···11+## v1.2.0 (2025-01-30)
22+33+Provide thread safety (Unix.fork and multi-domain safe) RNG generators by using
44+getrandom/getentropy on UNIX (or /dev/urandom). In your UNIX applications,
55+please use the "mirage-crypto-rng.unix" dependency and call
66+"Mirage_crypto_rng_unix.use_default ()" (instead of depending on
77+mirage-crypto-rng-{lwt,eio,async} and calling
88+"Mirage_crypto_rng_{eio,lwt,async}.initialize".
99+1010+* mirage-crypto-rng: handle CPU_RNG failures (#255 @hannesm, addresses #251 #252
1111+ #253)
1212+* mirage-crypto-rng.unix: provide two generators: Urandom and Getentropy
1313+ (#250 @hannesm @reynir @edwintorok, addresses #249)
1414+* mirage-crypto-rng: deprecate the initialize for lwt, async, eio (and
1515+ advertise `Mirage_crypto_rng_unix.use_default ()` (#254 @hannesm)
1616+* mirage-crypto-rng-eio: declare the cstruct dependency (#247 @hannesm)
1717+* include "windows.h" (all lowercase) (#248 @mefyl)
1818+119## v1.1.0 (2024-08-20)
220321* FEATURE mirage-crypto-ec: provide Dh.secret_to_octets (requested in #243 by