Symbol: KEYSZ
lib/libc/crypt/arc4random.c
137
m = minimum(datlen, KEYSZ + IVSZ);
lib/libc/crypt/arc4random.c
142
_rs_init(rsx->rs_buf, KEYSZ + IVSZ);
lib/libc/crypt/arc4random.c
143
memset(rsx->rs_buf, 0, KEYSZ + IVSZ);
lib/libc/crypt/arc4random.c
144
rs->rs_have = sizeof(rsx->rs_buf) - KEYSZ - IVSZ;
lib/libc/crypt/arc4random.c
75
if (n < KEYSZ + IVSZ)
lib/libc/crypt/arc4random.c
83
chacha_keysetup(&rsx->rs_chacha, buf, KEYSZ * 8);
lib/libc/crypt/arc4random.c
84
chacha_ivsetup(&rsx->rs_chacha, buf + KEYSZ);
lib/libc/crypt/arc4random.c
90
u_char rnd[KEYSZ + IVSZ];
libexec/ld.so/util.c
90
char bytes[KEYSZ + IVSZ];
libexec/ld.so/util.c
92
if (_dl_getentropy(bytes, KEYSZ + IVSZ) != 0)
libexec/ld.so/util.c
94
chacha_keysetup(&chacha, bytes, KEYSZ * 8);
libexec/ld.so/util.c
95
chacha_ivsetup(&chacha, bytes + KEYSZ);
libexec/ld.so/util.c
96
if (_dl_getentropy(bytes, KEYSZ + IVSZ) != 0)
sys/dev/rnd.c
127
#define EBUFSIZE KEYSZ + IVSZ
sys/dev/rnd.c
367
KASSERT(n >= KEYSZ + IVSZ);
sys/dev/rnd.c
368
chacha_keysetup(&rs, buf, KEYSZ * 8);
sys/dev/rnd.c
369
chacha_ivsetup(&rs, buf + KEYSZ, NULL);
sys/dev/rnd.c
423
_rs_init(rs_buf, KEYSZ + IVSZ);
sys/dev/rnd.c
480
m = MIN(datlen, KEYSZ + IVSZ);
sys/dev/rnd.c
485
_rs_init(rs_buf, KEYSZ + IVSZ);
sys/dev/rnd.c
486
memset(rs_buf, 0, KEYSZ + IVSZ);
sys/dev/rnd.c
487
rs_have = sizeof(rs_buf) - KEYSZ - IVSZ;
sys/dev/rnd.c
551
char keybuf[KEYSZ + IVSZ];
sys/dev/rnd.c
554
arc4random_buf(keybuf, KEYSZ + IVSZ);
sys/dev/rnd.c
555
chacha_keysetup(ctx, keybuf, KEYSZ * 8);
sys/dev/rnd.c
556
chacha_ivsetup(ctx, keybuf + KEYSZ, NULL);