diff --git a/services/package/pkg_verify/pkg_verify_util.cpp b/services/package/pkg_verify/pkg_verify_util.cpp index 4725e1af4eeb3aacd0479e879967876e43273943..4b99d744f9428427c9e21fb9a52f981c0936b8cd 100644 --- a/services/package/pkg_verify/pkg_verify_util.cpp +++ b/services/package/pkg_verify/pkg_verify_util.cpp @@ -32,7 +32,6 @@ namespace { constexpr uint32_t ZIP_EOCD_FIXED_PART_LEN = 22; constexpr uint32_t PKG_FOOTER_SIZE = 6; constexpr uint32_t PKG_HASH_CONTENT_LEN = SHA256_DIGEST_LENGTH; -constexpr uint32_t INTERCEPT_HASH_LENGTH = 8; } int32_t PkgVerifyUtil::VerifySourceDigest(std::vector &signature, std::vector &sourceDigest, @@ -229,9 +228,7 @@ int32_t PkgVerifyUtil::HashCheck(const PkgStreamPtr srcData, const size_t dataLe if (memcmp(hash.data(), sourceDigest.data(), digestLen) != EOK) { PKG_LOGW("Failed to memcmp data."); - UPDATER_LAST_WORD(PKG_INVALID_DIGEST, - ConvertShaHex(hash).substr(0, INTERCEPT_HASH_LENGTH), - ConvertShaHex(sourceDigest).substr(0, INTERCEPT_HASH_LENGTH), fileInfo); + UPDATER_LAST_WORD(PKG_INVALID_DIGEST, hash.data(), sourceDigest.data(), fileInfo); return PKG_INVALID_DIGEST; }