diff options
Diffstat (limited to 'devel/electron38/files/patch-base_rand__util__posix.cc')
-rw-r--r-- | devel/electron38/files/patch-base_rand__util__posix.cc | 60 |
1 files changed, 60 insertions, 0 deletions
diff --git a/devel/electron38/files/patch-base_rand__util__posix.cc b/devel/electron38/files/patch-base_rand__util__posix.cc new file mode 100644 index 000000000000..c7904981e228 --- /dev/null +++ b/devel/electron38/files/patch-base_rand__util__posix.cc @@ -0,0 +1,60 @@ +--- base/rand_util_posix.cc.orig 2025-08-26 20:49:50 UTC ++++ base/rand_util_posix.cc +@@ -30,7 +30,7 @@ + #include "build/build_config.h" + #include "third_party/boringssl/src/include/openssl/rand.h" + +-#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) ++#if (BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS)) && !BUILDFLAG(IS_BSD) + #include "third_party/lss/linux_syscall_support.h" + #elif BUILDFLAG(IS_MAC) + // TODO(crbug.com/40641285): Waiting for this header to appear in the iOS SDK. +@@ -42,6 +42,7 @@ namespace { + + namespace { + ++#if !BUILDFLAG(IS_BSD) + #if BUILDFLAG(IS_AIX) + // AIX has no 64-bit support for O_CLOEXEC. + static constexpr int kOpenFlags = O_RDONLY; +@@ -66,8 +67,9 @@ class URandomFd { + private: + const int fd_; + }; ++#endif + +-#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_ANDROID) ++#if (BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_ANDROID)) && !BUILDFLAG(IS_BSD) + + bool KernelSupportsGetRandom() { + return base::SysInfo::KernelVersionNumber::Current() >= +@@ -122,6 +124,7 @@ void RandBytesInternal(span<uint8_t> output, bool avoi + namespace { + + void RandBytesInternal(span<uint8_t> output, bool avoid_allocation) { ++#if !BUILDFLAG(IS_BSD) + // The BoringSSL experiment takes priority over everything else. + if (!avoid_allocation && internal::UseBoringSSLForRandBytes()) { + // BoringSSL's RAND_bytes always returns 1. Any error aborts the program. +@@ -152,6 +155,9 @@ void RandBytesInternal(span<uint8_t> output, bool avoi + const int urandom_fd = GetUrandomFD(); + const bool success = ReadFromFD(urandom_fd, as_writable_chars(output)); + CHECK(success); ++#else ++ arc4random_buf(output.data(), output.size()); ++#endif + } + + } // namespace +@@ -171,9 +177,11 @@ void RandBytes(span<uint8_t> output) { + RandBytesInternal(output, /*avoid_allocation=*/false); + } + ++#if !BUILDFLAG(IS_BSD) + int GetUrandomFD() { + static NoDestructor<URandomFd> urandom_fd; + return urandom_fd->fd(); + } ++#endif + + } // namespace base |