Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Delphi DLL) TOTP Algorithm: Time-Based One-Time Password AlgorithmDemonstrates how to generate an time-based one-time password (TOTP) as specified in RFC 6238. This is the algorithm used by Google Authenticator. Note: This example requires Chilkat v9.5.0.77 or greater.
uses Winapi.Windows, Winapi.Messages, System.SysUtils, System.Variants, System.Classes, Vcl.Graphics, Vcl.Controls, Vcl.Forms, Vcl.Dialogs, Vcl.StdCtrls, Crypt2; ... procedure TForm1.Button1Click(Sender: TObject); var crypt: HCkCrypt2; seed: PWideChar; seed32: PWideChar; seed64: PWideChar; begin // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. crypt := CkCrypt2_Create(); // Duplicate the following results from RFC 6238 // TOTP Algorithm: Test Values // // +-------------+--------------+------------------+----------+--------+ // | Time (sec) | UTC Time | Value of T (hex) | TOTP | Mode | // +-------------+--------------+------------------+----------+--------+ // | 59 | 1970-01-01 | 0000000000000001 | 94287082 | SHA1 | // | | 00:00:59 | | | | // | 59 | 1970-01-01 | 0000000000000001 | 46119246 | SHA256 | // | | 00:00:59 | | | | // | 59 | 1970-01-01 | 0000000000000001 | 90693936 | SHA512 | // | | 00:00:59 | | | | // | 1111111109 | 2005-03-18 | 00000000023523EC | 07081804 | SHA1 | // | | 01:58:29 | | | | // | 1111111109 | 2005-03-18 | 00000000023523EC | 68084774 | SHA256 | // | | 01:58:29 | | | | // | 1111111109 | 2005-03-18 | 00000000023523EC | 25091201 | SHA512 | // | | 01:58:29 | | | | // | 1111111111 | 2005-03-18 | 00000000023523ED | 14050471 | SHA1 | // | | 01:58:31 | | | | // | 1111111111 | 2005-03-18 | 00000000023523ED | 67062674 | SHA256 | // | | 01:58:31 | | | | // | 1111111111 | 2005-03-18 | 00000000023523ED | 99943326 | SHA512 | // | | 01:58:31 | | | | // | 1234567890 | 2009-02-13 | 000000000273EF07 | 89005924 | SHA1 | // | | 23:31:30 | | | | // | 1234567890 | 2009-02-13 | 000000000273EF07 | 91819424 | SHA256 | // | | 23:31:30 | | | | // | 1234567890 | 2009-02-13 | 000000000273EF07 | 93441116 | SHA512 | // | | 23:31:30 | | | | // | 2000000000 | 2033-05-18 | 0000000003F940AA | 69279037 | SHA1 | // | | 03:33:20 | | | | // | 2000000000 | 2033-05-18 | 0000000003F940AA | 90698825 | SHA256 | // | | 03:33:20 | | | | // | 2000000000 | 2033-05-18 | 0000000003F940AA | 38618901 | SHA512 | // | | 03:33:20 | | | | // | 20000000000 | 2603-10-11 | 0000000027BC86AA | 65353130 | SHA1 | // | | 11:33:20 | | | | // | 20000000000 | 2603-10-11 | 0000000027BC86AA | 77737706 | SHA256 | // | | 11:33:20 | | | | // | 20000000000 | 2603-10-11 | 0000000027BC86AA | 47863826 | SHA512 | // | | 11:33:20 | | | | // +-------------+--------------+------------------+----------+--------+ // Seed for HMAC-SHA1 seed := '3132333435363738393031323334353637383930'; // Seed for HMAC-SHA256 - 32 bytes seed32 := '3132333435363738393031323334353637383930313233343536373839303132'; // Seed for HMAC-SHA512 - 64 bytes seed64 := '31323334353637383930313233343536373839303132333435363738393031323334353637383930313233343536373839303132333435363738393031323334'; // See the online reference documentation for an explanation of arguments. Memo1.Lines.Add('TOTP(59,sha1) ' + CkCrypt2__totp(crypt,seed,'hex','0','59',30,8,-1,'sha1')); Memo1.Lines.Add('TOTP(59,sha256) ' + CkCrypt2__totp(crypt,seed32,'hex','0','59',30,8,-1,'sha256')); Memo1.Lines.Add('TOTP(59,sha512) ' + CkCrypt2__totp(crypt,seed64,'hex','0','59',30,8,-1,'sha512')); Memo1.Lines.Add('TOTP(1111111109,sha1) ' + CkCrypt2__totp(crypt,seed,'hex','0','1111111109',30,8,-1,'sha1')); Memo1.Lines.Add('TOTP(1111111109,sha256) ' + CkCrypt2__totp(crypt,seed32,'hex','0','1111111109',30,8,-1,'sha256')); Memo1.Lines.Add('TOTP(1111111109,sha512) ' + CkCrypt2__totp(crypt,seed64,'hex','0','1111111109',30,8,-1,'sha512')); Memo1.Lines.Add('TOTP(1111111111,sha1) ' + CkCrypt2__totp(crypt,seed,'hex','0','1111111111',30,8,-1,'sha1')); Memo1.Lines.Add('TOTP(1111111111,sha256) ' + CkCrypt2__totp(crypt,seed32,'hex','0','1111111111',30,8,-1,'sha256')); Memo1.Lines.Add('TOTP(1111111111,sha512) ' + CkCrypt2__totp(crypt,seed64,'hex','0','1111111111',30,8,-1,'sha512')); Memo1.Lines.Add('TOTP(1234567890,sha1) ' + CkCrypt2__totp(crypt,seed,'hex','0','1234567890',30,8,-1,'sha1')); Memo1.Lines.Add('TOTP(1234567890,sha256) ' + CkCrypt2__totp(crypt,seed32,'hex','0','1234567890',30,8,-1,'sha256')); Memo1.Lines.Add('TOTP(1234567890,sha512) ' + CkCrypt2__totp(crypt,seed64,'hex','0','1234567890',30,8,-1,'sha512')); Memo1.Lines.Add('TOTP(2000000000,sha1) ' + CkCrypt2__totp(crypt,seed,'hex','0','2000000000',30,8,-1,'sha1')); Memo1.Lines.Add('TOTP(2000000000,sha256) ' + CkCrypt2__totp(crypt,seed32,'hex','0','2000000000',30,8,-1,'sha256')); Memo1.Lines.Add('TOTP(2000000000,sha512) ' + CkCrypt2__totp(crypt,seed64,'hex','0','2000000000',30,8,-1,'sha512')); Memo1.Lines.Add('TOTP(20000000000,sha1) ' + CkCrypt2__totp(crypt,seed,'hex','0','20000000000',30,8,-1,'sha1')); Memo1.Lines.Add('TOTP(20000000000,sha256) ' + CkCrypt2__totp(crypt,seed32,'hex','0','20000000000',30,8,-1,'sha256')); Memo1.Lines.Add('TOTP(20000000000,sha512) ' + CkCrypt2__totp(crypt,seed64,'hex','0','20000000000',30,8,-1,'sha512')); // Note: To compute the TOTP using the current system date/time, pass an empty string instead of an explicit time. // For example: Memo1.Lines.Add('TOTP(CurrentSystemTime,sha1) ' + CkCrypt2__totp(crypt,seed,'hex','0','',30,8,-1,'sha1')); Memo1.Lines.Add('TOTP(CurrentSystemTime,sha256) ' + CkCrypt2__totp(crypt,seed32,'hex','0','',30,8,-1,'sha256')); Memo1.Lines.Add('TOTP(CurrentSystemTime,sha512) ' + CkCrypt2__totp(crypt,seed64,'hex','0','',30,8,-1,'sha512')); CkCrypt2_Dispose(crypt); end; |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.