From f470b886de1fced2926125a3c0101e3757eb4ff7 Mon Sep 17 00:00:00 2001 From: Robert Nagy Date: Wed, 29 Oct 2025 10:08:34 +0100 Subject: www/iridium: update to 2025.10.141.2 --- www/iridium/files/patch-base_rand__util__posix.cc | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'www/iridium/files/patch-base_rand__util__posix.cc') diff --git a/www/iridium/files/patch-base_rand__util__posix.cc b/www/iridium/files/patch-base_rand__util__posix.cc index 431914ec5c84..87168dcf5466 100644 --- a/www/iridium/files/patch-base_rand__util__posix.cc +++ b/www/iridium/files/patch-base_rand__util__posix.cc @@ -1,4 +1,4 @@ ---- base/rand_util_posix.cc.orig 2025-09-11 13:19:19 UTC +--- base/rand_util_posix.cc.orig 2025-10-28 14:29:43 UTC +++ base/rand_util_posix.cc @@ -30,7 +30,7 @@ #include "build/build_config.h" @@ -28,7 +28,7 @@ bool KernelSupportsGetRandom() { return base::SysInfo::KernelVersionNumber::Current() >= -@@ -122,6 +124,7 @@ bool UseBoringSSLForRandBytes() { +@@ -120,6 +122,7 @@ bool UseBoringSSLForRandBytes() { namespace { void RandBytesInternal(span output, bool avoid_allocation) { @@ -36,7 +36,7 @@ // The BoringSSL experiment takes priority over everything else. if (!avoid_allocation && internal::UseBoringSSLForRandBytes()) { // BoringSSL's RAND_bytes always returns 1. Any error aborts the program. -@@ -152,6 +155,9 @@ void RandBytesInternal(span output, bool avoi +@@ -150,6 +153,9 @@ void RandBytesInternal(span output, bool avoi const int urandom_fd = GetUrandomFD(); const bool success = ReadFromFD(urandom_fd, as_writable_chars(output)); CHECK(success); @@ -46,7 +46,7 @@ } } // namespace -@@ -171,9 +177,11 @@ void RandBytes(span output) { +@@ -169,9 +175,11 @@ void RandBytes(span output) { RandBytesInternal(output, /*avoid_allocation=*/false); } -- cgit v1.2.3