diff options
4 files changed, 5 insertions, 5 deletions
diff --git a/projecttemplates/RelyingPartyLogic/Model.Client.cs b/projecttemplates/RelyingPartyLogic/Model.Client.cs index 472db1e..2b06958 100644 --- a/projecttemplates/RelyingPartyLogic/Model.Client.cs +++ b/projecttemplates/RelyingPartyLogic/Model.Client.cs @@ -45,7 +45,7 @@ namespace RelyingPartyLogic { /// <returns><c>true</c> if the secret matches the one in the authorization server's record for the client; <c>false</c> otherwise.</returns> /// <remarks> /// All string equality checks, whether checking secrets or their hashes, - /// should be done using <see cref="MessagingUtilites.EqualsConstantTime"/> to mitigate timing attacks. + /// should be done using <see cref="MessagingUtilities.EqualsConstantTime"/> to mitigate timing attacks. /// </remarks> bool IClientDescription.IsValidClientSecret(string secret) { return MessagingUtilities.EqualsConstantTime(secret, this.ClientSecret); diff --git a/samples/OAuthAuthorizationServer/Code/Client.cs b/samples/OAuthAuthorizationServer/Code/Client.cs index 7495869..cf5ea59 100644 --- a/samples/OAuthAuthorizationServer/Code/Client.cs +++ b/samples/OAuthAuthorizationServer/Code/Client.cs @@ -66,7 +66,7 @@ /// <returns><c>true</c> if the secret matches the one in the authorization server's record for the client; <c>false</c> otherwise.</returns> /// <remarks> /// All string equality checks, whether checking secrets or their hashes, - /// should be done using <see cref="MessagingUtilites.EqualsConstantTime"/> to mitigate timing attacks. + /// should be done using <see cref="MessagingUtilities.EqualsConstantTime"/> to mitigate timing attacks. /// </remarks> bool IClientDescription.IsValidClientSecret(string secret) { return MessagingUtilities.EqualsConstantTime(secret, this.ClientSecret); diff --git a/src/DotNetOpenAuth.OAuth2.AuthorizationServer/OAuth2/ClientDescription.cs b/src/DotNetOpenAuth.OAuth2.AuthorizationServer/OAuth2/ClientDescription.cs index dd59993..3384183 100644 --- a/src/DotNetOpenAuth.OAuth2.AuthorizationServer/OAuth2/ClientDescription.cs +++ b/src/DotNetOpenAuth.OAuth2.AuthorizationServer/OAuth2/ClientDescription.cs @@ -77,7 +77,7 @@ namespace DotNetOpenAuth.OAuth2 { /// <returns><c>true</c> if the secret matches the one in the authorization server's record for the client; <c>false</c> otherwise.</returns> /// <remarks> /// All string equality checks, whether checking secrets or their hashes, - /// should be done using <see cref="MessagingUtilites.EqualsConstantTime"/> to mitigate timing attacks. + /// should be done using <see cref="MessagingUtilities.EqualsConstantTime"/> to mitigate timing attacks. /// </remarks> public virtual bool IsValidClientSecret(string secret) { Requires.NotNullOrEmpty(secret, "secret"); diff --git a/src/DotNetOpenAuth.OAuth2.ClientAuthorization/OAuth2/IClientDescription.cs b/src/DotNetOpenAuth.OAuth2.ClientAuthorization/OAuth2/IClientDescription.cs index ebbe1f2..8b1988c 100644 --- a/src/DotNetOpenAuth.OAuth2.ClientAuthorization/OAuth2/IClientDescription.cs +++ b/src/DotNetOpenAuth.OAuth2.ClientAuthorization/OAuth2/IClientDescription.cs @@ -64,7 +64,7 @@ namespace DotNetOpenAuth.OAuth2 { /// <returns><c>true</c> if the secret matches the one in the authorization server's record for the client; <c>false</c> otherwise.</returns> /// <remarks> /// All string equality checks, whether checking secrets or their hashes, - /// should be done using <see cref="MessagingUtilites.EqualsConstantTime"/> to mitigate timing attacks. + /// should be done using <see cref="MessagingUtilities.EqualsConstantTime"/> to mitigate timing attacks. /// </remarks> bool IsValidClientSecret(string secret); } @@ -125,7 +125,7 @@ namespace DotNetOpenAuth.OAuth2 { /// <returns><c>true</c> if the secret matches the one in the authorization server's record for the client; <c>false</c> otherwise.</returns> /// <remarks> /// All string equality checks, whether checking secrets or their hashes, - /// should be done using <see cref="MessagingUtilites.EqualsConstantTime"/> to mitigate timing attacks. + /// should be done using <see cref="MessagingUtilities.EqualsConstantTime"/> to mitigate timing attacks. /// </remarks> bool IClientDescription.IsValidClientSecret(string secret) { Requires.NotNullOrEmpty(secret, "secret"); |