···0000000000000000001## v1.1.0 (2024-08-20)
23* FEATURE mirage-crypto-ec: provide Dh.secret_to_octets (requested in #243 by
···1+## v1.2.0 (2025-01-30)
2+3+Provide thread safety (Unix.fork and multi-domain safe) RNG generators by using
4+getrandom/getentropy on UNIX (or /dev/urandom). In your UNIX applications,
5+please use the "mirage-crypto-rng.unix" dependency and call
6+"Mirage_crypto_rng_unix.use_default ()" (instead of depending on
7+mirage-crypto-rng-{lwt,eio,async} and calling
8+"Mirage_crypto_rng_{eio,lwt,async}.initialize".
9+10+* mirage-crypto-rng: handle CPU_RNG failures (#255 @hannesm, addresses #251 #252
11+ #253)
12+* mirage-crypto-rng.unix: provide two generators: Urandom and Getentropy
13+ (#250 @hannesm @reynir @edwintorok, addresses #249)
14+* mirage-crypto-rng: deprecate the initialize for lwt, async, eio (and
15+ advertise `Mirage_crypto_rng_unix.use_default ()` (#254 @hannesm)
16+* mirage-crypto-rng-eio: declare the cstruct dependency (#247 @hannesm)
17+* include "windows.h" (all lowercase) (#248 @mefyl)
18+19## v1.1.0 (2024-08-20)
2021* FEATURE mirage-crypto-ec: provide Dh.secret_to_octets (requested in #243 by