Skip to content
This repository has been archived by the owner on Mar 20, 2019. It is now read-only.

Commit

Permalink
StyleCop fixes.
Browse files Browse the repository at this point in the history
  • Loading branch information
AArnott committed Jun 8, 2010
1 parent a42953f commit a34f614
Show file tree
Hide file tree
Showing 5 changed files with 7 additions and 8 deletions.
2 changes: 1 addition & 1 deletion samples/OAuthConsumer/SignInWithTwitter.aspx.cs
Expand Up @@ -33,7 +33,7 @@ public partial class SignInWithTwitter : System.Web.UI.Page {
}

protected void signInButton_Click(object sender, ImageClickEventArgs e) {
TwitterConsumer.StartSignInWithTwitter(forceLoginCheckbox.Checked).Send();
TwitterConsumer.StartSignInWithTwitter(this.forceLoginCheckbox.Checked).Send();
}
}
}
6 changes: 3 additions & 3 deletions samples/OAuthServiceProvider/Members/Authorize.aspx.cs
Expand Up @@ -29,8 +29,8 @@ public partial class Authorize : System.Web.UI.Page {
} else {
ITokenContainingMessage pendingToken = Global.PendingOAuthAuthorization;
var token = Global.DataContext.OAuthTokens.Single(t => t.Token == pendingToken.Token);
desiredAccessLabel.Text = token.Scope;
consumerLabel.Text = Global.TokenManager.GetConsumerForToken(token.Token).ConsumerKey;
this.desiredAccessLabel.Text = token.Scope;
this.consumerLabel.Text = Global.TokenManager.GetConsumerForToken(token.Token).ConsumerKey;

// Generate an unpredictable secret that goes to the user agent and must come back
// with authorization to guarantee the user interacted with this page rather than
Expand All @@ -52,7 +52,7 @@ public partial class Authorize : System.Web.UI.Page {
this.AuthorizationSecret = null; // clear one time use secret
var pending = Global.PendingOAuthAuthorization;
Global.AuthorizePendingRequestToken();
multiView.ActiveViewIndex = 1;
this.multiView.ActiveViewIndex = 1;

ServiceProvider sp = new ServiceProvider(Constants.SelfDescription, Global.TokenManager);
var response = sp.PrepareAuthorizationResponse(pending);
Expand Down
Expand Up @@ -80,7 +80,7 @@ public class AssociationHandshakeTests : OpenIdTestBase {
op.SecuritySettings.MaximumHashBitLength = 160; // Force OP to reject HMAC-SHA256
// Receive initial request for an HMAC-SHA256 association.
AutoResponsiveRequest req = (AutoResponsiveRequest) op.GetRequest();
AutoResponsiveRequest req = (AutoResponsiveRequest)op.GetRequest();
AutoResponsiveRequest_Accessor reqAccessor = AutoResponsiveRequest_Accessor.AttachShadow(req);
AssociateRequest associateRequest = (AssociateRequest)reqAccessor.RequestMessage;
Assert.AreEqual(protocol.Args.SignatureAlgorithm.HMAC_SHA256, associateRequest.AssociationType);
Expand Down
2 changes: 1 addition & 1 deletion src/DotNetOpenAuth/Configuration/MessagingElement.cs
Expand Up @@ -101,7 +101,7 @@ public class MessagingElement : ConfigurationElement {
/// </remarks>
[ConfigurationProperty(StrictConfigName, DefaultValue = true)]
internal bool Strict {
get { return (bool) this[StrictConfigName]; }
get { return (bool)this[StrictConfigName]; }
set { this[StrictConfigName] = value; }
}

Expand Down
Expand Up @@ -15,8 +15,7 @@ namespace DotNetOpenAuth.OAuth.ChannelElements {
[ContractClassFor(typeof(SigningBindingElementBase))]
internal abstract class SigningBindingElementBaseContract : SigningBindingElementBase {
/// <summary>
/// Prevents a default instance of the SigningBindingElementBaseContract
/// class from being created.
/// Prevents a default instance of the SigningBindingElementBaseContract class from being created.
/// </summary>
private SigningBindingElementBaseContract()
: base(string.Empty) {
Expand Down

0 comments on commit a34f614

Please sign in to comment.