Use canonical test keys in all SSH agent key listings
Marco Ricci

Marco Ricci commited on 2024-11-27 15:10:52
Zeige 3 geänderte Dateien mit 23 Einfügungen und 23 Löschungen.


For all documentation, whenever a formatted key listing of suitable keys
is presented, use the test keys from the test suite if possible.

Also, correct a typo.
... ...
@@ -81,9 +81,9 @@ On UNIX-like systems with OpenSSH or PuTTY installed, you can use an Ed25519, Ed
81 81
 ```` shell-session
82 82
 $ derivepassphrase vault -k my-email-account
83 83
 Suitable SSH keys:
84
-[1] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQ... test key
85
-[2] ssh-ed448 AAAACXNzaC1lZDQ0OAAAADni9nLTT1... test key
86
-[3] ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIF4gW... test key
84
+[1] ssh-rsa ...feXycsvJZ2uaYRjMdZeJGNAnHLUGLkBscw5aI8=  test key without passphrase
85
+[2] ssh-ed448 ...BQ72ZgtPMckdzabiz7JbM/b0JzcRzGLMsbwA=  test key without passphrase
86
+[3] ssh-ed25519 ...gJIXw//Mkhv5MEwidwcakUGCekJD/vCEml2  test key without passphrase
87 87
 Your selection? (1-3, leave empty to abort): 1
88 88
 oXDGCvMhLWPQyCzYtaobOq2Wh9olYj
89 89
 ````
... ...
@@ -94,9 +94,9 @@ This choice can be made either specifically for the service (in this case, `my-e
94 94
 ```` shell-session
95 95
 $ derivepassphrase vault --config -k  # global setting
96 96
 Suitable SSH keys:
97
-[1] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQ... test key
98
-[2] ssh-ed448 AAAACXNzaC1lZDQ0OAAAADni9nLTT1... test key
99
-[3] ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIF4gW... test key
97
+[1] ssh-rsa ...feXycsvJZ2uaYRjMdZeJGNAnHLUGLkBscw5aI8=  test key without passphrase
98
+[2] ssh-ed448 ...BQ72ZgtPMckdzabiz7JbM/b0JzcRzGLMsbwA=  test key without passphrase
99
+[3] ssh-ed25519 ...gJIXw//Mkhv5MEwidwcakUGCekJD/vCEml2  test key without passphrase
100 100
 Your selection? (1-3, leave empty to abort): 1
101 101
 $ derivepassphrase vault my-email-account
102 102
 oXDGCvMhLWPQyCzYtaobOq2Wh9olYj
... ...
@@ -80,9 +80,9 @@ Next, configure `derivepassphrase vault` to use the loaded SSH key.
80 80
     ~~~~ console
81 81
     $ derivepassphrase vault --config -k
82 82
     Suitable SSH keys:
83
-    [1] ssh-ed25519 ...n6tMofjJyWHLyjEXfXsJhBt+OuheHzPA/xRUqw  developer key
84
-    [2] ssh-rsa ...Cr5XE5ZbIjm1NYmxZ81G5IJkMgF3JTSE1PfQgbVHE=  my key comment
85
-    [3] ssh-ed25519 ...iimqEbE9kUM+G+g12hhuDNfsI/S02xtaphIOOH  vault key
83
+    [1] ssh-rsa ...feXycsvJZ2uaYRjMdZeJGNAnHLUGLkBscw5aI8=  test key without passphrase
84
+    [2] ssh-ed448 ...BQ72ZgtPMckdzabiz7JbM/b0JzcRzGLMsbwA=  test key without passphrase
85
+    [3] ssh-ed25519 ...gJIXw//Mkhv5MEwidwcakUGCekJD/vCEml2  test key without passphrase
86 86
     Your selection? (1-3, leave empty to abort): 3
87 87
     ~~~~
88 88
 
... ...
@@ -97,9 +97,9 @@ Next, configure `derivepassphrase vault` to use the loaded SSH key.
97 97
     ~~~~ console
98 98
     $ derivepassphrase vault --config -k SERVICE
99 99
     Suitable SSH keys:
100
-    [1] ssh-ed25519 ...n6tMofjJyWHLyjEXfXsJhBt+OuheHzPA/xRUqw  developer key
101
-    [2] ssh-rsa ...Cr5XE5ZbIjm1NYmxZ81G5IJkMgF3JTSE1PfQgbVHE=  my key comment
102
-    [3] ssh-ed25519 ...iimqEbE9kUM+G+g12hhuDNfsI/S02xtaphIOOH  vault key
100
+    [1] ssh-rsa ...feXycsvJZ2uaYRjMdZeJGNAnHLUGLkBscw5aI8=  test key without passphrase
101
+    [2] ssh-ed448 ...BQ72ZgtPMckdzabiz7JbM/b0JzcRzGLMsbwA=  test key without passphrase
102
+    [3] ssh-ed25519 ...gJIXw//Mkhv5MEwidwcakUGCekJD/vCEml2  test key without passphrase
103 103
     Your selection? (1-3, leave empty to abort): 3
104 104
     ~~~~
105 105
 
... ...
@@ -163,18 +163,18 @@ widely implemented.
163 163
         Your identification has been saved in .../.ssh/my-vault-ed25519-key
164 164
         Your public key has been saved in .../.ssh/my-vault-ed25519-key.pub
165 165
         The key fingerprint is:
166
-        SHA256:BKD43lBB7qh4VvZxq6xSYDXUUbXF6snrRF7qUnOx1PA vault key
166
+        SHA256:0h+WAokssfhzfzVyuMLJlIcWyCtk5WiXI8BHyhXYxC0 vault key
167 167
         The key's randomart image is:
168 168
         +--[ED25519 256]--+
169
-        |   o=ooo.....    |
170
-        | . oo...   oo    |
171
-        |. ..o.  . .. +   |
172
-        | .o+   .  . o E  |
173
-        | .+.+ . So.o.o   |
174
-        |.o =.. o +*oo    |
175
-        |o +.. . ..++     |
176
-        | o.  . ..o.      |
177
-        |   ...o  oo      |
169
+        |o B=+            |
170
+        |.=oE = .         |
171
+        |.oX @ +          |
172
+        | = + o * . .     |
173
+        |  + o * S B      |
174
+        |   + * + O o     |
175
+        |      * o .      |
176
+        |       o         |
177
+        |                 |
178 178
         +----[SHA256]-----+
179 179
         ~~~~
180 180
 
... ...
@@ -197,7 +197,7 @@ widely implemented.
197 197
     === "GnuPG"
198 198
 
199 199
         Not supported natively.  An alternative SSH client distribution
200
-        such as OpenSSH or PuTTY is necessary
200
+        such as OpenSSH or PuTTY is necessary.
201 201
 
202 202
         Alternatively, GnuPG supports reusing keys in its native OpenPGP
203 203
         format for SSH as long as the underlying key type is compatible.
204 204