Searched full:depicted (Results 1 – 21 of 21) sorted by relevance
257 The depicted example decomposes the AEAD cipher of GCM(AES) based on the319 as the cipher for ESP. The following call sequence is now depicted in364 Generic block ciphers follow the same concept as depicted with the ASCII375 depicted in the ASCII art picture above.
15 The DRBD objects are interconnected to form a matrix as depicted below; a
35 For a two pipeline system such as the one depicted above, the lines
44 depicted on the next figure::62 initialized by a peer device, is depicted on the figure::
22 measurements timeout. Its internal structure is depicted on the next
53 the PLL configuration procedure. The PLLs work as depicted on the next
71 peculiarities the dividers may lack of some functionality depicted on the
31 * a specific calibration parameter as depicted below.
91 * attribute in the buffer right after the character. This is not depicted
80 * array for header for each slave (depicted by the rsc_header). Each h/w
22 is not depicted here.]
33 It is similar to the one depicted below::
263 among NILFS2 files can be depicted as follows::
166 bounds depicted\ [#f4]_, or a field image covering lines of two
61 disappointed when they are later invoked, as fancifully depicted at
31 * The PSCI firmware region depicted below is the default one
158 The current utilization landscape of the CPUs is depicted on the graph
399 * depicted above or if the top waiter is gone away and we are
17 * The ECC layouts are depicted in details in Marvell AN-379, but here
475 - mainly from Avery Pennarun <apenwarr@worldvisions.ca>. Values depicted
31 The file tree structure of ALSA driver is depicted below.