Giter VIP home page Giter VIP logo

anotherpass's Introduction

ANOTHERpass

This Android app is another approach of a password manager. Instead of managing manually created passwords this app encourages to generate passwords. Passwords can be generated in a human readable but secure way by default, called Pseudo Phrases. Another feature is a two-factor authentication with knowledge (a user PIN) and ownership (a master password physically stored as NFC tag or QR code).

One consistent idea of the app is to use QR codes and NFC tags as offline-storage for credentials and secrets. Printed QR codes and NFC tags can easily be stored at a protected analogue place. With that and the option to separate the encrypted vault and the encryption keys it is possible to implement your own specific security and backup strategy.

Further this app tries to not be just another offline password manager by focusing on making it easy AND safe to work with secure password credentials.

The motivation of developing this app was curiosity of how cryptography works, how to code in Kotlin and the personal need of an easy, lightweight but secure password manager. It is a one-man-project without any warranty and pretension of absolute professionality.

Get it on F-Droid

Core features of the app

  • easy two-factor authentication
  • no complicated master password to memorize
  • easy to read generated passwords
  • strong modern encryption (AES, Blowfish, Chacha20)
  • Autofill support
  • biometrics (e.g. fingerprint) for stored master password
  • no insecure clipboard function by default
  • display passwords over other apps to easily type them
  • no internet connection needed, all is offline
  • export and import credential vault
  • share and outsource single credentials
  • obfuscate passwords
  • expiring credentials with notification
  • self destruction mode
  • Dark Theme support ;-)

For more information see https://anotherpass.jepfa.de

You can download the latest release version here.

You are also welcome to hunt bugs :-)

anotherpass's People

Contributors

jenspfahl avatar poussinou avatar ruditimmermans avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar

anotherpass's Issues

"Some optional info" field

Hello!

Could you please make the "Some optional info" field a bit larger? For example, 300 characters instead of 200. 200 characters was barely enough to save all the recovery codes, and there was no enough space to save more information that I needed.

Also when I just view the credentials, if the "Some optional info" field is very long (more than 11 lines), I can only see those 11 lines. It would be wonderful if you could add some scrolling there.

Have a nice day! Cheers!

master password/encryption key discussion

Hi again, I was just wondering if you could explain why you chose to make the master key exportable, and indeed why it need be backed up at all. It just seems rather complex to have to backup four separate items (vault, password, pin, key). I realise that you have implemented reminders to prompt users what to backup and when but I wonder how many can appreciate the difference between an encryption key and a password that they did not get to choose themselves.

Surely the simplest implementation is that the key is programmatically derived from a combination of password and pin, with the processing time/resource cost of the derivation algorithm an effective mitigation against brute force attack. When I want to unlock my vault I enter the pin and the password, wait a few seconds, and Viola! Now, if I loose everything and restore my vault from backup, I need only my password, my pin and a few seconds to derive the key. I just can't see how there is any benefit to having to backup the key, or how this makes it any more secure.

NPE at start

************ CAUSE OF ERROR ************

java.lang.RuntimeException: Unable to start activity ComponentInfo{de.jepfa.yapm/de.jepfa.yapm.ui.importread.VerifyActivity}: java.lang.NullPointerException: findViewById(R.id.verify_status_text_result) must not be null
at android.app.ActivityThread.performLaunchActivity(ActivityThread.java:3644)
at android.app.ActivityThread.handleLaunchActivity(ActivityThread.java:3781)
at android.app.servertransaction.LaunchActivityItem.execute(LaunchActivityItem.java:101)
at android.app.servertransaction.TransactionExecutor.executeCallbacks(TransactionExecutor.java:138)
at android.app.servertransaction.TransactionExecutor.execute(TransactionExecutor.java:95)
at android.app.ActivityThread$H.handleMessage(ActivityThread.java:2306)
at android.os.Handler.dispatchMessage(Handler.java:106)
at android.os.Looper.loopOnce(Looper.java:201)
at android.os.Looper.loop(Looper.java:288)
at android.app.ActivityThread.main(ActivityThread.java:7918)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:548)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:936)
Caused by: java.lang.NullPointerException: findViewById(R.id.verify_status_text_result) must not be null
at de.jepfa.yapm.ui.importread.VerifyActivity.onCreate(VerifyActivity.kt:32)
at android.app.Activity.performCreate(Activity.java:8342)
at android.app.Activity.performCreate(Activity.java:8321)
at android.app.Instrumentation.callActivityOnCreate(Instrumentation.java:1417)
at android.app.ActivityThread.performLaunchActivity(ActivityThread.java:3625)
... 12 more

************ APP INFORMATION ***********
Version: 1.8.1
Version Code: 108001
Database Version: 6
Vault Version: 1
Vault Cipher: AES_128
Build Timestamp: 03.07.2023 18:47:43
Build Type: debug

************ DEVICE INFORMATION ***********
Brand: google
Manufacturer: Google
Device: sunfish
Model: Pixel 4a
Product: sunfish
Hardware: sunfish
OS Build Id: TQ3A.230805.001
NFC available: true
NFC enabled: true
Has StrongBox support: true
Has biometrics support: true
Is fingerprint enrolled: true
Is device lock enabled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Notifications granted: true
Overlay dialog granted: true
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 33
Release: 13
Incremental: 10316531
Codename: REL
Security patch: 2023-08-05

Printing option, please!

Hi and thank you!

I would like a backup printing solution in case my harddrive crashes...

Thanx!

went wrong :-(

First, I like your app a lot, I started using it on my pixel 3a, it worked great.
Then I changed phones for a Asus Zenfone 9, I imported the vault and it has been working great for like a day, then I try to login with my pin and tells me there was a bug after reading my pin.

So I clear the data, and import it back again, but this time after importing and putting the Master Key says something went wrong and won't restore the vault.

The problem goes away when I restart my Zenfone but comes back again after like 3 openins of the vault.

Any help?

************ CAUSE OF ERROR ************

java.lang.RuntimeException: java.lang.reflect.InvocationTargetException
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:558)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1009)
Caused by: java.lang.reflect.InvocationTargetException
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:548)
... 1 more
Caused by: android.security.keystore.UserNotAuthenticatedException: User not authenticated
at android.security.keystore2.KeyStoreCryptoOperationUtils.getInvalidKeyException(KeyStoreCryptoOperationUtils.java:128)
at android.security.keystore2.KeyStoreCryptoOperationUtils.getExceptionForCipherInit(KeyStoreCryptoOperationUtils.java:154)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.ensureKeystoreOperationInitialized(AndroidKeyStoreCipherSpiBase.java:339)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.engineInit(AndroidKeyStoreCipherSpiBase.java:171)
at javax.crypto.Cipher.tryTransformWithProvider(Cipher.java:2985)
at javax.crypto.Cipher.tryCombinations(Cipher.java:2892)
at javax.crypto.Cipher$SpiAndProviderUpdater.updateAndGetSpiAndProvider(Cipher.java:2797)
at javax.crypto.Cipher.chooseProvider(Cipher.java:774)
at javax.crypto.Cipher.init(Cipher.java:1144)
at javax.crypto.Cipher.init(Cipher.java:1085)
at de.jepfa.yapm.service.secret.SecretService.encryptData(SecretService.kt:201)
at de.jepfa.yapm.service.secret.SecretService.encryptPassword(SecretService.kt:165)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$onViewCreated$3$3.invoke(LoginEnterPinFragment.kt:131)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$onViewCreated$3$3.invoke(LoginEnterPinFragment.kt:126)
at de.jepfa.yapm.service.secret.MasterPasswordService.decryptWithBiometrics(MasterPasswordService.kt:226)
at de.jepfa.yapm.service.secret.MasterPasswordService.getMasterPasswordFromStore(MasterPasswordService.kt:67)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment.onViewCreated$lambda-3(LoginEnterPinFragment.kt:126)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment.$r8$lambda$2L5oUcZAgJNXJDAtleYP0VvHNWg(Unknown Source:0)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$$ExternalSyntheticLambda1.onClick(Unknown Source:8)
at android.view.View.performClick(View.java:7475)
at android.view.View.performClickInternal(View.java:7452)
at android.view.View.access$3700(View.java:835)
at android.view.View$PerformClick.run(View.java:28834)
at android.os.Handler.handleCallback(Handler.java:938)
at android.os.Handler.dispatchMessage(Handler.java:99)
at android.os.Looper.loopOnce(Looper.java:241)
at android.os.Looper.loop(Looper.java:358)
at android.app.ActivityThread.main(ActivityThread.java:8068)
... 3 more

************ APP INFORMATION ***********
Version: 1.7.2_rc
Version Code: 107002
Database Version: 5
Vault Version: 2
Vault Cipher: AES_128
Build Timestamp: Oct 31, 2022 9:04:42 PM
Build Type: release

************ DEVICE INFORMATION ***********
Brand: asus
Manufacturer: asus
Device: ASUS_AI2202
Model: ASUS_AI2202
Product: JP_AI2202
Hardware: qcom
OS Build Id: SKQ1.220406.001
NFC available: true
NFC enabled: true
Has StrongBox support: false
Has biometrics support: true
Is fingerprint enroled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Overlay dialog granted: true
Camera granted: false
Biometric granted: true

************ FIRMWARE ************
SDK: 32
Release: 12
Incremental: 32.2050.2050.29
Codename: REL
Security patch: 2022-10-01

Something went wrong :-(

************ CAUSE OF ERROR ************

java.lang.RuntimeException: test bug report
at de.jepfa.yapm.ui.changelogin.ChangePinActivity$onCreate$1.onLongClick(ChangePinActivity.kt:43)
at android.view.View.performLongClickInternal(View.java:6987)
at android.view.View.performLongClick(View.java:6936)
at android.widget.TextView.performLongClick(TextView.java:12745)
at android.view.View.performLongClick(View.java:6954)
at android.view.View$CheckForLongPress.run(View.java:26066)
at android.os.Handler.handleCallback(Handler.java:789)
at android.os.Handler.dispatchMessage(Handler.java:98)
at android.os.Looper.loop(Looper.java:164)
at android.app.ActivityThread.main(ActivityThread.java:6944)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.Zygote$MethodAndArgsCaller.run(Zygote.java:327)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1374)

************ APP INFORMATION ***********
Version: 0.9
VersionCode: 9
Database Version: 2
BuildTimestamp: 25.06.2021 11:40:15
BuildType: debug

************ DEVICE INFORMATION ***********
Brand: samsung
Device: a3y17lte
Model: SM-A320FL
Id: R16NW
Product: a3y17ltexc
NFC available: true
NFC enabled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Overlay dialog granted: true
Camera granted: true

************ FIRMWARE ************
SDK: 26
Release: 8.0.0
Incremental: A320FLXXS9CTK1

feature request: using thirdpart qrcode scanner?

Hi, thanks to your amazing work,

(not sure its my specific problem or something really went wrong, haven't seen anyone issue this.)

BinaryEye: which offer scan from file, that way I can scan qrcode image

Heads-up on quantum supremacy risks

Hello,

On your website you write:

"Many password managers use the cloud to sync between platforms. So you have to trust that NSA doesn’t read your encrypted passwords from the cloud and tries to crack your master password with a quantum computer."

Most common implementations of master passwords are symnetric encryption such as AES, AES and others symnetric encryption algorithms are not threatened by quantum supremacy. Only asymnetric encryption algorithms are at risk, such as RSA or ECDSA.

https://crypto.stackexchange.com/questions/25389/are-there-any-quantum-resistant-symmetric-encryption-schemes

Namely, AES-256 is quantum-safe.

