Skip to content

Commit

Permalink
Format code
Browse files Browse the repository at this point in the history
  • Loading branch information
iamcarbon committed Nov 22, 2024
1 parent a0ced63 commit dd2d208
Show file tree
Hide file tree
Showing 6 changed files with 12 additions and 5 deletions.
2 changes: 1 addition & 1 deletion Src/Fido2.Models/AuthenticatorAssertionRawResponse.cs
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ public sealed class AssertionResponse
public required byte[] ClientDataJson { get; init; }

#nullable enable

[JsonPropertyName("userHandle")]
[JsonConverter(typeof(Base64UrlConverter))]
public byte[]? UserHandle { get; init; }
Expand Down
4 changes: 4 additions & 0 deletions Src/Fido2.Models/Objects/KeyProtection.cs
Original file line number Diff line number Diff line change
Expand Up @@ -19,21 +19,25 @@ public enum KeyProtection
/// </summary>
[EnumMember(Value = "software")]
SOFTWARE = 1,

/// <summary>
/// This flag should be set if the authenticator uses hardware-based key management. Exclusive in authenticator metadata with KEY_PROTECTION_SOFTWARE
/// </summary>
[EnumMember(Value = "hardware")]
HARDWARE = 2,

/// <summary>
/// This flag should be set if the authenticator uses the Trusted Execution Environment [TEE] for key management. In authenticator metadata, this flag should be set in conjunction with KEY_PROTECTION_HARDWARE. Exclusive in authenticator metadata with KEY_PROTECTION_SOFTWARE, KEY_PROTECTION_SECURE_ELEMENT
/// </summary>
[EnumMember(Value = "tee")]
TEE = 4,

/// <summary>
/// This flag should be set if the authenticator uses a Secure Element [SecureElement] for key management. In authenticator metadata, this flag should be set in conjunction with KEY_PROTECTION_HARDWARE. Exclusive in authenticator metadata with KEY_PROTECTION_TEE, KEY_PROTECTION_SOFTWARE
/// </summary>
[EnumMember(Value = "secure_element")]
SECURE_ELEMENT = 0x8,

/// <summary>
/// This flag must be set if the authenticator does not store (wrapped) UAuth keys at the client, but relies on a server-provided key handle. This flag must be set in conjunction with one of the other KEY_PROTECTION flags to indicate how the local key handle wrapping key and operations are protected. Servers may unset this flag in authenticator policy if they are not prepared to store and return key handles, for example, if they have a requirement to respond indistinguishably to authentication attempts against userIDs that do and do not exist. Refer to [UAFProtocol] for more details.
/// </summary>
Expand Down
6 changes: 4 additions & 2 deletions Src/Fido2.Models/Objects/LargeBlobSupport.cs
Original file line number Diff line number Diff line change
Expand Up @@ -14,10 +14,12 @@ public enum LargeBlobSupport
/// <summary>
/// largeBlob support is required -- credential creation will fail if largeBlob is not supported
/// </summary>
[EnumMember(Value = "required")] Required,
[EnumMember(Value = "required")]
Required,

/// <summary>
/// largeBlob support is preferred -- credential creation will succeed even if largeBlob is not supported.
/// </summary>
[EnumMember(Value = "preferred")] Preferred
[EnumMember(Value = "preferred")]
Preferred
}
1 change: 1 addition & 0 deletions Src/Fido2/GetAssertionOptionsParams.cs
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
using System;
using System.Collections.Generic;

using Fido2NetLib.Objects;

namespace Fido2NetLib;
Expand Down
3 changes: 1 addition & 2 deletions Src/Fido2/IFido2.cs
Original file line number Diff line number Diff line change
@@ -1,5 +1,4 @@
using System.Collections.Generic;
using System.Threading;
using System.Threading;
using System.Threading.Tasks;

using Fido2NetLib.Objects;
Expand Down
1 change: 1 addition & 0 deletions Src/Fido2/RequestNewCredentialParams.cs
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
using System;
using System.Collections.Generic;

using Fido2NetLib.Objects;

namespace Fido2NetLib;
Expand Down

0 comments on commit dd2d208

Please sign in to comment.