Skip to content
Permalink
Browse files

use SecRandomCopyBytes on macOS in Miri

  • Loading branch information...
RalfJung committed Apr 21, 2019
1 parent 31a75a1 commit 54aefc6a2d076b74921a8d78c5d8c68c13bfa4a7
Showing with 4 additions and 1 deletion.
  1. +4 −1 src/libstd/sys/unix/rand.rs
@@ -13,6 +13,7 @@ pub fn hashmap_random_keys() -> (u64, u64) {

#[cfg(all(unix,
not(target_os = "ios"),
not(all(target_os = "macos", miri)),
not(target_os = "openbsd"),
not(target_os = "freebsd"),
not(target_os = "fuchsia")))]
@@ -106,7 +107,9 @@ mod imp {
// once per thread in `hashmap_random_keys`. Therefore `SecRandomCopyBytes` is
// only used on iOS where direct access to `/dev/urandom` is blocked by the
// sandbox.
#[cfg(target_os = "ios")]
// HACK: However, we do use this when running in Miri on macOS; intercepting this is much
// easier than intercepting accesses to /dev/urandom.
#[cfg(any(target_os = "ios", all(target_os = "macos", miri)))]
mod imp {
use crate::io;
use crate::ptr;

0 comments on commit 54aefc6

Please sign in to comment.
You can’t perform that action at this time.