- swi-prolog
- library
- error.pl -- Error generating support
- apply.pl -- Apply predicates on a list
- lists.pl -- List Manipulation
- pairs.pl -- Operations on key-value lists
- debug.pl -- Print debug messages and test assertions
- broadcast.pl -- Event service
- socket.pl -- Network socket (TCP and UDP) library
- shlib.pl -- Utility library for loading foreign objects (DLLs, shared objects)
- option.pl -- Option list processing
- uid.pl -- User and group management on Unix systems
- unix.pl -- Unix specific operations
- syslog.pl -- Unix syslog interface
- thread_pool.pl -- Resource bounded thread management
- rbtrees.pl -- Red black trees
- gensym.pl -- Generate unique symbols
- readutil.pl -- Read utilities
- url.pl -- Analysing and constructing URL
- utf8.pl -- UTF-8 encoding/decoding on lists of character codes.
- uri.pl -- Process URIs
- memfile.pl
- settings.pl -- Setting management
- arithmetic.pl -- Extensible arithmetic
- sgml.pl -- SGML, XML and HTML parser
- iostream.pl -- Utilities to deal with streams
- dialect.pl
- quasi_quotations.pl -- Define Quasi Quotation syntax
- pure_input.pl -- Pure Input from files and streams
- time.pl -- Time and alarm library
- main.pl -- Provide entry point for scripts
- ssl.pl -- Secure Socket Layer (SSL) library
- crypto.pl -- Cryptography and authentication library
- crypto_n_random_bytes/2
- crypto_data_hash/3
- crypto_file_hash/3
- crypto_context_new/2
- crypto_data_context/3
- crypto_context_hash/2
- crypto_open_hash_stream/3
- crypto_stream_hash/2
- crypto_password_hash/2
- crypto_password_hash/3
- crypto_data_hkdf/4
- ecdsa_sign/4
- ecdsa_verify/4
- hex_bytes/2
- rsa_private_decrypt/4
- rsa_private_encrypt/4
- rsa_public_decrypt/4
- rsa_public_encrypt/4
- rsa_sign/4
- rsa_verify/4
- crypto_data_decrypt/6
- crypto_data_encrypt/6
- crypto_modular_inverse/3
- crypto_generate_prime/3
- crypto_is_prime/2
- crypto_name_curve/2
- crypto_curve_order/2
- crypto_curve_generator/2
- crypto_curve_scalar_mult/4
- filesex.pl -- Extended operations on files
- doc_http.pl -- Documentation server
- pldoc.pl -- Process source documentation
- operators.pl -- Manage operators
- prolog_source.pl -- Examine Prolog source-files
- base64.pl -- Base64 encoding and decoding
- aggregate.pl -- Aggregation operators on backtrackable predicates
- ordsets.pl -- Ordered set manipulation
- oset.pl -- Ordered set manipulation
- www_browser.pl -- Open a URL in the users browser
- process.pl -- Create processes and redirect I/O
- prolog_colour.pl -- Prolog syntax colouring support.
- prolog_xref.pl -- Prolog cross-referencer data collection
- predicate_options.pl -- Access and analyse predicate options
- prolog_clause.pl -- Get detailed source-information about a clause
- occurs.pl -- Finding and counting sub-terms
- listing.pl -- List programs and pretty print clauses
- record.pl -- Access compound arguments by name
- assoc.pl -- Binary associations
- ugraphs.pl -- Graph manipulation library
- xpath.pl -- Select nodes in an XML DOM
- prolog_pack.pl -- A package manager for Prolog
- archive.pl -- Access several archive formats
- rdf.pl
- rdf_parser.pl
- rewrite.pl
- quintus.pl -- Quintus compatibility
- rdf_triple.pl -- Create triples from intermediate representation
- sgml_write.pl -- XML/SGML writer module
- xsdp_types.pl -- XML-Schema primitive types
- thread.pl -- High level thread primitives
- git.pl -- Run GIT commands
- ctypes.pl -- Character code classification
- sha.pl -- SHA secure hashes
- crypt.pl
- persistency.pl -- Provide persistent dynamic predicates
- tty.pl -- Terminal operations
- terms.pl -- Term manipulation
- snowball.pl -- The Snowball multi-lingual stemmer library
- sandbox.pl -- Sandboxed Prolog code
- prolog_format.pl -- Analyse format specifications
- when.pl -- Conditional coroutining
- apply_macros.pl -- Goal expansion rules to avoid meta-calling
- double_metaphone.pl -- Phonetic string matching
- porter_stem.pl
- nb_set.pl -- Non-backtrackable sets
- c14n2.pl -- C14n2 canonical XML documents
- dicts.pl -- Dict utilities
- solution_sequences.pl -- Modify solution sequences
- uuid.pl -- Universally Unique Identifier (UUID) Library
- pcre.pl -- Perl compatible regular expression matching for SWI-Prolog
- backcomp.pl -- Backward compatibility
- system.pl -- System utilities
- rdf_write.pl -- Write RDF/XML from a list of triples
- date.pl -- Process dates and times
- zlib.pl -- Zlib wrapper for SWI-Prolog
- rdf_ntriples.pl -- RDF N-triples parser (obsolete)
