/external/rust/crates/getrandom/ |
D | CHANGELOG.md | 15 [#234]: https://github.com/rust-random/getrandom/pull/234 16 [#244]: https://github.com/rust-random/getrandom/pull/244 17 [#245]: https://github.com/rust-random/getrandom/pull/245 29 [#220]: https://github.com/rust-random/getrandom/pull/220 30 [#222]: https://github.com/rust-random/getrandom/pull/222 31 [#233]: https://github.com/rust-random/getrandom/pull/233 32 [#235]: https://github.com/rust-random/getrandom/pull/235 33 [#236]: https://github.com/rust-random/getrandom/pull/236 38 - Add support for getrandom syscall on DragonFly BSD. [#210] 41 [#205]: https://github.com/rust-random/getrandom/pull/205 [all …]
|
D | README.md | 1 # getrandom chapter 5 [GitHub Actions]: https://github.com/rust-random/getrandom/actions?query=workflow:Tests+branch:mast… 6 [Build Status]: https://github.com/rust-random/getrandom/workflows/Tests/badge.svg?branch=master 7 [crates.io]: https://crates.io/crates/getrandom 8 [Crate]: https://img.shields.io/crates/v/getrandom 9 [docs.rs]: https://docs.rs/getrandom 10 [Documentation]: https://docs.rs/getrandom/badge.svg 11 [deps.rs]: https://deps.rs/repo/github/rust-random/getrandom 12 [Dependency Status]: https://deps.rs/repo/github/rust-random/getrandom/status.svg 13 [Downloads]: https://img.shields.io/crates/d/getrandom [all …]
|
D | METADATA | 1 name: "getrandom" 6 value: "https://crates.io/crates/getrandom" 10 value: "https://static.crates.io/crates/getrandom/getrandom-0.2.5.crate"
|
D | Cargo.toml.orig | 2 name = "getrandom" 8 documentation = "https://docs.rs/getrandom" 9 repository = "https://github.com/rust-random/getrandom" 33 # Implement std-only traits for getrandom::Error
|
D | Cargo.toml | 14 name = "getrandom" 19 documentation = "https://docs.rs/getrandom" 25 repository = "https://github.com/rust-random/getrandom"
|
/external/rust/crates/ahash/patches/ |
D | 0001-Use-dev-urandom-instead-of-getrandom.patch | 4 Subject: [PATCH] Use /dev/urandom instead of getrandom() 7 instead of getrandom() to avoid blocking boot on systems where the 11 If opening or reading from /dev/urandom fails, fall back to getrandom(). 43 - getrandom::getrandom(&mut result).expect("getrandom::getrandom() failed."); 45 + getrandom::getrandom(&mut result).expect("getrandom::getrandom() failed.");
|
/external/rust/crates/getrandom/tests/ |
D | custom.rs | 17 use getrandom::{getrandom, register_custom_getrandom, Error}; 41 assert_eq!(getrandom(&mut buf), Ok(())); in custom_rng_output() 43 assert_eq!(getrandom(&mut buf), Ok(())); in custom_rng_output() 49 assert_eq!(getrandom(&mut [0; 7]), Err(len7_err())); in rng_err_output()
|
D | normal.rs | 10 use getrandom::getrandom as getrandom_impl;
|
/external/rust/crates/getrandom/benches/ |
D | mod.rs | 8 getrandom::getrandom(&mut buf[..]).unwrap(); in bench_64() 18 getrandom::getrandom(&mut buf[..]).unwrap(); in bench_65536()
|
/external/rust/crates/uuid/ |
D | Cargo.toml.orig | 57 [dependencies.getrandom] 94 stdweb = ["getrandom", "getrandom/js"] 97 v4 = ["getrandom"] 99 wasm-bindgen = ["getrandom", "getrandom/js"]
|
D | Cargo.toml | 33 [dependencies.getrandom] 69 stdweb = ["getrandom", "getrandom/js"] 72 v4 = ["getrandom"] 74 wasm-bindgen = ["getrandom", "getrandom/js"]
|
/external/rust/crates/rand_core/src/ |
D | error.rs | 126 getrandom::Error::from(self.code).fmt(f) in fmt() 143 getrandom::Error::from(self.code).fmt(f) in fmt() 169 impl From<getrandom::Error> for Error { 171 fn from(error: getrandom::Error) -> Self { in from() 225 assert_eq!(super::Error::CUSTOM_START, getrandom::Error::CUSTOM_START); in test_error_codes() 226 assert_eq!(super::Error::INTERNAL_START, getrandom::Error::INTERNAL_START); in test_error_codes()
