Skip to content

Conversation

@zy6p
Copy link

@zy6p zy6p commented Nov 3, 2025

This PR adds the preinstalled vivo FIDO / passkey client com.fido.client to the privileged apps list consumed by Keyguard (via .github/update_gpm_passkeys_priv_apps.py).

On recent vivo devices (OriginOS / Android 14), passkey flows routed through the system FIDO UI (com.fido.client) can fail in passkey providers with errors like:

The calling app 'com.fido.client' is not on the privileged list and cannot request authentication on behalf of the other app.

By trusting com.fido.client (package name + SHA-256 cert fingerprint), Keyguard can successfully complete passkey registration and authentication when the vivo system FIDO UI mediates the request. This change is aligned with a similar community contribution to Bitwarden:
bitwarden/android#6114

Verification:

  • Set Keyguard as the default passkey provider on a vivo device.
  • Use https://passkeys.io / https://webauthn.io with QR / cross-device sign-in.
  • Confirm that passkey registration and authentication via com.fido.client succeed after this change.

Screenshot_20251103_233149
Screenshot_20251103_233134

@github-actions
Copy link
Contributor

github-actions bot commented Nov 3, 2025

All contributors have signed the CLA ✍️ ✅
Posted by the CLA Assistant Lite bot.

@zy6p
Copy link
Author

zy6p commented Nov 3, 2025

I have read the CLA Document and I hereby sign the CLA

github-actions bot added a commit that referenced this pull request Nov 3, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant