BN_mod_inverse man page on OpenBSD

Man page or keyword search:  
man Server   11362 pages
apropos Keyword Search (all sections)
Output format
OpenBSD logo
[printable version]

BN_MOD_INVERSE(3)		    OpenSSL		     BN_MOD_INVERSE(3)

NAME
       BN_mod_inverse - compute inverse modulo n

SYNOPSIS
	#include <openssl/bn.h>

	BIGNUM *BN_mod_inverse(BIGNUM *r, BIGNUM *a, const BIGNUM *n,
		  BN_CTX *ctx);

DESCRIPTION
       BN_mod_inverse() computes the inverse of a modulo n places the result
       in r ("(a*r)%n==1"). If r is NULL, a new BIGNUM is created.

       ctx is a previously allocated BN_CTX used for temporary variables. r
       may be the same BIGNUM as a or n.

RETURN VALUES
       BN_mod_inverse() returns the BIGNUM containing the inverse, and NULL on
       error. The error codes can be obtained by ERR_get_error(3).

SEE ALSO
       bn(3), ERR_get_error(3), BN_add(3)

HISTORY
       BN_mod_inverse() is available in all versions of SSLeay and OpenSSL.

OpenBSD 4.9							 April 3, 2000
[top]

List of man pages available for OpenBSD

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net