- csv.pl -- Process CSV (Comma-Separated Values) data
- dif.pl -- The dif/2 constraint
- ansi_term.pl -- Print decorated text to ANSI consoles
- pengines.pl -- Pengines: Web Logic Programming Made Easy
- charsio.pl -- I/O on Lists of Character Codes
- modules.pl -- Module utility predicates
- term_to_json.pl
- prolog_stack.pl -- Examine the Prolog stack
- statistics.pl -- Get information about resource usage
- qsave.pl -- Save current program as a state or executable
- prolog_autoload.pl -- Autoload all dependencies
- prolog_codewalk.pl -- Prolog code walker
- prolog_metainference.pl -- Infer meta-predicate properties
- edinburgh.pl -- Some traditional Edinburgh predicates
- helpidx.pl
- explain.pl -- Describe Prolog Terms
- edit.pl -- Editor interface
- make.pl -- Reload modified source files
- check.pl -- Consistency checking
- prolog_breakpoints.pl -- Manage Prolog break-points
- help.pl
- threadutil.pl -- Interactive thread utilities
- editline.pl -- BSD libedit based command line editing
- console_input.pl
- md5.pl -- MD5 hashes
- hash_stream.pl -- Maintain a hash on a stream
- writef.pl -- Old-style formatted write
- tabling.pl -- Tabled execution (SLG WAM)
- random.pl -- Random numbers
- pengines_io.pl -- Provide Prolog I/O for HTML clients
- yall.pl -- Lambda expressions
- prolog_stream.pl -- A stream with Prolog callbacks
- shell.pl -- Elementary shell commands
- xmldsig.pl -- XML Digital signature
- xmlenc.pl -- XML encryption library
- table.pl
- unicode.pl -- Unicode string handling
- optparse.pl -- command line parsing
- chr.pl
- sort.pl
- streampool.pl
- base32.pl -- Base32 encoding and decoding
- cgi.pl -- Read CGI parameters
- varnumbers.pl -- Utilities for numbered terms
- doc_files.pl -- Create stand-alone documentation files
- udp_broadcast.pl -- A UDP Broadcast Bridge
- win_menu.pl -- Console window menu
- readline.pl -- GNU readline interface
- rlimit.pl
- prolog_history.pl -- Per-directory persistent commandline history
- files.pl
- library
- crypto_password_hash(+Password, -Hash, +Options) is det
- Derive Hash based on Password. This predicate is similar to
crypto_data_hash/3 in that it derives a hash from given data.
However, it is tailored for the specific use case of
passwords. One essential distinction is that for this use case,
the derivation of a hash should be as slow as possible to
counteract brute-force attacks over possible passwords.
Another important distinction is that equal passwords must yield, with very high probability, different hashes. For this reason, cryptographically strong random numbers are automatically added to the password before a hash is derived.
Hash is unified with an atom that contains the computed hash and all parameters that were used, except for the password. Instead of storing passwords, store these hashes. Later, you can verify the validity of a password with crypto_password_hash/2, comparing the then entered password to the stored hash. If you need to export this atom, you should treat it as opaque ASCII data with up to 255 bytes of length. The maximal length may increase in the future.
Admissible options are:
- algorithm(+Algorithm)
- The algorithm to use. Currently, the only available algorithm
is
pbkdf2-sha512
, which is therefore also the default. - cost(+C)
- C is an integer, denoting the binary logarithm of the number of iterations used for the derivation of the hash. This means that the number of iterations is set to 2^C. Currently, the default is 17, and thus more than one hundred thousand iterations. You should set this option as high as your server and users can tolerate. The default is subject to change and will likely increase in the future or adapt to new algorithms.
- salt(+Salt)
- Use the given list of bytes as salt. By default, cryptographically secure random numbers are generated for this purpose. The default is intended to be secure, and constitutes the typical use case of this predicate.
Currently, PBKDF2 with SHA-512 is used as the hash derivation function, using 128 bits of salt. All default parameters, including the algorithm, are subject to change, and other algorithms will also become available in the future. Since computed hashes store all parameters that were used during their derivation, such changes will not affect the operation of existing deployments. Note though that new hashes will then be computed with the new default parameters.
- See also
- - crypto_data_hkdf/4 for generating keys from Hash.