diff options
author | kokke <spam@rowdy.dk> | 2017-12-08 15:34:40 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-12-08 15:34:40 +0100 |
commit | d574614f02893e78e50402ee9cf784d96a7ee3bb (patch) | |
tree | 0af75e83dedb2ac81ee7ce49892fe0511d0bae5b | |
parent | Update test.c (diff) | |
download | tiny-AES-c-d574614f02893e78e50402ee9cf784d96a7ee3bb.tar tiny-AES-c-d574614f02893e78e50402ee9cf784d96a7ee3bb.tar.gz tiny-AES-c-d574614f02893e78e50402ee9cf784d96a7ee3bb.tar.bz2 tiny-AES-c-d574614f02893e78e50402ee9cf784d96a7ee3bb.tar.lz tiny-AES-c-d574614f02893e78e50402ee9cf784d96a7ee3bb.tar.xz tiny-AES-c-d574614f02893e78e50402ee9cf784d96a7ee3bb.tar.zst tiny-AES-c-d574614f02893e78e50402ee9cf784d96a7ee3bb.zip |
-rw-r--r-- | aes.h | 1 |
1 files changed, 0 insertions, 1 deletions
@@ -79,7 +79,6 @@ void AES_CBC_decrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, uint32_t length); // Same function for encrypting as for decrypting. // IV is incremented for every block, and used after encryption as XOR-compliment for output -// buffer size MUST be multiple of AES_BLOCKLEN; // Suggesting https://en.wikipedia.org/wiki/Padding_(cryptography)#PKCS7 for padding scheme // NOTES: you need to set IV in ctx with AES_init_ctx_iv() or AES_ctx_set_iv() // no IV should ever be reused with the same key |