diff options
author | sr55 <[email protected]> | 2016-04-29 21:24:57 +0100 |
---|---|---|
committer | sr55 <[email protected]> | 2016-04-29 21:24:57 +0100 |
commit | 04463e2dae2e7b86f2179a3df1a39e2085479a81 (patch) | |
tree | 6d35488bd41e8313c0291212d3eb1aa30d099355 /win/CS/HandBrakeTools/Program.cs | |
parent | c851af449ec95b3a39b40cf803bb41e317b73403 (diff) |
WinGui: Simple tool for generating a signed hash of the HandBrake download.
Diffstat (limited to 'win/CS/HandBrakeTools/Program.cs')
-rw-r--r-- | win/CS/HandBrakeTools/Program.cs | 101 |
1 files changed, 101 insertions, 0 deletions
diff --git a/win/CS/HandBrakeTools/Program.cs b/win/CS/HandBrakeTools/Program.cs new file mode 100644 index 000000000..d4da0dbf5 --- /dev/null +++ b/win/CS/HandBrakeTools/Program.cs @@ -0,0 +1,101 @@ +// -------------------------------------------------------------------------------------------------------------------- +// <copyright file="Program.cs" company="HandBrake Project (http://handbrake.fr)"> +// This file is part of the HandBrake source code - It may be used under the terms of the GNU General Public License. +// </copyright> +// <summary> +// HandBrake Toolkit +// </summary> +// -------------------------------------------------------------------------------------------------------------------- + +namespace HandBrakeTools +{ + using System; + using System.Diagnostics; + using System.IO; + using System.Security.Cryptography; + + public class Program + { + static void Main(string[] args) + { + if (args.Length == 0) + { + Console.WriteLine("Invalid Comand. Either 'genkeys' or 'sign <filename>'"); + Console.Read(); + return; + } + + string command = args[0]; + string file = args.Length > 1 ? args[1] : null; + switch (command) + { + case "genkeys": + GenKeyFiles(); + return; + case "sign": + string hash = SignDownload(file); + Console.WriteLine(VerifyDownload(hash, file) ? "Passed Verification Test" : "Failed Verification Test"); + Console.WriteLine("Hash: " + hash); + File.WriteAllText("file.hash", hash); + return; + } + + Console.WriteLine("Done."); + Console.Read(); + } + + public static void GenKeyFiles() + { + RSACryptoServiceProvider provider = new RSACryptoServiceProvider { KeySize = 2048 }; + + using (StreamWriter sw = new StreamWriter("private.key")) + { + sw.Write(provider.ToXmlString(true)); + } + + using (StreamWriter sw = new StreamWriter("public.key")) + { + sw.Write(provider.ToXmlString(false)); + } + } + + public static string SignDownload(string updateFile) + { + RSACryptoServiceProvider provider = new RSACryptoServiceProvider(); + provider.FromXmlString(File.ReadAllText("private.key")); + byte[] signedBytes = provider.SignData(File.ReadAllBytes(updateFile), "SHA256"); + return Convert.ToBase64String(signedBytes); + } + + public static bool VerifyDownload(string signature, string updateFile) + { + // Sanity Checks + if (!File.Exists(updateFile)) + { + return false; + } + + if (string.IsNullOrEmpty(signature)) + { + return false; + } + + // Fetch our Public Key + string publicKey = File.ReadAllText("public.key"); + + // Verify the file against the Signature. + try + { + byte[] file = File.ReadAllBytes(updateFile); + RSACryptoServiceProvider verifyProfider = new RSACryptoServiceProvider(); + verifyProfider.FromXmlString(publicKey); + return verifyProfider.VerifyData(file, "SHA256", Convert.FromBase64String(signature)); + } + catch (Exception e) + { + Debug.WriteLine(e); + return false; + } + } + } +} |