mirror of
https://github.com/openssl/openssl.git
synced 2024-12-21 06:09:35 +08:00
a528d4f0a9
If something was "present in all versions" of SSLeay, or if it was added to a version of SSLeay (and therefore predates OpenSSL), remove mention of it. Documentation history now starts with OpenSSL. Remove mention of all history before OpenSSL 0.9.8, inclusive. Remove all AUTHOR sections. Reviewed-by: Tim Hudson <tjh@openssl.org>
33 lines
711 B
Plaintext
33 lines
711 B
Plaintext
=pod
|
|
|
|
=head1 NAME
|
|
|
|
BN_mod_inverse - compute inverse modulo n
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
#include <openssl/bn.h>
|
|
|
|
BIGNUM *BN_mod_inverse(BIGNUM *r, BIGNUM *a, const BIGNUM *n,
|
|
BN_CTX *ctx);
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
BN_mod_inverse() computes the inverse of B<a> modulo B<n>
|
|
places the result in B<r> (C<(a*r)%n==1>). If B<r> is NULL,
|
|
a new B<BIGNUM> is created.
|
|
|
|
B<ctx> is a previously allocated B<BN_CTX> used for temporary
|
|
variables. B<r> may be the same B<BIGNUM> as B<a> or B<n>.
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
BN_mod_inverse() returns the B<BIGNUM> containing the inverse, and
|
|
NULL on error. The error codes can be obtained by L<ERR_get_error(3)>.
|
|
|
|
=head1 SEE ALSO
|
|
|
|
L<bn(3)>, L<ERR_get_error(3)>, L<BN_add(3)>
|
|
|
|
=cut
|