6 ## The key types are adorned with bit lengths. Work out the raw key type
9 for kt
in $keytypes; do
10 rawkeytypes
="$rawkeytypes ${kt%:*}"
13 ## Start a new output directory.
16 for kt
in $rawkeytypes; do
17 cp ca
/ca-
$kt.pub publish.new
/
18 read pub
<ca
/ca-
$kt.pub
19 echo "$@cert-authority $scope $pub" >publish.new
/ca-
$kt.entry
22 ## Sign the various host keys.
23 exec 3<etc
/hosts
4>publish.new
/hosts.list
25 while read line
<&3; do
27 ## Ignore comments and empty lines.
29 "#"* |
"") continue ;;
34 ## Read the host line.
39 ## If this is a different host, then start a new section of the list.
41 "%%%") echo "$host" >&4 ;;
43 *) { echo; echo "$host"; } >&4 ;;
47 ## Build a list of names for the host.
49 names
=${names:+$names,}$n
52 *) names
=${names:+$names,}$n.
$domain ;;
57 for kt
in $rawkeytypes; do
58 if [ ! -f
host/$host-$kt.pub
]; then continue; fi
59 cp host/$host-$kt.pub publish.new
/
60 ssh-keygen
-q
-tv00
-sca
/ca-
$kt \
61 -h
-I
"$cacomment:$host.$domain" -n
$names \
63 publish.new
/$host-$kt.pub
64 mv publish.new
/$host-$kt-cert.pub \
65 publish.new
/$host-$kt.cert
66 ssh-keygen
-lv
-fpublish.new
/$host-$kt.pub |
sed 's,^,| ,' >&4
72 run_gpg
--armor
-o publish.new
/hosts.asc \
73 --clearsign publish.new
/hosts.list
74 rm publish.new
/hosts.list
76 ## Include a copy of the public key.
77 run_gpg
--export --armor
-o publish.new
/ca-gnupg.asc
80 if [ -d publish
]; then
82 mv publish publish.old
84 mv publish.new publish