Searched full:conform (Results 1 – 25 of 584) sorted by relevance
12345678910>>...24
1 /* Which POSIX version to conform to, for utilities.41 /* The POSIX version that utilities should conform to. The default is
270 functions are expected to conform to274 function is expected to conform to287 functions do not conform to any standard.
335 conform to348 mode option does not conform to any standard357 mode does not conform to any standard
150 conform to156 functions conform to
145 conform to151 functions conform to
258 conform to265 functions conform to
58 The string length must conform to any restrictions of the MAC algorithm.74 The string length must conform to any restrictions of the MAC algorithm.80 The key length must conform to any restrictions of the MAC algorithm.
78 The string length must conform to any restrictions of the KDF algorithm.101 The length must conform to any restrictions of the KDF algorithm.117 The length must conform to any restrictions of the KDF algorithm.
94 functions conform to102 functions conform to
348 functions conform to361 functions conform to367 functions conform to
222 functions conform to235 functions conform to
109 The string length must conform to any restrictions of the MAC algorithm.122 The string length must conform to any restrictions of the MAC algorithm.127 The key length must conform to any restrictions of the MAC algorithm.
125 The string length must conform to any restrictions of the KDF algorithm.144 The length must conform to any restrictions of the KDF algorithm.158 The length must conform to any restrictions of the KDF algorithm.
315 functions conform to317 and conform to329 functions are expected to conform to
162 functions conform to168 functions conform to
261 functions are expected to conform to267 functions are GNU extensions and conform to no standard.
200 conform to206 functions conform to
157 These functions conform to167 which conform to
336 system call is expected to conform to342 bit on directories is expected to conform to346 system call is expected to conform to
295 system call is expected to conform to301 system calls are expected to conform to
104 some undocumented ctrl functions. These ciphers do not conform to the EVP AEAD115 some undocumented ctrl functions. These ciphers do not conform to the EVP AEAD
243 conform to SP800\-56Ar3 \fIAssurances of Domain-Parameter Validity\fR.249 conform to SP800\-56Ar3 \fIECC Full Public-Key Validation\fR and253 conform to SP800\-56Ar3 \fIPrivate key validity\fR and
219 conform to SP800-56Ar3 I<Assurances of Domain-Parameter Validity>.225 conform to SP800-56Ar3 I<ECC Full Public-Key Validation> and229 conform to SP800-56Ar3 I<Private key validity> and
133 some undocumented ctrl functions. These ciphers do not conform to the EVP AEAD142 some undocumented ctrl functions. These ciphers do not conform to the EVP AEAD
52 This allows managing devices that conform to the98 Writes that do not conform to the zone layout may be significantly slower