6 ## The key types are adorned with bit lengths. Work out the raw key type
9 for kt
in $keytypes; do
10 rawkeytypes
="$rawkeytypes ${kt%:*}"
13 ## Start a new output directory.
16 exec 3<etc
/hosts
4>publish.new
/hosts.list
17 echo ":certificate-authority" >&4
18 for kt
in $rawkeytypes; do
19 cp ca
/ca-
$kt.pub publish.new
/
20 read pub
<ca
/ca-
$kt.pub
21 echo "@cert-authority $scope $pub" |
22 tee publish.new
/ca-
$kt.entry
>&4
23 ssh-keygen
-lv
-fca
/ca-
$kt.pub |
sed 's,^,| ,' >&4
26 ## Sign the various host keys.
28 while read line
<&3; do
30 ## Ignore comments and empty lines.
32 "#"* |
"") continue ;;
37 ## Read the host line.
41 @
*) echo >&2 "$0: unknown directive \`$1'"; exit 1 ;;
47 ## If this is a different host, then start a new section of the list.
50 *) { echo; echo ":host $host"; } >&4 ;;
54 ## Build a list of names for the host.
57 .
*) for h
in $nicks; do names
=${names:+$names,}$h$n.
$domain; done ;;
58 *.
* |
*:*) names
=${names:+$names,}$n ;;
59 *) nicks
=${nicks:+$nicks }$n names
=${names:+$names,}$n.
$domain ;;
64 for kt
in $rawkeytypes; do
65 if [ ! -f
host/$host-$kt.pub
]; then continue; fi
66 cp host/$host-$kt.pub publish.new
/
67 ssh-keygen
-q
-tv00
-sca
/ca-
$kt \
68 -h
-I
"$cacomment:$host.$domain" -n
$names \
70 publish.new
/$host-$kt.pub
71 mv publish.new
/$host-$kt-cert.pub \
72 publish.new
/$host-$kt.cert
73 { printf "%s " $names; cat host/$host-$kt.pub
; } >&4
74 ssh-keygen
-lv
-fhost
/$host-$kt.pub |
sed 's,^,| ,' >&4
80 run_gpg
--armor
-o publish.new
/hosts.asc \
81 --clearsign publish.new
/hosts.list
82 rm publish.new
/hosts.list
84 ## Include a copy of the public key.
85 run_gpg
--export --armor
-o publish.new
/ca-gnupg.asc
88 if [ -d publish
]; then
90 mv publish publish.old
92 mv publish.new publish