summaryrefslogtreecommitdiff
path: root/ssh-keygen.c
diff options
context:
space:
mode:
authornaddy@openbsd.org <naddy@openbsd.org>2020-02-06 22:30:54 +0000
committerDamien Miller <djm@mindrot.org>2020-02-07 09:52:59 +1100
commita47f6a6c0e06628eed0c2a08dc31a8923bcc37ba (patch)
tree4f65bc75647cf817ea926a6a585defd3af534d24 /ssh-keygen.c
parent849a9b87144f8a5b1771de6c85e44bfeb86be9a9 (diff)
upstream: Replace "security key" with "authenticator" in program
messages. This replaces "security key" in error/usage/verbose messages and distinguishes between "authenticator" and "authenticator-hosted key". ok djm@ OpenBSD-Commit-ID: 7c63800e9c340c59440a054cde9790a78f18592e
Diffstat (limited to 'ssh-keygen.c')
-rw-r--r--ssh-keygen.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/ssh-keygen.c b/ssh-keygen.c
index 2a64622c1..a6ba6cc7a 100644
--- a/ssh-keygen.c
+++ b/ssh-keygen.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssh-keygen.c,v 1.396 2020/02/04 09:58:04 djm Exp $ */ 1/* $OpenBSD: ssh-keygen.c,v 1.397 2020/02/06 22:30:54 naddy Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -2971,7 +2971,7 @@ do_download_sk(const char *skprovider, const char *device)
2971 if (skprovider == NULL) 2971 if (skprovider == NULL)
2972 fatal("Cannot download keys without provider"); 2972 fatal("Cannot download keys without provider");
2973 2973
2974 pin = read_passphrase("Enter PIN for security key: ", RP_ALLOW_STDIN); 2974 pin = read_passphrase("Enter PIN for authenticator: ", RP_ALLOW_STDIN);
2975 if ((r = sshsk_load_resident(skprovider, device, pin, 2975 if ((r = sshsk_load_resident(skprovider, device, pin,
2976 &keys, &nkeys)) != 0) { 2976 &keys, &nkeys)) != 0) {
2977 freezero(pin, strlen(pin)); 2977 freezero(pin, strlen(pin));
@@ -3582,7 +3582,7 @@ main(int argc, char **argv)
3582 } 3582 }
3583 } 3583 }
3584 if (!quiet) { 3584 if (!quiet) {
3585 printf("You may need to touch your security key " 3585 printf("You may need to touch your authenticator "
3586 "to authorize key generation.\n"); 3586 "to authorize key generation.\n");
3587 } 3587 }
3588 passphrase = NULL; 3588 passphrase = NULL;
@@ -3600,8 +3600,8 @@ main(int argc, char **argv)
3600 fatal("Key enrollment failed: %s", ssh_err(r)); 3600 fatal("Key enrollment failed: %s", ssh_err(r));
3601 if (passphrase != NULL) 3601 if (passphrase != NULL)
3602 freezero(passphrase, strlen(passphrase)); 3602 freezero(passphrase, strlen(passphrase));
3603 passphrase = read_passphrase("Enter PIN for security " 3603 passphrase = read_passphrase("Enter PIN for "
3604 "key: ", RP_ALLOW_STDIN); 3604 "authenticator: ", RP_ALLOW_STDIN);
3605 } 3605 }
3606 if (passphrase != NULL) 3606 if (passphrase != NULL)
3607 freezero(passphrase, strlen(passphrase)); 3607 freezero(passphrase, strlen(passphrase));