From e2fe4d9d37466f959e50cc9b6c168c116e519067 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?K=C3=A9vin=20Chalet?= Date: Tue, 28 Jul 2020 16:24:59 +0200 Subject: [PATCH] Update the XML documentation to use where appropriate --- .../OpenIddictServerOptions.cs | 20 +++++++++++-------- .../OpenIddictValidationOptions.cs | 10 ++++++---- 2 files changed, 18 insertions(+), 12 deletions(-) diff --git a/src/OpenIddict.Server/OpenIddictServerOptions.cs b/src/OpenIddict.Server/OpenIddictServerOptions.cs index c8a7aa8e..33143da3 100644 --- a/src/OpenIddict.Server/OpenIddictServerOptions.cs +++ b/src/OpenIddict.Server/OpenIddictServerOptions.cs @@ -36,10 +36,12 @@ namespace OpenIddict.Server /// /// /// Note: OpenIddict automatically sorts the credentials based on the following algorithm: - /// • Symmetric keys are always preferred when they can be used for the operation (e.g token encryption). - /// • X.509 keys are always preferred to non-X.509 asymmetric keys. - /// • X.509 keys with the furthest expiration date are preferred. - /// • X.509 keys whose backing certificate is not yet valid are never preferred. + /// + /// Symmetric keys are always preferred when they can be used for the operation (e.g token encryption). + /// X.509 keys are always preferred to non-X.509 asymmetric keys. + /// X.509 keys with the furthest expiration date are preferred. + /// X.509 keys whose backing certificate is not yet valid are never preferred. + /// /// public List EncryptionCredentials { get; } = new List(); @@ -52,10 +54,12 @@ namespace OpenIddict.Server /// /// /// Note: OpenIddict automatically sorts the credentials based on the following algorithm: - /// • Symmetric keys are always preferred when they can be used for the operation (e.g token signing). - /// • X.509 keys are always preferred to non-X.509 asymmetric keys. - /// • X.509 keys with the furthest expiration date are preferred. - /// • X.509 keys whose backing certificate is not yet valid are never preferred. + /// + /// Symmetric keys are always preferred when they can be used for the operation (e.g token signing). + /// X.509 keys are always preferred to non-X.509 asymmetric keys. + /// X.509 keys with the furthest expiration date are preferred. + /// X.509 keys whose backing certificate is not yet valid are never preferred. + /// /// public List SigningCredentials { get; } = new List(); diff --git a/src/OpenIddict.Validation/OpenIddictValidationOptions.cs b/src/OpenIddict.Validation/OpenIddictValidationOptions.cs index d56e0f35..dc862013 100644 --- a/src/OpenIddict.Validation/OpenIddictValidationOptions.cs +++ b/src/OpenIddict.Validation/OpenIddictValidationOptions.cs @@ -28,10 +28,12 @@ namespace OpenIddict.Validation /// /// /// Note: OpenIddict automatically sorts the credentials based on the following algorithm: - /// • Symmetric keys are always preferred when they can be used for the operation (e.g token decryption). - /// • X.509 keys are always preferred to non-X.509 asymmetric keys. - /// • X.509 keys with the furthest expiration date are preferred. - /// • X.509 keys whose backing certificate is not yet valid are never preferred. + /// + /// Symmetric keys are always preferred when they can be used for the operation (e.g token encryption). + /// X.509 keys are always preferred to non-X.509 asymmetric keys. + /// X.509 keys with the furthest expiration date are preferred. + /// X.509 keys whose backing certificate is not yet valid are never preferred. + /// /// public List EncryptionCredentials { get; } = new List();