Index: chrome/android/java/src/org/chromium/chrome/browser/IntentHandler.java |
diff --git a/chrome/android/java/src/org/chromium/chrome/browser/IntentHandler.java b/chrome/android/java/src/org/chromium/chrome/browser/IntentHandler.java |
index db629e07202840b2abfe6a1fc7f79fff68fd8092..e0d73c9dd67f3675cea83a2f3e003809accf236f 100644 |
--- a/chrome/android/java/src/org/chromium/chrome/browser/IntentHandler.java |
+++ b/chrome/android/java/src/org/chromium/chrome/browser/IntentHandler.java |
@@ -589,14 +589,14 @@ public class IntentHandler { |
*/ |
public static void addTrustedIntentExtras(Intent intent) { |
if (ExternalNavigationDelegateImpl.willChromeHandleIntent(intent, true)) { |
- // The PendingIntent functions as an authentication token --- it could only have come |
- // from us. Stash it in the real Intent as an extra. shouldIgnoreIntent will retrieve it |
- // and check it with isIntentChromeInternal. |
- intent.putExtra(TRUSTED_APPLICATION_CODE_EXTRA, getAuthenticationToken()); |
// It is crucial that we never leak the authentication token to other packages, because |
// then the other package could be used to impersonate us/do things as us. Therefore, |
// scope the real Intent to our package. |
intent.setPackage(ContextUtils.getApplicationContext().getPackageName()); |
+ // The PendingIntent functions as an authentication token --- it could only have come |
+ // from us. Stash it in the real Intent as an extra. shouldIgnoreIntent will retrieve it |
+ // and check it with isIntentChromeInternal. |
+ intent.putExtra(TRUSTED_APPLICATION_CODE_EXTRA, getAuthenticationToken()); |
} |
} |