| Index: net/ssl/ssl_cipher_suite_names.cc
 | 
| diff --git a/net/ssl/ssl_cipher_suite_names.cc b/net/ssl/ssl_cipher_suite_names.cc
 | 
| index fc99cfed410c8a0223aa042ea4c168c5f5106fdd..2bfe72ac93f9e2e0746db4c04c69f5b6111ab5ac 100644
 | 
| --- a/net/ssl/ssl_cipher_suite_names.cc
 | 
| +++ b/net/ssl/ssl_cipher_suite_names.cc
 | 
| @@ -31,7 +31,7 @@
 | 
|  namespace {
 | 
|  
 | 
|  struct CipherSuite {
 | 
| -  uint16 cipher_suite, encoded;
 | 
| +  uint16_t cipher_suite, encoded;
 | 
|  };
 | 
|  
 | 
|  const struct CipherSuite kCipherSuites[] = {
 | 
| @@ -277,7 +277,7 @@ int CipherSuiteCmp(const void* ia, const void* ib) {
 | 
|    }
 | 
|  }
 | 
|  
 | 
| -bool GetCipherProperties(uint16 cipher_suite,
 | 
| +bool GetCipherProperties(uint16_t cipher_suite,
 | 
|                           int* out_key_exchange,
 | 
|                           int* out_cipher,
 | 
|                           int* out_mac) {
 | 
| @@ -303,8 +303,8 @@ namespace net {
 | 
|  void SSLCipherSuiteToStrings(const char** key_exchange_str,
 | 
|                               const char** cipher_str,
 | 
|                               const char** mac_str,
 | 
| -                             bool *is_aead,
 | 
| -                             uint16 cipher_suite) {
 | 
| +                             bool* is_aead,
 | 
| +                             uint16_t cipher_suite) {
 | 
|    *key_exchange_str = *cipher_str = *mac_str = "???";
 | 
|    *is_aead = false;
 | 
|  
 | 
| @@ -350,19 +350,19 @@ void SSLVersionToString(const char** name, int ssl_version) {
 | 
|  }
 | 
|  
 | 
|  bool ParseSSLCipherString(const std::string& cipher_string,
 | 
| -                          uint16* cipher_suite) {
 | 
| +                          uint16_t* cipher_suite) {
 | 
|    int value = 0;
 | 
|    if (cipher_string.size() == 6 &&
 | 
|        base::StartsWith(cipher_string, "0x",
 | 
|                         base::CompareCase::INSENSITIVE_ASCII) &&
 | 
|        base::HexStringToInt(cipher_string, &value)) {
 | 
| -    *cipher_suite = static_cast<uint16>(value);
 | 
| +    *cipher_suite = static_cast<uint16_t>(value);
 | 
|      return true;
 | 
|    }
 | 
|    return false;
 | 
|  }
 | 
|  
 | 
| -bool IsSecureTLSCipherSuite(uint16 cipher_suite) {
 | 
| +bool IsSecureTLSCipherSuite(uint16_t cipher_suite) {
 | 
|    int key_exchange, cipher, mac;
 | 
|    if (!GetCipherProperties(cipher_suite, &key_exchange, &cipher, &mac))
 | 
|      return false;
 | 
| @@ -392,7 +392,7 @@ bool IsSecureTLSCipherSuite(uint16 cipher_suite) {
 | 
|    return true;
 | 
|  }
 | 
|  
 | 
| -bool IsTLSCipherSuiteAllowedByHTTP2(uint16 cipher_suite) {
 | 
| +bool IsTLSCipherSuiteAllowedByHTTP2(uint16_t cipher_suite) {
 | 
|    int key_exchange, cipher, mac;
 | 
|    if (!GetCipherProperties(cipher_suite, &key_exchange, &cipher, &mac))
 | 
|      return false;
 | 
| @@ -423,7 +423,7 @@ bool IsTLSCipherSuiteAllowedByHTTP2(uint16 cipher_suite) {
 | 
|    return true;
 | 
|  }
 | 
|  
 | 
| -const char* ECCurveName(uint16 cipher_suite, int key_exchange_info) {
 | 
| +const char* ECCurveName(uint16_t cipher_suite, int key_exchange_info) {
 | 
|  #if defined(USE_OPENSSL)
 | 
|    int key_exchange, cipher, mac;
 | 
|    if (!GetCipherProperties(cipher_suite, &key_exchange, &cipher, &mac))
 | 
| 
 |