Index: extensions/browser/api/cast_channel/cast_auth_util_nss.cc |
diff --git a/extensions/browser/api/cast_channel/cast_auth_util_nss.cc b/extensions/browser/api/cast_channel/cast_auth_util_nss.cc |
index a3fc24dffd24747fe76dd35d2628f02acf388169..dfe8fdffd671e75dce7e41a9046a399b2d26bb52 100644 |
--- a/extensions/browser/api/cast_channel/cast_auth_util_nss.cc |
+++ b/extensions/browser/api/cast_channel/cast_auth_util_nss.cc |
@@ -676,7 +676,7 @@ AuthResult VerifyCredentials(const AuthResponse& response, |
// Parse into a certificate structure. |
ScopedCERTCertificate cert(CERT_NewTempCertificate( |
- CERT_GetDefaultCertDB(), &der_cert, NULL, PR_FALSE, PR_TRUE)); |
+ CERT_GetDefaultCertDB(), &der_cert, nullptr, PR_FALSE, PR_TRUE)); |
if (!cert.get()) { |
return AuthResult::CreateWithNSSError( |
kErrorPrefix + "Failed to parse certificate.", |
@@ -692,7 +692,7 @@ AuthResult VerifyCredentials(const AuthResponse& response, |
SECKEY_ImportDERPublicKey( |
const_cast<SECItem*>(trusted_ca_key_der), CKK_RSA)); |
SECStatus verified = CERT_VerifySignedDataWithPublicKey( |
- &cert->signatureWrap, ca_public_key.get(), NULL); |
+ &cert->signatureWrap, ca_public_key.get(), nullptr); |
if (verified != SECSuccess) { |
return AuthResult::CreateWithNSSError( |
kErrorPrefix + "Cert not signed by trusted CA", |
@@ -721,7 +721,9 @@ AuthResult VerifyCredentials(const AuthResponse& response, |
public_key.get(), |
&signature_item, |
SEC_OID_PKCS1_RSA_ENCRYPTION, |
- SEC_OID_SHA1, NULL, NULL); |
+ SEC_OID_SHA1, |
+ nullptr, |
+ nullptr); |
if (verified != SECSuccess) { |
return AuthResult::CreateWithNSSError( |