| Index: extensions/browser/api/cast_channel/cast_auth_util_nss.cc
|
| diff --git a/extensions/browser/api/cast_channel/cast_auth_util_nss.cc b/extensions/browser/api/cast_channel/cast_auth_util_nss.cc
|
| index 97f16d7c8e04fb3f20568d0ec81748b80cd7609c..dede4d0e80818a3c60b2d0aeb9b5bfdca9a9bc68 100644
|
| --- a/extensions/browser/api/cast_channel/cast_auth_util_nss.cc
|
| +++ b/extensions/browser/api/cast_channel/cast_auth_util_nss.cc
|
| @@ -77,7 +77,7 @@ AuthResult VerifyCredentials(const AuthResponse& response,
|
|
|
| // Parse into a certificate structure.
|
| ScopedCERTCertificate cert(CERT_NewTempCertificate(
|
| - CERT_GetDefaultCertDB(), &der_cert, NULL, PR_FALSE, PR_TRUE));
|
| + CERT_GetDefaultCertDB(), &der_cert, nullptr, PR_FALSE, PR_TRUE));
|
| if (!cert.get()) {
|
| return AuthResult::CreateWithNSSError(
|
| "Failed to parse certificate.",
|
| @@ -96,7 +96,7 @@ AuthResult VerifyCredentials(const AuthResponse& response,
|
| AuthResult::ERROR_CERT_PARSING_FAILED, PORT_GetError());
|
| }
|
| SECStatus verified = CERT_VerifySignedDataWithPublicKey(
|
| - &cert->signatureWrap, ca_public_key.get(), NULL);
|
| + &cert->signatureWrap, ca_public_key.get(), nullptr);
|
| if (verified != SECSuccess) {
|
| return AuthResult::CreateWithNSSError(
|
| "Cert not signed by trusted CA",
|
| @@ -119,11 +119,8 @@ AuthResult VerifyCredentials(const AuthResponse& response,
|
| signature_item.len = signature.length();
|
| verified = VFY_VerifyDataDirect(
|
| reinterpret_cast<unsigned char*>(const_cast<char*>(peer_cert.data())),
|
| - peer_cert.size(),
|
| - public_key.get(),
|
| - &signature_item,
|
| - SEC_OID_PKCS1_RSA_ENCRYPTION,
|
| - SEC_OID_SHA1, NULL, NULL);
|
| + peer_cert.size(), public_key.get(), &signature_item,
|
| + SEC_OID_PKCS1_RSA_ENCRYPTION, SEC_OID_SHA1, nullptr, nullptr);
|
|
|
| if (verified != SECSuccess) {
|
| return AuthResult::CreateWithNSSError(
|
|
|