6 ## The key types are adorned with bit lengths. Work out the raw key type
9 for kt in $keytypes; do
10 rawkeytypes="$rawkeytypes ${kt%:*}"
13 ## Start a new output directory.
16 for kt in $rawkeytypes; do
17 cp ca/ca-$kt.pub publish.new/
18 read pub <ca/ca-$kt.pub
19 echo "$@cert-authority $scope $pub" >publish.new/ca-$kt.entry
22 ## Sign the various host keys.
23 exec 3<etc/hosts 4>publish.new/hosts.list
25 while read line <&3; do
27 ## Ignore comments and empty lines.
29 "#"* | "") continue ;;
34 ## Read the host line.
39 ## If this is a different host, then start a new section of the list.
41 "%%%") echo "$host" >&4 ;;
43 *) { echo; echo "$host"; } >&4 ;;
47 ## Build a list of names for the host.
49 names=${names:+$names,}$n
52 *) names=${names:+$names,}$n.$domain ;;
57 for kt in $rawkeytypes; do
58 if [ ! -f host/$host-$kt.pub ]; then continue; fi
59 cp host/$host-$kt.pub publish.new/
60 ssh-keygen -q -tv00 -sca/ca-$kt \
61 -h -I"$cacomment:$host.$domain" -n$names \
63 publish.new/$host-$kt.pub
64 mv publish.new/$host-$kt-cert.pub \
65 publish.new/$host-$kt.cert
66 ssh-keygen -lv -fpublish.new/$host-$kt.pub | sed 's,^,| ,' >&4
72 run_gpg --armor -o publish.new/hosts.asc \
73 --clearsign publish.new/hosts.list
74 rm publish.new/hosts.list
76 ## Include a copy of the public key.
77 run_gpg --export --armor -o publish.new/ca-gnupg.asc
80 if [ -d publish ]; then
82 mv publish publish.old
84 mv publish.new publish