| Index: net/quic/crypto/aead_base_decrypter_nss.cc
 | 
| diff --git a/net/quic/crypto/aead_base_decrypter_nss.cc b/net/quic/crypto/aead_base_decrypter_nss.cc
 | 
| index 806abe252674c0fb4176264d0b049afcacda30bc..9036681a1d675795d172a0e1a43c3cb52280be20 100644
 | 
| --- a/net/quic/crypto/aead_base_decrypter_nss.cc
 | 
| +++ b/net/quic/crypto/aead_base_decrypter_nss.cc
 | 
| @@ -55,7 +55,7 @@ bool AeadBaseDecrypter::DecryptPacket(QuicPacketNumber packet_number,
 | 
|      return false;
 | 
|    }
 | 
|  
 | 
| -  uint8 nonce[sizeof(nonce_prefix_) + sizeof(packet_number)];
 | 
| +  uint8_t nonce[sizeof(nonce_prefix_) + sizeof(packet_number)];
 | 
|    const size_t nonce_size = nonce_prefix_size_ + sizeof(packet_number);
 | 
|    DCHECK_LE(nonce_size, sizeof(nonce));
 | 
|    memcpy(nonce, nonce_prefix_, nonce_prefix_size_);
 | 
| @@ -99,7 +99,7 @@ bool AeadBaseDecrypter::DecryptPacket(QuicPacketNumber packet_number,
 | 
|  
 | 
|    unsigned int output_len;
 | 
|    if (PK11_Decrypt(aead_key.get(), aead_mechanism_, ¶m,
 | 
| -                   reinterpret_cast<uint8*>(output), &output_len,
 | 
| +                   reinterpret_cast<uint8_t*>(output), &output_len,
 | 
|                     max_output_length,
 | 
|                     reinterpret_cast<const unsigned char*>(ciphertext.data()),
 | 
|                     ciphertext.length()) != SECSuccess) {
 | 
| 
 |