Index: ios/web/navigation/crw_session_certificate_policy_manager.mm |
diff --git a/ios/web/navigation/crw_session_certificate_policy_manager.mm b/ios/web/navigation/crw_session_certificate_policy_manager.mm |
index 3547536bc816307a8f4a3a248aefb547adea7697..73aa05ee3b924bea9ccac687b15bf105de0ceb3d 100644 |
--- a/ios/web/navigation/crw_session_certificate_policy_manager.mm |
+++ b/ios/web/navigation/crw_session_certificate_policy_manager.mm |
@@ -17,32 +17,29 @@ |
// Break if we detect that CertStatus values changed, because we persist them on |
// disk and thus require them to be consistent. |
-COMPILE_ASSERT(net::CERT_STATUS_ALL_ERRORS == 0xFFFF, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_COMMON_NAME_INVALID == 1 << 0, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_DATE_INVALID == 1 << 1, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_AUTHORITY_INVALID == 1 << 2, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_NO_REVOCATION_MECHANISM == 1 << 4, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION == 1 << 5, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_REVOKED == 1 << 6, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_INVALID == 1 << 7, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_WEAK_SIGNATURE_ALGORITHM == 1 << 8, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_NON_UNIQUE_NAME == 1 << 10, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_WEAK_KEY == 1 << 11, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_IS_EV == 1 << 16, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_REV_CHECKING_ENABLED == 1 << 17, |
- cert_status_value_changed); |
+static_assert(net::CERT_STATUS_ALL_ERRORS == 0xFFFF, |
+ "cert_status_value_changed"); |
+static_assert(net::CERT_STATUS_COMMON_NAME_INVALID == 1 << 0, |
+ "cert_status_value_changed"); |
+static_assert(net::CERT_STATUS_DATE_INVALID == 1 << 1, |
+ "cert_status_value_changed"); |
+static_assert(net::CERT_STATUS_AUTHORITY_INVALID == 1 << 2, |
+ "cert_status_value_changed"); |
+static_assert(net::CERT_STATUS_NO_REVOCATION_MECHANISM == 1 << 4, |
+ "cert_status_value_changed"); |
+static_assert(net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION == 1 << 5, |
+ "cert_status_value_changed"); |
+static_assert(net::CERT_STATUS_REVOKED == 1 << 6, "cert_status_value_changed"); |
+static_assert(net::CERT_STATUS_INVALID == 1 << 7, "cert_status_value_changed"); |
+static_assert(net::CERT_STATUS_WEAK_SIGNATURE_ALGORITHM == 1 << 8, |
+ "cert_status_value_changed"); |
+static_assert(net::CERT_STATUS_NON_UNIQUE_NAME == 1 << 10, |
+ "cert_status_value_changed"); |
+static_assert(net::CERT_STATUS_WEAK_KEY == 1 << 11, |
+ "cert_status_value_changed"); |
+static_assert(net::CERT_STATUS_IS_EV == 1 << 16, "cert_status_value_changed"); |
+static_assert(net::CERT_STATUS_REV_CHECKING_ENABLED == 1 << 17, |
+ "cert_status_value_changed"); |
namespace { |