diff options
author | Andrew Arnott <andrewarnott@gmail.com> | 2012-04-01 09:45:13 -0700 |
---|---|---|
committer | Andrew Arnott <andrewarnott@gmail.com> | 2012-04-01 09:45:13 -0700 |
commit | b5bc1a4cc5b4f0729249ebdf9d659ec387f30766 (patch) | |
tree | 2169bd2488dcce0e429f6e9b097ecab6441570ea | |
parent | e9694a76f36710499d209587f554fdace99cad55 (diff) | |
download | DotNetOpenAuth-b5bc1a4cc5b4f0729249ebdf9d659ec387f30766.zip DotNetOpenAuth-b5bc1a4cc5b4f0729249ebdf9d659ec387f30766.tar.gz DotNetOpenAuth-b5bc1a4cc5b4f0729249ebdf9d659ec387f30766.tar.bz2 |
Fixed typo.
4 files changed, 5 insertions, 5 deletions
diff --git a/projecttemplates/RelyingPartyLogic/Model.Client.cs b/projecttemplates/RelyingPartyLogic/Model.Client.cs index 472db1e..2b06958 100644 --- a/projecttemplates/RelyingPartyLogic/Model.Client.cs +++ b/projecttemplates/RelyingPartyLogic/Model.Client.cs @@ -45,7 +45,7 @@ namespace RelyingPartyLogic { /// <returns><c>true</c> if the secret matches the one in the authorization server's record for the client; <c>false</c> otherwise.</returns> /// <remarks> /// All string equality checks, whether checking secrets or their hashes, - /// should be done using <see cref="MessagingUtilites.EqualsConstantTime"/> to mitigate timing attacks. + /// should be done using <see cref="MessagingUtilities.EqualsConstantTime"/> to mitigate timing attacks. /// </remarks> bool IClientDescription.IsValidClientSecret(string secret) { return MessagingUtilities.EqualsConstantTime(secret, this.ClientSecret); diff --git a/samples/OAuthAuthorizationServer/Code/Client.cs b/samples/OAuthAuthorizationServer/Code/Client.cs index 7495869..cf5ea59 100644 --- a/samples/OAuthAuthorizationServer/Code/Client.cs +++ b/samples/OAuthAuthorizationServer/Code/Client.cs @@ -66,7 +66,7 @@ /// <returns><c>true</c> if the secret matches the one in the authorization server's record for the client; <c>false</c> otherwise.</returns> /// <remarks> /// All string equality checks, whether checking secrets or their hashes, - /// should be done using <see cref="MessagingUtilites.EqualsConstantTime"/> to mitigate timing attacks. + /// should be done using <see cref="MessagingUtilities.EqualsConstantTime"/> to mitigate timing attacks. /// </remarks> bool IClientDescription.IsValidClientSecret(string secret) { return MessagingUtilities.EqualsConstantTime(secret, this.ClientSecret); diff --git a/src/DotNetOpenAuth.OAuth2.AuthorizationServer/OAuth2/ClientDescription.cs b/src/DotNetOpenAuth.OAuth2.AuthorizationServer/OAuth2/ClientDescription.cs index dd59993..3384183 100644 --- a/src/DotNetOpenAuth.OAuth2.AuthorizationServer/OAuth2/ClientDescription.cs +++ b/src/DotNetOpenAuth.OAuth2.AuthorizationServer/OAuth2/ClientDescription.cs @@ -77,7 +77,7 @@ namespace DotNetOpenAuth.OAuth2 { /// <returns><c>true</c> if the secret matches the one in the authorization server's record for the client; <c>false</c> otherwise.</returns> /// <remarks> /// All string equality checks, whether checking secrets or their hashes, - /// should be done using <see cref="MessagingUtilites.EqualsConstantTime"/> to mitigate timing attacks. + /// should be done using <see cref="MessagingUtilities.EqualsConstantTime"/> to mitigate timing attacks. /// </remarks> public virtual bool IsValidClientSecret(string secret) { Requires.NotNullOrEmpty(secret, "secret"); diff --git a/src/DotNetOpenAuth.OAuth2.ClientAuthorization/OAuth2/IClientDescription.cs b/src/DotNetOpenAuth.OAuth2.ClientAuthorization/OAuth2/IClientDescription.cs index ebbe1f2..8b1988c 100644 --- a/src/DotNetOpenAuth.OAuth2.ClientAuthorization/OAuth2/IClientDescription.cs +++ b/src/DotNetOpenAuth.OAuth2.ClientAuthorization/OAuth2/IClientDescription.cs @@ -64,7 +64,7 @@ namespace DotNetOpenAuth.OAuth2 { /// <returns><c>true</c> if the secret matches the one in the authorization server's record for the client; <c>false</c> otherwise.</returns> /// <remarks> /// All string equality checks, whether checking secrets or their hashes, - /// should be done using <see cref="MessagingUtilites.EqualsConstantTime"/> to mitigate timing attacks. + /// should be done using <see cref="MessagingUtilities.EqualsConstantTime"/> to mitigate timing attacks. /// </remarks> bool IsValidClientSecret(string secret); } @@ -125,7 +125,7 @@ namespace DotNetOpenAuth.OAuth2 { /// <returns><c>true</c> if the secret matches the one in the authorization server's record for the client; <c>false</c> otherwise.</returns> /// <remarks> /// All string equality checks, whether checking secrets or their hashes, - /// should be done using <see cref="MessagingUtilites.EqualsConstantTime"/> to mitigate timing attacks. + /// should be done using <see cref="MessagingUtilities.EqualsConstantTime"/> to mitigate timing attacks. /// </remarks> bool IClientDescription.IsValidClientSecret(string secret) { Requires.NotNullOrEmpty(secret, "secret"); |