On Tue, Mar 27, 2012 at 8:26 PM, Ken Goldman <kgold...@us.ibm.com> wrote:

> On 3/27/2012 3:51 PM, Jakob Bohm wrote:
>
>> On 3/27/2012 9:37 PM, Dr. Stephen Henson wrote:
>>
>>> You should really be using EVP instead of the low level routines.
>>> They are well documented with examples.
>>>
>> Where, precisely?
>>
>> I didn't find it either when I was looking a few years ago, so I
>> settled on the obvious low level APIs too.
>>
>
> In fact, neither the low level or the EVP APIs are documented.  I don't
> see any AES documentation at all.
>
> I also use the low level APIs, just because they were easier to find and
> understand in the source.


I hope you both know what you're doing - using low-level APIs directly is
unlikely to result in a secure construction unless you do.

Reply via email to