!227 HILOG日志整改

Merge pull request !227 from 张丰壮/master
This commit is contained in:
openharmony_ci 2024-08-20 13:14:12 +00:00 committed by Gitee
commit 7e96e63f1b
No known key found for this signature in database
GPG Key ID: 173E9B9CA92EEF8F
5 changed files with 8 additions and 8 deletions

View File

@ -137,7 +137,7 @@ bool TrustedTicketManager::ParseTrustedTicketSourceJson(TicketSourceInfoVec& tru
HAPVERIFY_LOG_ERROR("Get critialcalCertExtension Failed");
return false;
}
HAPVERIFY_LOG_INFO("trusted ticket source: %{public}s",
HAPVERIFY_LOG_INFO("trusted ticket source: %{private}s",
EncapTrustedTicketSourceString(hapTicketSource).c_str());
trustedTicketSources.push_back(hapTicketSource);
}

View File

@ -187,11 +187,11 @@ bool VerifyTicketSignature(HapByteBuffer& ticketBlock, Pkcs7Context& pkcs7Contex
pkcs7Context.matchResult = trustedTicketSourceManager.IsTrustedSource(certSubject, pkcs7Context.certIssuer,
pkcs7Context.certChains[0].size());
if (pkcs7Context.matchResult.matchState == DO_NOT_MATCH) {
HAPVERIFY_LOG_ERROR("Ticket signature is not trusted source, subject: %{public}s, issuer: %{public}s",
HAPVERIFY_LOG_ERROR("Ticket signature is not trusted source, subject: %{private}s, issuer: %{public}s",
certSubject.c_str(), pkcs7Context.certIssuer.c_str());
return false;
}
HAPVERIFY_LOG_INFO("Ticket subject: %{public}s, issuer: %{public}s",
HAPVERIFY_LOG_INFO("Ticket subject: %{private}s, issuer: %{public}s",
certSubject.c_str(), pkcs7Context.certIssuer.c_str());
return true;
}

View File

@ -133,7 +133,7 @@ bool HapCertVerifyOpensslUtils::GetFingerprintBase64FromPemCert(const std::strin
fingerprint += buff;
}
X509_free(cert);
HAPVERIFY_LOG_DEBUG("GetFingerprintBase64FromPemCert end %{public}s", fingerprint.c_str());
HAPVERIFY_LOG_DEBUG("GetFingerprintBase64FromPemCert end %{private}s", fingerprint.c_str());
return true;
}

View File

@ -69,11 +69,11 @@ bool HapProfileVerifyUtils::VerifyProfile(Pkcs7Context& pkcs7Context)
pkcs7Context.matchResult = trustedSourceManager.IsTrustedSource(certSubject, certIssuer, PROFILE_BLOB,
pkcs7Context.certChains[0].size());
if (pkcs7Context.matchResult.matchState == DO_NOT_MATCH) {
HAPVERIFY_LOG_ERROR("profile signature is not trusted source, subject: %{public}s, issuer: %{public}s",
HAPVERIFY_LOG_ERROR("profile signature is not trusted source, subject: %{private}s, issuer: %{public}s",
certSubject.c_str(), certIssuer.c_str());
return false;
}
HAPVERIFY_LOG_DEBUG("profile subject: %{public}s, issuer: %{public}s",
HAPVERIFY_LOG_DEBUG("profile subject: %{private}s, issuer: %{public}s",
certSubject.c_str(), certIssuer.c_str());
return true;
}

View File

@ -151,7 +151,7 @@ bool HapVerifyV2::VerifyAppSourceAndParseProfile(Pkcs7Context& pkcs7Context,
HAPVERIFY_LOG_ERROR("Get info of sign cert failed");
return false;
}
HAPVERIFY_LOG_DEBUG("App signature subject: %{public}s, issuer: %{public}s",
HAPVERIFY_LOG_DEBUG("App signature subject: %{private}s, issuer: %{public}s",
certSubject.c_str(), pkcs7Context.certIssuer.c_str());
TrustedSourceManager& trustedSourceManager = TrustedSourceManager::GetInstance();
@ -262,7 +262,7 @@ bool HapVerifyV2::GenerateFingerprint(ProvisionInfo& provisionInfo)
return false;
}
provisionInfo.fingerprint = fingerprint;
HAPVERIFY_LOG_DEBUG("fingerprint is : %{public}s", fingerprint.c_str());
HAPVERIFY_LOG_DEBUG("fingerprint is : %{private}s", fingerprint.c_str());
return true;
}