diff options
author | kokke <spam@rowdy.dk> | 2017-07-11 00:13:01 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-07-11 00:13:01 +0200 |
commit | 3d4ae34b11a241f730d22e12b97561340478af07 (patch) | |
tree | 1e782b9a7803cf3257b268e76f2cb1ab7c000f88 | |
parent | Update README.md (diff) | |
download | tiny-AES-c-3d4ae34b11a241f730d22e12b97561340478af07.tar tiny-AES-c-3d4ae34b11a241f730d22e12b97561340478af07.tar.gz tiny-AES-c-3d4ae34b11a241f730d22e12b97561340478af07.tar.bz2 tiny-AES-c-3d4ae34b11a241f730d22e12b97561340478af07.tar.lz tiny-AES-c-3d4ae34b11a241f730d22e12b97561340478af07.tar.xz tiny-AES-c-3d4ae34b11a241f730d22e12b97561340478af07.tar.zst tiny-AES-c-3d4ae34b11a241f730d22e12b97561340478af07.zip |
-rw-r--r-- | README.md | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -16,7 +16,7 @@ void AES_CBC_decrypt_buffer(uint8_t* output, uint8_t* input, uint32_t length, co You can choose to use one or both of the modes-of-operation, by defining the symbols CBC and ECB. See the header file for clarification. -There is no built-in error checking or protection from out-of-bounds memory access errors as a result of malicious input. The two functions AES_ECB_xxcrypt() do most of the work, and they expect inputs of 128 bit length (or 192/256). +There is no built-in error checking or protection from out-of-bounds memory access errors as a result of malicious input. The two functions AES_ECB_xxcrypt() do most of the work, and they expect inputs of 128 bit length. The module uses around 200 bytes of RAM and 2.5K ROM when compiled for ARM (~2K for Thumb but YMMV). |