BN_mod_inverse man page on DragonFly

Man page or keyword search:  
man Server   44335 pages
apropos Keyword Search (all sections)
Output format
DragonFly logo
[printable version]

BN_MOD_INVERSE(3)	 BSD Library Functions Manual	     BN_MOD_INVERSE(3)

NAME
     BN_mod_inverse — compute inverse modulo n

SYNOPSIS
     #include <openssl/bn.h>

     BIGNUM *
     BN_mod_inverse(BIGNUM *r, BIGNUM *a, const BIGNUM *n, BN_CTX *ctx);

DESCRIPTION
     BN_mod_inverse() computes the inverse of a modulo n add places the result
     in r ((a*r)%n==1).	 If r is NULL, a new BIGNUM is created.

     ctx is a previously allocated BN_CTX used for temporary variables.	 r may
     be the same BIGNUM as a or n.

RETURN VALUES
     BN_mod_inverse() returns the BIGNUM containing the inverse, or NULL on
     error.  The error codes can be obtained by ERR_get_error(3).

SEE ALSO
     bn(3), BN_add(3), ERR_get_error(3)

HISTORY
     BN_mod_inverse() is available in all versions of SSLeay and OpenSSL.

BSD				April 18, 2024				   BSD
[top]

List of man pages available for DragonFly

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net