| Index: net/quic/crypto/aead_base_decrypter_nss.cc
|
| diff --git a/net/quic/crypto/aead_base_decrypter_nss.cc b/net/quic/crypto/aead_base_decrypter_nss.cc
|
| index 806abe252674c0fb4176264d0b049afcacda30bc..9036681a1d675795d172a0e1a43c3cb52280be20 100644
|
| --- a/net/quic/crypto/aead_base_decrypter_nss.cc
|
| +++ b/net/quic/crypto/aead_base_decrypter_nss.cc
|
| @@ -55,7 +55,7 @@ bool AeadBaseDecrypter::DecryptPacket(QuicPacketNumber packet_number,
|
| return false;
|
| }
|
|
|
| - uint8 nonce[sizeof(nonce_prefix_) + sizeof(packet_number)];
|
| + uint8_t nonce[sizeof(nonce_prefix_) + sizeof(packet_number)];
|
| const size_t nonce_size = nonce_prefix_size_ + sizeof(packet_number);
|
| DCHECK_LE(nonce_size, sizeof(nonce));
|
| memcpy(nonce, nonce_prefix_, nonce_prefix_size_);
|
| @@ -99,7 +99,7 @@ bool AeadBaseDecrypter::DecryptPacket(QuicPacketNumber packet_number,
|
|
|
| unsigned int output_len;
|
| if (PK11_Decrypt(aead_key.get(), aead_mechanism_, ¶m,
|
| - reinterpret_cast<uint8*>(output), &output_len,
|
| + reinterpret_cast<uint8_t*>(output), &output_len,
|
| max_output_length,
|
| reinterpret_cast<const unsigned char*>(ciphertext.data()),
|
| ciphertext.length()) != SECSuccess) {
|
|
|