Appendix A. Source Code

A.1 Introduction

This appendix contains some miscellaneous source code that was referenced, but did not appear, in the main text. Short descriptions of the few library routines from ETCP used in the text are also included. The source code for these library routines is available on the author’s Web site.

A.2 Cryptographic Routines

This section shows implementations of some simple cryptographic algorithms mentioned in Chapter 3. Two implementations of the Extended Euclidean Algorithm, which is used to find inverses in Zp, are also shown.

Be aware that these implementations are intended to illustrate the principles involved and are definitely not meant to be used in real cryptographic software. As we’ve seen throughout ...

Get VPNs Illustrated: Tunnels, VPNs, and IPsec now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.