commit | 95305d27de8b9314150d6c1637d979809cfbb08c | [log] [tgz] |
---|---|---|
author | danakj <[email protected]> | Thu May 09 20:38:44 2024 |
committer | Chromium LUCI CQ <[email protected]> | Thu May 09 20:38:44 2024 |
tree | f80b516e5fde699fa582f4d905387fc803ea7253 | |
parent | b7f484b12145c2afdd49a0f7fcd10b88d211e500 [diff] [blame] |
Remove use of the pointer version of RandBytes, use span always The pointer-based crypto::RandBytes() overload can't be removed until nearby stops using it: https://crrev.com/c/5529443 will do this. The pointer-based base::RandBytes() will be removed next. Bug: 40284755 Change-Id: I72c79e23e120f988b091dd2576de180a1c60d2b7 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/5514816 Commit-Queue: danakj <[email protected]> Reviewed-by: Daniel Cheng <[email protected]> Owners-Override: Daniel Cheng <[email protected]> Cr-Commit-Position: refs/heads/main@{#1298850}
diff --git a/base/sync_socket_win.cc b/base/sync_socket_win.cc index ce7b29d..e1c6510 100644 --- a/base/sync_socket_win.cc +++ b/base/sync_socket_win.cc
@@ -56,7 +56,7 @@ do { unsigned long rnd_name; - RandBytes(&rnd_name, sizeof(rnd_name)); + RandBytes(byte_span_from_ref(rnd_name)); swprintf(name, kPipePathMax, kPipeNameFormat,