BN_mod_inverse man page on MirBSD

Man page or keyword search:  
man Server   6113 pages
apropos Keyword Search (all sections)
Output format
MirBSD logo
[printable version]



BN_MOD_INVERSE(3)	     OpenSSL		BN_MOD_INVERSE(3)

NAME
     BN_mod_inverse - compute inverse modulo n

SYNOPSIS
      #include <openssl/bn.h>

      BIGNUM *BN_mod_inverse(BIGNUM *r, BIGNUM *a, const BIGNUM *n,
		BN_CTX *ctx);

DESCRIPTION
     BN_mod_inverse() computes the inverse of a modulo n places
     the result in r ("(a*r)%n==1"). If r is NULL, a new BIGNUM
     is created.

     ctx is a previously allocated BN_CTX used for temporary
     variables. r may be the same BIGNUM as a or n.

RETURN VALUES
     BN_mod_inverse() returns the BIGNUM containing the inverse,
     and NULL on error. The error codes can be obtained by
     ERR_get_error(3).

SEE ALSO
     bn(3), ERR_get_error(3), BN_add(3)

HISTORY
     BN_mod_inverse() is available in all versions of SSLeay and
     OpenSSL.

MirOS BSD #10-current	   2005-02-05				1

[top]

List of man pages available for MirBSD

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net