Did you know ... Search Documentation:
Title for pldoc(dir_index)

ssl

Prolog files

crypto.pl  -- Cryptography and authentication libraryShow source
crypto_context_hash/2Obtain the hash code of Context.Source
crypto_context_new/2Context is unified with the empty context, taking into account Options.Source
crypto_curve_generator/2Point is the generator of the elliptic curve Curve.Source
crypto_curve_order/2Obtain the order of an elliptic curve.Source
crypto_curve_scalar_mult/4R is the result of N times Point on the elliptic curve Curve.Source
crypto_data_context/3Context0 is an existing computation context, and Context is the new context after hashing Data in addition to the previously hashed data.Source
crypto_data_decrypt/6Decrypt the given CipherText, using the symmetric algorithm Algorithm, key Key, and initialization vector IV, to give PlainText.Source
crypto_data_encrypt/6Encrypt the given PlainText, using the symmetric algorithm Algorithm, key Key, and initialization vector (or nonce) IV, to give CipherText.Source
crypto_data_hash/3Hash is the hash of Data.Source
crypto_data_hkdf/4Concentrate possibly dispersed entropy of Data and then expand it to the desired length.Source
crypto_file_hash/3True if Hash is the hash of the content of File.Source
crypto_generate_prime/3Generate a prime P with at least N bits.Source
crypto_is_prime/2True iff P passes a probabilistic primality test.Source
crypto_modular_inverse/3Compute the modular multiplicative inverse of the integer X.Source
crypto_n_random_bytes/2Bytes is unified with a list of N cryptographically secure pseudo-random bytes.Source
crypto_name_curve/2Obtain a handle for a named elliptic curve.Source
crypto_open_hash_stream/3Open a filter stream on OrgStream that maintains a hash.Source
crypto_password_hash/2If Hash is instantiated, the predicate succeeds iff the hash matches the given password.Source
crypto_password_hash/3Derive Hash based on Password.Source
crypto_stream_hash/2Unify Hash with a hash for the bytes sent to or read from HashStream.Source
ecdsa_sign/4Create an ECDSA signature for Data with EC private key Key.Source
ecdsa_verify/4True iff Signature can be verified as the ECDSA signature for Data, using the EC public key Key.Source
hex_bytes/2Relation between a hexadecimal sequence and a list of bytes.Source
rsa_private_decrypt/4RSA Public key encryption and decryption primitives.Source
rsa_private_encrypt/4RSA Public key encryption and decryption primitives.Source
rsa_public_decrypt/4RSA Public key encryption and decryption primitives.Source
rsa_public_encrypt/4RSA Public key encryption and decryption primitives.Source
rsa_sign/4Create an RSA signature for Data with private key Key.Source
rsa_verify/4Verify an RSA signature for Data with public key Key.Source
saml.pl  -- SAML AuthenticationShow source
ssl.pl  -- Secure Socket Layer (SSL) libraryShow source
xmldsig.pl  -- XML Digital signatureShow source
xmlenc.pl  -- XML encryption libraryShow source