diff --git a/doc/spec/proposals/124-tls-certificates.txt b/doc/spec/proposals/124-tls-certificates.txt index 3f10149439..7ed89707b4 100644 --- a/doc/spec/proposals/124-tls-certificates.txt +++ b/doc/spec/proposals/124-tls-certificates.txt @@ -81,7 +81,7 @@ Version negotiation and cipher suite selection: Responders supporting version 2 of the Tor connection protocol should compare the cipher suite list in the client hello with those in List 1. If it matches any in the list then the responder should assume that the initiatior supports - version 1, and should thus should maintain the version 1 behavior, i.e. send a + version 1, and thus should maintain the version 1 behavior, i.e. send a two-certificate chain, request a client certificate and do not send or expect a VERSIONS cell [2]. diff --git a/doc/spec/rend-spec.txt b/doc/spec/rend-spec.txt index 63386795a5..155bf9e043 100644 --- a/doc/spec/rend-spec.txt +++ b/doc/spec/rend-spec.txt @@ -252,7 +252,7 @@ $Id$ 32 base32 chars. Using this secret id part, everyone can verify that the signed descriptor belongs to "descriptor-id". - secret-id-part = H(time-period | cookie | replica) + secret-id-part = H(time-period | descriptor-cookie | replica) "publication-time" YYYY-MM-DD HH:MM:SS NL