X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=src%2Fnet%2Fquic%2Fcrypto%2Faead_base_decrypter_nss.cc;h=2401222d3dccce8c9fb7b2b3c090d804d0076877;hb=1afa4dd80ef85af7c90efaea6959db1d92330844;hp=bbf30244f87636f896ecd8b86209e22fd17f3f2a;hpb=90762837333c13ccf56f2ad88e4481fc71e8d281;p=platform%2Fframework%2Fweb%2Fcrosswalk.git diff --git a/src/net/quic/crypto/aead_base_decrypter_nss.cc b/src/net/quic/crypto/aead_base_decrypter_nss.cc index bbf3024..2401222 100644 --- a/src/net/quic/crypto/aead_base_decrypter_nss.cc +++ b/src/net/quic/crypto/aead_base_decrypter_nss.cc @@ -83,9 +83,9 @@ bool AeadBaseDecrypter::Decrypt(StringPiece nonce, // it's not PK11_OriginFortezzaHack, so pass PK11_OriginUnwrap as a // placeholder. crypto::ScopedPK11SymKey aead_key(PK11_ImportSymKey( - slot, key_mechanism, PK11_OriginUnwrap, CKA_DECRYPT, &key_item, NULL)); + slot, key_mechanism, PK11_OriginUnwrap, CKA_DECRYPT, &key_item, nullptr)); PK11_FreeSlot(slot); - slot = NULL; + slot = nullptr; if (!aead_key) { DVLOG(1) << "PK11_ImportSymKey failed"; return false; @@ -120,7 +120,7 @@ QuicData* AeadBaseDecrypter::DecryptPacket( StringPiece associated_data, StringPiece ciphertext) { if (ciphertext.length() < auth_tag_size_) { - return NULL; + return nullptr; } size_t plaintext_size; scoped_ptr plaintext(new char[ciphertext.length()]); @@ -134,7 +134,7 @@ QuicData* AeadBaseDecrypter::DecryptPacket( associated_data, ciphertext, reinterpret_cast(plaintext.get()), &plaintext_size)) { - return NULL; + return nullptr; } return new QuicData(plaintext.release(), plaintext_size, true); }