Obtenir le ‘CheckSum’ d’un fichier

Author:

Exemple,d'utilisation,de,'PermissionSet'
{filelink=17824}

///////////////////////////////////////////////////////////////////////////////////////////////
//
//    This File is Part of the CallButler Open Source PBX (http://www.codeplex.com/callbutler
//
//    Copyright (c) 2005-2008, Jim Heising
//    All rights reserved.
//
//    Redistribution and use in source and binary forms, with or without modification,
//    are permitted provided that the following conditions are met:
//
//    * Redistributions of source code must retain the above copyright notice,
//      this list of conditions and the following disclaimer.
//
//    * Redistributions in binary form must reproduce the above copyright notice,
//      this list of conditions and the following disclaimer in the documentation and/or
//      other materials provided with the distribution.
//
//    * Neither the name of Jim Heising nor the names of its contributors may be
//      used to endorse or promote products derived from this software without specific prior
//      written permission.
//
//    THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
//    ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
//    WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
//    IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
//    INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
//    NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
//    PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
//    WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
//    ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
//    POSSIBILITY OF SUCH DAMAGE.
//
///////////////////////////////////////////////////////////////////////////////////////////////

using System;
using System.Security.Cryptography;
using System.Text;
using System.Globalization;
using System.IO;

namespace MesExemples.Securités
{

  public class FichierCheckSum
  {
        public static byte[] ObtenirBytesFichier(string nomFichier)
        {
           if (File.Exists(nomFichier))
            {
                FileStream fluxF = File.Open(nomFichier, FileMode.Open, FileAccess.Read);

                byte[] fileBytes = new byte[fluxF.Length];

                fluxF.Read(fileBytes, 0, (int)fluxF.Length);

                fluxF.Close();

                return fileBytes;
            }

            return null;
        }

		  public static string ObtenirChecksumFichier(string nomFichier)
        {
            if (File.Exists(nomFichier))
            {
                MD5CryptoServiceProvider md5 = new MD5CryptoServiceProvider();

                byte[] fileBytes = ObtenirBytesFichier(nomFichier);
                return ObtenirChecksumParByte(fileBytes);
            }

            return "";
        }
        public static string ObtenirChecksumParByte(byte[] bytes)
        {
            MD5CryptoServiceProvider md5 = new MD5CryptoServiceProvider();

            byte[] valeurHash = md5.ComputeHash(bytes);

            return Convert.ToBase64String(valeurHash);
        }

   }
}

Leave a Reply

Your email address will not be published. Required fields are marked *