summaryrefslogtreecommitdiffstats
path: root/win/CS/HandBrakeTools/Program.cs
diff options
context:
space:
mode:
authorsr55 <[email protected]>2016-04-29 21:24:57 +0100
committersr55 <[email protected]>2016-04-29 21:24:57 +0100
commit04463e2dae2e7b86f2179a3df1a39e2085479a81 (patch)
tree6d35488bd41e8313c0291212d3eb1aa30d099355 /win/CS/HandBrakeTools/Program.cs
parentc851af449ec95b3a39b40cf803bb41e317b73403 (diff)
WinGui: Simple tool for generating a signed hash of the HandBrake download.
Diffstat (limited to 'win/CS/HandBrakeTools/Program.cs')
-rw-r--r--win/CS/HandBrakeTools/Program.cs101
1 files changed, 101 insertions, 0 deletions
diff --git a/win/CS/HandBrakeTools/Program.cs b/win/CS/HandBrakeTools/Program.cs
new file mode 100644
index 000000000..d4da0dbf5
--- /dev/null
+++ b/win/CS/HandBrakeTools/Program.cs
@@ -0,0 +1,101 @@
+// --------------------------------------------------------------------------------------------------------------------
+// <copyright file="Program.cs" company="HandBrake Project (http://handbrake.fr)">
+// This file is part of the HandBrake source code - It may be used under the terms of the GNU General Public License.
+// </copyright>
+// <summary>
+// HandBrake Toolkit
+// </summary>
+// --------------------------------------------------------------------------------------------------------------------
+
+namespace HandBrakeTools
+{
+ using System;
+ using System.Diagnostics;
+ using System.IO;
+ using System.Security.Cryptography;
+
+ public class Program
+ {
+ static void Main(string[] args)
+ {
+ if (args.Length == 0)
+ {
+ Console.WriteLine("Invalid Comand. Either 'genkeys' or 'sign <filename>'");
+ Console.Read();
+ return;
+ }
+
+ string command = args[0];
+ string file = args.Length > 1 ? args[1] : null;
+ switch (command)
+ {
+ case "genkeys":
+ GenKeyFiles();
+ return;
+ case "sign":
+ string hash = SignDownload(file);
+ Console.WriteLine(VerifyDownload(hash, file) ? "Passed Verification Test" : "Failed Verification Test");
+ Console.WriteLine("Hash: " + hash);
+ File.WriteAllText("file.hash", hash);
+ return;
+ }
+
+ Console.WriteLine("Done.");
+ Console.Read();
+ }
+
+ public static void GenKeyFiles()
+ {
+ RSACryptoServiceProvider provider = new RSACryptoServiceProvider { KeySize = 2048 };
+
+ using (StreamWriter sw = new StreamWriter("private.key"))
+ {
+ sw.Write(provider.ToXmlString(true));
+ }
+
+ using (StreamWriter sw = new StreamWriter("public.key"))
+ {
+ sw.Write(provider.ToXmlString(false));
+ }
+ }
+
+ public static string SignDownload(string updateFile)
+ {
+ RSACryptoServiceProvider provider = new RSACryptoServiceProvider();
+ provider.FromXmlString(File.ReadAllText("private.key"));
+ byte[] signedBytes = provider.SignData(File.ReadAllBytes(updateFile), "SHA256");
+ return Convert.ToBase64String(signedBytes);
+ }
+
+ public static bool VerifyDownload(string signature, string updateFile)
+ {
+ // Sanity Checks
+ if (!File.Exists(updateFile))
+ {
+ return false;
+ }
+
+ if (string.IsNullOrEmpty(signature))
+ {
+ return false;
+ }
+
+ // Fetch our Public Key
+ string publicKey = File.ReadAllText("public.key");
+
+ // Verify the file against the Signature.
+ try
+ {
+ byte[] file = File.ReadAllBytes(updateFile);
+ RSACryptoServiceProvider verifyProfider = new RSACryptoServiceProvider();
+ verifyProfider.FromXmlString(publicKey);
+ return verifyProfider.VerifyData(file, "SHA256", Convert.FromBase64String(signature));
+ }
+ catch (Exception e)
+ {
+ Debug.WriteLine(e);
+ return false;
+ }
+ }
+ }
+}