Did you know ... Search Documentation:
Title for pldoc(dir_index)


Prolog files

crypto.pl  -- Cryptography and authentication libraryShow source
crypto_context_hash/2Obtain the hash code of Context.Source
crypto_context_new/2Context is unified with the empty context, taking into account Options.Source
crypto_curve_generator/2Point is the generator of the elliptic curve Curve.Source
crypto_curve_order/2Obtain the order of an elliptic curve.Source
crypto_curve_scalar_mult/4R is the result of N times Point on the elliptic curve Curve.Source
crypto_data_context/3Context0 is an existing computation context, and Context is the new context after hashing Data in addition to the previously hashed data.Source
crypto_data_decrypt/6Decrypt the given CipherText, using the symmetric algorithm Algorithm, key Key, and initialization vector IV, to give PlainText.Source
crypto_data_encrypt/6Encrypt the given PlainText, using the symmetric algorithm Algorithm, key Key, and initialization vector (or nonce) IV, to give CipherText.Source
crypto_data_hash/3Hash is the hash of Data.Source
crypto_data_hkdf/4Concentrate possibly dispersed entropy of Data and then expand it to the desired length.Source
crypto_file_hash/3True if Hash is the hash of the content of File.Source
crypto_generate_prime/3Generate a prime P with at least N bits.Source
crypto_is_prime/2True iff P passes a probabilistic primality test.Source
crypto_modular_inverse/3Compute the modular multiplicative inverse of the integer X.Source
crypto_n_random_bytes/2Bytes is unified with a list of N cryptographically secure pseudo-random bytes.Source
crypto_name_curve/2Obtain a handle for a named elliptic curve.Source
crypto_open_hash_stream/3Open a filter stream on OrgStream that maintains a hash.Source
crypto_password_hash/2If Hash is instantiated, the predicate succeeds iff the hash matches the given password.Source
crypto_password_hash/3Derive Hash based on Password.Source
crypto_stream_hash/2Unify Hash with a hash for the bytes sent to or read from HashStream.Source
ecdsa_sign/4Create an ECDSA signature for Data with EC private key Key.Source
ecdsa_verify/4True iff Signature can be verified as the ECDSA signature for Data, using the EC public key Key.Source
hex_bytes/2Relation between a hexadecimal sequence and a list of bytes.Source
rsa_private_decrypt/4RSA Public key encryption and decryption primitives.Source
rsa_private_encrypt/4RSA Public key encryption and decryption primitives.Source
rsa_public_decrypt/4RSA Public key encryption and decryption primitives.Source
rsa_public_encrypt/4RSA Public key encryption and decryption primitives.Source
rsa_sign/4Create an RSA signature for Data with private key Key.Source
rsa_verify/4Verify an RSA signature for Data with public key Key.Source
saml.pl  -- SAML AuthenticationShow source
ssl.pl  -- Secure Socket Layer (SSL) libraryShow source
cert_accept_any/5Implementation for the hook `cert_verify_hook(:Hook)` that accepts any certificate.Source
certificate_field/2Retrieve the field matching Field from Certificate.Source
load_certificate/2Loads a certificate from a PEM- or DER-encoded stream, returning a certificate.Source
load_crl/2Loads a CRL from a PEM- or DER-encoded stream, returning a term containing terms hash/1, signature/1, issuer_name/1 and revocations/1, which is a list of revoked/2 terms.Source
load_private_key/3Load a private key PrivateKey from the given stream Stream, using Password to decrypt the key if it is encrypted.Source
load_public_key/2Load a public key PublicKey from the given stream Stream.Source
same_certificate/2True if CertificateA is logically the same as CertificateB, even if they are stored in different blobs.Source
ssl_add_certificate_key/4Add an additional certificate/key pair to SSL0, yielding SSL.Source
ssl_context/3Create an SSL context.Source
ssl_negotiate/5Once a connection is established and a read/write stream pair is available, (PlainRead and PlainWrite), this predicate can be called to negotiate an SSL session over the streams.Source
ssl_peer_certificate/2True if the peer certificate is provided (this is always the case for a client connection) and Certificate unifies with the peer certificate.Source
ssl_peer_certificate_chain/2Certificates is the certificate chain provided by the peer, represented as a list of certificates.Source
ssl_property/2True when Property is a property of SSL.Source
ssl_secure_ciphers/1Ciphers is a secure cipher preference list that can be used in the cipher_list/1 option of ssl_context/3.Source
ssl_session/2Retrieves (debugging) properties from the SSL context associated with Stream.Source
ssl_set_options/3SSL is the same as SSL0, except for the options specified in Options.Source
ssl_upgrade_legacy_options/2Handle deprecated cacert_file(Spec) option and map it to the new cacerts(+List) option.Source
system_root_certificates/1List is a list of trusted root certificates as provided by the OS.Source
verify_certificate/3True if it is possible to build a chain of trust from Certificate to one of the certificates in TrustedCertificates, optionally using the (untrusted) certificates in AuxiliaryCertificates to complete the chain.Source
verify_certificate_issuer/2True if Certificate is a certificate which was issued by the certificate Issuer.Source
write_certificate/3Writes a certificate to the stream Stream.Source
xmldsig.pl  -- XML Digital signatureShow source
xmld_signed_DOM/3Translate an XML DOM structure in a signed version.Source
xmld_verify_signature/4Confirm that an ds:Signature element contains a valid signature.Source
xmlenc.pl  -- XML encryption libraryShow source
load_certificate_from_base64_string/2Loads a certificate from a string, adding newlines and header where appropriate so that OpenSSL 1.0.1+ will be able to parse it.Source