/src/sys/external/bsd/vchiq/dist/interface/vchiq_arm/ |
vchiq_ioctl.h | 80 int blocking; member in struct:__anon3780ff960608
|
vchiq_arm.c | 963 if (!args.blocking) {
|
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/ |
sanitizer_common_test.cc | 361 for (bool blocking : { false, true }) { 362 EXPECT_FALSE(GetRandom(nullptr, 32, blocking)); 363 EXPECT_FALSE(GetRandom(buffer_1, 0, blocking)); 364 EXPECT_FALSE(GetRandom(buffer_1, 512, blocking)); 368 EXPECT_TRUE(GetRandom(buffer_1, size, blocking)); 369 EXPECT_TRUE(GetRandom(buffer_2, size, blocking));
|
/src/sys/external/bsd/vchiq/dist/interface/vchi/message_drivers/ |
message.h | 101 struct semaphore *blocking; member in struct:rx_bulk_slotinfo_t
|
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
sanitizer_fuchsia.cc | 485 bool GetRandom(void *buffer, uptr length, bool blocking) {
|
sanitizer_linux.cc | 2078 bool GetRandom(void *buffer, uptr length, bool blocking) { 2095 blocking ? 0 : GRND_NONBLOCK); 2104 // blocking is moot here, O_NONBLOCK has no effect when opening /dev/urandom.
|
sanitizer_common.h | 944 // be used to seed a PRNG. Defaults to blocking like the underlying syscall. 945 bool GetRandom(void *buffer, uptr length, bool blocking = true);
|
sanitizer_mac.cc | 1118 bool GetRandom(void *buffer, uptr length, bool blocking) {
|
sanitizer_win.cc | 1057 bool GetRandom(void *buffer, uptr length, bool blocking) {
|
/src/sys/external/isc/libsodium/dist/ |
configure.ac | 97 AC_ARG_ENABLE(blocking-random, 98 [AS_HELP_STRING(--enable-blocking-random,Enable this switch only if /dev/urandom is totally broken on the target platform)],
|
configure | 1495 --enable-blocking-random 4439 # Check whether --enable-blocking-random was given.
|