Name

BN_mod_inverse — computes inverse modulo n


Library

libcrypto.lib


Synopsis

#include <openssl/bn.h>
BIGNUM *BN_mod_inverse(BIGNUM *r, BIGNUM *a, const BIGNUM *n, BN_CTX *ctx);


Detailed Description

BN_mod_inverse() computes the inverse of a modulo n places the result in r ((a*r)%n==1). If r is NULL, a new BIGNUM is created.

ctx is a previously allocated BN_CTX used for temporary variables. r may be the same BIGNUM as a or n.


Return Values

BN_mod_inverse() returns the BIGNUM containing the inverse, and NULL on error. The error codes can be obtained by ERR_get_error().


See Also

bn(), ERR_get_error(), BN_add()


History

BN_mod_inverse() is available in all versions of SSLeay and OpenSSL.


Feedback

For additional information or queries on this page send feedback


© 2008 Nokia Corporation. All rights reserved. This documentation can be used in the connection with this Product to help and support the user. 

Top