BN_mod_inverse.3ossl - Man Page

compute inverse modulo n

Synopsis

 #include <openssl/bn.h>

 BIGNUM *BN_mod_inverse(BIGNUM *r, BIGNUM *a, const BIGNUM *n,
                        BN_CTX *ctx);

Description

BN_mod_inverse() computes the inverse of a modulo n places the result in r ((a*r)%n==1). If r is NULL, a new BIGNUM is created.

ctx is a previously allocated BN_CTX used for temporary variables. r may be the same BIGNUM as a.

Notes

It is an error to use the same BIGNUM as n.

Return Values

BN_mod_inverse() returns the BIGNUM containing the inverse, and NULL on error. The error codes can be obtained by ERR_get_error(3).

See Also

ERR_get_error(3), BN_add(3)

Info

2024-09-12 3.2.2 OpenSSL