Lines Matching refs:cc

229 	size_t			 cc;
427 growbuf(obuf_t *obuf, size_t cc)
432 if (obuf->c + cc > obuf->alloc) {
433 newalloc = howmany(obuf->alloc + cc, 128) * 128;
503 ref->offset = ARRAY_ELEMENT(pgp->areas, ref->mem).cc;
531 fixup_partials(pgpv_t *pgp, uint8_t *p, size_t totlen, size_t filesize, size_t *cc)
551 for (*cc = 0 ; *cc < totlen ; newcc += partial, *cc += partial + 1) {
552 if (IS_PARTIAL(p[*cc])) {
553 partial = DECODE_PARTIAL(p[*cc]);
554 memcpy(&mem->mem[newcc], &p[*cc + 1], partial);
556 partial = PKT_LENGTH(p, *cc);
557 *cc += PKT_LENGTH_LENGTH(p, *cc);
558 memcpy(&mem->mem[newcc], &p[*cc], partial);
560 *cc += partial;
747 size_t cc;
750 cc = snprintf(s, size, "%s=", name);
752 cc += snprintf(&s[cc], size - cc, "[%u bits] ", bn->bits);
755 cc += snprintf(&s[cc], size - cc, "%s\n", buf);
757 return cc;
770 size_t cc;
772 cc = 0;
773 buf[cc++] = pubkey->version;
774 cc += fmt_32(&buf[cc], (uint32_t)pubkey->birth); /* XXX - do this portably! */
775 buf[cc++] = pubkey->keyalg; /* XXX - sign, or encrypt and sign? */
780 cc += fmt_binary_mpi(&pubkey->bn[RSA_N], &buf[cc], size - cc);
781 cc += fmt_binary_mpi(&pubkey->bn[RSA_E], &buf[cc], size - cc);
784 cc += fmt_binary_mpi(&pubkey->bn[DSA_P], &buf[cc], size - cc);
785 cc += fmt_binary_mpi(&pubkey->bn[DSA_Q], &buf[cc], size - cc);
786 cc += fmt_binary_mpi(&pubkey->bn[DSA_G], &buf[cc], size - cc);
787 cc += fmt_binary_mpi(&pubkey->bn[DSA_Y], &buf[cc], size - cc);
790 cc += fmt_binary_mpi(&pubkey->bn[ELGAMAL_P], &buf[cc], size - cc);
791 cc += fmt_binary_mpi(&pubkey->bn[ELGAMAL_G], &buf[cc], size - cc);
792 cc += fmt_binary_mpi(&pubkey->bn[ELGAMAL_Y], &buf[cc], size - cc);
795 return (unsigned)cc;
803 uint16_t cc;
813 cc = fmt_key_mpis(pubkey, buf, sizeof(buf));
815 fmt_16(len, cc);
817 digest_update(&fphash, buf, (unsigned)cc);
826 cc = fmt_binary_mpi(&pubkey->bn[RSA_N], buf, sizeof(buf));
827 digest_update(&fphash, &buf[2], (unsigned)(cc - 2));
828 cc = fmt_binary_mpi(&pubkey->bn[RSA_E], buf, sizeof(buf));
829 digest_update(&fphash, &buf[2], (unsigned)(cc - 2));
835 if ((cc = fmt_binary_mpi(&pubkey->bn[RSA_N], buf, sizeof(buf))) >= PGPV_KEYID_LEN) {
836 memcpy(fingerprint->v, &buf[cc - PGPV_KEYID_LEN], PGPV_KEYID_LEN);
852 int cc;
859 cc = snprintf(newbuf, sizeof(newbuf), "%02hhx",
861 if (!obuf_add_mem(obuf, newbuf, cc)) {
971 int cc;
977 cc = snprintf(newbuf, sizeof(newbuf), "%04d-%02d-%02d",
980 !obuf_add_mem(obuf, newbuf, cc)) {
984 cc = snprintf(newbuf, sizeof(newbuf),
991 if (!obuf_add_mem(obuf, newbuf, cc)) {
1425 size_t cc;
1428 for (cc = 0 ; cc < pktlen ; cc += subattr.size + lenlen + 1) {
1459 size_t cc;
1461 cc = 0;
1462 switch(litdata->format = p[cc++]) {
1472 litdata->filename.size = litdata->namelen = p[cc++];
1473 litdata->filename.data = &p[cc];
1475 cc += litdata->namelen;
1476 litdata->secs = get_32(&p[cc]);
1477 cc += 4;
1478 litdata->s.data = &p[cc];
1479 litdata->len = litdata->s.size = size - cc;
1481 litdata->offset = cc;
1497 pkt.tag = mem->mem[mem->cc++];
1499 printf("BAD PACKET - bit 7 not 1, offset %zu!\n", mem->cc - 1);
1505 ispartial = (pkt.newfmt && IS_PARTIAL(mem->mem[mem->cc]));
1506 pkt.s.size = get_pkt_len(pkt.newfmt, &mem->mem[mem->cc], mem->size - mem->cc, isprimary);
1507 lenlen = get_pkt_len_len(pkt.newfmt, &mem->mem[mem->cc], isprimary);
1508 pkt.offset = mem->cc;
1509 mem->cc += lenlen;
1511 pkt.s.data = &mem->mem[mem->cc];
1518 pkt.s.size = fixup_partials(pgp, &mem->mem[mem->cc - lenlen], pkt.s.size, mem->size, &size);
1557 printf("hi, need to implement %d, offset %zu\n", pkt.tag, mem->cc);
1560 mem->cc += size;
1762 int cc;
1764 cc = snprintf(newbuf, sizeof(newbuf), " %u/%s ",
1767 !obuf_add_mem(obuf, newbuf, cc)) {
1983 size_t cc;
1985 cc = SUBKEY_LEN("signature") +
1988 return cc;
2147 size_t cc;
2149 cc = 0;
2151 TIME_SNPRINTF(cc, buf, size, "Signature time (%.24s) was before pubkey creation ", signature->birth);
2152 TIME_SNPRINTF(cc, &buf[cc], size - cc, "(%s)", pubkey->birth);
2153 return cc;
2158 TIME_SNPRINTF(cc, buf, size, "Signature expired on %.24s", t);
2159 return cc;
2163 TIME_SNPRINTF(cc, buf, size, "Signature not valid before %.24s", signature->birth);
2164 return cc;
2175 size_t cc;
2178 cc = 0;
2181 TIME_SNPRINTF(cc, buf, size, "Pubkey expired on %.24s", t);
2182 return (int)cc;
2186 TIME_SNPRINTF(cc, buf, size, "Pubkey not valid before %.24s", pubkey->birth);
2187 return (int)cc;
2545 for (mem->cc = 0; mem->cc < mem->size ; ) {
2643 int cc;
2693 cc = bufgap_getbin(&bg, buf, (size_t)bg.bcc);
2695 cc = (int)(space - buf);
2697 cc = frombase64(bin, buf, (size_t)cc, 0);
2699 bufgap_insert(&bg, bin, cc);
2756 cc = snprintf(newbuf, sizeof(newbuf), "%s (%s) %s",
2758 userid.userid.size = cc;
2760 if ((userid.userid.data = calloc(1, cc + 1)) == NULL) {
2763 memcpy(userid.userid.data, newbuf, cc);
3315 size_t cc;
3320 cc = alloc = 0;
3323 if (cc + KB(64) >= alloc) {
3325 return cc;
3335 n = snprintf(&(*data)[cc], alloc - cc,
3343 cc += n;
3345 return cc;