diff --git a/interfaces/innerkits/appverify/src/init/trusted_ticket_manager.cpp b/interfaces/innerkits/appverify/src/init/trusted_ticket_manager.cpp index 3299faa655b19a0d42182c36216786628cb2291e..0537414adc212fd098f8995d64f7c9bd68f7dd20 100644 --- a/interfaces/innerkits/appverify/src/init/trusted_ticket_manager.cpp +++ b/interfaces/innerkits/appverify/src/init/trusted_ticket_manager.cpp @@ -137,7 +137,7 @@ bool TrustedTicketManager::ParseTrustedTicketSourceJson(TicketSourceInfoVec& tru HAPVERIFY_LOG_ERROR("Get critialcalCertExtension Failed"); return false; } - HAPVERIFY_LOG_INFO("trusted ticket source: %{public}s", + HAPVERIFY_LOG_INFO("trusted ticket source: %{private}s", EncapTrustedTicketSourceString(hapTicketSource).c_str()); trustedTicketSources.push_back(hapTicketSource); } diff --git a/interfaces/innerkits/appverify/src/ticket/ticket_verify.cpp b/interfaces/innerkits/appverify/src/ticket/ticket_verify.cpp index b5ad6be4dcb04ddecba4fbe69f4577af89dd2ec9..f079b1dd44db57aabdb3000906b625a7480e6f98 100644 --- a/interfaces/innerkits/appverify/src/ticket/ticket_verify.cpp +++ b/interfaces/innerkits/appverify/src/ticket/ticket_verify.cpp @@ -187,11 +187,11 @@ bool VerifyTicketSignature(HapByteBuffer& ticketBlock, Pkcs7Context& pkcs7Contex pkcs7Context.matchResult = trustedTicketSourceManager.IsTrustedSource(certSubject, pkcs7Context.certIssuer, pkcs7Context.certChains[0].size()); if (pkcs7Context.matchResult.matchState == DO_NOT_MATCH) { - HAPVERIFY_LOG_ERROR("Ticket signature is not trusted source, subject: %{public}s, issuer: %{public}s", + HAPVERIFY_LOG_ERROR("Ticket signature is not trusted source, subject: %{private}s, issuer: %{public}s", certSubject.c_str(), pkcs7Context.certIssuer.c_str()); return false; } - HAPVERIFY_LOG_INFO("Ticket subject: %{public}s, issuer: %{public}s", + HAPVERIFY_LOG_INFO("Ticket subject: %{private}s, issuer: %{public}s", certSubject.c_str(), pkcs7Context.certIssuer.c_str()); return true; } diff --git a/interfaces/innerkits/appverify/src/util/hap_cert_verify_openssl_utils.cpp b/interfaces/innerkits/appverify/src/util/hap_cert_verify_openssl_utils.cpp index 00669347704184671872026d3effcfedee656d70..3973a4c2228d7a7e01890d6602fecd47d8dfb011 100644 --- a/interfaces/innerkits/appverify/src/util/hap_cert_verify_openssl_utils.cpp +++ b/interfaces/innerkits/appverify/src/util/hap_cert_verify_openssl_utils.cpp @@ -133,7 +133,7 @@ bool HapCertVerifyOpensslUtils::GetFingerprintBase64FromPemCert(const std::strin fingerprint += buff; } X509_free(cert); - HAPVERIFY_LOG_DEBUG("GetFingerprintBase64FromPemCert end %{public}s", fingerprint.c_str()); + HAPVERIFY_LOG_DEBUG("GetFingerprintBase64FromPemCert end %{private}s", fingerprint.c_str()); return true; } diff --git a/interfaces/innerkits/appverify/src/util/hap_profile_verify_utils.cpp b/interfaces/innerkits/appverify/src/util/hap_profile_verify_utils.cpp index a1f8ca33c983c827c9031a1ceee0af887c0f7fe8..9b641242b883dd61f5da92c17b0c8f4352e9575d 100644 --- a/interfaces/innerkits/appverify/src/util/hap_profile_verify_utils.cpp +++ b/interfaces/innerkits/appverify/src/util/hap_profile_verify_utils.cpp @@ -69,11 +69,11 @@ bool HapProfileVerifyUtils::VerifyProfile(Pkcs7Context& pkcs7Context) pkcs7Context.matchResult = trustedSourceManager.IsTrustedSource(certSubject, certIssuer, PROFILE_BLOB, pkcs7Context.certChains[0].size()); if (pkcs7Context.matchResult.matchState == DO_NOT_MATCH) { - HAPVERIFY_LOG_ERROR("profile signature is not trusted source, subject: %{public}s, issuer: %{public}s", + HAPVERIFY_LOG_ERROR("profile signature is not trusted source, subject: %{private}s, issuer: %{public}s", certSubject.c_str(), certIssuer.c_str()); return false; } - HAPVERIFY_LOG_DEBUG("profile subject: %{public}s, issuer: %{public}s", + HAPVERIFY_LOG_DEBUG("profile subject: %{private}s, issuer: %{public}s", certSubject.c_str(), certIssuer.c_str()); return true; } diff --git a/interfaces/innerkits/appverify/src/verify/hap_verify_v2.cpp b/interfaces/innerkits/appverify/src/verify/hap_verify_v2.cpp index e0bcaa506ee0ccad0485e98db7ed384ab1aad376..829f35b497adbed3e25296777c28dc86b3b6cbaa 100644 --- a/interfaces/innerkits/appverify/src/verify/hap_verify_v2.cpp +++ b/interfaces/innerkits/appverify/src/verify/hap_verify_v2.cpp @@ -151,7 +151,7 @@ bool HapVerifyV2::VerifyAppSourceAndParseProfile(Pkcs7Context& pkcs7Context, HAPVERIFY_LOG_ERROR("Get info of sign cert failed"); return false; } - HAPVERIFY_LOG_DEBUG("App signature subject: %{public}s, issuer: %{public}s", + HAPVERIFY_LOG_DEBUG("App signature subject: %{private}s, issuer: %{public}s", certSubject.c_str(), pkcs7Context.certIssuer.c_str()); TrustedSourceManager& trustedSourceManager = TrustedSourceManager::GetInstance(); @@ -262,7 +262,7 @@ bool HapVerifyV2::GenerateFingerprint(ProvisionInfo& provisionInfo) return false; } provisionInfo.fingerprint = fingerprint; - HAPVERIFY_LOG_DEBUG("fingerprint is : %{public}s", fingerprint.c_str()); + HAPVERIFY_LOG_DEBUG("fingerprint is : %{private}s", fingerprint.c_str()); return true; }