diff options
| author | Jubilee <workingjubilee@gmail.com> | 2024-10-24 15:53:33 -0700 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2024-10-24 15:53:33 -0700 |
| commit | a0afe45466d321fb171dcaaf5dd33ff613b97112 (patch) | |
| tree | 39436baf5ac2d13dd4572f1ebe97fc4de3eff1b9 | |
| parent | f8af0aad41786911562e24eed445f6bf5dd53aa1 (diff) | |
| parent | 8ca39104f1af6871ccc6119ddfda37aa76f628fb (diff) | |
| download | rust-a0afe45466d321fb171dcaaf5dd33ff613b97112.tar.gz rust-a0afe45466d321fb171dcaaf5dd33ff613b97112.zip | |
Rollup merge of #132048 - mustartt:aix-random-impl, r=workingjubilee
AIX: use /dev/urandom for random implementation On AIX, we can poll `/dev/urandom` for cryptographically secure random output to implement `fill_bytes` because we don't have equivalent syscalls like other platforms. https://www.ibm.com/docs/en/aix/7.3?topic=files-random-urandom-devices
| -rw-r--r-- | library/std/src/random.rs | 2 | ||||
| -rw-r--r-- | library/std/src/sys/random/mod.rs | 1 |
2 files changed, 2 insertions, 1 deletions
diff --git a/library/std/src/random.rs b/library/std/src/random.rs index cdb88c795bf..45f51dd37b0 100644 --- a/library/std/src/random.rs +++ b/library/std/src/random.rs @@ -38,7 +38,7 @@ use crate::sys::random as sys; /// Vita | `arc4random_buf` /// Hermit | `read_entropy` /// Horizon | `getrandom` shim -/// Hurd, L4Re, QNX | `/dev/urandom` +/// AIX, Hurd, L4Re, QNX | `/dev/urandom` /// Redox | `/scheme/rand` /// RTEMS | [`arc4random_buf`](https://docs.rtems.org/branches/master/bsp-howto/getentropy.html) /// SGX | [`rdrand`](https://en.wikipedia.org/wiki/RDRAND) diff --git a/library/std/src/sys/random/mod.rs b/library/std/src/sys/random/mod.rs index edc2cacdfd8..f42351deb92 100644 --- a/library/std/src/sys/random/mod.rs +++ b/library/std/src/sys/random/mod.rs @@ -40,6 +40,7 @@ cfg_if::cfg_if! { mod horizon; pub use horizon::fill_bytes; } else if #[cfg(any( + target_os = "aix", target_os = "hurd", target_os = "l4re", target_os = "nto", |
