Skip to content
This repository has been archived by the owner on Mar 11, 2020. It is now read-only.

Latest commit

 

History

History
64 lines (39 loc) · 1.84 KB

CHANGES.md

File metadata and controls

64 lines (39 loc) · 1.84 KB

v0.5.1 (2020-02-24)

  • use dune for building this package (#47 @hannesm)

v0.5.0 (2019-11-01)

  • Use mirage-runtime provided hooks (since 3.7.0), see mirage/mirage#1010 (#45 @samoht)
  • Drop mirage-os-shim dependency (#45 @samoht)
  • Raise minimum OCaml version to 4.06.0 (#46 @hannesm)

0.4.1 (2018-08-15)

  • Aarch64 support (#39 by @reynir)

0.4.0 (2017-01-20)

  • Compatibility with MirageOS 3 module types.
  • Add a benchmark.
  • Obsolete mirage-entropy-<BACKEND>; the repository now contains only mirage-entropy.
  • Support Unix, Xen, and Solo5 backends.
  • Prune oasis.
  • Move noalloc to 4.03-style annotations

0.3.0 (2015-05-02)

  • Remove mirage-entropy-unix from the repository; it now only contains mirage-entropy-xen.
  • Add internal entropy harvesting via timing and CPU RNG if available.
  • Temporarily disable xentropyd.
  • The API is no longer V1.ENTROPY compatible.

0.2.0 (09-Mar-2015)

  • Do not wrap Entropy_unix in a functor as it is meant to be used directly.
  • Xen: read entropy from a Xen PV device. This is implemented by the xentropyd daemon.

0.1.6 (06-July-2014)

  • Rework the module to be event-driven, more in line with entropy gathering.

0.1.5 (06-July-2014)

  • Guarantee that all of the required entropy is read on Unix.
  • Add a Entropy_xen_weak that uses the builtin Random.self_init as a measure of last-resort.

0.1.4 (04-July-2014)

  • provide Mirage 1.2.0 interfaces (V1_LWT.ENTROPY).
  • name modules Entropy_xen and Entropy_unix to not clash.

0.1.3 (03-July-2014)

  • Unbreak build: ocamlfind wasn't able to locate the package previously.

0.1.2 (03-July-2014)

  • Use /dev/urandom instead of /dev/random (for non-blocking behaviour).

0.1.1 (03-July-2014)

  • Use Makefile instead of oasis as build system.

0.1.0 (03-July-2014)

  • Initial release: on Unix, use /dev/random; on XEN, error out.