Index: webrtc/base/socketadapters.cc |
diff --git a/webrtc/base/socketadapters.cc b/webrtc/base/socketadapters.cc |
index 0697c6fd518b4a8bca21638325f7a0f255788eb9..67debb60c10e21dbc19a97b6a27e9e3b542a54bc 100644 |
--- a/webrtc/base/socketadapters.cc |
+++ b/webrtc/base/socketadapters.cc |
@@ -97,7 +97,7 @@ void BufferedReadAdapter::BufferInput(bool on) { |
} |
void BufferedReadAdapter::OnReadEvent(AsyncSocket * socket) { |
- ASSERT(socket == socket_); |
+ RTC_DCHECK(socket == socket_); |
if (!buffering_) { |
AsyncSocketAdapter::OnReadEvent(socket); |
@@ -184,7 +184,7 @@ int AsyncSSLSocket::Connect(const SocketAddress& addr) { |
} |
void AsyncSSLSocket::OnConnectEvent(AsyncSocket * socket) { |
- ASSERT(socket == socket_); |
+ RTC_DCHECK(socket == socket_); |
// TODO: we could buffer output too... |
VERIFY(sizeof(kSslClientHello) == |
DirectSend(kSslClientHello, sizeof(kSslClientHello))); |
@@ -234,7 +234,7 @@ void AsyncSSLServerSocket::ProcessInput(char* data, size_t* len) { |
*len -= sizeof(kSslClientHello); |
// Clients should not send more data until the handshake is completed. |
- ASSERT(*len == 0); |
+ RTC_DCHECK(*len == 0); |
// Send a server hello back to the client. |
DirectSend(kSslServerHello, sizeof(kSslServerHello)); |
@@ -557,7 +557,7 @@ void AsyncSocksProxySocket::OnConnectEvent(AsyncSocket* socket) { |
} |
void AsyncSocksProxySocket::ProcessInput(char* data, size_t* len) { |
- ASSERT(state_ < SS_TUNNEL); |
+ RTC_DCHECK(state_ < SS_TUNNEL); |
ByteBufferReader response(data, *len); |
@@ -715,7 +715,7 @@ AsyncSocksProxyServerSocket::AsyncSocksProxyServerSocket(AsyncSocket* socket) |
void AsyncSocksProxyServerSocket::ProcessInput(char* data, size_t* len) { |
// TODO: See if the whole message has arrived |
- ASSERT(state_ < SS_CONNECT_PENDING); |
+ RTC_DCHECK(state_ < SS_CONNECT_PENDING); |
ByteBufferReader response(data, *len); |
if (state_ == SS_HELLO) { |