diff options
author | naddy@openbsd.org <naddy@openbsd.org> | 2020-02-06 22:30:54 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2020-02-07 09:52:59 +1100 |
commit | a47f6a6c0e06628eed0c2a08dc31a8923bcc37ba (patch) | |
tree | 4f65bc75647cf817ea926a6a585defd3af534d24 /ssh-keygen.c | |
parent | 849a9b87144f8a5b1771de6c85e44bfeb86be9a9 (diff) |
upstream: Replace "security key" with "authenticator" in program
messages.
This replaces "security key" in error/usage/verbose messages and
distinguishes between "authenticator" and "authenticator-hosted key".
ok djm@
OpenBSD-Commit-ID: 7c63800e9c340c59440a054cde9790a78f18592e
Diffstat (limited to 'ssh-keygen.c')
-rw-r--r-- | ssh-keygen.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/ssh-keygen.c b/ssh-keygen.c index 2a64622c1..a6ba6cc7a 100644 --- a/ssh-keygen.c +++ b/ssh-keygen.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh-keygen.c,v 1.396 2020/02/04 09:58:04 djm Exp $ */ | 1 | /* $OpenBSD: ssh-keygen.c,v 1.397 2020/02/06 22:30:54 naddy Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -2971,7 +2971,7 @@ do_download_sk(const char *skprovider, const char *device) | |||
2971 | if (skprovider == NULL) | 2971 | if (skprovider == NULL) |
2972 | fatal("Cannot download keys without provider"); | 2972 | fatal("Cannot download keys without provider"); |
2973 | 2973 | ||
2974 | pin = read_passphrase("Enter PIN for security key: ", RP_ALLOW_STDIN); | 2974 | pin = read_passphrase("Enter PIN for authenticator: ", RP_ALLOW_STDIN); |
2975 | if ((r = sshsk_load_resident(skprovider, device, pin, | 2975 | if ((r = sshsk_load_resident(skprovider, device, pin, |
2976 | &keys, &nkeys)) != 0) { | 2976 | &keys, &nkeys)) != 0) { |
2977 | freezero(pin, strlen(pin)); | 2977 | freezero(pin, strlen(pin)); |
@@ -3582,7 +3582,7 @@ main(int argc, char **argv) | |||
3582 | } | 3582 | } |
3583 | } | 3583 | } |
3584 | if (!quiet) { | 3584 | if (!quiet) { |
3585 | printf("You may need to touch your security key " | 3585 | printf("You may need to touch your authenticator " |
3586 | "to authorize key generation.\n"); | 3586 | "to authorize key generation.\n"); |
3587 | } | 3587 | } |
3588 | passphrase = NULL; | 3588 | passphrase = NULL; |
@@ -3600,8 +3600,8 @@ main(int argc, char **argv) | |||
3600 | fatal("Key enrollment failed: %s", ssh_err(r)); | 3600 | fatal("Key enrollment failed: %s", ssh_err(r)); |
3601 | if (passphrase != NULL) | 3601 | if (passphrase != NULL) |
3602 | freezero(passphrase, strlen(passphrase)); | 3602 | freezero(passphrase, strlen(passphrase)); |
3603 | passphrase = read_passphrase("Enter PIN for security " | 3603 | passphrase = read_passphrase("Enter PIN for " |
3604 | "key: ", RP_ALLOW_STDIN); | 3604 | "authenticator: ", RP_ALLOW_STDIN); |
3605 | } | 3605 | } |
3606 | if (passphrase != NULL) | 3606 | if (passphrase != NULL) |
3607 | freezero(passphrase, strlen(passphrase)); | 3607 | freezero(passphrase, strlen(passphrase)); |