| Index: webrtc/p2p/base/pseudotcp.cc | 
| diff --git a/webrtc/p2p/base/pseudotcp.cc b/webrtc/p2p/base/pseudotcp.cc | 
| index 03c8814ef407bf3e59ddaf374d037160395f3e6f..ec302d3520423fa7ad1f95971feb950f6e37765d 100644 | 
| --- a/webrtc/p2p/base/pseudotcp.cc | 
| +++ b/webrtc/p2p/base/pseudotcp.cc | 
| @@ -219,7 +219,7 @@ PseudoTcp::PseudoTcp(IPseudoTcpNotify* notify, uint32_t conv) | 
| m_sbuf_len(DEFAULT_SND_BUF_SIZE), | 
| m_sbuf(m_sbuf_len) { | 
| // Sanity check on buffer sizes (needed for OnTcpWriteable notification logic) | 
| -  ASSERT(m_rbuf_len + MIN_PACKET < m_sbuf_len); | 
| +  RTC_DCHECK(m_rbuf_len + MIN_PACKET < m_sbuf_len); | 
|  | 
| uint32_t now = Now(); | 
|  | 
| @@ -236,7 +236,7 @@ PseudoTcp::PseudoTcp(IPseudoTcpNotify* notify, uint32_t conv) | 
|  | 
| m_msslevel = 0; | 
| m_largest = 0; | 
| -  ASSERT(MIN_PACKET > PACKET_OVERHEAD); | 
| +  RTC_DCHECK(MIN_PACKET > PACKET_OVERHEAD); | 
| m_mss = MIN_PACKET - PACKET_OVERHEAD; | 
| m_mtu_advise = MAX_PACKET; | 
|  | 
| @@ -388,10 +388,10 @@ void PseudoTcp::SetOption(Option opt, int value) { | 
| } else if (opt == OPT_ACKDELAY) { | 
| m_ack_delay = value; | 
| } else if (opt == OPT_SNDBUF) { | 
| -    ASSERT(m_state == TCP_LISTEN); | 
| +    RTC_DCHECK(m_state == TCP_LISTEN); | 
| resizeSendBuffer(value); | 
| } else if (opt == OPT_RCVBUF) { | 
| -    ASSERT(m_state == TCP_LISTEN); | 
| +    RTC_DCHECK(m_state == TCP_LISTEN); | 
| resizeReceiveBuffer(value); | 
| } else { | 
| RTC_NOTREACHED(); | 
| @@ -435,7 +435,7 @@ int PseudoTcp::Recv(char* buffer, size_t len) { | 
| m_error = EWOULDBLOCK; | 
| return SOCKET_ERROR; | 
| } | 
| -  ASSERT(result == rtc::SR_SUCCESS); | 
| +  RTC_DCHECK(result == rtc::SR_SUCCESS); | 
|  | 
| size_t available_space = 0; | 
| m_rbuf.GetWriteRemaining(&available_space); | 
| @@ -492,7 +492,7 @@ uint32_t PseudoTcp::queue(const char* data, uint32_t len, bool bCtrl) { | 
| m_sbuf.GetWriteRemaining(&available_space); | 
|  | 
| if (len > static_cast<uint32_t>(available_space)) { | 
| -    ASSERT(!bCtrl); | 
| +    RTC_DCHECK(!bCtrl); | 
| len = static_cast<uint32_t>(available_space); | 
| } | 
|  | 
| @@ -517,7 +517,7 @@ IPseudoTcpNotify::WriteResult PseudoTcp::packet(uint32_t seq, | 
| uint8_t flags, | 
| uint32_t offset, | 
| uint32_t len) { | 
| -  ASSERT(HEADER_SIZE + len <= MAX_PACKET); | 
| +  RTC_DCHECK(HEADER_SIZE + len <= MAX_PACKET); | 
|  | 
| uint32_t now = Now(); | 
|  | 
| @@ -540,8 +540,8 @@ IPseudoTcpNotify::WriteResult PseudoTcp::packet(uint32_t seq, | 
| rtc::StreamResult result = m_sbuf.ReadOffset( | 
| buffer.get() + HEADER_SIZE, len, offset, &bytes_read); | 
| RTC_UNUSED(result); | 
| -    ASSERT(result == rtc::SR_SUCCESS); | 
| -    ASSERT(static_cast<uint32_t>(bytes_read) == len); | 
| +    RTC_DCHECK(result == rtc::SR_SUCCESS); | 
| +    RTC_DCHECK(static_cast<uint32_t>(bytes_read) == len); | 
| } | 
|  | 
| #if _DEBUGMSG >= _DBG_VERBOSE | 
| @@ -750,7 +750,7 @@ bool PseudoTcp::process(Segment& seg) { | 
| m_sbuf.ConsumeReadData(nAcked); | 
|  | 
| for (uint32_t nFree = nAcked; nFree > 0;) { | 
| -      ASSERT(!m_slist.empty()); | 
| +      RTC_DCHECK(!m_slist.empty()); | 
| if (nFree < m_slist.front().len) { | 
| m_slist.front().len -= nFree; | 
| nFree = 0; | 
| @@ -912,7 +912,7 @@ bool PseudoTcp::process(Segment& seg) { | 
|  | 
| rtc::StreamResult result = m_rbuf.WriteOffset(seg.data, seg.len, | 
| nOffset, NULL); | 
| -      ASSERT(result == rtc::SR_SUCCESS); | 
| +      RTC_DCHECK(result == rtc::SR_SUCCESS); | 
| RTC_UNUSED(result); | 
|  | 
| if (seg.seq == m_rcv_nxt) { | 
| @@ -989,7 +989,7 @@ bool PseudoTcp::transmit(const SList::iterator& seg, uint32_t now) { | 
| return false; | 
| } | 
|  | 
| -    ASSERT(wres == IPseudoTcpNotify::WR_TOO_LARGE); | 
| +    RTC_DCHECK(wres == IPseudoTcpNotify::WR_TOO_LARGE); | 
|  | 
| while (true) { | 
| if (PACKET_MAXIMUMS[m_msslevel + 1] == 0) { | 
| @@ -1110,7 +1110,7 @@ void PseudoTcp::attemptSend(SendFlags sflags) { | 
| SList::iterator it = m_slist.begin(); | 
| while (it->xmit > 0) { | 
| ++it; | 
| -      ASSERT(it != m_slist.end()); | 
| +      RTC_DCHECK(it != m_slist.end()); | 
| } | 
| SList::iterator seg = it; | 
|  | 
| @@ -1203,7 +1203,7 @@ void PseudoTcp::parseOptions(const char* data, uint32_t len) { | 
| } | 
|  | 
| // Length of this option. | 
| -    ASSERT(len != 0); | 
| +    RTC_DCHECK(len != 0); | 
| RTC_UNUSED(len); | 
| uint8_t opt_len = 0; | 
| buf.ReadUInt8(&opt_len); | 
| @@ -1273,7 +1273,7 @@ void PseudoTcp::resizeReceiveBuffer(uint32_t new_size) { | 
| // buffer. This should always be true because this method is called either | 
| // before connection is established or when peers are exchanging connect | 
| // messages. | 
| -  ASSERT(result); | 
| +  RTC_DCHECK(result); | 
| RTC_UNUSED(result); | 
| m_rbuf_len = new_size; | 
| m_rwnd_scale = scale_factor; | 
|  |