Regards

test issue

************ CAUSE OF ERROR ************

java.lang.RuntimeException: test bug report
at de.jepfa.yapm.ui.changelogin.ChangePinActivity$onCreate$1.onLongClick(ChangePinActivity.kt:43)
at android.view.View.performLongClickInternal(View.java:6987)
at android.view.View.performLongClick(View.java:6936)
at android.widget.TextView.performLongClick(TextView.java:12745)
at android.view.View.performLongClick(View.java:6954)
at android.view.View$CheckForLongPress.run(View.java:26066)
at android.os.Handler.handleCallback(Handler.java:789)
at android.os.Handler.dispatchMessage(Handler.java:98)
at android.os.Looper.loop(Looper.java:164)
at android.app.ActivityThread.main(ActivityThread.java:6944)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.Zygote$MethodAndArgsCaller.run(Zygote.java:327)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1374)

************ APP INFORMATION ***********
Version: 0.9
VersionCode: 9
Database Version: 2
BuildTimestamp: 14.06.2021 15:36:31
BuildType: debug

************ DEVICE INFORMATION ***********
Brand: samsung
Device: a3y17lte
Model: SM-A320FL
Id: R16NW
Product: a3y17ltexc
NFC available: true
NFC enabled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Overlay dialog granted: true
Camera granted: true

************ FIRMWARE ************
SDK: 26
Release: 8.0.0
Incremental: A320FLXXS9CTK1

Something went wrong :-(

************ CAUSE OF ERROR ************

java.lang.RuntimeException: java.lang.reflect.InvocationTargetException
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:594)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1013)
Caused by: java.lang.reflect.InvocationTargetException
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:584)
... 1 more
Caused by: android.security.keystore.UserNotAuthenticatedException: User not authenticated
at android.security.keystore2.KeyStoreCryptoOperationUtils.getInvalidKeyException(KeyStoreCryptoOperationUtils.java:128)
at android.security.keystore2.KeyStoreCryptoOperationUtils.getExceptionForCipherInit(KeyStoreCryptoOperationUtils.java:154)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.ensureKeystoreOperationInitialized(AndroidKeyStoreCipherSpiBase.java:339)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.engineInit(AndroidKeyStoreCipherSpiBase.java:171)
at javax.crypto.Cipher.tryTransformWithProvider(Cipher.java:2985)
at javax.crypto.Cipher.tryCombinations(Cipher.java:2892)
at javax.crypto.Cipher$SpiAndProviderUpdater.updateAndGetSpiAndProvider(Cipher.java:2797)
at javax.crypto.Cipher.chooseProvider(Cipher.java:774)
at javax.crypto.Cipher.init(Cipher.java:1144)
at javax.crypto.Cipher.init(Cipher.java:1085)
at de.jepfa.yapm.service.secret.SecretService.encrypt(SecretService.kt:227)
at de.jepfa.yapm.service.secret.SecretService.encryptData(SecretService.kt:215)
at de.jepfa.yapm.service.secret.SecretService.encryptPassword(SecretService.kt:165)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$onViewCreated$3$3.invoke(LoginEnterPinFragment.kt:114)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$onViewCreated$3$3.invoke(LoginEnterPinFragment.kt:109)
at de.jepfa.yapm.service.secret.MasterPasswordService.decryptWithBiometrics(MasterPasswordService.kt:226)
at de.jepfa.yapm.service.secret.MasterPasswordService.getMasterPasswordFromStore(MasterPasswordService.kt:67)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment.onViewCreated$lambda$2(LoginEnterPinFragment.kt:109)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment.$r8$lambda$rE_szBT3zcIN3lUfwWmeZShNVww(Unknown Source:0)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$$ExternalSyntheticLambda2.onClick(Unknown Source:8)
at android.view.View.performClick(View.java:7570)
at android.view.View.performClickInternal(View.java:7540)
at android.view.View.-$$Nest$mperformClickInternal(Unknown Source:0)
at android.view.View$PerformClick.run(View.java:29710)
at android.os.Handler.handleCallback(Handler.java:942)
at android.os.Handler.dispatchMessage(Handler.java:99)
at android.os.Looper.loopOnce(Looper.java:240)
at android.os.Looper.loop(Looper.java:351)
at android.app.ActivityThread.main(ActivityThread.java:8427)
... 3 more

************ APP INFORMATION ***********
Version: 1.8.1
Version Code: 108001
Database Version: 6
Vault Version: 2
Vault Cipher: AES_256
Build Timestamp: 7 juil. 2023 5:39:05 PM
Build Type: release

************ DEVICE INFORMATION ***********
Brand: realme
Manufacturer: realme
Device: RE879AL1
Model: RMX3370
Product: RMX3370EEA
Hardware: qcom
OS Build Id: TP1A.220905.001
NFC available: true
NFC enabled: false
Has StrongBox support: false
Has biometrics support: true
Is fingerprint enrolled: true
Is device lock enabled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Notifications granted: true
Overlay dialog granted: true
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 33
Release: 13
Incremental: R.12f334c_84945-2
Codename: REL
Security patch: 2023-09-05

Something went wrong :-(

************ CAUSE OF ERROR ************

java.lang.RuntimeException: test bug report
at de.jepfa.yapm.ui.changelogin.ChangePinActivity$onCreate$1.onLongClick(ChangePinActivity.kt:43)
at android.view.View.performLongClickInternal(View.java:6987)
at android.view.View.performLongClick(View.java:6936)
at android.widget.TextView.performLongClick(TextView.java:12745)
at android.view.View.performLongClick(View.java:6954)
at android.view.View$CheckForLongPress.run(View.java:26066)
at android.os.Handler.handleCallback(Handler.java:789)
at android.os.Handler.dispatchMessage(Handler.java:98)
at android.os.Looper.loop(Looper.java:164)
at android.app.ActivityThread.main(ActivityThread.java:6944)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.Zygote$MethodAndArgsCaller.run(Zygote.java:327)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1374)

************ APP INFORMATION ***********
Version: 1.0
VersionCode: 10
Database Version: 2
BuildTimestamp: 01.07.2021 12:24:35
BuildType: debug

************ DEVICE INFORMATION ***********
Brand: samsung
Device: a3y17lte
Model: SM-A320FL
Id: R16NW
Product: a3y17ltexc
NFC available: true
NFC enabled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Overlay dialog granted: true
Camera granted: true

************ FIRMWARE ************
SDK: 26
Release: 8.0.0
Incremental: A320FLXXS9CTK1

Questions about Yubikey and Mifare cards (and more)

Do you plan to support Mifare cards with encryption? Or maybe yubikey?

QR code can be easily copied and stolen. Regular NFC tags can be quickly read and clonned - NFC tags without encryption.

I used to trust Smart Lock with bluetooth handsfree, but looks like, that is even more easy to crack compared to NFC and QR code. (Bluetooth communication can be sniffed from big distance and I assume that device MAC can be easify clonned).

Thank you.


For NFC tag, there could be (daily/weekly) reminder - "change and write new master password to NFC tag" (because write is easy and quick)


For NFC tag, there could be "counter" - after unlock, increase the counter and write it to NFC tag. This could be useful if someone clone/copy your NFC tag.


There could be a log - "last vault unlocks", "last viewed passwords". If codeword is used for the master password, then the log could be hidden without the codeword.

Something went wrong :-(

************ CAUSE OF ERROR ************

java.lang.RuntimeException: java.lang.reflect.InvocationTargetException
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:594)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1034)
Caused by: java.lang.reflect.InvocationTargetException
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:584)
... 1 more
Caused by: android.security.keystore.UserNotAuthenticatedException: User not authenticated
at android.security.keystore2.KeyStoreCryptoOperationUtils.getInvalidKeyException(KeyStoreCryptoOperationUtils.java:128)
at android.security.keystore2.KeyStoreCryptoOperationUtils.getExceptionForCipherInit(KeyStoreCryptoOperationUtils.java:154)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.ensureKeystoreOperationInitialized(AndroidKeyStoreCipherSpiBase.java:339)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.engineInit(AndroidKeyStoreCipherSpiBase.java:171)
at javax.crypto.Cipher.tryTransformWithProvider(Cipher.java:2985)
at javax.crypto.Cipher.tryCombinations(Cipher.java:2892)
at javax.crypto.Cipher$SpiAndProviderUpdater.updateAndGetSpiAndProvider(Cipher.java:2797)
at javax.crypto.Cipher.chooseProvider(Cipher.java:774)
at javax.crypto.Cipher.init(Cipher.java:1144)
at javax.crypto.Cipher.init(Cipher.java:1085)
at de.jepfa.yapm.service.secret.SecretService.encrypt(SecretService.kt:227)
at de.jepfa.yapm.service.secret.SecretService.encryptData(SecretService.kt:215)
at de.jepfa.yapm.service.secret.SecretService.encryptPassword(SecretService.kt:165)
at de.jepfa.yapm.ui.createvault.CreateVaultEnterPassphraseFragment.onViewCreated$lambda$9(CreateVaultEnterPassphraseFragment.kt:132)
at de.jepfa.yapm.ui.createvault.CreateVaultEnterPassphraseFragment.$r8$lambda$kyetuE4aVGHegjZ_LRMiLNJX5K4(Unknown Source:0)
at de.jepfa.yapm.ui.createvault.CreateVaultEnterPassphraseFragment$$ExternalSyntheticLambda6.onClick(Unknown Source:6)
at android.view.View.performClick(View.java:7488)
at android.view.View.performClickInternal(View.java:7464)
at android.view.View.access$3700(View.java:841)
at android.view.View$PerformClick.run(View.java:28900)
at android.os.Handler.handleCallback(Handler.java:938)
at android.os.Handler.dispatchMessage(Handler.java:99)
at android.os.Looper.loopOnce(Looper.java:233)
at android.os.Looper.loop(Looper.java:344)
at android.app.ActivityThread.main(ActivityThread.java:8191)
... 3 more

************ APP INFORMATION ***********
Version: 1.8.1
Version Code: 108001
Database Version: 6
Vault Version: 1
Vault Cipher: AES_128
Build Timestamp: 07.07.2023 17:39:05
Build Type: release

************ DEVICE INFORMATION ***********
Brand: OPPO
Manufacturer: OPPO
Device: OP4C41L1
Model: CPH2005
Product: CPH2005EEA
Hardware: qcom
OS Build Id: RKQ1.211103.002
NFC available: true
NFC enabled: true
Has StrongBox support: false
Has biometrics support: true
Is fingerprint enrolled: false
Is device lock enabled: true

************ PERMISSIONS ************
Read Storage granted: false
Read/write storage granted: false
Notifications granted: true
Overlay dialog granted: false
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 31
Release: 12
Incremental: Q.GDPR.10c1ef0_666_668
Codename: REL
Security patch: 2023-06-05

