Index: components/policy/proto/device_management_backend.proto |
diff --git a/components/policy/proto/device_management_backend.proto b/components/policy/proto/device_management_backend.proto |
index 4d85e74f1ff8e7240399a0b4963a26154519e6ad..836db550e485a26ae33adc93d1054e64df6ce1f1 100644 |
--- a/components/policy/proto/device_management_backend.proto |
+++ b/components/policy/proto/device_management_backend.proto |
@@ -325,10 +325,10 @@ message PolicyFetchResponse { |
// public key on the client). If DMServer is unable to find matching key, it |
// will return an error instead of policy data. |
// In case hash was not specified, DMServer will leave verification signature |
- // field empty (legacy behavior). |
+ // field empty (legacy behavior). |
// In addition to the checks between new_public_key |
// and new_public_key_signature described above, Chrome also verifies |
- // new_public_key with the embedded public key and |
+ // new_public_key with the embedded public key and |
// new_public_key_verification_signature. |
optional bytes new_public_key_verification_signature = 7; |
} |
@@ -643,7 +643,7 @@ message DeviceStateRetrievalResponse { |
// * devicetype: MUST BE "1" for Android or "2" for Chrome OS. |
// * apptype: MUST BE Android or Chrome. |
// * deviceid: MUST BE no more than 64-char in [\x21-\x7E]. |
-// * agent: MUST BE no more than 64-char long. |
+// * agent: MUST BE a string of characters. |
// * HTTP Authorization header MUST be in the following formats: |
// * For register and ping requests |
// Authorization: GoogleLogin auth=<auth cookie for Mobile Sync> |