summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh-add.c
diff options
context:
space:
mode:
authornaddy <naddy@openbsd.org>2020-02-06 22:30:54 +0000
committernaddy <naddy@openbsd.org>2020-02-06 22:30:54 +0000
commit5f47a66000ea6cb181f93ec6eec42d947fb45006 (patch)
tree1d2af3b4a13bec94ca62c471f8bd9f7b9c7e0ec0 /usr.bin/ssh/ssh-add.c
parentTry to reduce the lying, hyperbolic or obsolete commentary on (diff)
downloadwireguard-openbsd-5f47a66000ea6cb181f93ec6eec42d947fb45006.tar.xz
wireguard-openbsd-5f47a66000ea6cb181f93ec6eec42d947fb45006.zip
Replace "security key" with "authenticator" in program messages.
This replaces "security key" in error/usage/verbose messages and distinguishes between "authenticator" and "authenticator-hosted key". ok djm@
Diffstat (limited to 'usr.bin/ssh/ssh-add.c')
-rw-r--r--usr.bin/ssh/ssh-add.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/usr.bin/ssh/ssh-add.c b/usr.bin/ssh/ssh-add.c
index 641b6cf2faf..6631aedb027 100644
--- a/usr.bin/ssh/ssh-add.c
+++ b/usr.bin/ssh/ssh-add.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ssh-add.c,v 1.151 2020/01/25 23:02:13 djm Exp $ */
+/* $OpenBSD: ssh-add.c,v 1.152 2020/02/06 22:30:54 naddy Exp $ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -308,8 +308,8 @@ add_file(int agent_fd, const char *filename, int key_only, int qflag,
if (!sshkey_is_sk(private))
skprovider = NULL; /* Don't send constraint for other keys */
else if (skprovider == NULL) {
- fprintf(stderr, "Cannot load security key %s without "
- "provider\n", filename);
+ fprintf(stderr, "Cannot load authenticator-hosted key %s "
+ "without provider\n", filename);
goto out;
}
@@ -539,7 +539,7 @@ load_resident_keys(int agent_fd, const char *skprovider, int qflag)
int r, ok = 0;
char *fp;
- pass = read_passphrase("Enter PIN for security key: ", RP_ALLOW_STDIN);
+ pass = read_passphrase("Enter PIN for authenticator: ", RP_ALLOW_STDIN);
if ((r = sshsk_load_resident(skprovider, NULL, pass,
&keys, &nkeys)) != 0) {
error("Unable to load resident keys: %s", ssh_err(r));