Something went wrong :-(

************ CAUSE OF ERROR ************

java.lang.RuntimeException: Failure delivering result ResultInfo{who=null, request=1320303484, result=-1, data=Intent { act=inline-data (has extras) }} to activity {de.jepfa.yapm/de.jepfa.yapm.ui.createvault.CreateVaultActivity}: android.security.keystore.UserNotAuthenticatedException: User not authenticated
at android.app.ActivityThread.deliverResults(ActivityThread.java:5517)
at android.app.ActivityThread.handleSendResult(ActivityThread.java:5556)
at android.app.servertransaction.ActivityResultItem.execute(ActivityResultItem.java:54)
at android.app.servertransaction.ActivityTransactionItem.execute(ActivityTransactionItem.java:45)
at android.app.servertransaction.TransactionExecutor.executeCallbacks(TransactionExecutor.java:135)
at android.app.servertransaction.TransactionExecutor.execute(TransactionExecutor.java:95)
at android.app.ActivityThread$H.handleMessage(ActivityThread.java:2348)
at android.os.Handler.dispatchMessage(Handler.java:106)
at android.os.Looper.loopOnce(Looper.java:233)
at android.os.Looper.loop(Looper.java:344)
at android.app.ActivityThread.main(ActivityThread.java:8191)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:584)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1034)
Caused by: android.security.keystore.UserNotAuthenticatedException: User not authenticated
at android.security.keystore2.KeyStoreCryptoOperationUtils.getInvalidKeyException(KeyStoreCryptoOperationUtils.java:128)
at android.security.keystore2.KeyStoreCryptoOperationUtils.getExceptionForCipherInit(KeyStoreCryptoOperationUtils.java:154)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.ensureKeystoreOperationInitialized(AndroidKeyStoreCipherSpiBase.java:339)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.engineInit(AndroidKeyStoreCipherSpiBase.java:171)
at javax.crypto.Cipher.tryTransformWithProvider(Cipher.java:2985)
at javax.crypto.Cipher.tryCombinations(Cipher.java:2892)
at javax.crypto.Cipher$SpiAndProviderUpdater.updateAndGetSpiAndProvider(Cipher.java:2797)
at javax.crypto.Cipher.chooseProvider(Cipher.java:774)
at javax.crypto.Cipher.init(Cipher.java:1144)
at javax.crypto.Cipher.init(Cipher.java:1085)
at de.jepfa.yapm.service.secret.SecretService.encrypt(SecretService.kt:227)
at de.jepfa.yapm.service.secret.SecretService.encryptData(SecretService.kt:215)
at de.jepfa.yapm.service.secret.SecretService.encryptKey(SecretService.kt:157)
at de.jepfa.yapm.service.secret.SaltService.storeSalt(SaltService.kt:43)
at de.jepfa.yapm.service.secret.SaltService.createAndStoreSalt(SaltService.kt:54)
at de.jepfa.yapm.service.secret.SaltService.getSalt(SaltService.kt:27)
at de.jepfa.yapm.usecase.secret.SeedRandomGeneratorUseCase.extractSeedFromImage(SeedRandomGeneratorUseCase.kt:109)
at de.jepfa.yapm.usecase.secret.SeedRandomGeneratorUseCase.execute(SeedRandomGeneratorUseCase.kt:29)
at de.jepfa.yapm.usecase.secret.SeedRandomGeneratorUseCase.execute(SeedRandomGeneratorUseCase.kt:24)
at de.jepfa.yapm.ui.UseCaseBackgroundLauncher$launch$2.invokeSuspend(UseCaseBackgroundLauncher.kt:24)
at de.jepfa.yapm.ui.UseCaseBackgroundLauncher$launch$2.invoke(Unknown Source:8)
at de.jepfa.yapm.ui.UseCaseBackgroundLauncher$launch$2.invoke(Unknown Source:2)
at de.jepfa.yapm.ui.AsyncWithProgressBar$result$1.invokeSuspend(AsyncWithProgressBar.kt:38)
at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:33)
at kotlinx.coroutines.DispatchedTask.run(DispatchedTask.kt:106)
at kotlinx.coroutines.EventLoopImplBase.processNextEvent(EventLoop.common.kt:284)
at kotlinx.coroutines.BlockingCoroutine.joinBlocking(Builders.kt:85)
at kotlinx.coroutines.BuildersKt__BuildersKt.runBlocking(Builders.kt:59)
at kotlinx.coroutines.BuildersKt.runBlocking(Unknown Source:1)
at kotlinx.coroutines.BuildersKt__BuildersKt.runBlocking$default(Builders.kt:38)
at kotlinx.coroutines.BuildersKt.runBlocking$default(Unknown Source:1)
at de.jepfa.yapm.ui.AsyncWithProgressBar.(AsyncWithProgressBar.kt:37)
at de.jepfa.yapm.ui.UseCaseBackgroundLauncher.launch(UseCaseBackgroundLauncher.kt:22)
at de.jepfa.yapm.ui.createvault.CreateVaultEnterPassphraseFragment.onActivityResult(CreateVaultEnterPassphraseFragment.kt:150)
at androidx.fragment.app.FragmentManager$8.onActivityResult(FragmentManager.java:2698)
at androidx.fragment.app.FragmentManager$8.onActivityResult(FragmentManager.java:2678)
at androidx.activity.result.ActivityResultRegistry.doDispatch(ActivityResultRegistry.java:418)
at androidx.activity.result.ActivityResultRegistry.dispatchResult(ActivityResultRegistry.java:375)
at androidx.activity.ComponentActivity.onActivityResult(ComponentActivity.java:793)
at androidx.fragment.app.FragmentActivity.onActivityResult(FragmentActivity.java:152)
at android.app.Activity.dispatchActivityResult(Activity.java:8487)
at android.app.ActivityThread.deliverResults(ActivityThread.java:5510)
... 13 more

************ APP INFORMATION ***********
Version: 1.8.1
Version Code: 108001
Database Version: 6
Vault Version: 1
Vault Cipher: AES_128
Build Timestamp: 07.07.2023 17:39:05
Build Type: release

************ DEVICE INFORMATION ***********
Brand: OPPO
Manufacturer: OPPO
Device: OP4C41L1
Model: CPH2005
Product: CPH2005EEA
Hardware: qcom
OS Build Id: RKQ1.211103.002
NFC available: true
NFC enabled: true
Has StrongBox support: false
Has biometrics support: true
Is fingerprint enrolled: false
Is device lock enabled: true

************ PERMISSIONS ************
Read Storage granted: false
Read/write storage granted: false
Notifications granted: true
Overlay dialog granted: false
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 31
Release: 12
Incremental: Q.GDPR.10c1ef0_666_668
Codename: REL
Security patch: 2023-06-05

App crash

App crashes regularly when editing a credential with more than one labels, going forward to second edit screen (password parameters) and navigating back to first edit screen. IT seems there is a bug in com.pchmn.materialchips library. Would be a good idea to replace it because it is not maintained anymore.

************ CAUSE OF ERROR ************

java.lang.IllegalStateException: ViewHolder views must not be attached when created. Ensure that you are not passing 'true' to the attachToRoot parameter of LayoutInflater.inflate(..., boolean attachToRoot)
at androidx.recyclerview.widget.RecyclerView$Adapter.createViewHolder(RecyclerView.java:7080)
at androidx.recyclerview.widget.RecyclerView$Recycler.tryGetViewHolderForPositionByDeadline(RecyclerView.java:6235)
at androidx.recyclerview.widget.RecyclerView$Recycler.getViewForPosition(RecyclerView.java:6118)
at androidx.recyclerview.widget.RecyclerView$Recycler.getViewForPosition(RecyclerView.java:6114)
at com.beloo.widget.chipslayoutmanager.ChipsLayoutManager.layoutDisappearingViews(ChipsLayoutManager.java:767)
at com.beloo.widget.chipslayoutmanager.ChipsLayoutManager.onLayoutChildren(ChipsLayoutManager.java:731)
at androidx.recyclerview.widget.RecyclerView.dispatchLayoutStep2(RecyclerView.java:4134)
at androidx.recyclerview.widget.RecyclerView.onMeasure(RecyclerView.java:3540)
at android.view.View.measure(View.java:23297)
at androidx.core.widget.NestedScrollView.measureChildWithMargins(NestedScrollView.java:1599)
at android.widget.FrameLayout.onMeasure(FrameLayout.java:185)
at androidx.core.widget.NestedScrollView.onMeasure(NestedScrollView.java:585)
at com.pchmn.materialchips.views.ScrollViewMaxHeight.onMeasure(ScrollViewMaxHeight.java:47)
at android.view.View.measure(View.java:23297)
at androidx.core.widget.NestedScrollView.measureChildWithMargins(NestedScrollView.java:1599)
at android.widget.FrameLayout.onMeasure(FrameLayout.java:185)
at androidx.core.widget.NestedScrollView.onMeasure(NestedScrollView.java:585)
at com.pchmn.materialchips.views.ScrollViewMaxHeight.onMeasure(ScrollViewMaxHeight.java:47)
at android.view.View.measure(View.java:23297)
at android.view.ViewGroup.measureChildWithMargins(ViewGroup.java:6928)
at android.widget.LinearLayout.measureChildBeforeLayout(LinearLayout.java:1514)
at android.widget.LinearLayout.measureHorizontal(LinearLayout.java:1167)
at android.widget.LinearLayout.onMeasure(LinearLayout.java:687)
at android.view.View.measure(View.java:23297)
at android.view.ViewGroup.measureChildWithMargins(ViewGroup.java:6928)
at android.widget.LinearLayout.measureChildBeforeLayout(LinearLayout.java:1514)
at android.widget.LinearLayout.measureVertical(LinearLayout.java:806)
at android.widget.LinearLayout.onMeasure(LinearLayout.java:685)
at android.view.View.measure(View.java:23297)
at android.widget.ScrollView.measureChildWithMargins(ScrollView.java:2226)
at android.widget.FrameLayout.onMeasure(FrameLayout.java:185)
at android.widget.ScrollView.onMeasure(ScrollView.java:566)
at android.view.View.measure(View.java:23297)
at android.view.ViewGroup.measureChildWithMargins(ViewGroup.java:6928)
at androidx.coordinatorlayout.widget.CoordinatorLayout.onMeasureChild(CoordinatorLayout.java:760)
at androidx.coordinatorlayout.widget.CoordinatorLayout.onMeasure(CoordinatorLayout.java:833)
at android.view.View.measure(View.java:23297)
at android.view.ViewGroup.measureChildWithMargins(ViewGroup.java:6928)
at android.widget.FrameLayout.onMeasure(FrameLayout.java:185)
at android.view.View.measure(View.java:23297)
at androidx.constraintlayout.widget.ConstraintLayout$Measurer.measure(ConstraintLayout.java:789)
at androidx.constraintlayout.solver.widgets.ConstraintWidgetContainer.measure(ConstraintWidgetContainer.java:583)
at androidx.constraintlayout.solver.widgets.analyzer.Direct.verticalSolvingPass(Direct.java:351)
at androidx.constraintlayout.solver.widgets.analyzer.Direct.solveVerticalMatchConstraint(Direct.java:633)
at androidx.constraintlayout.solver.widgets.analyzer.Direct.verticalSolvingPass(Direct.java:402)
at androidx.constraintlayout.solver.widgets.analyzer.Direct.solvingPass(Direct.java:176)
at androidx.constraintlayout.solver.widgets.ConstraintWidgetContainer.layout(ConstraintWidgetContainer.java:642)
at androidx.constraintlayout.solver.widgets.analyzer.BasicMeasure.solveLinearSystem(BasicMeasure.java:152)
at androidx.constraintlayout.solver.widgets.analyzer.BasicMeasure.solverMeasure(BasicMeasure.java:281)
at androidx.constraintlayout.solver.widgets.ConstraintWidgetContainer.measure(ConstraintWidgetContainer.java:119)
at androidx.constraintlayout.widget.ConstraintLayout.resolveSystem(ConstraintLayout.java:1590)
at androidx.constraintlayout.widget.ConstraintLayout.onMeasure(ConstraintLayout.java:1688)
at android.view.View.measure(View.java:23297)
at android.view.ViewGroup.measureChildWithMargins(ViewGroup.java:6928)
at androidx.coordinatorlayout.widget.CoordinatorLayout.onMeasureChild(CoordinatorLayout.java:760)
at androidx.coordinatorlayout.widget.CoordinatorLayout.onMeasure(CoordinatorLayout.java:833)
at android.view.View.measure(View.java:23297)
at android.view.ViewGroup.measureChildWithMargins(ViewGroup.java:6928)
at android.widget.FrameLayout.onMeasure(FrameLayout.java:185)
at androidx.appcompat.widget.ContentFrameLayout.onMeasure(ContentFrameLayout.java:146)
at android.view.View.measure(View.java:23297)
at android.view.ViewGroup.measureChildWithMargins(ViewGroup.java:6928)
at androidx.appcompat.widget.ActionBarOverlayLayout.onMeasure(ActionBarOverlayLayout.java:490)
at android.view.View.measure(View.java:23297)
at android.view.ViewGroup.measureChildWithMargins(ViewGroup.java:6928)
at android.widget.FrameLayout.onMeasure(FrameLayout.java:185)
at android.view.View.measure(View.java:23297)
at android.view.ViewGroup.measureChildWithMargins(ViewGroup.java:6928)
at android.widget.LinearLayout.measureChildBeforeLayout(LinearLayout.java:1514)
at android.widget.LinearLayout.measureVertical(LinearLayout.java:806)
at android.widget.LinearLayout.onMeasure(LinearLayout.java:685)
at android.view.View.measure(View.java:23297)
at android.view.ViewGroup.measureChildWithMargins(ViewGroup.java:6928)
at android.widget.FrameLayout.onMeasure(FrameLayout.java:185)
at com.android.internal.policy.DecorView.onMeasure(DecorView.java:899)
at android.view.View.measure(View.java:23297)
at android.view.ViewRootImpl.performMeasure(ViewRootImpl.java:2886)
at android.view.ViewRootImpl.measureHierarchy(ViewRootImpl.java:1916)
at android.view.ViewRootImpl.performTraversals(ViewRootImpl.java:2171)
at android.view.ViewRootImpl.doTraversal(ViewRootImpl.java:1785)
at android.view.ViewRootImpl$TraversalRunnable.run(ViewRootImpl.java:7832)
at android.view.Choreographer$CallbackRecord.run(Choreographer.java:911)
at android.view.Choreographer.doCallbacks(Choreographer.java:723)
at android.view.Choreographer.doFrame(Choreographer.java:658)
at android.view.Choreographer$FrameDisplayEventReceiver.run(Choreographer.java:897)
at android.os.Handler.handleCallback(Handler.java:789)
at android.os.Handler.dispatchMessage(Handler.java:98)
at android.os.Looper.loop(Looper.java:164)
at android.app.ActivityThread.main(ActivityThread.java:6944)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.Zygote$MethodAndArgsCaller.run(Zygote.java:327)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1374)

