From 02d4168d68aff5c6f323476b8cebdedf39af8715 Mon Sep 17 00:00:00 2001 From: Jin Fang Cheng Cheng Date: Wed, 23 May 2018 14:02:30 +0800 Subject: [PATCH] Update blufi.rst --- docs/en/api-guides/blufi.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/en/api-guides/blufi.rst b/docs/en/api-guides/blufi.rst index 9c70a08e7b..2aab6db8d5 100644 --- a/docs/en/api-guides/blufi.rst +++ b/docs/en/api-guides/blufi.rst @@ -11,7 +11,7 @@ Fragmenting, data encryption, checksum verification in the BluFi layer are the k You can customize symmetric encryption, asymmetric encryption and checksum support custmization on your demand in practical use. Here we use the DH algorithm for key negotiation, 128-AES algorithm for data encryption, and CRC16 algorithm for checksum verification. The BluFi Flow --------------- +---------------- The BluFi networking flow includes the configuration of the SoftAP and Station. The following uses Station as an example to illustrate the core parts of the procedure, including broadcast, connection, service discovery, negotiation of the shared key, data transmission, connection status backhaul. -- 2.40.0