Skip to content

Commit

Permalink
bump version for dev and update year in readme
Browse files Browse the repository at this point in the history
  • Loading branch information
JacobBarthelmeh committed Jan 3, 2022
1 parent a0b9e2b commit 7dd50a1
Show file tree
Hide file tree
Showing 8 changed files with 10 additions and 10 deletions.
4 changes: 2 additions & 2 deletions CMakeLists.txt
Original file line number Diff line number Diff line change
Expand Up @@ -28,13 +28,13 @@ if("${CMAKE_SOURCE_DIR}" STREQUAL "${CMAKE_BINARY_DIR}")
You must delete them, or cmake will refuse to work.")
endif()

project(wolfssl VERSION 5.1.1 LANGUAGES C)
project(wolfssl VERSION 5.1.2 LANGUAGES C)

# shared library versioning
# increment if interfaces have been added, removed or changed
set(LIBTOOL_CURRENT 31)
# increment if source code has changed set to zero if current is incremented
set(LIBTOOL_REVISION 1)
set(LIBTOOL_REVISION 2)
# increment if interfaces have been added set to zero if interfaces have been
# removed or changed
set(LIBTOOL_AGE 1)
Expand Down
2 changes: 1 addition & 1 deletion ChangeLog.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# wolfSSL Release 5.1.1 (Jan 3rd, 2021)
# wolfSSL Release 5.1.1 (Jan 3rd, 2022)
Release 5.1.1 of wolfSSL embedded TLS has a high vulnerability fix:

### Vulnerabilities
Expand Down
2 changes: 1 addition & 1 deletion README
Original file line number Diff line number Diff line change
Expand Up @@ -77,7 +77,7 @@ https://www.wolfssl.com/docs/security-vulnerabilities/
See INSTALL file for build instructions.
More info can be found on-line at https://wolfssl.com/wolfSSL/Docs.html

# wolfSSL Release 5.1.1 (Jan 3rd, 2021)
# wolfSSL Release 5.1.1 (Jan 3rd, 2022)
Release 5.1.1 of wolfSSL embedded TLS has a high vulnerability fix:

### Vulnerabilities
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ macro `NO_OLD_SHA_NAMES`. These names get mapped to the OpenSSL API for a
single call hash function. Instead the name `WC_SHA`, `WC_SHA256`, `WC_SHA384` and
`WC_SHA512` should be used for the enum name.
# wolfSSL Release 5.1.1 (Jan 3rd, 2021)
# wolfSSL Release 5.1.1 (Jan 3rd, 2022)
Release 5.1.1 of wolfSSL embedded TLS has a high vulnerability fix:
### Vulnerabilities
Expand Down
4 changes: 2 additions & 2 deletions configure.ac
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
#
AC_COPYRIGHT([Copyright (C) 2006-2020 wolfSSL Inc.])
AC_PREREQ([2.69])
AC_INIT([wolfssl],[5.1.1],[https://github.com/wolfssl/wolfssl/issues],[wolfssl],[https://www.wolfssl.com])
AC_INIT([wolfssl],[5.1.2],[https://github.com/wolfssl/wolfssl/issues],[wolfssl],[https://www.wolfssl.com])
AC_CONFIG_AUX_DIR([build-aux])

# The following sets CFLAGS to empty if unset on command line. We do not
Expand Down Expand Up @@ -38,7 +38,7 @@ LT_INIT([disable-static win32-dll])
AC_ARG_VAR(EXTRA_CFLAGS, [Extra CFLAGS to add to autoconf-computed arg list. Can also supply directly to make.])

#shared library versioning
WOLFSSL_LIBRARY_VERSION=31:1:1
WOLFSSL_LIBRARY_VERSION=31:2:1
# | | |
# +------+ | +---+
# | | |
Expand Down
2 changes: 1 addition & 1 deletion rpm/spec.in
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,7 @@ mkdir -p $RPM_BUILD_ROOT/
%{_libdir}/libwolfssl.la
%{_libdir}/libwolfssl.so
%{_libdir}/libwolfssl.so.30
%{_libdir}/libwolfssl.so.30.1.1
%{_libdir}/libwolfssl.so.30.1.2

%files devel
%defattr(-,root,root,-)
Expand Down
Binary file modified wolfssl.rc
Binary file not shown.
4 changes: 2 additions & 2 deletions wolfssl/version.h
Original file line number Diff line number Diff line change
Expand Up @@ -28,8 +28,8 @@
extern "C" {
#endif

#define LIBWOLFSSL_VERSION_STRING "5.1.1"
#define LIBWOLFSSL_VERSION_HEX 0x05001001
#define LIBWOLFSSL_VERSION_STRING "5.1.2"
#define LIBWOLFSSL_VERSION_HEX 0x05001002

#ifdef __cplusplus
}
Expand Down

0 comments on commit 7dd50a1

Please sign in to comment.