************ APP INFORMATION ***********
Version: 1.0
VersionCode: 10
Database Version: 2
BuildTimestamp: 05.07.2021 11:37:40
BuildType: debug

************ DEVICE INFORMATION ***********
Brand: samsung
Device: a3y17lte
Model: SM-A320FL
Id: R16NW
Product: a3y17ltexc
NFC available: true
NFC enabled: false

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Overlay dialog granted: true
Camera granted: true

************ FIRMWARE ************
SDK: 26
Release: 8.0.0
Incremental: A320FLXXS9CTK1

Npe while autofill

************ CAUSE OF ERROR ************

java.lang.NullPointerException: null cannot be cast to non-null type kotlin.collections.List<de.jepfa.yapm.model.encrypted.EncCredential?>
at java.util.Objects.requireNonNull(Objects.java:245)
at de.jepfa.yapm.ui.credential.ListCredentialAdapter$getFilter$1.publishResults(ListCredentialAdapter.kt:212)
at android.widget.Filter$ResultsHandler.handleMessage(Filter.java:284)
at android.os.Handler.dispatchMessage(Handler.java:106)
at android.os.Looper.loopOnce(Looper.java:201)
at android.os.Looper.loop(Looper.java:288)
at android.app.ActivityThread.main(ActivityThread.java:7839)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:548)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1003)

************ APP INFORMATION ***********
Version: 1.6.0
Version Code: 106000
Database Version: 5
Vault Version: 1
Vault Cipher: AES_128
Build Timestamp: 27.02.2022 01:42:53
Build Type: release

************ DEVICE INFORMATION ***********
Brand: google
Manufacturer: Google
Device: sunfish
Model: Pixel 4a
Product: sunfish
Hardware: sunfish
OS Build Id: SQ1A.211205.008
NFC available: true
NFC enabled: true
Has StrongBox support: true
Has biometrics support: true
Is fingerprint enroled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Overlay dialog granted: false
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 31
Release: 12
Incremental: 7888514
Codename: REL
Security patch: 2021-12-05

Something went wrong :-(

************ CAUSE OF ERROR ************

java.lang.NoSuchMethodError: No virtual method getHintIdEntry()Ljava/lang/String; in class Landroid/app/assist/AssistStructure$ViewNode; or its super classes (declaration of 'android.app.assist.AssistStructure$ViewNode' appears in /system/framework/framework.jar)
at de.jepfa.yapm.service.autofill.ResponseFiller.inspectNodeAttributes(ResponseFiller.kt:491)
at de.jepfa.yapm.service.autofill.ResponseFiller.identifyFields(ResponseFiller.kt:458)
at de.jepfa.yapm.service.autofill.ResponseFiller.identifyFields(ResponseFiller.kt:433)
at de.jepfa.yapm.service.autofill.ResponseFiller.createFillResponse(ResponseFiller.kt:169)
at de.jepfa.yapm.service.autofill.ResponseFiller.createFillResponse$default(ResponseFiller.kt:118)
at de.jepfa.yapm.service.autofill.CredentialFillService.onFillRequest(CredentialFillService.kt:30)
at android.service.autofill.-$$Lambda$I0gCKFrBTO70VZfSZTq2fj-wyG8.accept(Unknown Source:8)
at com.android.internal.util.function.pooled.PooledLambdaImpl.doInvoke(PooledLambdaImpl.java:300)
at com.android.internal.util.function.pooled.PooledLambdaImpl.invoke(PooledLambdaImpl.java:195)
at com.android.internal.util.function.pooled.OmniFunction.run(OmniFunction.java:86)
at android.os.Handler.handleCallback(Handler.java:900)
at android.os.Handler.dispatchMessage(Handler.java:103)
at android.os.Looper.loop(Looper.java:219)
at android.app.ActivityThread.main(ActivityThread.java:8676)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:513)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1109)

************ APP INFORMATION ***********
Version: 1.7.2
Version Code: 107002
Database Version: 5
Vault Version: 2
Vault Cipher: AES_256
Build Timestamp: 17 дек. 2022 г. 04:12:01
Build Type: release

************ DEVICE INFORMATION ***********
Brand: HONOR
Manufacturer: HUAWEI
Device: HWBKL
Model: BKL-L09
Product: BKL-L09
Hardware: kirin970
OS Build Id: HUAWEIBKL-L09S
NFC available: true
NFC enabled: false
Has StrongBox support: false
Has biometrics support: true
Is fingerprint enroled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Overlay dialog granted: true
Camera granted: false
Biometric granted: true

************ FIRMWARE ************
SDK: 29
Release: 10
Incremental: 10.0.0.177C10
Codename: REL
Security patch: 2020-04-01

[FEATURE REQUEST] Copy password

Once a password has been generated or retrieved, as a user, I want to have the possibility of copying it to paste in the required login form.
If I am logging into different services several times a day, typing 1 character at a time of that complex password generated by Anotherpass is time consuming & counterproductive.
At the very least enable a user toggle in the settings to allow/prevent passwords to be copied.

Something went wrong :-(

************ CAUSE OF ERROR ************

java.security.ProviderException: Keystore key generation failed
at android.security.keystore2.AndroidKeyStoreKeyGeneratorSpi.engineGenerateKey(AndroidKeyStoreKeyGeneratorSpi.java:413)
at javax.crypto.KeyGenerator.generateKey(KeyGenerator.java:612)
at de.jepfa.yapm.service.secret.SecretService.initAndroidSecretKey(SecretService.kt:285)
at de.jepfa.yapm.service.secret.SecretService.getAndroidSecretKey(SecretService.kt:246)
at de.jepfa.yapm.ui.createvault.CreateVaultEnterPassphraseFragment.onViewCreated$lambda-7(CreateVaultEnterPassphraseFragment.kt:122)
at de.jepfa.yapm.ui.createvault.CreateVaultEnterPassphraseFragment.$r8$lambda$YtCt-PGo7alsKyuinU0Of4KHlE8(Unknown Source:0)
at de.jepfa.yapm.ui.createvault.CreateVaultEnterPassphraseFragment$$ExternalSyntheticLambda3.onClick(Unknown Source:6)
at android.view.View.performClick(View.java:7506)
at android.view.View.performClickInternal(View.java:7483)
at android.view.View.-$$Nest$mperformClickInternal(Unknown Source:0)
at android.view.View$PerformClick.run(View.java:29341)
at android.os.Handler.handleCallback(Handler.java:942)
at android.os.Handler.dispatchMessage(Handler.java:99)
at android.os.Looper.loopOnce(Looper.java:201)
at android.os.Looper.loop(Looper.java:288)
at android.app.ActivityThread.main(ActivityThread.java:7872)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:548)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:936)
Caused by: android.security.KeyStoreException: System error (internal Keystore code: 4 message: In generate_key.

Caused by:
0: In store_new_key.
1: In store_new_key. Failed to handle super encryption.
2: In handle_super_encryption_on_key_init: User ECDH key missing.
3: Error::Rc(ResponseCode(4))) (public error code: 4 internal Keystore code: 4)
at android.security.KeyStore2.getKeyStoreException(KeyStore2.java:336)
at android.security.KeyStoreSecurityLevel.handleExceptions(KeyStoreSecurityLevel.java:57)
at android.security.KeyStoreSecurityLevel.generateKey(KeyStoreSecurityLevel.java:145)
at android.security.keystore2.AndroidKeyStoreKeyGeneratorSpi.engineGenerateKey(AndroidKeyStoreKeyGeneratorSpi.java:400)
... 18 more

************ APP INFORMATION ***********
Version: 1.7.2
Version Code: 107002
Database Version: 5
Vault Version: 1
Vault Cipher: AES_128
Build Timestamp: 17-Dec-2022 6:42:01 am
Build Type: release

************ DEVICE INFORMATION ***********
Brand: google
Manufacturer: Google
Device: oriole
Model: Pixel 6
Product: oriole
Hardware: oriole
OS Build Id: TQ1A.221205.011
NFC available: true
NFC enabled: true
Has StrongBox support: true
Has biometrics support: true
Is fingerprint enroled: false

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Overlay dialog granted: false
Camera granted: false
Biometric granted: true

************ FIRMWARE ************
SDK: 33
Release: 13
Incremental: 9244662
Codename: REL
Security patch: 2022-12-05

Error after flashing MPT on NFC

************ CAUSE OF ERROR ************

java.lang.RuntimeException: Unable to pause activity {de.jepfa.yapm/de.jepfa.yapm.ui.nfc.NfcActivity}: java.lang.SecurityException: Permission Denial: Tag ( ID: 04 0B BA BA 90 6B 81 ) is out of date
at android.app.ActivityThread.performPauseActivityIfNeeded(ActivityThread.java:5088)
at android.app.ActivityThread.performPauseActivity(ActivityThread.java:5039)
at android.app.ActivityThread.handlePauseActivity(ActivityThread.java:4991)
at android.app.servertransaction.TransactionExecutor.performLifecycleSequence(TransactionExecutor.java:229)
at android.app.servertransaction.TransactionExecutor.cycleToPath(TransactionExecutor.java:201)
at android.app.servertransaction.TransactionExecutor.cycleToPath(TransactionExecutor.java:183)
at android.app.servertransaction.TransactionExecutor.executeCallbacks(TransactionExecutor.java:132)
at android.app.servertransaction.TransactionExecutor.execute(TransactionExecutor.java:95)
at android.app.ActivityThread$H.handleMessage(ActivityThread.java:2308)
at android.os.Handler.dispatchMessage(Handler.java:106)
at android.os.Looper.loopOnce(Looper.java:201)
at android.os.Looper.loop(Looper.java:288)
at android.app.ActivityThread.main(ActivityThread.java:7898)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:548)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:936)
Caused by: java.lang.SecurityException: Permission Denial: Tag ( ID: 04 0B BA BA 90 6B 81 ) is out of date
at android.nfc.Tag.getTagService(Tag.java:388)
at android.nfc.tech.BasicTagTechnology.close(BasicTagTechnology.java:125)
at android.nfc.tech.Ndef.close(Ndef.java:71)
at de.jepfa.yapm.service.nfc.NdefTag.close(NdefTag.kt:99)
at de.jepfa.yapm.ui.nfc.NfcBaseActivity.onPause(NfcBaseActivity.kt:32)
at android.app.Activity.performPause(Activity.java:8466)
at android.app.Instrumentation.callActivityOnPause(Instrumentation.java:1585)
at android.app.ActivityThread.performPauseActivityIfNeeded(ActivityThread.java:5078)
... 15 more

