diff --git a/src/Core/Services/Fido2AuthenticatorService.cs b/src/Core/Services/Fido2AuthenticatorService.cs index 807c04154..43ed81401 100644 --- a/src/Core/Services/Fido2AuthenticatorService.cs +++ b/src/Core/Services/Fido2AuthenticatorService.cs @@ -27,7 +27,7 @@ namespace Bit.Core.Services // await _userInterface.EnsureUnlockedVault(); await _syncService.FullSyncAsync(false); - var existingCipherIds = await FindExcludedCredentials( + var existingCipherIds = await FindExcludedCredentialsAsync( makeCredentialParams.ExcludeCredentialDescriptorList ); if (existingCipherIds.Length > 0) { @@ -73,7 +73,7 @@ namespace Bit.Core.Services await _cipherService.SaveWithServerAsync(reencrypted); credentialId = fido2Credential.CredentialId; - var authData = await GenerateAuthData( + var authData = await GenerateAuthDataAsync( rpId: makeCredentialParams.RpEntity.Id, counter: fido2Credential.CounterValue, userPresence: true, @@ -110,12 +110,12 @@ namespace Bit.Core.Services await _syncService.FullSyncAsync(false); if (assertionParams.AllowCredentialDescriptorList?.Length > 0) { - cipherOptions = await FindCredentialsById( + cipherOptions = await FindCredentialsByIdAsync( assertionParams.AllowCredentialDescriptorList, assertionParams.RpId ); } else { - cipherOptions = await FindCredentialsByRp(assertionParams.RpId); + cipherOptions = await FindCredentialsByRpAsync(assertionParams.RpId); } if (cipherOptions.Count == 0) { @@ -162,7 +162,7 @@ namespace Bit.Core.Services var encrypted = await _cipherService.EncryptAsync(selectedCipher); await _cipherService.SaveWithServerAsync(encrypted); - var authenticatorData = await GenerateAuthData( + var authenticatorData = await GenerateAuthDataAsync( rpId: selectedFido2Credential.RpId, userPresence: true, userVerification: userVerified, @@ -197,7 +197,7 @@ namespace Bit.Core.Services /// /// Finds existing crendetials and returns the `CipherId` for each one /// - private async Task FindExcludedCredentials( + private async Task FindExcludedCredentialsAsync( PublicKeyCredentialDescriptor[] credentials ) { var ids = new List(); @@ -228,7 +228,7 @@ namespace Bit.Core.Services .ToArray(); } - private async Task> FindCredentialsById(PublicKeyCredentialDescriptor[] credentials, string rpId) + private async Task> FindCredentialsByIdAsync(PublicKeyCredentialDescriptor[] credentials, string rpId) { var ids = new List(); @@ -256,7 +256,7 @@ namespace Bit.Core.Services ); } - private async Task> FindCredentialsByRp(string rpId) + private async Task> FindCredentialsByRpAsync(string rpId) { var ciphers = await _cipherService.GetAllDecryptedAsync(); return ciphers.FindAll((cipher) => @@ -297,7 +297,7 @@ namespace Bit.Core.Services }; } - private async Task GenerateAuthData( + private async Task GenerateAuthDataAsync( string rpId, bool userVerification, bool userPresence,