| /src/sys/external/bsd/vchiq/dist/interface/vchiq_arm/ | 
| vchiq_ioctl.h | 80 	int blocking;  member in struct:__anon3780ff960608 
 | 
| vchiq_arm.c | 963 			if (!args.blocking) { 
 | 
| /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/ | 
| sanitizer_common_test.cc | 361   for (bool blocking : { false, true }) { 362     EXPECT_FALSE(GetRandom(nullptr, 32, blocking));
 363     EXPECT_FALSE(GetRandom(buffer_1, 0, blocking));
 364     EXPECT_FALSE(GetRandom(buffer_1, 512, blocking));
 368         EXPECT_TRUE(GetRandom(buffer_1, size, blocking));
 369         EXPECT_TRUE(GetRandom(buffer_2, size, blocking));
 
 | 
| /src/sys/external/bsd/vchiq/dist/interface/vchi/message_drivers/ | 
| message.h | 101    struct semaphore *blocking;  member in struct:rx_bulk_slotinfo_t 
 | 
| /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ | 
| sanitizer_fuchsia.cc | 485 bool GetRandom(void *buffer, uptr length, bool blocking) { 
 | 
| sanitizer_linux.cc | 2078 bool GetRandom(void *buffer, uptr length, bool blocking) { 2095                                 blocking ? 0 : GRND_NONBLOCK);
 2104   // blocking is moot here, O_NONBLOCK has no effect when opening /dev/urandom.
 
 | 
| sanitizer_common.h | 944 // be used to seed a PRNG. Defaults to blocking like the underlying syscall. 945 bool GetRandom(void *buffer, uptr length, bool blocking = true);
 
 | 
| sanitizer_mac.cc | 1118 bool GetRandom(void *buffer, uptr length, bool blocking) { 
 | 
| sanitizer_win.cc | 1057 bool GetRandom(void *buffer, uptr length, bool blocking) { 
 | 
| /src/sys/external/isc/libsodium/dist/ | 
| configure.ac | 97 AC_ARG_ENABLE(blocking-random, 98 [AS_HELP_STRING(--enable-blocking-random,Enable this switch only if /dev/urandom is totally broken on the target platform)],
 
 | 
| configure | 1495   --enable-blocking-random 4439 # Check whether --enable-blocking-random was given.
 
 |