************ APP INFORMATION ***********
Version: 1.7.0_rc
Version Code: 107000
Database Version: 5
Vault Version: 1
Vault Cipher: AES_128
Build Timestamp: 17.09.2022 22:06:49
Build Type: debug

************ DEVICE INFORMATION ***********
Brand: google
Manufacturer: Google
Device: sunfish
Model: Pixel 4a
Product: sunfish
Hardware: sunfish
OS Build Id: TP1A.220905.004
NFC available: true
NFC enabled: true
Has StrongBox support: true
Has biometrics support: true
Is fingerprint enroled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: false
Overlay dialog granted: true
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 33
Release: 13
Incremental: 8927612
Codename: REL
Security patch: 2022-09-05

Desktop application

Hello and thank you for this very interesting application.

Is there a plan for a desktop application for Linux?
I think this would be very nice especially to have a backup whem your smartphone geys lost or broken suddenly...

Best regards,

Lucas

Something went wrong :-( again

************ CAUSE OF ERROR ************

java.lang.RuntimeException: java.lang.reflect.InvocationTargetException
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:594)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1013)
Caused by: java.lang.reflect.InvocationTargetException
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:584)
... 1 more
Caused by: android.security.keystore.UserNotAuthenticatedException: User not authenticated
at android.security.keystore2.KeyStoreCryptoOperationUtils.getInvalidKeyException(KeyStoreCryptoOperationUtils.java:128)
at android.security.keystore2.KeyStoreCryptoOperationUtils.getExceptionForCipherInit(KeyStoreCryptoOperationUtils.java:154)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.ensureKeystoreOperationInitialized(AndroidKeyStoreCipherSpiBase.java:339)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.engineInit(AndroidKeyStoreCipherSpiBase.java:171)
at javax.crypto.Cipher.tryTransformWithProvider(Cipher.java:2985)
at javax.crypto.Cipher.tryCombinations(Cipher.java:2892)
at javax.crypto.Cipher$SpiAndProviderUpdater.updateAndGetSpiAndProvider(Cipher.java:2797)
at javax.crypto.Cipher.chooseProvider(Cipher.java:774)
at javax.crypto.Cipher.init(Cipher.java:1144)
at javax.crypto.Cipher.init(Cipher.java:1085)
at de.jepfa.yapm.service.secret.SecretService.encrypt(SecretService.kt:227)
at de.jepfa.yapm.service.secret.SecretService.encryptData(SecretService.kt:215)
at de.jepfa.yapm.service.secret.SecretService.encryptPassword(SecretService.kt:165)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$onViewCreated$3$3.invoke(LoginEnterPinFragment.kt:114)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$onViewCreated$3$3.invoke(LoginEnterPinFragment.kt:109)
at de.jepfa.yapm.service.secret.MasterPasswordService.getMasterPasswordFromStore(MasterPasswordService.kt:62)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment.onViewCreated$lambda$2(LoginEnterPinFragment.kt:109)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment.$r8$lambda$rE_szBT3zcIN3lUfwWmeZShNVww(Unknown Source:0)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$$ExternalSyntheticLambda2.onClick(Unknown Source:8)
at android.view.View.performClick(View.java:7570)
at android.view.View.performClickInternal(View.java:7540)
at android.view.View.-$$Nest$mperformClickInternal(Unknown Source:0)
at android.view.View$PerformClick.run(View.java:29710)
at android.os.Handler.handleCallback(Handler.java:942)
at android.os.Handler.dispatchMessage(Handler.java:99)
at android.os.Looper.loopOnce(Looper.java:240)
at android.os.Looper.loop(Looper.java:351)
at android.app.ActivityThread.main(ActivityThread.java:8427)
... 3 more

************ APP INFORMATION ***********
Version: 1.8.1
Version Code: 108001
Database Version: 6
Vault Version: 2
Vault Cipher: AES_256
Build Timestamp: 7 juil. 2023 5:39:05 PM
Build Type: release

************ DEVICE INFORMATION ***********
Brand: realme
Manufacturer: realme
Device: RE879AL1
Model: RMX3370
Product: RMX3370EEA
Hardware: qcom
OS Build Id: TP1A.220905.001
NFC available: true
NFC enabled: false
Has StrongBox support: false
Has biometrics support: true
Is fingerprint enrolled: true
Is device lock enabled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Notifications granted: true
Overlay dialog granted: true
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 33
Release: 13
Incremental: R.12f334c_84945-2
Codename: REL
Security patch: 2023-09-05

Something went wrong :-(

************ CAUSE OF ERROR ************

java.lang.RuntimeException: Failure delivering result ResultInfo{who=null, request=1, result=-1, data=Intent { dat=content://com.android.externalstorage.documents/document/primary:AnotherPass/anotherpassvault-86nwwotu-2023-01-24.json flg=0x43 }} to activity {de.jepfa.yapm/de.jepfa.yapm.ui.exportvault.ExportVaultActivity}: java.lang.IllegalStateException: Not allowed to start service Intent { act=action_exportVault cmp=de.jepfa.yapm/.service.io.FileIOService (has extras) }: app is in background uid UidRecord{f9975c7 u0a104 LAST bg:+21s743ms idle change:idle procs:1 seq(0,0,0)}
at android.app.ActivityThread.deliverResults(ActivityThread.java:5782)
at android.app.ActivityThread.handleSendResult(ActivityThread.java:5823)
at android.app.servertransaction.ActivityResultItem.execute(ActivityResultItem.java:51)
at android.app.servertransaction.TransactionExecutor.executeCallbacks(TransactionExecutor.java:149)
at android.app.servertransaction.TransactionExecutor.execute(TransactionExecutor.java:103)
at android.app.ActivityThread$H.handleMessage(ActivityThread.java:2613)
at android.os.Handler.dispatchMessage(Handler.java:110)
at android.os.Looper.loop(Looper.java:219)
at android.app.ActivityThread.main(ActivityThread.java:8676)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:513)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1109)
Caused by: java.lang.IllegalStateException: Not allowed to start service Intent { act=action_exportVault cmp=de.jepfa.yapm/.service.io.FileIOService (has extras) }: app is in background uid UidRecord{f9975c7 u0a104 LAST bg:+21s743ms idle change:idle procs:1 seq(0,0,0)}
at android.app.ContextImpl.startServiceCommon(ContextImpl.java:1744)
at android.app.ContextImpl.startService(ContextImpl.java:1699)
at android.content.ContextWrapper.startService(ContextWrapper.java:669)
at android.content.ContextWrapper.startService(ContextWrapper.java:669)
at de.jepfa.yapm.ui.exportvault.ExportVaultActivity.onActivityResult(ExportVaultActivity.kt:97)
at android.app.Activity.dispatchActivityResult(Activity.java:8541)
at android.app.ActivityThread.deliverResults(ActivityThread.java:5775)
... 11 more

************ APP INFORMATION ***********
Version: 1.7.2
Version Code: 107002
Database Version: 5
Vault Version: 2
Vault Cipher: AES_256
Build Timestamp: 17 дек. 2022 г. 04:12:01
Build Type: release

************ DEVICE INFORMATION ***********
Brand: HONOR
Manufacturer: HUAWEI
Device: HWBKL
Model: BKL-L09
Product: BKL-L09
Hardware: kirin970
OS Build Id: HUAWEIBKL-L09S
NFC available: true
NFC enabled: false
Has StrongBox support: false
Has biometrics support: true
Is fingerprint enroled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Overlay dialog granted: true
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 29
Release: 10
Incremental: 10.0.0.177C10
Codename: REL
Security patch: 2020-04-01

Create label if focus lost on label edit text

When typing a new label without pressing space but leaving the text field to proceed, the label will not be created. Adding a FocusChangedListener would help but doesn't work since the underlying EditText is encapsulated by the Chip-framework. See EditCredentialDataFragment.kt:114 (TODO)

/*
        TODO doesn't work since editCredentialLabelsView.editText return a new ChipsInputEditText ll the time.
         The origin is encapsulated in ChipsAdapter which is encapsulated in ChipsInput.
         Need to fork that lib and change it,
        editCredentialLabelsView.editText.setOnFocusChangeListener { view, focusGained ->
            if (!focusGained) {
                addLabel(editCredentialLabelsView.editText.editableText.toString(), editCredentialActivity)
            }
        }*/

Observe in use cases fail

************ CAUSE OF ERROR ************

java.lang.IllegalStateException: Cannot invoke observe on a background thread
at androidx.lifecycle.LiveData.assertMainThread(LiveData.java:487)
at androidx.lifecycle.LiveData.observe(LiveData.java:191)
at de.jepfa.yapm.util.ExtensionsKt.observeOnce(Extensions.kt:152)
at de.jepfa.yapm.usecase.label.DeleteLabelUseCase.doExecute(DeleteLabelUseCase.kt:20)
at de.jepfa.yapm.usecase.label.DeleteLabelUseCase.doExecute(DeleteLabelUseCase.kt:12)
at de.jepfa.yapm.usecase.InputUseCase.execute(InputUseCase.kt:8)
at de.jepfa.yapm.ui.UseCaseBackgroundLauncher$launch$2.invokeSuspend(UseCaseBackgroundLauncher.kt:24)
at de.jepfa.yapm.ui.UseCaseBackgroundLauncher$launch$2.invoke(Unknown Source:8)
at de.jepfa.yapm.ui.UseCaseBackgroundLauncher$launch$2.invoke(Unknown Source:2)
at de.jepfa.yapm.ui.AsyncWithProgressBar$3.invokeSuspend(AsyncWithProgressBar.kt:28)
at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:33)
at kotlinx.coroutines.DispatchedTask.run(DispatchedTask.kt:106)
at kotlinx.coroutines.scheduling.CoroutineScheduler.runSafely(CoroutineScheduler.kt:571)
at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.executeTask(CoroutineScheduler.kt:750)
at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.runWorker(CoroutineScheduler.kt:678)
at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.run(CoroutineScheduler.kt:665)

************ APP INFORMATION ***********
Version: 1.7.0_rc
Version Code: 107000
Database Version: 5
Vault Version: 2
Vault Cipher: AES_128
Build Timestamp: 30.07.2022 22:55:50
Build Type: debug

************ DEVICE INFORMATION ***********
Brand: samsung
Manufacturer: samsung
Device: a3y17lte
Model: SM-A320FL
Product: a3y17ltexc
Hardware: samsungexynos7870
OS Build Id: QQ3A.200805.001
NFC available: true
NFC enabled: true
Has StrongBox support: false
Has biometrics support: true
Is fingerprint enroled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Overlay dialog granted: false
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 29
Release: 10
Incremental: eng.wistan.20220205.130213
Codename: REL
Security patch: 2022-01-05