|
D | os.rs | 12 use getrandom::getrandom; 68 getrandom(dest)?; in try_fill_bytes()
|
/external/rust/crates/getrandom/src/ |
D | linux_android.rs | 20 getrandom(buf.as_mut_ptr() as *mut libc::c_void, buf.len(), 0) in getrandom_inner() 28 let res = unsafe { getrandom(core::ptr::null_mut(), 0, libc::GRND_NONBLOCK) }; in is_getrandom_available() 40 unsafe fn getrandom( in getrandom() function
|
/external/oss-fuzz/infra/base-images/base-builder/test_data/ |
D | culprit-commit.txt | 6 [compiler-rt] Implement getrandom interception 9 Straightforward implementation of `getrandom` syscall and libc 12 Test Plan: Local MSAN failures caused by uninstrumented `getrandom`
|
/external/rust/crates/zip/benches/ |
D | read_entry.rs | 6 use getrandom::getrandom; 17 getrandom(&mut bytes).unwrap(); in generate_random_archive()
|
/external/rust/crates/rand_core/ |
D | Cargo.toml.orig | 18 std = ["alloc", "getrandom", "getrandom/std"] # use std library; should be default but for above… 24 getrandom = { version = "0.2", optional = true }
|
D | Cargo.toml | 32 [dependencies.getrandom] 44 std = ["alloc", "getrandom", "getrandom/std"]
|
/external/rust/crates/rand/ |
D | Cargo.toml.orig | 36 std = ["rand_core/std", "rand_chacha/std", "alloc", "getrandom", "libc"] 41 # Option: use getrandom package for seeding 42 getrandom = ["rand_core/getrandom"]
|
D | README.md | 15 - Secure seeding via the [`getrandom` crate](https://crates.io/crates/getrandom) 116 - `getrandom` (implied by `std`) is an optional dependency providing the code 140 unavailable (unless `getrandom` is enabled), large parts of `seq` are 147 `rand` or `getrandom`. To solve this, either use a different target such as 148 `wasm32-wasi` or add a direct dependency on `getrandom` with the `js` feature 150 [getrandom#WebAssembly support](https://docs.rs/getrandom/latest/getrandom/#webassembly-support).
|
D | Cargo.toml | 64 getrandom = ["rand_core/getrandom"] 70 std = ["rand_core/std", "rand_chacha/std", "alloc", "getrandom", "libc"]
|
/external/rust/crates/ahash/ |
D | Cargo.toml.orig | 30 …ive to runtime key generation which does compile time key generation if getrandom is not available. 31 # (If getrandom is available this does nothing.) 32 # If this is on (and getrandom is off) it implies the produced binary will not be identical. 68 getrandom = { version = "0.2.3" }
|
D | README.md | 56 …h will seed hashers with random numbers using the [getrandom](https://github.com/rust-random/getra… 57 …de a source of randomness. (see the [full list](https://docs.rs/getrandom/0.2.0/getrandom/#support… 59 If `getrandom` is unavailable and `compile-time-rng` is enabled, aHash will generate random numbers… 61 This makes the binary non-deterministic, unless `getrandom` is available for the target in which ca… 64 **NOTE:** If `getrandom` is unavailable and `compile-time-rng` is disabled aHash will fall back on …
|
/external/rust/crates/uuid/src/ |
D | v4.rs | 29 getrandom::getrandom(&mut bytes).unwrap_or_else(|err| { in new_v4()
|
/external/expat/ |
D | configure.ac | 232 AC_ARG_WITH([getrandom], optwith 233 [AS_HELP_STRING([--with-getrandom], 234 [enforce the use of getrandom function in the system @<:@default=check@:>@]) 235 AS_HELP_STRING([--without-getrandom], 236 [skip auto detect of getrandom @<:@default=check@:>@])], 241 [AC_MSG_CHECKING([for getrandom (Linux 3.17+, glibc 2.25+)]) 246 return getrandom(NULL, 0U, 0U); 249 [AC_DEFINE([HAVE_GETRANDOM], [1], [Define to 1 if you have the `getrandom' function.]) 253 [AC_MSG_ERROR([enforced the use of getrandom --with-getrandom, but not detected])])])]) 256 [AS_HELP_STRING([--with-sys-getrandom], [all …]
|