Chilkat Examples

ChilkatHOMEAndroid™Classic ASPCC++C#C# UWP/WinRTDataFlexDelphi ActiveXDelphi DLLVisual FoxProJavaLianjaMFCObjective-CPerlPHP ActiveXPHP ExtensionPowerBuilderPowerShellPureBasicPythonRubySQL ServerSwiftTclUnicode CUnicode C++Visual Basic 6.0VB.NETVB.NET UWP/WinRTVBScriptXojo PluginNode.js

SQL Server Examples

Async
Certificates
ECC
Email Object
Encryption
FTP
HTML-to-XML/Text
Gzip
HTTP
IMAP
JSON
Jwt
MHT / HTML Email
PEM
PFX/P12
Java KeyStore (JKS)
POP3
RSA Encryption
MIME
REST
SCP
SMTP
Socket/SSL/TLS
SSH Key
SSH
SSH Tunnel
SFTP
Stream
Tar Archive
XML
XMP
Zip

More Examples...
OpenSSL
Google APIs
Google Cloud Storage
Azure Cloud Storage
Amazon S3 (new)
Google Drive
Dropbox
Firebase
ASN.1
PRNG
Amazon S3
Bounced Email
CSV
Diffie-Hellman
DKIM / DomainKey
DSA
NTLM
QuickBooks
Spider
Digital Signatures

 

 

 

 

 

 

 

(SQL Server) PBKDF2 - Derive Key from Password

Demonstrates how to derive a symmetric encryption key from a password using PBKDF2. This example matches the results found at this URL: http://www.di-mgt.com.au/cryptoKDFs.html#examplespbkdf

Chilkat ActiveX Downloads

ActiveX for 32-bit and 64-bit Windows

CREATE PROCEDURE ChilkatSample
AS
BEGIN
    DECLARE @hr int
    DECLARE @sTmp0 nvarchar(4000)
    DECLARE @crypt int
    EXEC @hr = sp_OACreate 'Chilkat_9_5_0.Crypt2', @crypt OUT
    IF @hr <> 0
    BEGIN
        PRINT 'Failed to create ActiveX component'
        RETURN
    END

    DECLARE @success int
    EXEC sp_OAMethod @crypt, 'UnlockComponent', @success OUT, 'Anything for 30-day trial'
    IF STR(@success) <> 1
      BEGIN
        EXEC sp_OAGetProperty @crypt, 'LastErrorText', @sTmp0 OUT

        PRINT @sTmp0
        EXEC @hr = sp_OADestroy @crypt
        RETURN
      END

    DECLARE @hexKey nvarchar(4000)

    --  http://www.di-mgt.com.au/cryptoKDFs.html#examplespbkdf

    DECLARE @pw nvarchar(4000)
    SELECT @pw = 'password'
    DECLARE @pwCharset nvarchar(4000)
    SELECT @pwCharset = 'ansi'
    --  Hash algorithms may be: sha1, md2, md5, etc.
    DECLARE @hashAlg nvarchar(4000)
    SELECT @hashAlg = 'sha1'
    --  The salt should be 8 bytes:
    DECLARE @saltHex nvarchar(4000)
    SELECT @saltHex = '78578E5A5D63CB06'
    DECLARE @iterationCount int
    SELECT @iterationCount = 2048
    --  Derive a 192-bit key from the password.
    DECLARE @outputBitLen int
    SELECT @outputBitLen = 192

    --  The derived key is returned as a hex or base64 encoded string.
    --  (Note: The salt argument must be a string that also uses
    --  the same encoding.)
    DECLARE @enc nvarchar(4000)
    SELECT @enc = 'hex'

    EXEC sp_OAMethod @crypt, 'Pbkdf2', @hexKey OUT, @pw, @pwCharset, @hashAlg, @saltHex, STR(@iterationCount), STR(@outputBitLen), @enc


    PRINT @hexKey

    --  The output should have this value:
    --  BFDE6BE94DF7E11DD409BCE20A0255EC327CB936FFE93643

    EXEC @hr = sp_OADestroy @crypt


END
GO

 

© 2000-2016 Chilkat Software, Inc. All Rights Reserved.