Something went wrong

************ CAUSE OF ERROR ************

java.lang.RuntimeException: test bug report
at de.jepfa.yapm.ui.changelogin.ChangePinActivity$onCreate$1.onLongClick(ChangePinActivity.kt:43)
at android.view.View.performLongClickInternal(View.java:6677)
at android.view.View.performLongClick(View.java:6635)
at android.widget.TextView.performLongClick(TextView.java:11340)
at android.view.View.performLongClick(View.java:6653)
at android.view.View$CheckForLongPress.run(View.java:25850)
at android.os.Handler.handleCallback(Handler.java:873)
at android.os.Handler.dispatchMessage(Handler.java:99)
at android.os.Looper.loop(Looper.java:193)
at android.app.ActivityThread.main(ActivityThread.java:6669)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:493)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:858)

************ APP INFORMATION ***********
Version: 0.9
VersionCode: 9
Database Version: 2
BuildTimestamp: Jun 20, 2021 9:26:09 PM
BuildType: debug

************ DEVICE INFORMATION ***********
Brand: google
Device: generic_x86_arm
Model: AOSP on IA Emulator
Id: PSR1.180720.117
Product: sdk_gphone_x86_arm
NFC available: false
NFC enabled: false

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Overlay dialog granted: true
Camera granted: true

************ FIRMWARE ************
SDK: 28
Release: 9
Incremental: 5875966
D

Something went wrong :-(

************ CAUSE OF ERROR ************

java.lang.RuntimeException: java.lang.reflect.InvocationTargetException
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:581)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1067)
Caused by: java.lang.reflect.InvocationTargetException
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:571)
... 1 more
Caused by: android.security.keystore.UserNotAuthenticatedException: User not authenticated
at android.security.keystore2.KeyStoreCryptoOperationUtils.getInvalidKeyException(KeyStoreCryptoOperationUtils.java:128)
at android.security.keystore2.KeyStoreCryptoOperationUtils.getExceptionForCipherInit(KeyStoreCryptoOperationUtils.java:154)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.ensureKeystoreOperationInitialized(AndroidKeyStoreCipherSpiBase.java:345)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.engineInit(AndroidKeyStoreCipherSpiBase.java:177)
at javax.crypto.Cipher.tryTransformWithProvider(Cipher.java:2985)
at javax.crypto.Cipher.tryCombinations(Cipher.java:2892)
at javax.crypto.Cipher$SpiAndProviderUpdater.updateAndGetSpiAndProvider(Cipher.java:2797)
at javax.crypto.Cipher.chooseProvider(Cipher.java:774)
at javax.crypto.Cipher.init(Cipher.java:1144)
at javax.crypto.Cipher.init(Cipher.java:1085)
at de.jepfa.yapm.service.secret.SecretService.encryptData(SecretService.kt:198)
at de.jepfa.yapm.service.secret.SecretService.encryptPassword(SecretService.kt:162)
at de.jepfa.yapm.ui.createvault.CreateVaultEnterPassphraseFragment.onViewCreated$lambda-7(CreateVaultEnterPassphraseFragment.kt:123)
at de.jepfa.yapm.ui.createvault.CreateVaultEnterPassphraseFragment.$r8$lambda$YtCt-PGo7alsKyuinU0Of4KHlE8(Unknown Source:0)
at de.jepfa.yapm.ui.createvault.CreateVaultEnterPassphraseFragment$$ExternalSyntheticLambda3.onClick(Unknown Source:6)
at android.view.View.performClick(View.java:7881)
at android.widget.TextView.performClick(TextView.java:16201)
at android.view.View.performClickInternal(View.java:7858)
at android.view.View.-$$Nest$mperformClickInternal(Unknown Source:0)
at android.view.View$PerformClick.run(View.java:30863)
at android.os.Handler.handleCallback(Handler.java:942)
at android.os.Handler.dispatchMessage(Handler.java:99)
at android.os.Looper.loopOnce(Looper.java:226)
at android.os.Looper.loop(Looper.java:313)
at android.app.ActivityThread.main(ActivityThread.java:8741)
... 3 more

************ APP INFORMATION ***********
Version: 1.7.2
Version Code: 107002
Database Version: 5
Vault Version: 1
Vault Cipher: AES_128
Build Timestamp: 17.12.2022 02:12:01
Build Type: release

************ DEVICE INFORMATION ***********
Brand: samsung
Manufacturer: samsung
Device: r9q
Model: SM-G990B2
Product: r9q2xeea
Hardware: qcom
OS Build Id: TP1A.220624.014
NFC available: true
NFC enabled: true
Has StrongBox support: true
Has biometrics support: true
Is fingerprint enroled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Overlay dialog granted: false
Camera granted: false
Biometric granted: true

************ FIRMWARE ************
SDK: 33
Release: 13
Incremental: G990B2XXS1DVL1
Codename: REL
Security patch: 2022-12-01

Crypto error

************ CAUSE OF ERROR ************

java.security.InvalidKeyException: Keystore operation failed
at android.security.keystore2.KeyStoreCryptoOperationUtils.getInvalidKeyException(KeyStoreCryptoOperationUtils.java:130)
at android.security.keystore2.KeyStoreCryptoOperationUtils.getExceptionForCipherInit(KeyStoreCryptoOperationUtils.java:154)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.ensureKeystoreOperationInitialized(AndroidKeyStoreCipherSpiBase.java:339)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.engineInit(AndroidKeyStoreCipherSpiBase.java:171)
at javax.crypto.Cipher.tryTransformWithProvider(Cipher.java:2985)
at javax.crypto.Cipher.tryCombinations(Cipher.java:2892)
at javax.crypto.Cipher$SpiAndProviderUpdater.updateAndGetSpiAndProvider(Cipher.java:2797)
at javax.crypto.Cipher.chooseProvider(Cipher.java:774)
at javax.crypto.Cipher.init(Cipher.java:1144)
at javax.crypto.Cipher.init(Cipher.java:1085)
at de.jepfa.yapm.service.secret.SecretService.encryptData(SecretService.kt:201)
at de.jepfa.yapm.service.secret.SecretService.encryptPassword(SecretService.kt:165)
at de.jepfa.yapm.usecase.session.LoginUseCase.doExecute(LoginUseCase.kt:40)
at de.jepfa.yapm.usecase.session.LoginUseCase.doExecute(LoginUseCase.kt:19)
at de.jepfa.yapm.usecase.InputUseCase.execute(InputUseCase.kt:8)
at de.jepfa.yapm.ui.UseCaseBackgroundLauncher$launch$2.invokeSuspend(UseCaseBackgroundLauncher.kt:24)
at de.jepfa.yapm.ui.UseCaseBackgroundLauncher$launch$2.invoke(Unknown Source:8)
at de.jepfa.yapm.ui.UseCaseBackgroundLauncher$launch$2.invoke(Unknown Source:2)
at de.jepfa.yapm.ui.AsyncWithProgressBar$3.invokeSuspend(AsyncWithProgressBar.kt:28)
at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:33)
at kotlinx.coroutines.DispatchedTask.run(DispatchedTask.kt:106)
at kotlinx.coroutines.scheduling.CoroutineScheduler.runSafely(CoroutineScheduler.kt:571)
at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.executeTask(CoroutineScheduler.kt:750)
at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.runWorker(CoroutineScheduler.kt:678)
at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.run(CoroutineScheduler.kt:665)
Caused by: android.security.KeyStoreException: Device locked (internal Keystore code: -72 message: In create_operation.

Caused by:
0: In authorize_create: device is locked.
1: Error::Km(ErrorCode(-72))) (public error code: 2 internal Keystore code: -72)
at android.security.KeyStore2.getKeyStoreException(KeyStore2.java:369)
at android.security.KeyStoreSecurityLevel.createOperation(KeyStoreSecurityLevel.java:120)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.ensureKeystoreOperationInitialized(AndroidKeyStoreCipherSpiBase.java:334)
... 22 more

************ APP INFORMATION ***********
Version: 1.7.0_rc
Version Code: 107000
Database Version: 5
Vault Version: 1
Vault Cipher: AES_128
Build Timestamp: 17.09.2022 14:53:57
Build Type: debug

************ DEVICE INFORMATION ***********
Brand: google
Manufacturer: Google
Device: sunfish
Model: Pixel 4a
Product: sunfish
Hardware: sunfish
OS Build Id: TP1A.220905.004
NFC available: true
NFC enabled: true
Has StrongBox support: true
Has biometrics support: true
Is fingerprint enroled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: false
Overlay dialog granted: true
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 33
Release: 13
Incremental: 8927612
Codename: REL
Security patch: 2022-09-05

Issue importing credentials from csv file

Thanks for this awesome app, appreciate it a lot.

I have encountered a problem while trying to import my csv file from firefox. After pressing the load button, the app tells me it does not have the necessary permissions.

I´m running the latest GrapheneOS Build, the only permissions I can grant are for sensors and camera.
Maybe this is an OS problem, I tried restarting several times.

Best regards.

Something went wrong :-(

************ CAUSE OF ERROR ************

java.lang.RuntimeException: java.lang.reflect.InvocationTargetException
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:558)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:936)
Caused by: java.lang.reflect.InvocationTargetException
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:548)
... 1 more
Caused by: android.security.keystore.UserNotAuthenticatedException: User not authenticated
at android.security.keystore2.KeyStoreCryptoOperationUtils.getInvalidKeyException(KeyStoreCryptoOperationUtils.java:128)
at android.security.keystore2.KeyStoreCryptoOperationUtils.getExceptionForCipherInit(KeyStoreCryptoOperationUtils.java:154)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.ensureKeystoreOperationInitialized(AndroidKeyStoreCipherSpiBase.java:339)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.engineInit(AndroidKeyStoreCipherSpiBase.java:171)
at javax.crypto.Cipher.tryTransformWithProvider(Cipher.java:2985)
at javax.crypto.Cipher.tryCombinations(Cipher.java:2892)
at javax.crypto.Cipher$SpiAndProviderUpdater.updateAndGetSpiAndProvider(Cipher.java:2797)
at javax.crypto.Cipher.chooseProvider(Cipher.java:774)
at javax.crypto.Cipher.init(Cipher.java:1144)
at javax.crypto.Cipher.init(Cipher.java:1085)
at de.jepfa.yapm.service.secret.SecretService.encryptData(SecretService.kt:198)
at de.jepfa.yapm.service.secret.SecretService.encryptPassword(SecretService.kt:162)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$onViewCreated$3$3.invoke(LoginEnterPinFragment.kt:130)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$onViewCreated$3$3.invoke(LoginEnterPinFragment.kt:125)
at de.jepfa.yapm.service.secret.MasterPasswordService.getMasterPasswordFromStore(MasterPasswordService.kt:62)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment.onViewCreated$lambda-3(LoginEnterPinFragment.kt:125)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment.$r8$lambda$2L5oUcZAgJNXJDAtleYP0VvHNWg(Unknown Source:0)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$$ExternalSyntheticLambda1.onClick(Unknown Source:8)
at android.view.View.performClick(View.java:7506)
at android.view.View.performClickInternal(View.java:7483)
at android.view.View.-$$Nest$mperformClickInternal(Unknown Source:0)
at android.view.View$PerformClick.run(View.java:29357)
at android.os.Handler.handleCallback(Handler.java:942)
at android.os.Handler.dispatchMessage(Handler.java:99)
at android.os.Looper.loopOnce(Looper.java:201)
at android.os.Looper.loop(Looper.java:288)
at android.app.ActivityThread.main(ActivityThread.java:7884)
... 3 more

************ APP INFORMATION ***********
Version: 1.7.3
Version Code: 107003
Database Version: 5
Vault Version: 2
Vault Cipher: AES_128
Build Timestamp: Feb 1, 2023 17:45:36
Build Type: release

************ DEVICE INFORMATION ***********
Brand: google
Manufacturer: Google
Device: cheetah
Model: Pixel 7 Pro
Product: cheetah
Hardware: cheetah
OS Build Id: TQ2A.230305.008.C1
NFC available: true
NFC enabled: true
Has StrongBox support: true
Has biometrics support: true
Is fingerprint enroled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Overlay dialog granted: false
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 33
Release: 13
Incremental: 9619669
Codename: REL
Security patch: 2023-03-05

My NFC tag "write protected" when it's not?

