On Tue, Mar 27, 2012 at 8:26 PM, Ken Goldman <kgold...@us.ibm.com> wrote:
> On 3/27/2012 3:51 PM, Jakob Bohm wrote: > >> On 3/27/2012 9:37 PM, Dr. Stephen Henson wrote: >> >>> You should really be using EVP instead of the low level routines. >>> They are well documented with examples. >>> >> Where, precisely? >> >> I didn't find it either when I was looking a few years ago, so I >> settled on the obvious low level APIs too. >> > > In fact, neither the low level or the EVP APIs are documented. I don't > see any AES documentation at all. > > I also use the low level APIs, just because they were easier to find and > understand in the source. I hope you both know what you're doing - using low-level APIs directly is unlikely to result in a secure construction unless you do.