Index: ios/web/navigation/crw_session_certificate_policy_manager.mm |
diff --git a/ios/web/navigation/crw_session_certificate_policy_manager.mm b/ios/web/navigation/crw_session_certificate_policy_manager.mm |
index 3547536bc816307a8f4a3a248aefb547adea7697..735ac1c1b3aadf40f56e94ae6595e3701b5859bf 100644 |
--- a/ios/web/navigation/crw_session_certificate_policy_manager.mm |
+++ b/ios/web/navigation/crw_session_certificate_policy_manager.mm |
@@ -17,32 +17,32 @@ |
// Break if we detect that CertStatus values changed, because we persist them on |
// disk and thus require them to be consistent. |
-COMPILE_ASSERT(net::CERT_STATUS_ALL_ERRORS == 0xFFFF, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_COMMON_NAME_INVALID == 1 << 0, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_DATE_INVALID == 1 << 1, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_AUTHORITY_INVALID == 1 << 2, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_NO_REVOCATION_MECHANISM == 1 << 4, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION == 1 << 5, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_REVOKED == 1 << 6, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_INVALID == 1 << 7, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_WEAK_SIGNATURE_ALGORITHM == 1 << 8, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_NON_UNIQUE_NAME == 1 << 10, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_WEAK_KEY == 1 << 11, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_IS_EV == 1 << 16, |
- cert_status_value_changed); |
-COMPILE_ASSERT(net::CERT_STATUS_REV_CHECKING_ENABLED == 1 << 17, |
- cert_status_value_changed); |
+static_assert(net::CERT_STATUS_ALL_ERRORS == 0xFFFF, |
+ "The value of CERT_STATUS_ALL_ERRORS changed!"); |
+static_assert(net::CERT_STATUS_COMMON_NAME_INVALID == 1 << 0, |
+ "The value of CERT_STATUS_COMMON_NAME_INVALID changed!"); |
+static_assert(net::CERT_STATUS_DATE_INVALID == 1 << 1, |
+ "The value of CERT_STATUS_DATE_INVALID changed!"); |
+static_assert(net::CERT_STATUS_AUTHORITY_INVALID == 1 << 2, |
+ "The value of CERT_STATUS_AUTHORITY_INVALID changed!"); |
+static_assert(net::CERT_STATUS_NO_REVOCATION_MECHANISM == 1 << 4, |
+ "The value of CERT_STATUS_NO_REVOCATION_MECHANISM changed!"); |
+static_assert(net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION == 1 << 5, |
+ "The value of CERT_STATUS_UNABLE_TO_CHECK_REVOCATION changed!"); |
+static_assert(net::CERT_STATUS_REVOKED == 1 << 6, |
+ "The value of CERT_STATUS_REVOKED changed!"); |
+static_assert(net::CERT_STATUS_INVALID == 1 << 7, |
+ "The value of CERT_STATUS_INVALID changed!"); |
+static_assert(net::CERT_STATUS_WEAK_SIGNATURE_ALGORITHM == 1 << 8, |
+ "The value of CERT_STATUS_WEAK_SIGNATURE_ALGORITHM changed!"); |
+static_assert(net::CERT_STATUS_NON_UNIQUE_NAME == 1 << 10, |
+ "The value of CERT_STATUS_NON_UNIQUE_NAME changed!"); |
+static_assert(net::CERT_STATUS_WEAK_KEY == 1 << 11, |
+ "The value of CERT_STATUS_WEAK_KEY changed!"); |
+static_assert(net::CERT_STATUS_IS_EV == 1 << 16, |
+ "The value of CERT_STATUS_IS_EV changed!"); |
+static_assert(net::CERT_STATUS_REV_CHECKING_ENABLED == 1 << 17, |
+ "The value of CERT_STATUS_REV_CHECKING_ENABLED changed!"); |
namespace { |