Hi, I just installed the app. Wanted to create a NFC token and just grabbed some mifare classic 1k (iso 14443-3A) gen 2 CUID tags, but it says they're write protected.

I only used one of the 10 tags I bought some time ago to clone another NFC tag with "mifare classic tool" app and it worked, so I guess they're not write protected, so maybe the tag is not compatible? Or is it a bug?

In case it's because it's not supported, which types of tags are?

Change master password failed

************ CAUSE OF ERROR ************

java.lang.NullPointerException: Can't toast on a thread that has not called Looper.prepare()
at com.android.internal.util.Preconditions.checkNotNull(Preconditions.java:167)
at android.widget.Toast.getLooper(Toast.java:185)
at android.widget.Toast.(Toast.java:170)
at android.widget.Toast.makeText(Toast.java:498)
at android.widget.Toast.makeText(Toast.java:486)
at de.jepfa.yapm.util.UiUtilsKt.toastText(UiUtils.kt:28)
at de.jepfa.yapm.service.secret.SecretService.getSecureRandom(SecretService.kt:61)
at de.jepfa.yapm.service.secretgenerator.passphrase.PassphraseGenerator.random(PassphraseGenerator.kt:97)
at de.jepfa.yapm.service.secretgenerator.passphrase.PassphraseGenerator.generateTuple(PassphraseGenerator.kt:59)
at de.jepfa.yapm.service.secretgenerator.passphrase.PassphraseGenerator.generateTuple$default(PassphraseGenerator.kt:57)
at de.jepfa.yapm.service.secretgenerator.passphrase.PassphraseGenerator.generateWord(PassphraseGenerator.kt:48)
at de.jepfa.yapm.service.secretgenerator.passphrase.PassphraseGenerator.generate(PassphraseGenerator.kt:28)
at de.jepfa.yapm.usecase.secret.GenerateMasterPasswordUseCase.generate(GenerateMasterPasswordUseCase.kt:25)
at de.jepfa.yapm.usecase.secret.GenerateMasterPasswordUseCase.execute(GenerateMasterPasswordUseCase.kt:18)
at de.jepfa.yapm.usecase.secret.GenerateMasterPasswordUseCase.execute(GenerateMasterPasswordUseCase.kt:14)
at de.jepfa.yapm.ui.UseCaseBackgroundLauncher$launch$2.invokeSuspend(UseCaseBackgroundLauncher.kt:24)
at de.jepfa.yapm.ui.UseCaseBackgroundLauncher$launch$2.invoke(Unknown Source:8)
at de.jepfa.yapm.ui.UseCaseBackgroundLauncher$launch$2.invoke(Unknown Source:2)
at de.jepfa.yapm.ui.AsyncWithProgressBar$3.invokeSuspend(AsyncWithProgressBar.kt:28)
at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:33)
at kotlinx.coroutines.DispatchedTask.run(DispatchedTask.kt:106)
at kotlinx.coroutines.scheduling.CoroutineScheduler.runSafely(CoroutineScheduler.kt:571)
at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.executeTask(CoroutineScheduler.kt:750)
at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.runWorker(CoroutineScheduler.kt:678)
at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.run(CoroutineScheduler.kt:665)

************ APP INFORMATION ***********
Version: 1.7.2_rc
Version Code: 107002
Database Version: 5
Vault Version: 1
Vault Cipher: AES_128
Build Timestamp: 31.10.2022 13:00:00
Build Type: debug

************ DEVICE INFORMATION ***********
Brand: google
Manufacturer: Google
Device: sunfish
Model: Pixel 4a
Product: sunfish
Hardware: sunfish
OS Build Id: TP1A.221005.002
NFC available: true
NFC enabled: true
Has StrongBox support: true
Has biometrics support: true
Is fingerprint enroled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Overlay dialog granted: true
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 33
Release: 13
Incremental: 9012097
Codename: REL
Security patch: 2022-10-05

Error report from user (jfs9aa)

testing

aaaas bbbb

************ CAUSE OF ERROR ************

java.lang.RuntimeException: test bug report
at de.jepfa.yapm.ui.changelogin.ChangePinActivity.onCreate$lambda$0(ChangePinActivity.kt:45)
at de.jepfa.yapm.ui.changelogin.ChangePinActivity.$r8$lambda$MViAsDlBdxFH15aXNSuIENbRtiU(Unknown Source:0)
at de.jepfa.yapm.ui.changelogin.ChangePinActivity$$ExternalSyntheticLambda0.onLongClick(Unknown Source:0)
at android.view.View.performLongClickInternal(View.java:7622)
at android.view.View.performLongClick(View.java:7580)
at android.widget.TextView.performLongClick(TextView.java:12974)
at android.view.View.performLongClick(View.java:7598)
at android.view.View$CheckForLongPress.run(View.java:29434)
at android.os.Handler.handleCallback(Handler.java:942)
at android.os.Handler.dispatchMessage(Handler.java:99)
at android.os.Looper.loopOnce(Looper.java:201)
at android.os.Looper.loop(Looper.java:288)
at android.app.ActivityThread.main(ActivityThread.java:7918)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:548)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:936)

************ APP INFORMATION ***********
Version: 1.9.1
Version Code: 109001
Database Version: 7
Vault Id (anonymized): jfs9aa
Vault Version: 1
Vault Cipher: AES_128
Vault Imported At: am 15.11.2023 21:30
MP stored: true
MP stored with auth: true
Build Timestamp: 13.01.2024 10:18:08
Build Type: release

************ DEVICE INFORMATION ***********
Brand: google
Manufacturer: Google
Device: sunfish
Model: Pixel 4a
Product: sunfish
Hardware: sunfish
OS Build Id: TQ3A.230805.001.S1
NFC available: true
NFC enabled: true
Has StrongBox support: true
Has biometrics support: true
Has biometrics enrolled: true
Is device lock enabled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Notifications granted: true
Overlay dialog granted: true
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 33
Release: 13
Incremental: 10786265
Codename: REL
Security patch: 2023-08-05

************ APP-LOG ************
209
01-13 10:25:18.408 I/ANOSS/EXP(22957): remove notification for 210
01-13 10:25:18.409 I/ANOSS/EXP(22957): remove notification for 211
01-13 10:25:18.410 I/ANOSS/EXP(22957): remove notification for 212
01-13 10:25:18.411 I/ANOSS/EXP(22957): remove notification for 213
01-13 10:25:18.412 I/ANOSS/EXP(22957): remove notification for 214
01-13 10:25:18.413 I/ANOSS/EXP(22957): remove notification for 215
01-13 10:25:18.414 I/ANOSS/NOTIF(22957): 216: Wed Jul 03 00:00:00 GMT+02:00 2024 >= Sun Jan 14 00:00:00 GMT+01:00 2024 true
01-13 10:25:18.416 I/ANOSS/NOTIF(22957): 216: scheduled for Wed Jul 03 00:00:00 GMT+02:00 2024
01-13 10:25:18.416 I/ANOSS/EXP(22957): remove notification for 217
01-13 10:25:18.601 I/ANOSS/LST(22957): onCreateOptionsMenu
01-13 10:25:18.617 I/ANOSS/LST(22957): onPrepareOptionsMenu
01-13 10:25:25.646 I/ANOSS/LST(22957): onResume
01-13 10:25:27.754 I/ANOSS/CFS(22957): isDecativatedSince null
01-13 10:25:27.755 I/ANOSS/CFS(22957): myself
01-13 10:25:28.568 W/ANOSS/TEST(22957): trigger report

Something went wrong :-(

************ CAUSE OF ERROR ************

java.lang.RuntimeException: java.lang.reflect.InvocationTargetException
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:581)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1067)
Caused by: java.lang.reflect.InvocationTargetException
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:571)
... 1 more
Caused by: android.security.keystore.UserNotAuthenticatedException: User not authenticated
at android.security.keystore2.KeyStoreCryptoOperationUtils.getInvalidKeyException(KeyStoreCryptoOperationUtils.java:128)
at android.security.keystore2.KeyStoreCryptoOperationUtils.getExceptionForCipherInit(KeyStoreCryptoOperationUtils.java:154)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.ensureKeystoreOperationInitialized(AndroidKeyStoreCipherSpiBase.java:345)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.engineInit(AndroidKeyStoreCipherSpiBase.java:177)
at javax.crypto.Cipher.tryTransformWithProvider(Cipher.java:2985)
at javax.crypto.Cipher.tryCombinations(Cipher.java:2892)
at javax.crypto.Cipher$SpiAndProviderUpdater.updateAndGetSpiAndProvider(Cipher.java:2797)
at javax.crypto.Cipher.chooseProvider(Cipher.java:774)
at javax.crypto.Cipher.init(Cipher.java:1144)
at javax.crypto.Cipher.init(Cipher.java:1085)
at de.jepfa.yapm.service.secret.SecretService.encrypt(SecretService.kt:227)
at de.jepfa.yapm.service.secret.SecretService.encryptData(SecretService.kt:215)
at de.jepfa.yapm.service.secret.SecretService.encryptPassword(SecretService.kt:165)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$onViewCreated$3$3.invoke(LoginEnterPinFragment.kt:114)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$onViewCreated$3$3.invoke(LoginEnterPinFragment.kt:109)
at de.jepfa.yapm.service.secret.MasterPasswordService.getMasterPasswordFromStore(MasterPasswordService.kt:62)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment.onViewCreated$lambda$2(LoginEnterPinFragment.kt:109)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment.$r8$lambda$rE_szBT3zcIN3lUfwWmeZShNVww(Unknown Source:0)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$$ExternalSyntheticLambda2.onClick(Unknown Source:8)
at android.view.View.performClick(View.java:7892)
at android.widget.TextView.performClick(TextView.java:16219)
at android.view.View.performClickInternal(View.java:7869)
at android.view.View.-$$Nest$mperformClickInternal(Unknown Source:0)
at android.view.View$PerformClick.run(View.java:30880)
at android.os.Handler.handleCallback(Handler.java:942)
at android.os.Handler.dispatchMessage(Handler.java:99)
at android.os.Looper.loopOnce(Looper.java:226)
at android.os.Looper.loop(Looper.java:313)
at android.app.ActivityThread.main(ActivityThread.java:8757)
... 3 more

************ APP INFORMATION ***********
Version: 1.8.1
Version Code: 108001
Database Version: 6
Vault Version: 2
Vault Cipher: AES_256
Build Timestamp: 07.07.2023 17:39:05
Build Type: release

************ DEVICE INFORMATION ***********
Brand: samsung
Manufacturer: samsung
Device: a51
Model: SM-A515F
Product: a51nseea
Hardware: exynos9611
OS Build Id: TP1A.220624.014
NFC available: true
NFC enabled: false
Has StrongBox support: false
Has biometrics support: true
Is fingerprint enrolled: true
Is device lock enabled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Notifications granted: true
Overlay dialog granted: true
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 33
Release: 13
Incremental: A515FXXU7HWF1
Codename: REL
Security patch: 2023-06-01

HELP PLEASE

I have a problem and I no longer have access to the app. I know my pin but the fingerprint function has not worked several times. Now the app requires the exported master password, the QR code or NFC. I remember that I exported the master password but I can not find it but I urgently need help.

