diff --git a/ChangeLog b/ChangeLog
index 70d5baa58..a2019d231 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -24,6 +24,10 @@
      walked in either direction.
      discussions with several people,
      help, corrections and ok markus@ djm@
+   - grunk@cvs.openbsd.org 2008/06/11 21:38:25
+     [ssh-keygen.c]
+     ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub
+     would not display you the random art as intended, spotted by canacar@
 
 20080611
  - (djm) [channels.c configure.ac]
@@ -4186,4 +4190,4 @@
    OpenServer 6 and add osr5bigcrypt support so when someone migrates
    passwords between UnixWare and OpenServer they will still work. OK dtucker@
 
-$Id: ChangeLog,v 1.4969 2008/06/12 18:40:35 dtucker Exp $
+$Id: ChangeLog,v 1.4970 2008/06/12 18:42:14 dtucker Exp $
diff --git a/ssh-keygen.c b/ssh-keygen.c
index c22e814da..5d90e7a24 100644
--- a/ssh-keygen.c
+++ b/ssh-keygen.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ssh-keygen.c,v 1.167 2008/06/11 21:01:35 grunk Exp $ */
+/* $OpenBSD: ssh-keygen.c,v 1.168 2008/06/11 21:38:25 grunk Exp $ */
 /*
  * Author: Tatu Ylonen <ylo@cs.hut.fi>
  * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -522,9 +522,9 @@ do_fingerprint(struct passwd *pw)
 	public = key_load_public(identity_file, &comment);
 	if (public != NULL) {
 		fp = key_fingerprint(public, fptype, rep);
-		ra = key_fingerprint(public, fptype, rep);
+		ra = key_fingerprint(public, fptype, SSH_FP_RANDOMART);
 		printf("%u %s %s\n", key_size(public), fp, comment);
-		verbose("%s\n", ra);
+		verbose("%s", ra);
 		key_free(public);
 		xfree(comment);
 		xfree(ra);