From 9108bec11061b8669d0ade1127258897ff650399 Mon Sep 17 00:00:00 2001 From: kokke Date: Sat, 8 Jul 2017 02:04:39 +0200 Subject: Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 527c301..360488b 100644 --- a/README.md +++ b/README.md @@ -14,7 +14,7 @@ You can choose to use the standard 128b key or 192/256b by defining the symbols You can choose to use one or both of the modes-of-operation, by defining the symbols CBC and ECB. See the header file for clarification. -There is no built-in error checking or protection from out-of-bounds memory access errors as a result of malicious input. The two functions AES_ECB_xxcrypt() do most of the work, and they expect inputs of 128 bit length. +There is no built-in error checking or protection from out-of-bounds memory access errors as a result of malicious input. The two functions AES_ECB_xxcrypt() do most of the work, and they expect inputs of 128 bit length (or 192/256). The module uses around 200 bytes of RAM and 2.5K ROM when compiled for ARM (~2K for Thumb but YMMV). -- cgit v1.2.3