generate-some-certificates-with-the-certificatePolicies-e.patch
Add-a-Certificate-Policies-Test.patch
# CVE-2023-0466
Fix-documentation-of-X509_VERIFY_PARAM_add0_policy.patch
## CVE-2022-4304 alternative fix
#Revert-Fix-Timing-Oracle-in-RSA-decryption.patch
#Alternative-fix-for-CVE-2022-4304.patch
#Re-add-BN_F_OSSL_BN_RSA_DO_UNBLIND-which-was-incorrectly-.patch
# CVE-2023-2650
Restrict-the-size-of-OBJECT-IDENTIFIERs-that-OBJ_obj2txt-.patch

uniontech-CVE-2023-3446.patch
CVE-2023-3817.patch
CVE-2023-5678.patch
uniontech-CVE-2024-4741.patch
uniontech-CVE-2024-5535.patch
uniontech-CVE-2024-9143.patch
CVE-2024-2511.patch
backport-Add-a-test-for-session-cache-handling.patch
backport-Extend-the-multi_resume-test-for-simultaneous-resump.patch
backport-Hardening-around-not_resumable-sessions.patch
backport-Add-a-test-for-session-cache-overflow.patch
backport-Extend-the-multi_resume-test-for-simultaneous-resump-1.patch
CVE-2024-13176.patch
CVE-2025-9230.patch
backport-CVE-2025-69420.patch
backport-CVE-2025-69421.patch
CVE-2025-69419.patch
backport-CVE-2026-28388.patch
backport-CVE-2026-28389.patch
backport-CVE-2026-28390.patch
