| Index: net/quic/crypto/aes_128_gcm_12_encrypter_nss.cc
|
| diff --git a/net/quic/crypto/aes_128_gcm_12_encrypter_nss.cc b/net/quic/crypto/aes_128_gcm_12_encrypter_nss.cc
|
| index 09901a4767243027aa73381c8c26fccf09513acc..6214af540f2740b32f5bcb872acf328a243b21b9 100644
|
| --- a/net/quic/crypto/aes_128_gcm_12_encrypter_nss.cc
|
| +++ b/net/quic/crypto/aes_128_gcm_12_encrypter_nss.cc
|
| @@ -59,7 +59,7 @@ class GcmSupportChecker {
|
| };
|
|
|
| // static
|
| -PK11_EncryptFunction GcmSupportChecker::pk11_encrypt_func_ = NULL;
|
| +PK11_EncryptFunction GcmSupportChecker::pk11_encrypt_func_ = nullptr;
|
|
|
| base::LazyInstance<GcmSupportChecker>::Leaky g_gcm_support_checker =
|
| LAZY_INSTANCE_INITIALIZER;
|
| @@ -78,7 +78,7 @@ SECStatus My_Encrypt(PK11SymKey* key,
|
| // being used, then NSS will support AES-GCM directly.
|
| PK11_EncryptFunction pk11_encrypt_func =
|
| GcmSupportChecker::pk11_encrypt_func();
|
| - if (pk11_encrypt_func != NULL) {
|
| + if (pk11_encrypt_func != nullptr) {
|
| return pk11_encrypt_func(key, mechanism, param, out, out_len, max_len, data,
|
| data_len);
|
| }
|
| @@ -110,7 +110,7 @@ SECStatus My_Encrypt(PK11SymKey* key,
|
| return SECFailure;
|
| }
|
|
|
| - SECItem my_param = { siBuffer, NULL, 0 };
|
| + SECItem my_param = { siBuffer, nullptr, 0 };
|
|
|
| // Step 1. Let H = CIPH_K(128 '0' bits).
|
| unsigned char ghash_key[16] = {0};
|
|
|