From 356f87355babda265600f32cb60226b9bbffbf01 Mon Sep 17 00:00:00 2001 From: Andreas Steffen Date: Sun, 21 Feb 2021 10:40:34 +0100 Subject: [PATCH] Version bump to 5.9.2rc2 --- NEWS | 3 ++- configure.ac | 2 +- testing/testing.conf | 2 +- 3 files changed, 4 insertions(+), 3 deletions(-) diff --git a/NEWS b/NEWS index 0262b949a..4c09bcb6e 100644 --- a/NEWS +++ b/NEWS @@ -12,7 +12,8 @@ strongswan-5.9.2 Pascal Knecht (client and server) for their work on this. Because the use of TLS 1.3 with these EAP methods is not yet standardized (two Internet-Drafts are being worked on), the default maximum version is currently - set to TLS 1.2, which is now also the default minimum version. + set to TLS 1.2, which is now also the default minimum version. However the TNC + test scenarios using PT-TLS transport already use TLS 1.3. - Other improvements for libtls also affect older TLS versions. For instance, we added support for ECDH with Curve25519/448 (DH groups may also be configured diff --git a/configure.ac b/configure.ac index 8c934bd46..6f4cbcbd4 100644 --- a/configure.ac +++ b/configure.ac @@ -19,7 +19,7 @@ # initialize & set some vars # ============================ -AC_INIT([strongSwan],[5.9.2rc1]) +AC_INIT([strongSwan],[5.9.2rc2]) AM_INIT_AUTOMAKE(m4_esyscmd([ echo tar-ustar echo subdir-objects diff --git a/testing/testing.conf b/testing/testing.conf index 3d8c74e7b..4d4df7df0 100644 --- a/testing/testing.conf +++ b/testing/testing.conf @@ -31,7 +31,7 @@ fi : ${KERNELPATCH=ha-5.0-abicompat.patch.bz2} # strongSwan version used in tests -: ${SWANVERSION=5.9.2rc1} +: ${SWANVERSION=5.9.2rc2} # Build directory where the guest kernel and images will be built : ${BUILDDIR=$TESTDIR/build}