6 ## The key types are adorned with bit lengths. Work out the raw key type
9 for kt
in $keytypes; do
10 rawkeytypes
="$rawkeytypes ${kt%:*}"
13 ## Start a new output directory.
16 for kt
in $rawkeytypes; do
17 cp ca
/ca-
$kt.pub publish.new
/
18 read pub
<ca
/ca-
$kt.pub
19 echo "$@cert-authority $scope $pub" >publish.new
/ca-
$kt.entry
22 ## Sign the various host keys.
23 exec 3<etc
/hosts
4>publish.new
/hosts.list
25 while read line
<&3; do
27 ## Ignore comments and empty lines.
29 "#"* |
"") continue ;;
34 ## Read the host line.
39 ## If this is a different host, then start a new section of the list.
40 case "$host" in "$last") ;; *) { echo; echo "$host"; } >&4 ;; esac
43 ## Build a list of names for the host.
45 names
=${names:+$names,}$n
48 *) names
=${names:+$names,}$n.
$domain ;;
53 for kt
in $rawkeytypes; do
54 if [ ! -f
host/$host-$kt.pub
]; then continue; fi
55 cp host/$host-$kt.pub publish.new
/
56 ssh-keygen
-q
-tv00
-sca
/ca-
$kt \
57 -h
-I
"$cacomment:$host.$domain" -n
$names \
59 publish.new
/$host-$kt.pub
60 mv publish.new
/$host-$kt-cert.pub \
61 publish.new
/$host-$kt.cert
62 ssh-keygen
-lv
-fpublish.new
/$host-$kt.pub |
sed 's,^,| ,' >&4
68 run_gpg
--armor
-o publish.new
/hosts.asc \
69 --clearsign publish.new
/hosts.list
70 rm publish.new
/hosts.list
72 ## Include a copy of the public key.
73 run_gpg
--export --armor
-o publish.new
/ca-gnupg.asc
76 if [ -d publish
]; then
78 mv publish publish.old
80 mv publish.new publish