| Index: net/cert/ct_log_verifier.cc
|
| diff --git a/net/cert/ct_log_verifier.cc b/net/cert/ct_log_verifier.cc
|
| index 7dbde12c4b225120ecb6aca5989b6e29c98f2bd0..4f3bc83ba9d7f6b5198c8ddb1a039c57a92d9310 100644
|
| --- a/net/cert/ct_log_verifier.cc
|
| +++ b/net/cert/ct_log_verifier.cc
|
| @@ -11,7 +11,7 @@
|
| namespace net {
|
|
|
| // static
|
| -scoped_refptr<CTLogVerifier> CTLogVerifier::Create(
|
| +scoped_refptr<const CTLogVerifier> CTLogVerifier::Create(
|
| const base::StringPiece& public_key,
|
| const base::StringPiece& description,
|
| const base::StringPiece& url) {
|
| @@ -35,7 +35,7 @@ CTLogVerifier::CTLogVerifier(const base::StringPiece& description,
|
| }
|
|
|
| bool CTLogVerifier::Verify(const ct::LogEntry& entry,
|
| - const ct::SignedCertificateTimestamp& sct) {
|
| + const ct::SignedCertificateTimestamp& sct) const {
|
| if (sct.log_id != key_id()) {
|
| DVLOG(1) << "SCT is not signed by this log.";
|
| return false;
|
| @@ -60,7 +60,7 @@ bool CTLogVerifier::Verify(const ct::LogEntry& entry,
|
| }
|
|
|
| bool CTLogVerifier::VerifySignedTreeHead(
|
| - const ct::SignedTreeHead& signed_tree_head) {
|
| + const ct::SignedTreeHead& signed_tree_head) const {
|
| if (!SignatureParametersMatch(signed_tree_head.signature))
|
| return false;
|
|
|
| @@ -74,7 +74,7 @@ bool CTLogVerifier::VerifySignedTreeHead(
|
| }
|
|
|
| bool CTLogVerifier::SignatureParametersMatch(
|
| - const ct::DigitallySigned& signature) {
|
| + const ct::DigitallySigned& signature) const {
|
| if (!signature.SignatureParametersMatch(hash_algorithm_,
|
| signature_algorithm_)) {
|
| DVLOG(1) << "Mismatched hash or signature algorithm. Hash: "
|
|
|