Windows PowerShell command on Get-command BN_mod_inverse
MyWebUniversity

Manual Pages for UNIX Operating System command usage for man BN_mod_inverse

OpenSSL BN_mod_inverse(3openssl)

NNNNAAAAMMMMEEEE

BN_mod_inverse - compute inverse modulo n

SSSSYYYYNNNNOOOOPPPPSSSSIIIISSSS

#include

BIGNUM *BN_mod_inverse(BIGNUM *r, BIGNUM *a, const BIGNUM *n,

BN_CTX *ctx);

DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN

BN_mod_inverse() computes the inverse of aaaa modulo nnnn places

the result in rrrr ((a*r)%n==1). If rrrr is NULL, a new BBBBIIIIGGGGNNNNUUUUMMMM is

created.

ccccttttxxxx is a previously allocated BBBBNNNN_CCCCTTTTXXXX used for temporary

variables. rrrr may be the same BBBBIIIIGGGGNNNNUUUUMMMM as aaaa or nnnn. RRRREEEETTTTUUUURRRRNNNN VVVVAAAALLLLUUUUEEEESSSS

BN_mod_inverse() returns the BBBBIIIIGGGGNNNNUUUUMMMM containing the inverse,

and NULL on error. The error codes can be obtained by

ERR_get_error(3).

SSSSEEEEEEEE AAAALLLLSSSSOOOO

bn(3), ERR_get_error(3), BN_add(3)

HHHHIIIISSSSTTTTOOOORRRRYYYY

BN_mod_inverse() is available in all versions of SSLeay and

OpenSSL.

25/Sep/2002 Last change: 0.9.8o 1




Contact us      |      About us      |      Term of use      |       Copyright © 2000-2019 MyWebUniversity.com ™