BN_mod_inverse - compute inverse modulo n
#include <openssl/bn.h> BIGNUM *BN_mod_inverse(BIGNUM *r, BIGNUM *a, const BIGNUM *n, BN_CTX *ctx);
BN_mod_inverse(3openssl) OpenSSL BN_mod_inverse(3openssl)
NAME
BN_mod_inverse - compute inverse modulo n
SYNOPSIS
#include <openssl/bn.h>
BIGNUM *BN_mod_inverse(BIGNUM *r, BIGNUM *a, const BIGNUM *n,
BN_CTX *ctx);
DESCRIPTION
BN_mod_inverse() computes the inverse of a modulo n places the result
in r ("(a*r)%n==1"). If r is NULL, a new BIGNUM is created.
ctx is a previously allocated BN_CTX used for temporary variables. r
may be the same BIGNUM as a or n.
RETURN VALUES
BN_mod_inverse() returns the BIGNUM containing the inverse, and NULL on
error. The error codes can be obtained by ERR_get_error(3).
ATTRIBUTES
See attributes(7) for descriptions of the following attributes:
+---------------+--------------------------+
|ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+---------------+--------------------------+
|Availability | library/security/openssl |
+---------------+--------------------------+
|Stability | Pass-through uncommitted |
+---------------+--------------------------+
SEE ALSO
bn(3), ERR_get_error(3), BN_add(3)
HISTORY
BN_mod_inverse() is available in all versions of SSLeay and OpenSSL.
NOTES
Source code for open source software components in Oracle Solaris can
be found at https://www.oracle.com/downloads/opensource/solaris-source-
code-downloads.html.
This software was built from source available at
https://github.com/oracle/solaris-userland. The original community
source was downloaded from
https://www.openssl.org/source/openssl-1.0.2ze.tar.gz.
Further information about this software can be found on the open source
community website at https://www.openssl.org/.
1.0.2ze 2022-05-03 BN_mod_inverse(3openssl)