From 034b0de0498f51ac99002fdc508ce8065a74f39d Mon Sep 17 00:00:00 2001 From: M66B Date: Thu, 18 Sep 2025 14:20:50 +0200 Subject: [PATCH] Default skip updating SSL provider --- app/src/github/java/eu/faircode/email/ApplicationSecure.java | 3 ++- .../main/java/eu/faircode/email/FragmentOptionsConnection.java | 2 +- app/src/play/java/eu/faircode/email/ApplicationSecure.java | 3 ++- 3 files changed, 5 insertions(+), 3 deletions(-) diff --git a/app/src/github/java/eu/faircode/email/ApplicationSecure.java b/app/src/github/java/eu/faircode/email/ApplicationSecure.java index 82c3dcfe14..4b3cbf8eed 100644 --- a/app/src/github/java/eu/faircode/email/ApplicationSecure.java +++ b/app/src/github/java/eu/faircode/email/ApplicationSecure.java @@ -38,9 +38,10 @@ public class ApplicationSecure extends ApplicationEx implements ProviderInstalle public void onCreate() { super.onCreate(); SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(this); - boolean ssl_update = prefs.getBoolean("ssl_update", Helper.isPlayStoreInstall()); + boolean ssl_update = prefs.getBoolean("ssl_update", false); if (ssl_update) { Log.i("Security provider check"); + // https://developer.android.com/privacy-and-security/security-gms-provider ProviderInstaller.installIfNeededAsync(this, this); } else lock.countDown(); diff --git a/app/src/main/java/eu/faircode/email/FragmentOptionsConnection.java b/app/src/main/java/eu/faircode/email/FragmentOptionsConnection.java index 9450a942b2..486b2cdfd6 100644 --- a/app/src/main/java/eu/faircode/email/FragmentOptionsConnection.java +++ b/app/src/main/java/eu/faircode/email/FragmentOptionsConnection.java @@ -789,7 +789,7 @@ public class FragmentOptionsConnection extends FragmentBase implements SharedPre etDnsExtra.setEnabled(swDnsCustom.isChecked() || Build.VERSION.SDK_INT < Build.VERSION_CODES.Q); swDnsClear.setChecked(prefs.getBoolean("dns_clear", false)); swTcpKeepAlive.setChecked(prefs.getBoolean("tcp_keep_alive", false)); - swSslUpdate.setChecked(prefs.getBoolean("ssl_update", Helper.isPlayStoreInstall())); + swSslUpdate.setChecked(prefs.getBoolean("ssl_update", false)); swSslHarden.setChecked(prefs.getBoolean("ssl_harden", false)); swSslHardenStrict.setChecked(prefs.getBoolean("ssl_harden_strict", false)); swSslHardenStrict.setEnabled(swSslHarden.isChecked()); diff --git a/app/src/play/java/eu/faircode/email/ApplicationSecure.java b/app/src/play/java/eu/faircode/email/ApplicationSecure.java index 82c3dcfe14..4b3cbf8eed 100644 --- a/app/src/play/java/eu/faircode/email/ApplicationSecure.java +++ b/app/src/play/java/eu/faircode/email/ApplicationSecure.java @@ -38,9 +38,10 @@ public class ApplicationSecure extends ApplicationEx implements ProviderInstalle public void onCreate() { super.onCreate(); SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(this); - boolean ssl_update = prefs.getBoolean("ssl_update", Helper.isPlayStoreInstall()); + boolean ssl_update = prefs.getBoolean("ssl_update", false); if (ssl_update) { Log.i("Security provider check"); + // https://developer.android.com/privacy-and-security/security-gms-provider ProviderInstaller.installIfNeededAsync(this, this); } else lock.countDown();