Inclusive language in //rtc_base.

Bug: webrtc:11680
Change-Id: I498199afb5e52fd9047afff96b45fa5dfa356606
Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/178393
Reviewed-by: Tommi <tommi@webrtc.org>
Commit-Queue: Mirko Bonadei <mbonadei@webrtc.org>
Cr-Commit-Position: refs/heads/master@{#31633}
diff --git a/rtc_base/nat_server.cc b/rtc_base/nat_server.cc
index 323a787..0c458df 100644
--- a/rtc_base/nat_server.cc
+++ b/rtc_base/nat_server.cc
@@ -174,7 +174,7 @@
   RTC_DCHECK(iter != int_map_->end());
 
   // Allow the destination to send packets back to the source.
-  iter->second->WhitelistInsert(dest_addr);
+  iter->second->AllowlistInsert(dest_addr);
 
   // Send the packet to its intended destination.
   rtc::PacketOptions options;
@@ -227,29 +227,29 @@
 
 bool NATServer::ShouldFilterOut(TransEntry* entry,
                                 const SocketAddress& ext_addr) {
-  return entry->WhitelistContains(ext_addr);
+  return entry->AllowlistContains(ext_addr);
 }
 
 NATServer::TransEntry::TransEntry(const SocketAddressPair& r,
                                   AsyncUDPSocket* s,
                                   NAT* nat)
     : route(r), socket(s) {
-  whitelist = new AddressSet(AddrCmp(nat));
+  allowlist = new AddressSet(AddrCmp(nat));
 }
 
 NATServer::TransEntry::~TransEntry() {
-  delete whitelist;
+  delete allowlist;
   delete socket;
 }
 
-void NATServer::TransEntry::WhitelistInsert(const SocketAddress& addr) {
+void NATServer::TransEntry::AllowlistInsert(const SocketAddress& addr) {
   CritScope cs(&crit_);
-  whitelist->insert(addr);
+  allowlist->insert(addr);
 }
 
-bool NATServer::TransEntry::WhitelistContains(const SocketAddress& ext_addr) {
+bool NATServer::TransEntry::AllowlistContains(const SocketAddress& ext_addr) {
   CritScope cs(&crit_);
-  return whitelist->find(ext_addr) == whitelist->end();
+  return allowlist->find(ext_addr) == allowlist->end();
 }
 
 }  // namespace rtc