| Index: extensions/browser/api/cast_channel/cast_auth_util_nss.cc
|
| diff --git a/extensions/browser/api/cast_channel/cast_auth_util_nss.cc b/extensions/browser/api/cast_channel/cast_auth_util_nss.cc
|
| index a3fc24dffd24747fe76dd35d2628f02acf388169..dfe8fdffd671e75dce7e41a9046a399b2d26bb52 100644
|
| --- a/extensions/browser/api/cast_channel/cast_auth_util_nss.cc
|
| +++ b/extensions/browser/api/cast_channel/cast_auth_util_nss.cc
|
| @@ -676,7 +676,7 @@ AuthResult VerifyCredentials(const AuthResponse& response,
|
|
|
| // Parse into a certificate structure.
|
| ScopedCERTCertificate cert(CERT_NewTempCertificate(
|
| - CERT_GetDefaultCertDB(), &der_cert, NULL, PR_FALSE, PR_TRUE));
|
| + CERT_GetDefaultCertDB(), &der_cert, nullptr, PR_FALSE, PR_TRUE));
|
| if (!cert.get()) {
|
| return AuthResult::CreateWithNSSError(
|
| kErrorPrefix + "Failed to parse certificate.",
|
| @@ -692,7 +692,7 @@ AuthResult VerifyCredentials(const AuthResponse& response,
|
| SECKEY_ImportDERPublicKey(
|
| const_cast<SECItem*>(trusted_ca_key_der), CKK_RSA));
|
| SECStatus verified = CERT_VerifySignedDataWithPublicKey(
|
| - &cert->signatureWrap, ca_public_key.get(), NULL);
|
| + &cert->signatureWrap, ca_public_key.get(), nullptr);
|
| if (verified != SECSuccess) {
|
| return AuthResult::CreateWithNSSError(
|
| kErrorPrefix + "Cert not signed by trusted CA",
|
| @@ -721,7 +721,9 @@ AuthResult VerifyCredentials(const AuthResponse& response,
|
| public_key.get(),
|
| &signature_item,
|
| SEC_OID_PKCS1_RSA_ENCRYPTION,
|
| - SEC_OID_SHA1, NULL, NULL);
|
| + SEC_OID_SHA1,
|
| + nullptr,
|
| + nullptr);
|
|
|
| if (verified != SECSuccess) {
|
| return AuthResult::CreateWithNSSError(
|
|
|