In the CERTIFICATES section of ssh-keygen.1, be consistent about
using "host_key" and "user_key" for the respective key types.

Index: ssh-keygen.1
===================================================================
RCS file: /cvs/src/usr.bin/ssh/ssh-keygen.1,v
retrieving revision 1.126
diff -u -p -r1.126 ssh-keygen.1
--- ssh-keygen.1        3 Jul 2015 03:49:45 -0000       1.126
+++ ssh-keygen.1        19 Aug 2015 17:45:18 -0000
@@ -680,7 +680,7 @@ and identifying the CA key by providing 
 to
 .Fl s :
 .Pp
-.Dl $ ssh-keygen -s ca_key.pub -D libpkcs11.so -I key_id host_key.pub
+.Dl $ ssh-keygen -s ca_key.pub -D libpkcs11.so -I key_id user_key.pub
 .Pp
 In all cases,
 .Ar key_id
@@ -693,7 +693,7 @@ By default, generated certificates are v
 To generate a certificate for a specified set of principals:
 .Pp
 .Dl $ ssh-keygen -s ca_key -I key_id -n user1,user2 user_key.pub
-.Dl "$ ssh-keygen -s ca_key -I key_id -h -n host.domain user_key.pub"
+.Dl "$ ssh-keygen -s ca_key -I key_id -h -n host.domain host_key.pub"
 .Pp
 Additional limitations on the validity and use of user certificates may
 be specified through certificate options.
-- 
Christian "naddy" Weisgerber                          na...@mips.inka.de

Reply via email to