BN_mod_inverse man page on HP-UX

Printed from http://www.polarhome.com/service/man/?qf=BN_mod_inverse&af=0&tf=2&of=HP-UX

BN_mod_inverse(3)		    OpenSSL		     BN_mod_inverse(3)

NAME
       BN_mod_inverse - compute inverse modulo n

SYNOPSIS
	#include <openssl/bn.h>

	BIGNUM *BN_mod_inverse(BIGNUM *r, BIGNUM *a, const BIGNUM *n,
		  BN_CTX *ctx);

DESCRIPTION
       BN_mod_inverse() computes the inverse of a modulo n places the result
       in r ("(a*r)%n==1"). If r is NULL, a new BIGNUM is created.

       ctx is a previously allocated BN_CTX used for temporary variables. r
       may be the same BIGNUM as a or n.

RETURN VALUES
       BN_mod_inverse() returns the BIGNUM containing the inverse, and NULL on
       error. The error codes can be obtained by ERR_get_error(3).

SEE ALSO
       bn(3), ERR_get_error(3), BN_add(3)

HISTORY
       BN_mod_inverse() is available in all versions of SSLeay and OpenSSL.

0.9.8k				  2009-05-20		     BN_mod_inverse(3)
[top]

List of man pages available for HP-UX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net