diff --git a/subsys/suit/platform/sdfw/src/suit_plat_authenticate.c b/subsys/suit/platform/sdfw/src/suit_plat_authenticate.c index 70746e4c0bf7..5dd111ca40be 100644 --- a/subsys/suit/platform/sdfw/src/suit_plat_authenticate.c +++ b/subsys/suit/platform/sdfw/src/suit_plat_authenticate.c @@ -72,8 +72,6 @@ int suit_plat_authenticate_manifest(struct zcbor_string *manifest_component_id, return SUIT_ERR_UNSUPPORTED_PARAMETER; } - LOG_WRN("Decoded key ID: %08x", public_key_id); - /* Validate KEY ID */ ret = suit_mci_signing_key_id_validate(class_id, public_key_id); if (ret != SUIT_PLAT_SUCCESS) { diff --git a/subsys/suit/storage/src/suit_storage_mpi.c b/subsys/suit/storage/src/suit_storage_mpi.c index 5c2b4a4ffbfa..427659b415f2 100644 --- a/subsys/suit/storage/src/suit_storage_mpi.c +++ b/subsys/suit/storage/src/suit_storage_mpi.c @@ -59,8 +59,6 @@ suit_plat_err_t suit_storage_mpi_configuration_load(suit_manifest_role_t role, c const suit_manifest_class_id_t *new_class_id = NULL; suit_storage_mpi_t *mpi = (suit_storage_mpi_t *)addr; - LOG_INF("Suit manifest role: %02x", role); - if ((role == SUIT_MANIFEST_UNKNOWN) || (addr == NULL) || (size == 0)) { return SUIT_PLAT_ERR_INVAL; } @@ -115,10 +113,7 @@ suit_plat_err_t suit_storage_mpi_configuration_load(suit_manifest_role_t role, c /* Validate downgrade prevention policy value. */ switch (mpi->downgrade_prevention_policy) { case SUIT_MPI_DOWNGRADE_PREVENTION_DISABLED: - LOG_INF("Downgrade prevention policy disabled"); - break; case SUIT_MPI_DOWNGRADE_PREVENTION_ENABLED: - LOG_INF("Downgrade prevention policy enabled"); break; default: LOG_ERR("Invalid downgrade prevention policy value for role 0x%x%s: %d", role, @@ -146,13 +141,8 @@ suit_plat_err_t suit_storage_mpi_configuration_load(suit_manifest_role_t role, c /* Validate signature verification policy value. */ switch (mpi->signature_verification_policy) { case SUIT_MPI_SIGNATURE_CHECK_DISABLED: - LOG_INF("Signature check disabled"); - break; case SUIT_MPI_SIGNATURE_CHECK_ENABLED_ON_UPDATE: - LOG_INF("Signature check enabled on update"); - break; case SUIT_MPI_SIGNATURE_CHECK_ENABLED_ON_UPDATE_AND_BOOT: - LOG_INF("Signature check enabled on update and boot"); break; default: LOG_ERR("Invalid signature verification policy value for role 0x%x%s: %d", role,