6 ## The key types are adorned with bit lengths. Work out the raw key type
9 for kt in $keytypes; do
10 rawkeytypes="$rawkeytypes ${kt%:*}"
13 ## Start a new output directory.
16 for kt in $rawkeytypes; do
17 cp ca/ca-$kt.pub publish.new/
18 read pub <ca/ca-$kt.pub
19 echo "$@cert-authority $scope $pub" >publish.new/ca-$kt.entry
22 ## Sign the various host keys.
23 exec 3<etc/hosts 4>publish.new/hosts.list
25 while read line <&3; do
27 ## Ignore comments and empty lines.
29 "#"* | "") continue ;;
34 ## Read the host line.
39 ## If this is a different host, then start a new section of the list.
40 case "$host" in "$last") ;; *) { echo; echo "$host"; } >&4 ;; esac
43 ## Build a list of names for the host.
45 names=${names:+$names,}$n
48 *) names=${names:+$names,}$n.$domain ;;
53 for kt in $rawkeytypes; do
54 if [ ! -f host/$host-$kt.pub ]; then continue; fi
55 cp host/$host-$kt.pub publish.new/
56 ssh-keygen -q -tv00 -sca/ca-$kt \
57 -h -I"$cacomment:$host.$domain" -n$names \
59 publish.new/$host-$kt.pub
60 mv publish.new/$host-$kt-cert.pub \
61 publish.new/$host-$kt.cert
62 ssh-keygen -lv -fpublish.new/$host-$kt.pub | sed 's,^,| ,' >&4
68 run_gpg --armor -o publish.new/hosts.asc \
69 --clearsign publish.new/hosts.list
70 rm publish.new/hosts.list
72 ## Include a copy of the public key.
73 run_gpg --export --armor -o publish.new/ca-gnupg.asc
76 if [ -d publish ]; then
78 mv publish publish.old
80 mv publish.new publish