Lines Matching refs:used
1 This document explains the strategy that was used so far in starting the
48 - When `MBEDTLS_PSA_CRYPTO_C` is enabled and used, applications need to call
132 The are multiple strategies that can be used regarding the place of those
146 This strategy is currently (early 2023) used for all operations in the PK
155 This strategy will probably be used for some time for the PK layer, while we
173 This strategy is currently (early 2023) used for the MD layer and the Cipher
190 This strategy is not useful when no context is used, for example with the
198 This strategy, with support for key isolation, is currently (early 2022) used for
203 This strategy, without key isolation, was also previously used (until 3.1
218 Strategies currently (early 2022) used with each abstraction layer:
236 (driver used, software implementation and abstraction layer compiled out),
256 3. Adapt compile-time guards used to query availability of a given algorithm;
331 macro that can be used to express dependencies everywhere (except pure PSA
356 taken to ensure this does not happen. The following criteria can be used:
434 when it's actually used.
455 would mostly benefit people who already used those generic APis rather than