ca.patch
config-hurd.patch
debian-targets.patch
engines-path.patch
man-dir.patch
man-section.patch
no-rpath.patch
no-symbolic.patch
pic.patch
valgrind.patch
shared-lib-ext.patch
stddef.patch
version-script.patch
block_diginotar.patch
block_digicert_malaysia.patch
#padlock_conf.patch
defaults.patch
openssl_fix_for_x32.patch
ppc64el.patch
Update-S-MIME-certificates.patch
Fix-name-length-limit-check.patch
CVE-2016-2177.patch
CVE-2016-2178.patch
CVE-2016-2179.patch
CVE-2016-2180.patch
CVE-2016-2181.patch
CVE-2016-2182.patch
CVE-2016-2183.patch
CVE-2016-6302.patch
CVE-2016-6303.patch
CVE-2016-6304.patch
CVE-2016-6306.patch
CVE-2016-8610.patch
CVE-2017-3731.patch
CVE-2016-7056.patch
CVE-2017-3735.patch
Limit-ASN.1-constructed-types-recursive-definition-d.patch
CVE-2018-0732.patch
CVE-2018-0737.patch
CVE-2018-5407+2018-0735.patch
CVE-2019-1559_part1.patch
CVE-2019-1559_part2.patch
CVE-2019-1547.patch
CVE-2019-1563.patch
DirectoryString-is-a-CHOICE-type-and-therefore-uses-expli.patch
Correctly-compare-EdiPartyName-in-GENERAL_NAME_cmp.patch
Check-that-multi-strings-CHOICE-types-don-t-use-implicit-.patch
Complain-if-we-are-attempting-to-encode-with-an-invalid-A.patch
Address-a-timing-side-channel-whereby-it-is-possible.patch
CVE-2018-0734-1.patch
CVE-2018-0734-2.patch
CVE-2018-0734-3.patch
CVE-2021-23840.patch
CVE-2021-23841.patch

add-trusted_first-option-and-verify-flag.patch
Check-chain-extensions-also-for-trusted-certificates.patch

CVE-2021-3712/Integer-overflow-in-ASN1_STRING_set.patch
CVE-2021-3712/Fix-i2v_GENERAL_NAME-to-not-assume-NUL-terminated-strings.patch
CVE-2021-3712/Fix-POLICYINFO-printing-to-not-assume-NUL-terminated-stri.patch
CVE-2021-3712/Fix-printing-of-PROXY_CERT_INFO_EXTENSION-to-not-assume-N.patch
CVE-2021-3712/Fix-the-name-constraints-code-to-not-assume-NUL-terminate.patch
CVE-2021-3712/Fix-append_ia5-function-to-not-assume-NUL-terminated-stri.patch
CVE-2021-3712/Fix-NETSCAPE_SPKI_print-function-to-not-assume-NUL-termin.patch
CVE-2021-3712/Fix-EC_GROUP_new_from_ecparameters-to-check-the-base-leng.patch
CVE-2021-3712/Allow-fuzz-builds-to-detect-string-overruns.patch
CVE-2021-3712/Fix-the-error-handling-in-i2v_AUTHORITY_KEYID.patch
CVE-2021-3712/fixup-Allow-fuzz-builds-to-detect-string-overruns.patch
CVE-2021-3712/fixup-Fix-the-name-constraints-code-to-not-assume-NUL-ter.patch
CVE-2021-3712/fixup-Fix-i2v_GENERAL_NAME-to-not-assume-NUL-terminated-s.patch

CVE-2022-0778.patch
c_rehash-add-more-extensions.patch
add-oldstyle-hash-to-c_rehash.patch
fix-rehash-c_rehash-behaviour.patch
c_rehash-fix-filename-scaping.patch
c_rehash-move-flist.patch
CVE-2022-1292.patch
CVE-2022-2068.patch
c_rehash-compat.patch
rehash-crt.patch
Fix-a-UAF-resulting-from-a-bug-in-BIO_new_NDEF.patch
CVE-2023-0286-Fix-GENERAL_NAME_cmp-for-x400Address-1.1.1.patch
CVE-2023-0464.patch
# CVE-2023-0466
Fix-documentation-of-X509_VERIFY_PARAM_add0_policy.patch
# CVE-2023-2650
Restrict-the-size-of-OBJECT-IDENTIFIERs-that-OBJ_obj2txt-.patch
CVE-2023-3446.patch
CVE-2023-0465.patch
Update-further-expiring-certificates-that-affect-tests.patch
CVE-2023-5678.patch
CVE-2024-0727-1.patch
CVE-2024-0727-2.patch
