| Index: extensions/browser/api/cast_channel/cast_auth_util_nss.cc
 | 
| diff --git a/extensions/browser/api/cast_channel/cast_auth_util_nss.cc b/extensions/browser/api/cast_channel/cast_auth_util_nss.cc
 | 
| index a3fc24dffd24747fe76dd35d2628f02acf388169..dfe8fdffd671e75dce7e41a9046a399b2d26bb52 100644
 | 
| --- a/extensions/browser/api/cast_channel/cast_auth_util_nss.cc
 | 
| +++ b/extensions/browser/api/cast_channel/cast_auth_util_nss.cc
 | 
| @@ -676,7 +676,7 @@ AuthResult VerifyCredentials(const AuthResponse& response,
 | 
|  
 | 
|    // Parse into a certificate structure.
 | 
|    ScopedCERTCertificate cert(CERT_NewTempCertificate(
 | 
| -      CERT_GetDefaultCertDB(), &der_cert, NULL, PR_FALSE, PR_TRUE));
 | 
| +      CERT_GetDefaultCertDB(), &der_cert, nullptr, PR_FALSE, PR_TRUE));
 | 
|    if (!cert.get()) {
 | 
|      return AuthResult::CreateWithNSSError(
 | 
|          kErrorPrefix + "Failed to parse certificate.",
 | 
| @@ -692,7 +692,7 @@ AuthResult VerifyCredentials(const AuthResponse& response,
 | 
|        SECKEY_ImportDERPublicKey(
 | 
|            const_cast<SECItem*>(trusted_ca_key_der), CKK_RSA));
 | 
|    SECStatus verified = CERT_VerifySignedDataWithPublicKey(
 | 
| -      &cert->signatureWrap, ca_public_key.get(), NULL);
 | 
| +      &cert->signatureWrap, ca_public_key.get(), nullptr);
 | 
|    if (verified != SECSuccess) {
 | 
|      return AuthResult::CreateWithNSSError(
 | 
|          kErrorPrefix + "Cert not signed by trusted CA",
 | 
| @@ -721,7 +721,9 @@ AuthResult VerifyCredentials(const AuthResponse& response,
 | 
|        public_key.get(),
 | 
|        &signature_item,
 | 
|        SEC_OID_PKCS1_RSA_ENCRYPTION,
 | 
| -      SEC_OID_SHA1, NULL, NULL);
 | 
| +      SEC_OID_SHA1,
 | 
| +      nullptr,
 | 
| +      nullptr);
 | 
|  
 | 
|    if (verified != SECSuccess) {
 | 
|      return AuthResult::CreateWithNSSError(
 | 
| 
 |