Device: Samsung Galaxy S21 Android 13

Something went wrong :-(

************ CAUSE OF ERROR ************

java.lang.OutOfMemoryError: Failed to allocate a 268173320 byte allocation with 25165824 free bytes and 252MB until OOM, target footprint 163130976, growth limit 402653184
at java.util.Arrays.copyOf(Arrays.java:3766)
at java.lang.AbstractStringBuilder.ensureCapacityInternal(AbstractStringBuilder.java:125)
at java.lang.AbstractStringBuilder.append(AbstractStringBuilder.java:449)
at java.lang.StringBuilder.append(StringBuilder.java:137)
at de.jepfa.yapm.util.FileUtil.readFile(FileUtil.kt:44)
at de.jepfa.yapm.ui.importvault.ImportVaultLoadFileFragment.onActivityResult(ImportVaultLoadFileFragment.kt:77)
at androidx.fragment.app.FragmentManager$8.onActivityResult(FragmentManager.java:2698)
at androidx.fragment.app.FragmentManager$8.onActivityResult(FragmentManager.java:2678)
at androidx.activity.result.ActivityResultRegistry.doDispatch(ActivityResultRegistry.java:418)
at androidx.activity.result.ActivityResultRegistry.dispatchResult(ActivityResultRegistry.java:375)
at androidx.activity.ComponentActivity.onActivityResult(ComponentActivity.java:793)
at androidx.fragment.app.FragmentActivity.onActivityResult(FragmentActivity.java:152)
at android.app.Activity.dispatchActivityResult(Activity.java:8472)
at android.app.ActivityThread.deliverResults(ActivityThread.java:5561)
at android.app.ActivityThread.handleSendResult(ActivityThread.java:5607)
at android.app.servertransaction.ActivityResultItem.execute(ActivityResultItem.java:54)
at android.app.servertransaction.ActivityTransactionItem.execute(ActivityTransactionItem.java:45)
at android.app.servertransaction.TransactionExecutor.executeCallbacks(TransactionExecutor.java:135)
at android.app.servertransaction.TransactionExecutor.execute(TransactionExecutor.java:95)
at android.app.ActivityThread$H.handleMessage(ActivityThread.java:2374)
at android.os.Handler.dispatchMessage(Handler.java:106)
at android.os.Looper.loopOnce(Looper.java:233)
at android.os.Looper.loop(Looper.java:344)
at android.app.ActivityThread.main(ActivityThread.java:8249)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:589)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1071)

************ APP INFORMATION ***********
Version: 1.8.2
Version Code: 108002
Database Version: 6
Vault Version: 1
Vault Cipher: AES_128
MP stored: false
MP stored with auth: false
Build Timestamp: 18 nov. 2023 4:40:18 p. m.
Build Type: release

************ DEVICE INFORMATION ***********
Brand: OPPO
Manufacturer: OPPO
Device: OP56F5
Model: CPH2477
Product: CPH2477T2
Hardware: mt6765
OS Build Id: SP1A.210812.016
NFC available: false
NFC enabled: false
Has StrongBox support: false
Has biometrics support: true
Has biometrics enrolled: true
Is device lock enabled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: false
Notifications granted: true
Overlay dialog granted: false
Camera granted: false
Biometric granted: true

************ FIRMWARE ************
SDK: 31
Release: 12
Incremental: S.202310092141
Codename: REL
Security patch: 2023-10-05

Multiplatoform plans?

Hi, very much like your software. Are there any plans on having it multiplatform e. g. for Windows? Like Keepass is, but I prefer your software over it.

Sorry for posting a question in issues.

Something went wrong :-(

************ CAUSE OF ERROR ************

java.lang.RuntimeException: java.lang.reflect.InvocationTargetException
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:591)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1028)
Caused by: java.lang.reflect.InvocationTargetException
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:581)
... 1 more
Caused by: android.security.keystore.UserNotAuthenticatedException: User not authenticated
at android.security.keystore2.KeyStoreCryptoOperationUtils.getInvalidKeyException(KeyStoreCryptoOperationUtils.java:128)
at android.security.keystore2.KeyStoreCryptoOperationUtils.getExceptionForCipherInit(KeyStoreCryptoOperationUtils.java:154)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.ensureKeystoreOperationInitialized(AndroidKeyStoreCipherSpiBase.java:339)
at android.security.keystore2.AndroidKeyStoreCipherSpiBase.engineInit(AndroidKeyStoreCipherSpiBase.java:171)
at javax.crypto.Cipher.tryTransformWithProvider(Cipher.java:2985)
at javax.crypto.Cipher.tryCombinations(Cipher.java:2892)
at javax.crypto.Cipher$SpiAndProviderUpdater.updateAndGetSpiAndProvider(Cipher.java:2797)
at javax.crypto.Cipher.chooseProvider(Cipher.java:774)
at javax.crypto.Cipher.init(Cipher.java:1144)
at javax.crypto.Cipher.init(Cipher.java:1085)
at de.jepfa.yapm.service.secret.SecretService.encrypt(SecretService.kt:227)
at de.jepfa.yapm.service.secret.SecretService.encryptData(SecretService.kt:215)
at de.jepfa.yapm.service.secret.SecretService.encryptPassword(SecretService.kt:165)
at de.jepfa.yapm.ui.createvault.CreateVaultEnterPassphraseFragment.onViewCreated$lambda$9(CreateVaultEnterPassphraseFragment.kt:132)
at de.jepfa.yapm.ui.createvault.CreateVaultEnterPassphraseFragment.$r8$lambda$kyetuE4aVGHegjZ_LRMiLNJX5K4(Unknown Source:0)
at de.jepfa.yapm.ui.createvault.CreateVaultEnterPassphraseFragment$$ExternalSyntheticLambda6.onClick(Unknown Source:6)
at android.view.View.performClick(View.java:7591)
at android.view.View.performClickInternal(View.java:7564)
at android.view.View.-$$Nest$mperformClickInternal(Unknown Source:0)
at android.view.View$PerformClick.run(View.java:29914)
at android.os.Handler.handleCallback(Handler.java:942)
at android.os.Handler.dispatchMessage(Handler.java:99)
at android.os.Looper.loopOnce(Looper.java:211)
at android.os.Looper.loop(Looper.java:300)
at android.app.ActivityThread.main(ActivityThread.java:8321)
... 3 more

************ APP INFORMATION ***********
Version: 1.9.0
Version Code: 109000
Database Version: 7
Vault Version: 1
Vault Cipher: AES_128
MP stored: false
MP stored with auth: false
Build Timestamp: ۶ ژانویه ۲۰۲۴ ۱۷:۱۸:۴۳
Build Type: release

************ DEVICE INFORMATION ***********
Brand: Xiaomi
Manufacturer: Xiaomi
Device: aristotle
Model: 2306EPN60G
Product: aristotle_global
Hardware: mt6895
OS Build Id: TP1A.220624.014
NFC available: true
NFC enabled: true
Has StrongBox support: false
Has biometrics support: true
Has biometrics enrolled: true
Is device lock enabled: true

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Notifications granted: false
Overlay dialog granted: false
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 33
Release: 13
Incremental: V14.0.6.0.TMFMIXM
Codename: REL
Security patch: 2023-10-01

Can't import vault, A13

Hi, I'm using
Android 13
Sony Xperia 5 III

ANOTHERpass 1.7.1.

With update from Android 12 to version 13, I did a factory reset. I exported my vault and master key before the reset.

Now when try to LOAD VAULT FILE I get message "Permision denied!". There is no popping dialog to allow access to storage and, also there is no such option in settings (device's Settings>Applications>ANOTHERpass).
Permission for notification (new on A13) is greyed out and not possible to allow. I think it is somehow related.
I tried reinstalling and restarting device. Nothing seems to help.

Can seem to use autofill

Hello good day,
I seem cannot use the autofill feature
And other feature works great like overlayz etc only autofill not working for me
Im using a Xiaomi phone and i enable autofill in setting to use AnotherPass instead of google

Something went wrong :-(

As of 1.6.2, I'm facing this error right after providing the vault login PIN.

************ CAUSE OF ERROR ************

java.security.ProviderException: Keystore key generation failed
at android.security.keystore2.AndroidKeyStoreKeyGeneratorSpi.engineGenerateKey(AndroidKeyStoreKeyGeneratorSpi.java:413)
at javax.crypto.KeyGenerator.generateKey(KeyGenerator.java:612)
at de.jepfa.yapm.service.secret.SecretService.initAndroidSecretKey(SecretService.kt:241)
at de.jepfa.yapm.service.secret.SecretService.getAndroidSecretKey(SecretService.kt:202)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment.onViewCreated$lambda-6(LoginEnterPinFragment.kt:129)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment.$r8$lambda$Oqsl7apUlyR0zU-AGzej8N6_ffo(Unknown Source:0)
at de.jepfa.yapm.ui.login.LoginEnterPinFragment$$ExternalSyntheticLambda1.onClick(Unknown Source:8)
at android.view.View.performClick(View.java:7452)
at android.view.View.performClickInternal(View.java:7429)
at android.view.View.access$4100(View.java:839)
at android.view.View$PerformClick.run(View.java:28764)
at android.os.Handler.handleCallback(Handler.java:938)
at android.os.Handler.dispatchMessage(Handler.java:99)
at android.os.Looper.loopOnce(Looper.java:201)
at android.os.Looper.loop(Looper.java:288)
at android.app.ActivityThread.main(ActivityThread.java:8005)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:548)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1039)
Caused by: android.security.KeyStoreException: System error
at android.security.KeyStore2.getKeyStoreException(KeyStore2.java:334)
at android.security.KeyStoreSecurityLevel.handleExceptions(KeyStoreSecurityLevel.java:57)
at android.security.KeyStoreSecurityLevel.generateKey(KeyStoreSecurityLevel.java:145)
at android.security.keystore2.AndroidKeyStoreKeyGeneratorSpi.engineGenerateKey(AndroidKeyStoreKeyGeneratorSpi.java:400)
... 18 more

************ APP INFORMATION ***********
Version: 1.6.2
Version Code: 106002
Database Version: 5
Vault Version: 2
Vault Cipher: AES_256
Build Timestamp: Jun 15, 2022 2:20:07 PM
Build Type: release

************ DEVICE INFORMATION ***********
Brand: lge
Manufacturer: LGE
Device: winglm
Model: LM-F100
Product: winglm
Hardware: winglm
OS Build Id: SKQ1.211103.001
NFC available: true
NFC enabled: false
Has StrongBox support: false
Has biometrics support: true
Is fingerprint enroled: false

************ PERMISSIONS ************
Read Storage granted: true
Read/write storage granted: true
Overlay dialog granted: false
Camera granted: true
Biometric granted: true

************ FIRMWARE ************
SDK: 31
Release: 12
Incremental: 2220019043a6c
Codename: REL
Security patch: 2022-07-01

Import vault file - format needed

Hi. AnotherPass is great !
What about CSV format. please ? I don't find help/information nowhere.
What means "The vault file must belong to the same vault with the current vault ..." ?
Cant you give un short example ? e.g.

"Account","Login Name","Web Site","Password",
"Home wifi","","","ueco sevi qiev popi 5,"

Thanks

Autofill in browser

Hello,

May I make one suggestion? It would appear that autofill on websites is looking for an entry to match the name of the browser app rather than the url of the site being logged into. It would be nice to get this fixed if at all possible.

Other than that I'm enjoying using the app and I found the rationale behind it very logical and sensible.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.