Chilkat Examples

ChilkatHOMEAndroid™Classic ASPCC++C#Delphi ActiveXDelphi DLLVisual FoxProJavaMFCObjective-CPerlPHP ActiveXPHP ExtensionPowerShellPythonRubySQL ServerUnicode CUnicode C++Visual Basic 6.0VB.NETVBScript

SQL Server Examples

Certificates
Email Object
Encryption
FTP
HTML-to-XML/Text
Gzip
HTTP
IMAP
MHT / HTML Email
PFX/P12
Java KeyStore (JKS)
POP3
RSA Encryption
MIME
SMTP
Socket/SSL/TLS
SSH Key
SSH
SFTP
Tar Archive
XML
XMP
Zip

More Examples...
Amazon S3
Bounced Email
CSV
Diffie-Hellman
DKIM / DomainKey
NTLM

 

 

 

 

 

 

 

(SQL Server) PBKDF2 - Derive Key from Password

Demonstrates how to derive a symmetric encryption key from a password using PBKDF2. This example matches the results found at this URL: http://www.di-mgt.com.au/cryptoKDFs.html#examplespbkdf

Chilkat ActiveX Downloads

ActiveX for 32-bit and 64-bit Windows

CREATE PROCEDURE ChilkatSample
AS
BEGIN
    DECLARE @hr int
    DECLARE @sTmp0 nvarchar(4000)
    -- This sp_OACreate statement uses the new single-DLL ActiveX for v9.5.0
    DECLARE @crypt int
    EXEC @hr = sp_OACreate 'Chilkat_9_5_0.Crypt2', @crypt OUT
    IF @hr <> 0
    BEGIN
        PRINT 'Failed to create ActiveX component'
        RETURN
    END

    DECLARE @success int

    EXEC sp_OAMethod @crypt, 'UnlockComponent', @success OUT, 'Anything for 30-day trial'
    IF @success <> 1
      BEGIN
        EXEC sp_OAGetProperty @crypt, 'LastErrorText', @sTmp0 OUT

        PRINT @sTmp0
        EXEC @hr = sp_OADestroy @crypt
        RETURN
      END

    DECLARE @hexKey nvarchar(4000)

    --  http://www.di-mgt.com.au/cryptoKDFs.html#examplespbkdf

    DECLARE @pw nvarchar(4000)

    SELECT @pw = 'password'
    DECLARE @pwCharset nvarchar(4000)

    SELECT @pwCharset = 'ansi'
    --  Hash algorithms may be: sha1, md2, md5, etc.
    DECLARE @hashAlg nvarchar(4000)

    SELECT @hashAlg = 'sha1'
    --  The salt should be 8 bytes:
    DECLARE @saltHex nvarchar(4000)

    SELECT @saltHex = '78578E5A5D63CB06'
    DECLARE @iterationCount int

    SELECT @iterationCount = 2048
    --  Derive a 192-bit key from the password.
    DECLARE @outputBitLen int

    SELECT @outputBitLen = 192

    --  The derived key is returned as a hex or base64 encoded string.
    --  (Note: The salt argument must be a string that also uses
    --  the same encoding.)
    DECLARE @enc nvarchar(4000)

    SELECT @enc = 'hex'

    EXEC sp_OAMethod @crypt, 'Pbkdf2', @hexKey OUT, @pw, @pwCharset, @hashAlg, @saltHex, @iterationCount, @outputBitLen, @enc


    PRINT @hexKey

    --  The output should have this value:
    --  BFDE6BE94DF7E11DD409BCE20A0255EC327CB936FFE93643

    EXEC @hr = sp_OADestroy @crypt


END
GO

 

© 2000-2014 Chilkat Software, Inc. All Rights Reserved.