01_use_pkg-config_for_pcsc-lite_module.patch
02_dbus_group_policy.patch
06_wpa_gui_menu_exec_path.patch
07_dbus_service_syslog.patch
12_wpa_gui_knotify_support.patch
dbus-activation-cmdline.patch
session-ticket.patch
EAP-TLS-server_fix-TLS-Message-length-validation.patch
git_accept_client_cert_from_server.patch
CVE-2014-3686.patch
CVE-2015-1863.patch
CVE-2015-4141.patch
CVE-2015-4142.patch
CVE-2015-4143-4146.patch
CVE-2015-5310.patch
CVE-2015-5315-1.patch
CVE-2015-5315-2.patch
2016-1/0001-WPS-Reject-a-Credential-with-invalid-passphrase.patch
2016-1/0002-Reject-psk-parameter-set-with-invalid-passphrase-cha.patch
2016-1/0003-Remove-newlines-from-wpa_supplicant-config-network-o.patch
2016-1/0004-Reject-SET_CRED-commands-with-newline-characters-in-.patch
2016-1/0005-Reject-SET-commands-with-newline-characters-in-the-s.patch
2017-1/0001-hostapd-Avoid-key-reinstallation-in-FT-handshake.patch
2017-1/0002-Prevent-reinstallation-of-an-already-in-use-group-ke.patch
2017-1/0003-Extend-protection-of-GTK-IGTK-reinstallation-of-WNM-.patch
2017-1/0004-Fix-PTK-rekeying-to-generate-a-new-ANonce.patch
2017-1/0005-TDLS-Reject-TPK-TK-reconfiguration.patch
# already applied in CVE-2015-5310.patch
# 2017-1/0006-WNM-Ignore-Key-Data-in-WNM-Sleep-Mode-Response-frame.patch
2017-1/0007-WNM-Ignore-WNM-Sleep-Mode-Response-if-WNM-Sleep-Mode.patch
2017-1/0008-WNM-Ignore-WNM-Sleep-Mode-Response-without-pending-r.patch
2017-1/0009-FT-Do-not-allow-multiple-Reassociation-Response-fram.patch
2017-1/0010-TDLS-Ignore-incoming-TDLS-Setup-Response-retries.patch
CVE-2018-14526.patch
VU-871675/Remove-unnecessary-OpenSSL-EVP_sha256.patch
VU-871675/Add-crypto_ec_point_cmp.patch
VU-871675/Add-functions-for-computing-the-Legendre-symbol.patch
VU-871675/Enhance-crypto-abstract-API.patch
VU-871675/Implement-new-crypto-API-functions.patch
VU-871675/Use-abstract-crypto-API.patch
VU-871675/Move-EC-group-initialization-to-earlier-step.patch
VU-871675/Mask-timing-of-PWE-derivation.patch
VU-871675/Fix-a-memory-leak-in-hunting-and-pecking-loop.patch
VU-871675/0001-OpenSSL-Use-constant-time-operations-for-private-big.patch
VU-871675/0002-Add-helper-functions-for-constant-time-operations.patch
VU-871675/0003-OpenSSL-Use-constant-time-selection-for-crypto_bignu.patch
VU-871675/0004-EAP-pwd-Use-constant-time-and-memory-access-for-find.patch
VU-871675/0011-EAP-pwd-server-Verify-received-scalar-and-element.patch
VU-871675/0012-EAP-pwd-server-Detect-reflection-attacks.patch
VU-871675/0013-EAP-pwd-client-Verify-received-scalar-and-element.patch
VU-871675/0014-EAP-pwd-Check-element-x-y-coordinates-explicitly.patch
CVE-2016-10743.patch
CVE-2019-11555-1.patch
CVE-2019-11555-2.patch
CVE-2019-16275.patch
CVE-2020-12695-1.patch
CVE-2020-12695-2.patch
CVE-2020-12695-3.patch
CVE-2021-0326.patch
CVE-2021-27803-pre1.patch
CVE-2021-27803.patch
lib_engine_trusted_path.patch
