From 0658668e244f550a97386a567d8fd986d28f2d9d Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?K=C3=A9vin=20Chalet?= Date: Fri, 5 Jan 2024 18:25:55 +0100 Subject: [PATCH] Remove invalid references to Windows in code comments present in the system integration package --- .../OpenIddictClientSystemIntegrationHandlers.cs | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/src/OpenIddict.Client.SystemIntegration/OpenIddictClientSystemIntegrationHandlers.cs b/src/OpenIddict.Client.SystemIntegration/OpenIddictClientSystemIntegrationHandlers.cs index 2ff231b3..e3e91c15 100644 --- a/src/OpenIddict.Client.SystemIntegration/OpenIddictClientSystemIntegrationHandlers.cs +++ b/src/OpenIddict.Client.SystemIntegration/OpenIddictClientSystemIntegrationHandlers.cs @@ -794,8 +794,8 @@ public static partial class OpenIddictClientSystemIntegrationHandlers } /// - /// Contains the logic responsible for redirecting the Windows protocol activation - /// to the instance that initially started the authentication demand, if applicable. + /// Contains the logic responsible for redirecting the protocol activation to + /// the instance that initially started the authentication demand, if applicable. /// Note: this handler is not used when the OpenID Connect request is not a protocol activation. /// public sealed class RedirectProtocolActivation : IOpenIddictClientHandler @@ -919,9 +919,9 @@ public static partial class OpenIddictClientSystemIntegrationHandlers Debug.Assert(!string.IsNullOrEmpty(context.Nonce), SR.GetResourceString(SR.ID4019)); - // Ensure the authentication demand is tracked by the OpenIddict client Windows marshal - // and resolve the corresponding request forgery protection. If it can't be found, this may - // indicate a session fixation attack: in this case, reject the authentication demand. + // Ensure the authentication demand is tracked by the OpenIddict client system integration + // marshal and resolve the corresponding request forgery protection. If it can't be found, + // this may indicate a session fixation attack: in this case, reject the authentication demand. if (!_marshal.TryGetRequestForgeryProtection(context.Nonce, out string? protection)) { context.Reject(