Skip to content

Commit 4cf2379

Browse files
committed
Revert "use SecRandomCopyBytes on macOS in Miri"
This reverts commit 54aefc6.
1 parent fe5f42c commit 4cf2379

File tree

1 file changed

+1
-4
lines changed

1 file changed

+1
-4
lines changed

src/libstd/sys/unix/rand.rs

+1-4
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,6 @@ pub fn hashmap_random_keys() -> (u64, u64) {
1313

1414
#[cfg(all(unix,
1515
not(target_os = "ios"),
16-
not(all(target_os = "macos", miri)),
1716
not(target_os = "openbsd"),
1817
not(target_os = "freebsd"),
1918
not(target_os = "fuchsia")))]
@@ -107,9 +106,7 @@ mod imp {
107106
// once per thread in `hashmap_random_keys`. Therefore `SecRandomCopyBytes` is
108107
// only used on iOS where direct access to `/dev/urandom` is blocked by the
109108
// sandbox.
110-
// HACK: However, we do use this when running in Miri on macOS; intercepting this is much
111-
// easier than intercepting accesses to /dev/urandom.
112-
#[cfg(any(target_os = "ios", all(target_os = "macos", miri)))]
109+
#[cfg(target_os = "ios")]
113110
mod imp {
114111
use crate::io;
115112
use crate::ptr;

0 commit comments

Comments
 (0)