| Index: net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc
|
| diff --git a/net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc b/net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc
|
| index 0ba82698a86677a6e3e8f9fbd6f6588bc31e59ea..d2cd7283acceb324b14af55e47d9dce820bec634 100644
|
| --- a/net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc
|
| +++ b/net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc
|
| @@ -59,7 +59,7 @@ class GcmSupportChecker {
|
| };
|
|
|
| // static
|
| -PK11_DecryptFunction GcmSupportChecker::pk11_decrypt_func_ = NULL;
|
| +PK11_DecryptFunction GcmSupportChecker::pk11_decrypt_func_ = nullptr;
|
|
|
| base::LazyInstance<GcmSupportChecker>::Leaky g_gcm_support_checker =
|
| LAZY_INSTANCE_INITIALIZER;
|
| @@ -78,7 +78,7 @@ SECStatus My_Decrypt(PK11SymKey* key,
|
| // being used, then NSS will support AES-GCM directly.
|
| PK11_DecryptFunction pk11_decrypt_func =
|
| GcmSupportChecker::pk11_decrypt_func();
|
| - if (pk11_decrypt_func != NULL) {
|
| + if (pk11_decrypt_func != nullptr) {
|
| return pk11_decrypt_func(key, mechanism, param, out, out_len, max_len, enc,
|
| enc_len);
|
| }
|
| @@ -104,7 +104,7 @@ SECStatus My_Decrypt(PK11SymKey* key,
|
| return SECFailure;
|
| }
|
|
|
| - SECItem my_param = { siBuffer, NULL, 0 };
|
| + SECItem my_param = { siBuffer, nullptr, 0 };
|
|
|
| // Step 2. Let H = CIPH_K(128 '0' bits).
|
| unsigned char ghash_key[16] = {0};
|
|
|