diff options
author | kokke <spam@rowdy.dk> | 2017-12-04 20:51:58 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-12-04 20:51:58 +0100 |
commit | b8394f3065786e5d256ea70e9a71c5eeaa232cde (patch) | |
tree | ec63eade313e1ebf5f07f17d996b4c6f50f38c9c /README.md | |
parent | Update aes.c (diff) | |
download | tiny-AES-c-b8394f3065786e5d256ea70e9a71c5eeaa232cde.tar tiny-AES-c-b8394f3065786e5d256ea70e9a71c5eeaa232cde.tar.gz tiny-AES-c-b8394f3065786e5d256ea70e9a71c5eeaa232cde.tar.bz2 tiny-AES-c-b8394f3065786e5d256ea70e9a71c5eeaa232cde.tar.lz tiny-AES-c-b8394f3065786e5d256ea70e9a71c5eeaa232cde.tar.xz tiny-AES-c-b8394f3065786e5d256ea70e9a71c5eeaa232cde.tar.zst tiny-AES-c-b8394f3065786e5d256ea70e9a71c5eeaa232cde.zip |
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -20,7 +20,7 @@ void AES_CTR_xcrypt_buffer(uint8_t* output, uint8_t* input, uint32_t length, con You can choose to use any or all of the modes-of-operations, by defining the symbols CBC, CTR or ECB. See the header file for clarification. -There is no built-in error checking or protection from out-of-bounds memory access errors as a result of malicious input. The two functions AES_ECB_xxcrypt() do most of the work, and they expect inputs of 128 bit length. +There is no built-in error checking or protection from out-of-bounds memory access errors as a result of malicious input. The module uses less than 200 bytes of RAM and 1-2K ROM when compiled for ARM, but YMMV depending on which modes are enabled. |