mirror of
https://gitee.com/openharmony/security_appverify
synced 2024-11-23 14:39:58 +00:00
commit
7e96e63f1b
@ -137,7 +137,7 @@ bool TrustedTicketManager::ParseTrustedTicketSourceJson(TicketSourceInfoVec& tru
|
||||
HAPVERIFY_LOG_ERROR("Get critialcalCertExtension Failed");
|
||||
return false;
|
||||
}
|
||||
HAPVERIFY_LOG_INFO("trusted ticket source: %{public}s",
|
||||
HAPVERIFY_LOG_INFO("trusted ticket source: %{private}s",
|
||||
EncapTrustedTicketSourceString(hapTicketSource).c_str());
|
||||
trustedTicketSources.push_back(hapTicketSource);
|
||||
}
|
||||
|
@ -187,11 +187,11 @@ bool VerifyTicketSignature(HapByteBuffer& ticketBlock, Pkcs7Context& pkcs7Contex
|
||||
pkcs7Context.matchResult = trustedTicketSourceManager.IsTrustedSource(certSubject, pkcs7Context.certIssuer,
|
||||
pkcs7Context.certChains[0].size());
|
||||
if (pkcs7Context.matchResult.matchState == DO_NOT_MATCH) {
|
||||
HAPVERIFY_LOG_ERROR("Ticket signature is not trusted source, subject: %{public}s, issuer: %{public}s",
|
||||
HAPVERIFY_LOG_ERROR("Ticket signature is not trusted source, subject: %{private}s, issuer: %{public}s",
|
||||
certSubject.c_str(), pkcs7Context.certIssuer.c_str());
|
||||
return false;
|
||||
}
|
||||
HAPVERIFY_LOG_INFO("Ticket subject: %{public}s, issuer: %{public}s",
|
||||
HAPVERIFY_LOG_INFO("Ticket subject: %{private}s, issuer: %{public}s",
|
||||
certSubject.c_str(), pkcs7Context.certIssuer.c_str());
|
||||
return true;
|
||||
}
|
||||
|
@ -133,7 +133,7 @@ bool HapCertVerifyOpensslUtils::GetFingerprintBase64FromPemCert(const std::strin
|
||||
fingerprint += buff;
|
||||
}
|
||||
X509_free(cert);
|
||||
HAPVERIFY_LOG_DEBUG("GetFingerprintBase64FromPemCert end %{public}s", fingerprint.c_str());
|
||||
HAPVERIFY_LOG_DEBUG("GetFingerprintBase64FromPemCert end %{private}s", fingerprint.c_str());
|
||||
return true;
|
||||
}
|
||||
|
||||
|
@ -69,11 +69,11 @@ bool HapProfileVerifyUtils::VerifyProfile(Pkcs7Context& pkcs7Context)
|
||||
pkcs7Context.matchResult = trustedSourceManager.IsTrustedSource(certSubject, certIssuer, PROFILE_BLOB,
|
||||
pkcs7Context.certChains[0].size());
|
||||
if (pkcs7Context.matchResult.matchState == DO_NOT_MATCH) {
|
||||
HAPVERIFY_LOG_ERROR("profile signature is not trusted source, subject: %{public}s, issuer: %{public}s",
|
||||
HAPVERIFY_LOG_ERROR("profile signature is not trusted source, subject: %{private}s, issuer: %{public}s",
|
||||
certSubject.c_str(), certIssuer.c_str());
|
||||
return false;
|
||||
}
|
||||
HAPVERIFY_LOG_DEBUG("profile subject: %{public}s, issuer: %{public}s",
|
||||
HAPVERIFY_LOG_DEBUG("profile subject: %{private}s, issuer: %{public}s",
|
||||
certSubject.c_str(), certIssuer.c_str());
|
||||
return true;
|
||||
}
|
||||
|
@ -151,7 +151,7 @@ bool HapVerifyV2::VerifyAppSourceAndParseProfile(Pkcs7Context& pkcs7Context,
|
||||
HAPVERIFY_LOG_ERROR("Get info of sign cert failed");
|
||||
return false;
|
||||
}
|
||||
HAPVERIFY_LOG_DEBUG("App signature subject: %{public}s, issuer: %{public}s",
|
||||
HAPVERIFY_LOG_DEBUG("App signature subject: %{private}s, issuer: %{public}s",
|
||||
certSubject.c_str(), pkcs7Context.certIssuer.c_str());
|
||||
|
||||
TrustedSourceManager& trustedSourceManager = TrustedSourceManager::GetInstance();
|
||||
@ -262,7 +262,7 @@ bool HapVerifyV2::GenerateFingerprint(ProvisionInfo& provisionInfo)
|
||||
return false;
|
||||
}
|
||||
provisionInfo.fingerprint = fingerprint;
|
||||
HAPVERIFY_LOG_DEBUG("fingerprint is : %{public}s", fingerprint.c_str());
|
||||
HAPVERIFY_LOG_DEBUG("fingerprint is : %{private}s", fingerprint.c_str());
|
||||
return true;
|
||||
}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user