001    package org.apache.commons.openpgp;
002    
003    /*
004     * Licensed to the Apache Software Foundation (ASF) under one or more
005     * contributor license agreements.  See the NOTICE file distributed with
006     * this work for additional information regarding copyright ownership.
007     * The ASF licenses this file to You under the Apache License, Version 2.0
008     * (the "License"); you may not use this file except in compliance with
009     * the License.  You may obtain a copy of the License at
010     *
011     *      http://www.apache.org/licenses/LICENSE-2.0
012     *
013     * Unless required by applicable law or agreed to in writing, software
014     * distributed under the License is distributed on an "AS IS" BASIS,
015     * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
016     * See the License for the specific language governing permissions and
017     * limitations under the License.
018     */
019    
020    import java.io.IOException;
021    import java.io.InputStream;
022    import java.io.OutputStream;
023    
024    /**
025     * Bouncy Castle implementation of the OpenPGP signer.
026     *
027     * @author <a href="mailto:brett@apache.org">Brett Porter</a>
028     */
029    public class BouncyCastleOpenPgpSigner
030        implements OpenPgpSigner
031    {
032        private static final int BUFFER_SIZE = 1024;
033    
034        public void sign( InputStream data, OutputStream signedOutput, String keyId, KeyRing keyRing, boolean asciiArmor )
035            throws OpenPgpException
036        {
037            // TODO
038        }
039    
040        public void detachedSign( InputStream data, OutputStream signature, String keyId, KeyRing keyRing,
041                                  boolean asciiArmor )
042            throws OpenPgpException, IOException
043        {
044            OpenPgpStreamingSigner updater =
045                new BouncyCastleOpenPgpStreamingSigner( signature, keyId, keyRing, asciiArmor );
046    
047            byte[] buf = new byte[BUFFER_SIZE];
048    
049            int len;
050            do
051            {
052                len = data.read( buf );
053                if ( len > 0 )
054                {
055                    updater.update( buf, 0, len );
056                }
057            }
058            while ( len >= 0 );
059    
060            updater.finish();
061        }
062    }