| Index: net/quic/core/crypto/crypto_secret_boxer.cc | 
| diff --git a/net/quic/core/crypto/crypto_secret_boxer.cc b/net/quic/core/crypto/crypto_secret_boxer.cc | 
| index 65691d25b79c7e156f8dc31c8749c1d9eb8b5614..6e75cb031709b2745fd93e95d68e8b4b99522c64 100644 | 
| --- a/net/quic/core/crypto/crypto_secret_boxer.cc | 
| +++ b/net/quic/core/crypto/crypto_secret_boxer.cc | 
| @@ -38,12 +38,12 @@ size_t CryptoSecretBoxer::GetKeySize() { | 
| return kKeySize; | 
| } | 
|  | 
| -// kAEAD is the AEAD used for boxing: AES-128-GCM-SIV. | 
| -static const EVP_AEAD* (*const kAEAD)() = EVP_aead_aes_128_gcm_siv; | 
| +// kAEAD_fn is the AEAD used for boxing: AES-128-GCM-SIV. | 
| +static const EVP_AEAD* (*const kAEAD_fn)() = EVP_aead_aes_128_gcm_siv; | 
|  | 
| void CryptoSecretBoxer::SetKeys(const std::vector<string>& keys) { | 
| DCHECK(!keys.empty()); | 
| -  const EVP_AEAD* const aead = kAEAD(); | 
| +  const EVP_AEAD* const aead = kAEAD_fn(); | 
| std::unique_ptr<State> new_state(new State); | 
|  | 
| for (const string& key : keys) { | 
| @@ -70,7 +70,7 @@ string CryptoSecretBoxer::Box(QuicRandom* rand, | 
| //   n bytes of ciphertext | 
| //   16 bytes of authenticator | 
| size_t out_len = | 
| -      kBoxNonceSize + plaintext.size() + EVP_AEAD_max_overhead(kAEAD()); | 
| +      kBoxNonceSize + plaintext.size() + EVP_AEAD_max_overhead(kAEAD_fn()); | 
|  | 
| string ret; | 
| uint8_t* out = reinterpret_cast<uint8_t*>(base::WriteInto(&ret, out_len + 1)); | 
|  |