Index: net/quic/crypto/aes_128_gcm_12_encrypter_nss.cc |
diff --git a/net/quic/crypto/aes_128_gcm_12_encrypter_nss.cc b/net/quic/crypto/aes_128_gcm_12_encrypter_nss.cc |
index 09901a4767243027aa73381c8c26fccf09513acc..6214af540f2740b32f5bcb872acf328a243b21b9 100644 |
--- a/net/quic/crypto/aes_128_gcm_12_encrypter_nss.cc |
+++ b/net/quic/crypto/aes_128_gcm_12_encrypter_nss.cc |
@@ -59,7 +59,7 @@ class GcmSupportChecker { |
}; |
// static |
-PK11_EncryptFunction GcmSupportChecker::pk11_encrypt_func_ = NULL; |
+PK11_EncryptFunction GcmSupportChecker::pk11_encrypt_func_ = nullptr; |
base::LazyInstance<GcmSupportChecker>::Leaky g_gcm_support_checker = |
LAZY_INSTANCE_INITIALIZER; |
@@ -78,7 +78,7 @@ SECStatus My_Encrypt(PK11SymKey* key, |
// being used, then NSS will support AES-GCM directly. |
PK11_EncryptFunction pk11_encrypt_func = |
GcmSupportChecker::pk11_encrypt_func(); |
- if (pk11_encrypt_func != NULL) { |
+ if (pk11_encrypt_func != nullptr) { |
return pk11_encrypt_func(key, mechanism, param, out, out_len, max_len, data, |
data_len); |
} |
@@ -110,7 +110,7 @@ SECStatus My_Encrypt(PK11SymKey* key, |
return SECFailure; |
} |
- SECItem my_param = { siBuffer, NULL, 0 }; |
+ SECItem my_param = { siBuffer, nullptr, 0 }; |
// Step 1. Let H = CIPH_K(128 '0' bits). |
unsigned char ghash_key[16] = {0}; |