Index: extensions/browser/api/cast_channel/cast_auth_util_nss.cc |
diff --git a/extensions/browser/api/cast_channel/cast_auth_util_nss.cc b/extensions/browser/api/cast_channel/cast_auth_util_nss.cc |
index 97f16d7c8e04fb3f20568d0ec81748b80cd7609c..dede4d0e80818a3c60b2d0aeb9b5bfdca9a9bc68 100644 |
--- a/extensions/browser/api/cast_channel/cast_auth_util_nss.cc |
+++ b/extensions/browser/api/cast_channel/cast_auth_util_nss.cc |
@@ -77,7 +77,7 @@ AuthResult VerifyCredentials(const AuthResponse& response, |
// Parse into a certificate structure. |
ScopedCERTCertificate cert(CERT_NewTempCertificate( |
- CERT_GetDefaultCertDB(), &der_cert, NULL, PR_FALSE, PR_TRUE)); |
+ CERT_GetDefaultCertDB(), &der_cert, nullptr, PR_FALSE, PR_TRUE)); |
if (!cert.get()) { |
return AuthResult::CreateWithNSSError( |
"Failed to parse certificate.", |
@@ -96,7 +96,7 @@ AuthResult VerifyCredentials(const AuthResponse& response, |
AuthResult::ERROR_CERT_PARSING_FAILED, PORT_GetError()); |
} |
SECStatus verified = CERT_VerifySignedDataWithPublicKey( |
- &cert->signatureWrap, ca_public_key.get(), NULL); |
+ &cert->signatureWrap, ca_public_key.get(), nullptr); |
if (verified != SECSuccess) { |
return AuthResult::CreateWithNSSError( |
"Cert not signed by trusted CA", |
@@ -119,11 +119,8 @@ AuthResult VerifyCredentials(const AuthResponse& response, |
signature_item.len = signature.length(); |
verified = VFY_VerifyDataDirect( |
reinterpret_cast<unsigned char*>(const_cast<char*>(peer_cert.data())), |
- peer_cert.size(), |
- public_key.get(), |
- &signature_item, |
- SEC_OID_PKCS1_RSA_ENCRYPTION, |
- SEC_OID_SHA1, NULL, NULL); |
+ peer_cert.size(), public_key.get(), &signature_item, |
+ SEC_OID_PKCS1_RSA_ENCRYPTION, SEC_OID_SHA1, nullptr, nullptr); |
if (verified != SECSuccess) { |
return AuthResult::CreateWithNSSError( |