chiark / gitweb /
keyfunc.sh.in, keys.reveal: Factor out sharing parameter file parsing.
[distorted-keys] / keys.new-keeper
CommitLineData
53263601
MW
1#! /bin/sh
2###
3### Construct a new set of keeper keys
4###
5### (c) 2011 Mark Wooding
6###
7
8###----- Licensing notice ---------------------------------------------------
9###
599c8f75
MW
10### This file is part of the distorted.org.uk key management suite.
11###
12### distorted-keys is free software; you can redistribute it and/or modify
53263601
MW
13### it under the terms of the GNU General Public License as published by
14### the Free Software Foundation; either version 2 of the License, or
15### (at your option) any later version.
16###
599c8f75 17### distorted-keys is distributed in the hope that it will be useful,
53263601
MW
18### but WITHOUT ANY WARRANTY; without even the implied warranty of
19### MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20### GNU General Public License for more details.
21###
22### You should have received a copy of the GNU General Public License
599c8f75 23### along with distorted-keys; if not, write to the Free Software Foundation,
53263601
MW
24### Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
25
26set -e
27case "${KEYSLIB+t}" in t) ;; *) echo >&2 "$0: KEYSLIB unset"; exit 1 ;; esac
28. "$KEYSLIB"/keyfunc.sh
29
30defhelp <<HELP
d516ebd0 31[-f] [-p PROFILE] KEEPER N [OPTION=VALUE ...]
53263601
MW
32Create a new set of keeper keys.
33
d516ebd0
MW
34The key nubs are stored in a safe but temporary place where they can be
35extracted using \`keys keeper-nub'.
53263601 36HELP
53263601
MW
37
38## Parse the command line.
d516ebd0 39force=nil
c47f2aba 40profile=${keeper_profile-keeper}
d516ebd0 41while getopts "fp:" opt; do
c47f2aba 42 case "$opt" in
d516ebd0 43 f) force=t ;;
c47f2aba
MW
44 p) profile=$OPTARG ;;
45 *) usage_err ;;
46 esac
47done
48shift $(( $OPTIND - 1 ))
49case $# in 0 | 1) usage_err ;; esac
50keeper=$1 n=$2; shift 2
53263601
MW
51checkword "keeper set label" "$keeper"
52checknumber "set size" "$n"
c47f2aba 53checkword "profile label" "$profile"
53263601
MW
54
55## Preflight checking.
d516ebd0
MW
56reqsafe
57case $force in
58 nil)
59 if [ -e $KEYS/keeper/$keeper ]; then
29c76a0f 60 echo >&2 "$quis: keeper set \`$keeper' already exists"
d516ebd0
MW
61 exit 1
62 fi
63 if [ -e $SAFE/keys.keeper/$keeper ]; then
29c76a0f 64 echo >&2 "$quis: destination \`$keeper' already exists"
d516ebd0
MW
65 exit 1
66 fi
67 ;;
68 t)
69 rm -rf $KEYS/keeper/$keeper
70 rm -rf $SAFE/keys.keeper/$keeper/
71 ;;
72esac
53263601
MW
73
74## Generate the private keys, one per file, and compute the public keys.
c47f2aba 75mktmp
d516ebd0
MW
76mkdir -m700 $SAFE/keys.keeper/
77cd $SAFE/keys.keeper/
53263601
MW
78rm -rf $keeper.new
79mkdir -m700 $keeper.new
80mkdir -p -m755 $KEYS/keeper/$keeper.new
81echo $n >$KEYS/keeper/$keeper.new/meta
82i=0
83while [ $i -lt $n ]; do
c47f2aba
MW
84 c_gensyskey $profile \
85 $KEYS/keeper/$keeper.new/$i \
86 $keeper.new/$i \
87 keeper="$keeper" seq="$i" tot="$n" "$@"
88 i=$(( $i + 1 ))
53263601
MW
89done
90mv $keeper.new $keeper
91mv $KEYS/keeper/$keeper.new $KEYS/keeper/$keeper
92
93###----- That's all, folks --------------------------------------------------