upstream: https://github.com/mirage/mirage-crypto

changes for 1.2.0

+18
+18
CHANGES.md
··· 1 + ## v1.2.0 (2025-01-30) 2 + 3 + Provide thread safety (Unix.fork and multi-domain safe) RNG generators by using 4 + getrandom/getentropy on UNIX (or /dev/urandom). In your UNIX applications, 5 + please use the "mirage-crypto-rng.unix" dependency and call 6 + "Mirage_crypto_rng_unix.use_default ()" (instead of depending on 7 + mirage-crypto-rng-{lwt,eio,async} and calling 8 + "Mirage_crypto_rng_{eio,lwt,async}.initialize". 9 + 10 + * mirage-crypto-rng: handle CPU_RNG failures (#255 @hannesm, addresses #251 #252 11 + #253) 12 + * mirage-crypto-rng.unix: provide two generators: Urandom and Getentropy 13 + (#250 @hannesm @reynir @edwintorok, addresses #249) 14 + * mirage-crypto-rng: deprecate the initialize for lwt, async, eio (and 15 + advertise `Mirage_crypto_rng_unix.use_default ()` (#254 @hannesm) 16 + * mirage-crypto-rng-eio: declare the cstruct dependency (#247 @hannesm) 17 + * include "windows.h" (all lowercase) (#248 @mefyl) 18 + 1 19 ## v1.1.0 (2024-08-20) 2 20 3 21 * FEATURE mirage-crypto-ec: provide Dh.secret_to_octets (requested in #243 by