commit f2ada2daab319c17156aef3fcccaecd4773498ab Author: Nick Mathewson nickm@torproject.org Date: Mon Mar 3 11:19:58 2014 -0500
Fix a couple of unfinished sentences --- proposals/220-ecc-id-keys.txt | 2 -- proposals/228-cross-certification-onionkeys.txt | 5 +++-- 2 files changed, 3 insertions(+), 4 deletions(-)
diff --git a/proposals/220-ecc-id-keys.txt b/proposals/220-ecc-id-keys.txt index fef8beb..94ec9a3 100644 --- a/proposals/220-ecc-id-keys.txt +++ b/proposals/220-ecc-id-keys.txt @@ -127,8 +127,6 @@ Status: Draft When this extension is present, it MUST match the key used to sign the certificate.
- This - 2.3. Revoking keys.
We also specify a revocation document for revoking a signing key or an diff --git a/proposals/228-cross-certification-onionkeys.txt b/proposals/228-cross-certification-onionkeys.txt index 904265a..d28b714 100644 --- a/proposals/228-cross-certification-onionkeys.txt +++ b/proposals/228-cross-certification-onionkeys.txt @@ -101,8 +101,9 @@ Status: Open
4. Performance impact
- Routers do not generate new descriptors frequently enough for - them to need to + Routers do not generate new descriptors frequently enough for the + extra signing operations required here to have an appreciable affect + on their performance.
Checking an extra ed25519 signature when parsing a descriptor is very cheap, since we can use batch signature checking.