aboutsummaryrefslogtreecommitdiff
path: root/www/chromium/files/patch-base_rand__util__posix.cc
diff options
context:
space:
mode:
Diffstat (limited to 'www/chromium/files/patch-base_rand__util__posix.cc')
-rw-r--r--www/chromium/files/patch-base_rand__util__posix.cc8
1 files changed, 4 insertions, 4 deletions
diff --git a/www/chromium/files/patch-base_rand__util__posix.cc b/www/chromium/files/patch-base_rand__util__posix.cc
index 47e1b91ef1ad..522d86461f96 100644
--- a/www/chromium/files/patch-base_rand__util__posix.cc
+++ b/www/chromium/files/patch-base_rand__util__posix.cc
@@ -1,4 +1,4 @@
---- base/rand_util_posix.cc.orig 2025-08-07 06:57:29 UTC
+--- base/rand_util_posix.cc.orig 2025-10-02 04:28:32 UTC
+++ base/rand_util_posix.cc
@@ -30,7 +30,7 @@
#include "build/build_config.h"
@@ -28,7 +28,7 @@
bool KernelSupportsGetRandom() {
return base::SysInfo::KernelVersionNumber::Current() >=
-@@ -122,6 +124,7 @@ bool UseBoringSSLForRandBytes() {
+@@ -120,6 +122,7 @@ bool UseBoringSSLForRandBytes() {
namespace {
void RandBytesInternal(span<uint8_t> output, bool avoid_allocation) {
@@ -36,7 +36,7 @@
// The BoringSSL experiment takes priority over everything else.
if (!avoid_allocation && internal::UseBoringSSLForRandBytes()) {
// BoringSSL's RAND_bytes always returns 1. Any error aborts the program.
-@@ -152,6 +155,9 @@ void RandBytesInternal(span<uint8_t> output, bool avoi
+@@ -150,6 +153,9 @@ void RandBytesInternal(span<uint8_t> output, bool avoi
const int urandom_fd = GetUrandomFD();
const bool success = ReadFromFD(urandom_fd, as_writable_chars(output));
CHECK(success);
@@ -46,7 +46,7 @@
}
} // namespace
-@@ -171,9 +177,11 @@ void RandBytes(span<uint8_t> output) {
+@@ -169,9 +175,11 @@ void RandBytes(span<uint8_t> output) {
RandBytesInternal(output, /*avoid_allocation=*/false);
}