File tree Expand file tree Collapse file tree 1 file changed +1
-4
lines changed Expand file tree Collapse file tree 1 file changed +1
-4
lines changed Original file line number Diff line number Diff line change @@ -13,7 +13,6 @@ pub fn hashmap_random_keys() -> (u64, u64) {
13
13
14
14
#[ cfg( all( unix,
15
15
not( target_os = "ios" ) ,
16
- not( all( target_os = "macos" , miri) ) ,
17
16
not( target_os = "openbsd" ) ,
18
17
not( target_os = "freebsd" ) ,
19
18
not( target_os = "fuchsia" ) ) ) ]
@@ -107,9 +106,7 @@ mod imp {
107
106
// once per thread in `hashmap_random_keys`. Therefore `SecRandomCopyBytes` is
108
107
// only used on iOS where direct access to `/dev/urandom` is blocked by the
109
108
// sandbox.
110
- // HACK: However, we do use this when running in Miri on macOS; intercepting this is much
111
- // easier than intercepting accesses to /dev/urandom.
112
- #[ cfg( any( target_os = "ios" , all( target_os = "macos" , miri) ) ) ]
109
+ #[ cfg( target_os = "ios" ) ]
113
110
mod imp {
114
111
use crate :: io;
115
112
use crate :: ptr;
You can’t perform that action at this time.
0 commit comments