diff --git a/components/bt/include/esp_bt.h b/components/bt/include/esp_bt.h index 28aa3cbdf..9b599f428 100644 --- a/components/bt/include/esp_bt.h +++ b/components/bt/include/esp_bt.h @@ -291,7 +291,7 @@ void esp_vhci_host_register_callback(const esp_vhci_host_callback_t *callback); /** @brief esp_bt_controller_mem_release * release the memory by mode, if never use the bluetooth mode - * it can release the .bbs, .data and other section to heap. + * it can release the .bss, .data and other section to heap. * The total size is about 70k bytes. * * esp_bt_controller_mem_release(mode) should be called only before esp_bt_controller_init() diff --git a/docs/en/security/flash-encryption.rst b/docs/en/security/flash-encryption.rst index f44fa18bb..584a6df25 100644 --- a/docs/en/security/flash-encryption.rst +++ b/docs/en/security/flash-encryption.rst @@ -196,7 +196,7 @@ Flash encryption keys are 32 bytes of random data. You can generate a random key Alternatively, if you're using :doc:`secure boot ` and have a secure boot signing key then you can generate a deterministic SHA-256 digest of the secure boot private signing key and use this as the flash encryption key:: - espsecure.py digest_private-key --keyfile secure_boot_signing_key.pem my_flash_encryption_key.bin + espsecure.py digest_private_key --keyfile secure_boot_signing_key.pem my_flash_encryption_key.bin (The same 32 bytes is used as the secure boot digest key if you enable :ref:`reflashable mode` for secure boot.)