Abstract :
Sometimes, we need to use cryptographic protection from application layer code. Although requirements for this don´t arise that often, when they do, they tend to be met in homegrown, ad hoc ways, and frequently without considering how to best use cryptographic APIs or do key management. In this article, the author considers how to do somewhat better than that.