summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAndrew Arnott <andrewarnott@gmail.com>2012-04-01 09:45:13 -0700
committerAndrew Arnott <andrewarnott@gmail.com>2012-04-01 09:45:13 -0700
commitb5bc1a4cc5b4f0729249ebdf9d659ec387f30766 (patch)
tree2169bd2488dcce0e429f6e9b097ecab6441570ea
parente9694a76f36710499d209587f554fdace99cad55 (diff)
downloadDotNetOpenAuth-b5bc1a4cc5b4f0729249ebdf9d659ec387f30766.zip
DotNetOpenAuth-b5bc1a4cc5b4f0729249ebdf9d659ec387f30766.tar.gz
DotNetOpenAuth-b5bc1a4cc5b4f0729249ebdf9d659ec387f30766.tar.bz2
Fixed typo.
-rw-r--r--projecttemplates/RelyingPartyLogic/Model.Client.cs2
-rw-r--r--samples/OAuthAuthorizationServer/Code/Client.cs2
-rw-r--r--src/DotNetOpenAuth.OAuth2.AuthorizationServer/OAuth2/ClientDescription.cs2
-rw-r--r--src/DotNetOpenAuth.OAuth2.ClientAuthorization/OAuth2/IClientDescription.cs4
4 files changed, 5 insertions, 5 deletions
diff --git a/projecttemplates/RelyingPartyLogic/Model.Client.cs b/projecttemplates/RelyingPartyLogic/Model.Client.cs
index 472db1e..2b06958 100644
--- a/projecttemplates/RelyingPartyLogic/Model.Client.cs
+++ b/projecttemplates/RelyingPartyLogic/Model.Client.cs
@@ -45,7 +45,7 @@ namespace RelyingPartyLogic {
/// <returns><c>true</c> if the secret matches the one in the authorization server's record for the client; <c>false</c> otherwise.</returns>
/// <remarks>
/// All string equality checks, whether checking secrets or their hashes,
- /// should be done using <see cref="MessagingUtilites.EqualsConstantTime"/> to mitigate timing attacks.
+ /// should be done using <see cref="MessagingUtilities.EqualsConstantTime"/> to mitigate timing attacks.
/// </remarks>
bool IClientDescription.IsValidClientSecret(string secret) {
return MessagingUtilities.EqualsConstantTime(secret, this.ClientSecret);
diff --git a/samples/OAuthAuthorizationServer/Code/Client.cs b/samples/OAuthAuthorizationServer/Code/Client.cs
index 7495869..cf5ea59 100644
--- a/samples/OAuthAuthorizationServer/Code/Client.cs
+++ b/samples/OAuthAuthorizationServer/Code/Client.cs
@@ -66,7 +66,7 @@
/// <returns><c>true</c> if the secret matches the one in the authorization server's record for the client; <c>false</c> otherwise.</returns>
/// <remarks>
/// All string equality checks, whether checking secrets or their hashes,
- /// should be done using <see cref="MessagingUtilites.EqualsConstantTime"/> to mitigate timing attacks.
+ /// should be done using <see cref="MessagingUtilities.EqualsConstantTime"/> to mitigate timing attacks.
/// </remarks>
bool IClientDescription.IsValidClientSecret(string secret) {
return MessagingUtilities.EqualsConstantTime(secret, this.ClientSecret);
diff --git a/src/DotNetOpenAuth.OAuth2.AuthorizationServer/OAuth2/ClientDescription.cs b/src/DotNetOpenAuth.OAuth2.AuthorizationServer/OAuth2/ClientDescription.cs
index dd59993..3384183 100644
--- a/src/DotNetOpenAuth.OAuth2.AuthorizationServer/OAuth2/ClientDescription.cs
+++ b/src/DotNetOpenAuth.OAuth2.AuthorizationServer/OAuth2/ClientDescription.cs
@@ -77,7 +77,7 @@ namespace DotNetOpenAuth.OAuth2 {
/// <returns><c>true</c> if the secret matches the one in the authorization server's record for the client; <c>false</c> otherwise.</returns>
/// <remarks>
/// All string equality checks, whether checking secrets or their hashes,
- /// should be done using <see cref="MessagingUtilites.EqualsConstantTime"/> to mitigate timing attacks.
+ /// should be done using <see cref="MessagingUtilities.EqualsConstantTime"/> to mitigate timing attacks.
/// </remarks>
public virtual bool IsValidClientSecret(string secret) {
Requires.NotNullOrEmpty(secret, "secret");
diff --git a/src/DotNetOpenAuth.OAuth2.ClientAuthorization/OAuth2/IClientDescription.cs b/src/DotNetOpenAuth.OAuth2.ClientAuthorization/OAuth2/IClientDescription.cs
index ebbe1f2..8b1988c 100644
--- a/src/DotNetOpenAuth.OAuth2.ClientAuthorization/OAuth2/IClientDescription.cs
+++ b/src/DotNetOpenAuth.OAuth2.ClientAuthorization/OAuth2/IClientDescription.cs
@@ -64,7 +64,7 @@ namespace DotNetOpenAuth.OAuth2 {
/// <returns><c>true</c> if the secret matches the one in the authorization server's record for the client; <c>false</c> otherwise.</returns>
/// <remarks>
/// All string equality checks, whether checking secrets or their hashes,
- /// should be done using <see cref="MessagingUtilites.EqualsConstantTime"/> to mitigate timing attacks.
+ /// should be done using <see cref="MessagingUtilities.EqualsConstantTime"/> to mitigate timing attacks.
/// </remarks>
bool IsValidClientSecret(string secret);
}
@@ -125,7 +125,7 @@ namespace DotNetOpenAuth.OAuth2 {
/// <returns><c>true</c> if the secret matches the one in the authorization server's record for the client; <c>false</c> otherwise.</returns>
/// <remarks>
/// All string equality checks, whether checking secrets or their hashes,
- /// should be done using <see cref="MessagingUtilites.EqualsConstantTime"/> to mitigate timing attacks.
+ /// should be done using <see cref="MessagingUtilities.EqualsConstantTime"/> to mitigate timing attacks.
/// </remarks>
bool IClientDescription.IsValidClientSecret(string secret) {
Requires.NotNullOrEmpty(secret, "secret");