MirBSD manpage: BN_mod_inverse(3)


BN_MOD_INVERSE(3)            OpenSSL            BN_MOD_INVERSE(3)

NAME

     BN_mod_inverse - compute inverse modulo n

SYNOPSIS

      #include <openssl/bn.h>

      BIGNUM *BN_mod_inverse(BIGNUM *r, BIGNUM *a, const BIGNUM *n,
                BN_CTX *ctx);

DESCRIPTION

     BN_mod_inverse() computes the inverse of a modulo n places
     the result in r ("(a*r)%n==1"). If r is NULL, a new BIGNUM
     is created.

     ctx is a previously allocated BN_CTX used for temporary
     variables. r may be the same BIGNUM as a or n.

RETURN VALUES

     BN_mod_inverse() returns the BIGNUM containing the inverse,
     and NULL on error. The error codes can be obtained by
     ERR_get_error(3).

SEE ALSO

     bn(3), ERR_get_error(3), BN_add(3)

HISTORY

     BN_mod_inverse() is available in all versions of SSLeay and
     OpenSSL.

MirBSD #10-current         2005-02-05                           1

Generated on 2022-12-24 01:00:14 by $MirOS: src/scripts/roff2htm,v 1.113 2022/12/21 23:14:31 tg Exp $ — This product includes material provided by mirabilos.

These manual pages and other documentation are copyrighted by their respective writers; their sources are available at the project’s CVSweb, AnonCVS and other mirrors. The rest is Copyright © 2002–2022 MirBSD.

This manual page’s HTML representation is supposed to be valid XHTML/1.1; if not, please send a bug report — diffs preferred.

Kontakt / Impressum & Datenschutzerklärung