| Index: media/cdm/aes_decryptor.cc
|
| diff --git a/media/cdm/aes_decryptor.cc b/media/cdm/aes_decryptor.cc
|
| index be781fd8232fde19e15b17711d813bbbebc2f870..9938bae2c8df544ffde76f1169697986d9d3e8cf 100644
|
| --- a/media/cdm/aes_decryptor.cc
|
| +++ b/media/cdm/aes_decryptor.cc
|
| @@ -293,21 +293,21 @@ void AesDecryptor::UpdateSession(const std::string& web_session_id,
|
| SessionType session_type = MediaKeys::TEMPORARY_SESSION;
|
| if (!ExtractKeysFromJWKSet(key_string, &keys, &session_type)) {
|
| promise->reject(
|
| - INVALID_ACCESS_ERROR, 0, "response is not a valid JSON Web Key Set.");
|
| + INVALID_ACCESS_ERROR, 0, "Response is not a valid JSON Web Key Set.");
|
| return;
|
| }
|
|
|
| // Make sure that at least one key was extracted.
|
| if (keys.empty()) {
|
| promise->reject(
|
| - INVALID_ACCESS_ERROR, 0, "response does not contain any keys.");
|
| + INVALID_ACCESS_ERROR, 0, "Response does not contain any keys.");
|
| return;
|
| }
|
|
|
| for (KeyIdAndKeyPairs::iterator it = keys.begin(); it != keys.end(); ++it) {
|
| if (it->second.length() !=
|
| static_cast<size_t>(DecryptConfig::kDecryptionKeySize)) {
|
| - DVLOG(1) << "Invalid key length: " << key_string.length();
|
| + DVLOG(1) << "Invalid key length: " << it->second.length();
|
| promise->reject(INVALID_ACCESS_ERROR, 0, "Invalid key length.");
|
| return;
|
| }
|
|
|