Searched full:conform (Results 1 – 25 of 561) sorted by relevance
12345678910>>...23
1 /* Which POSIX version to conform to, for utilities.41 /* The POSIX version that utilities should conform to. The default is
59 The string length must conform to any restrictions of the MAC algorithm.75 The string length must conform to any restrictions of the MAC algorithm.81 The key length must conform to any restrictions of the MAC algorithm.
78 The string length must conform to any restrictions of the KDF algorithm.101 The length must conform to any restrictions of the KDF algorithm.117 The length must conform to any restrictions of the KDF algorithm.
130 The string length must conform to any restrictions of the MAC algorithm.138 The key length must conform to any restrictions of the MAC algorithm.147 The string length must conform to any restrictions of the MAC algorithm.
269 functions are expected to conform to273 function is expected to conform to286 functions do not conform to any standard.
335 conform to348 mode option does not conform to any standard357 mode does not conform to any standard
150 conform to156 functions conform to
145 conform to151 functions conform to
258 conform to265 functions conform to
94 functions conform to102 functions conform to
348 functions conform to361 functions conform to367 functions conform to
222 functions conform to235 functions conform to
315 functions conform to317 and conform to329 functions are expected to conform to
162 functions conform to168 functions conform to
200 conform to206 functions conform to
157 These functions conform to167 which conform to
336 system call is expected to conform to342 bit on directories is expected to conform to346 system call is expected to conform to
295 system call is expected to conform to301 system calls are expected to conform to
273 system call is expected to conform to279 system calls are expected to conform to
185 The string length must conform to any restrictions of the \s-1MAC\s0 algorithm.198 The string length must conform to any restrictions of the \s-1MAC\s0 algorithm.203 The key length must conform to any restrictions of the \s-1MAC\s0 algorithm.
200 The string length must conform to any restrictions of the \s-1KDF\s0 algorithm.219 The length must conform to any restrictions of the \s-1KDF\s0 algorithm.233 The length must conform to any restrictions of the \s-1KDF\s0 algorithm.
246 The string length must conform to any restrictions of the \s-1MAC\s0 algorithm.253 The key length must conform to any restrictions of the \s-1MAC\s0 algorithm.261 The string length must conform to any restrictions of the \s-1MAC\s0 algorithm.
104 some undocumented ctrl functions. These ciphers do not conform to the EVP AEAD115 some undocumented ctrl functions. These ciphers do not conform to the EVP AEAD
189 conform to SP800-56Ar3 I<Assurances of Domain-Parameter Validity>.195 conform to SP800-56Ar3 I<ECC Full Public-Key Validation> and199 conform to SP800-56Ar3 I<Private key validity> and
52 This allows managing devices that conform to the98 Writes that do not conform to the zone layout may be significantly slower