Lines Matching full:strategy
1 This document explains the strategy that was used so far in starting the
127 current strategy is to keep using those identifiers in most of the code, in
146 This strategy is currently (early 2023) used for all operations in the PK
152 This strategy is not very well suited to the Cipher layer, as the PSA
155 This strategy will probably be used for some time for the PK layer, while we
173 This strategy is currently (early 2023) used for the MD layer and the Cipher
190 This strategy is not useful when no context is used, for example with the
193 There are two variants of this strategy: one where using the new setup
198 This strategy, with support for key isolation, is currently (early 2022) used for
203 This strategy, without key isolation, was also previously used (until 3.1
210 "opt-in" strategy can apply, and can complement each other, as one provides
289 **Strategy for step 1:**
292 (The strategy was outlined in the previous section.)
302 **Strategy for step 2:**
316 **Strategy for step 3:**
381 only natural to consider using the same strategy (with the PK, MD and Cipher