| Index: ios/web/navigation/crw_session_certificate_policy_manager.mm
|
| diff --git a/ios/web/navigation/crw_session_certificate_policy_manager.mm b/ios/web/navigation/crw_session_certificate_policy_manager.mm
|
| index 3547536bc816307a8f4a3a248aefb547adea7697..735ac1c1b3aadf40f56e94ae6595e3701b5859bf 100644
|
| --- a/ios/web/navigation/crw_session_certificate_policy_manager.mm
|
| +++ b/ios/web/navigation/crw_session_certificate_policy_manager.mm
|
| @@ -17,32 +17,32 @@
|
|
|
| // Break if we detect that CertStatus values changed, because we persist them on
|
| // disk and thus require them to be consistent.
|
| -COMPILE_ASSERT(net::CERT_STATUS_ALL_ERRORS == 0xFFFF,
|
| - cert_status_value_changed);
|
| -COMPILE_ASSERT(net::CERT_STATUS_COMMON_NAME_INVALID == 1 << 0,
|
| - cert_status_value_changed);
|
| -COMPILE_ASSERT(net::CERT_STATUS_DATE_INVALID == 1 << 1,
|
| - cert_status_value_changed);
|
| -COMPILE_ASSERT(net::CERT_STATUS_AUTHORITY_INVALID == 1 << 2,
|
| - cert_status_value_changed);
|
| -COMPILE_ASSERT(net::CERT_STATUS_NO_REVOCATION_MECHANISM == 1 << 4,
|
| - cert_status_value_changed);
|
| -COMPILE_ASSERT(net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION == 1 << 5,
|
| - cert_status_value_changed);
|
| -COMPILE_ASSERT(net::CERT_STATUS_REVOKED == 1 << 6,
|
| - cert_status_value_changed);
|
| -COMPILE_ASSERT(net::CERT_STATUS_INVALID == 1 << 7,
|
| - cert_status_value_changed);
|
| -COMPILE_ASSERT(net::CERT_STATUS_WEAK_SIGNATURE_ALGORITHM == 1 << 8,
|
| - cert_status_value_changed);
|
| -COMPILE_ASSERT(net::CERT_STATUS_NON_UNIQUE_NAME == 1 << 10,
|
| - cert_status_value_changed);
|
| -COMPILE_ASSERT(net::CERT_STATUS_WEAK_KEY == 1 << 11,
|
| - cert_status_value_changed);
|
| -COMPILE_ASSERT(net::CERT_STATUS_IS_EV == 1 << 16,
|
| - cert_status_value_changed);
|
| -COMPILE_ASSERT(net::CERT_STATUS_REV_CHECKING_ENABLED == 1 << 17,
|
| - cert_status_value_changed);
|
| +static_assert(net::CERT_STATUS_ALL_ERRORS == 0xFFFF,
|
| + "The value of CERT_STATUS_ALL_ERRORS changed!");
|
| +static_assert(net::CERT_STATUS_COMMON_NAME_INVALID == 1 << 0,
|
| + "The value of CERT_STATUS_COMMON_NAME_INVALID changed!");
|
| +static_assert(net::CERT_STATUS_DATE_INVALID == 1 << 1,
|
| + "The value of CERT_STATUS_DATE_INVALID changed!");
|
| +static_assert(net::CERT_STATUS_AUTHORITY_INVALID == 1 << 2,
|
| + "The value of CERT_STATUS_AUTHORITY_INVALID changed!");
|
| +static_assert(net::CERT_STATUS_NO_REVOCATION_MECHANISM == 1 << 4,
|
| + "The value of CERT_STATUS_NO_REVOCATION_MECHANISM changed!");
|
| +static_assert(net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION == 1 << 5,
|
| + "The value of CERT_STATUS_UNABLE_TO_CHECK_REVOCATION changed!");
|
| +static_assert(net::CERT_STATUS_REVOKED == 1 << 6,
|
| + "The value of CERT_STATUS_REVOKED changed!");
|
| +static_assert(net::CERT_STATUS_INVALID == 1 << 7,
|
| + "The value of CERT_STATUS_INVALID changed!");
|
| +static_assert(net::CERT_STATUS_WEAK_SIGNATURE_ALGORITHM == 1 << 8,
|
| + "The value of CERT_STATUS_WEAK_SIGNATURE_ALGORITHM changed!");
|
| +static_assert(net::CERT_STATUS_NON_UNIQUE_NAME == 1 << 10,
|
| + "The value of CERT_STATUS_NON_UNIQUE_NAME changed!");
|
| +static_assert(net::CERT_STATUS_WEAK_KEY == 1 << 11,
|
| + "The value of CERT_STATUS_WEAK_KEY changed!");
|
| +static_assert(net::CERT_STATUS_IS_EV == 1 << 16,
|
| + "The value of CERT_STATUS_IS_EV changed!");
|
| +static_assert(net::CERT_STATUS_REV_CHECKING_ENABLED == 1 << 17,
|
| + "The value of CERT_STATUS_REV_CHECKING_ENABLED changed!");
|
|
|
| namespace {
|
|
|
|
|