clib

Prolog files

crypt.plShow source
filesex.pl  -- Extended operations on filesShow source
hash_stream.pl  -- Maintain a hash on a streamShow source
mallocinfo.pl  -- Memory allocation detailsShow source
md5.pl  -- MD5 hashesShow source
md5_hash/3Hash is the MD5 hash of Data, The conversion is controlled by Options:.Source
memfile.plShow source
process.pl  -- Create processes and redirect I/OShow source
rlimit.plShow source
sha.pl  -- SHA secure hashesShow source
file_sha1/2True when SHA1 is the SHA1 hash for the content of File.Source
hash_atom/2Convert a list of bytes (integers 0..255) into the usual hexadecimal notation.Source
hmac_sha/4For Options, see sha_hash/3.Source
sha_hash/3Hash is the SHA hash of Data, The conversion is controlled by Options:.Source
sha_hash_ctx/4Hash is the SHA hash of Data.Source
sha_new_ctx/2NewContext is unified with the empty SHA computation context (which includes the Options.) It could later be passed to sha_hash_ctx/4.Source
socket.pl  -- Network socket (TCP and UDP) libraryShow source
syslog.plShow source
debug_print_hook/3Integration of debug/3 with the syslog facility.Source
closelog/0Close the system log.Source
openlog/3Open system log.Source
syslog/2Send a message to the system log.Source
syslog/3Send a formatted message to the system log if system logging is opened using openlog/3.Source
time.pl  -- Time and alarm libraryShow source
alarm/3Set up an alarm to be signaled Time seconds from now.Source
alarm/4Set up an alarm to be signaled Time seconds from now.Source
alarm_at/3As alarm/3 and alarm/4, but schedule the alarm at an absolute point in time.Source
alarm_at/4As alarm/3 and alarm/4, but schedule the alarm at an absolute point in time.Source
call_with_time_limit/2Call Goal, while watching out for a (wall-time) limit.Source
call_with_time_limit/3Call Goal, while watching out for a (wall-time) limit.Source
current_alarm/4Enumerate the alarms in the schedule.Source
install_alarm/1Install an alarm allocated using alarm/4 with the install(false) option or de-activated using uninstall_alarm/1.Source
install_alarm/2Install an alarm allocated using alarm/4 with the install(false) option or de-activated using uninstall_alarm/1.Source
remove_alarm/1Remove an alarm.Source
uninstall_alarm/1De-activate an alarm.Source
udp_broadcast.pl  -- A UDP broadcast proxyShow source
udp_broadcast_close/1Close a UDP broadcast scope.Source
udp_broadcast_initialize/2Initialized UDP broadcast bridge.Source
udp_peer/2Manage and query the set of known peers for a unicast network.Source
udp_peer_add/2Manage and query the set of known peers for a unicast network.Source
udp_peer_del/2Manage and query the set of known peers for a unicast network.Source
udp_term_string_hook/3Hook for serializing the message Term.Source
udp_unicast_join_hook/3This multifile hook is called if an UDP package is received on the port of the unicast network identified by Scope.Source
uid.pl  -- User and group management on Unix systemsShow source
unix.plShow source
detach_IO/0Detach I/O similar to detach_IO/1.Source
detach_IO/1This predicate is intended to create Unix deamon processes.Source
dup/2Interface to Unix dup2(), copying the underlying filedescriptor and thus making both streams point to the same underlying object.Source
exec/1Replace the running program by starting Command.Source
fork/1Clone the current process into two branches.Source
fork_exec/1Fork (as fork/1) and exec (using exec/1) the child immediately.Source
kill/2Deliver a software interrupt to the process with identifier Pid using software-interrupt number Signal.Source
pipe/2Create a communication-pipe.Source
prctl/1Access to Linux process control operations.Source
sysconf/1Access system configuration.Source
wait/2Wait for a child to change status.Source
uri.pl  -- Process URIsShow source
uuid.pl  -- Universally Unique Identifier (UUID) LibraryShow source