diff --git a/appattest/verify_attestation.go b/appattest/verify_attestation.go index 88794cc..6fc1807 100644 --- a/appattest/verify_attestation.go +++ b/appattest/verify_attestation.go @@ -7,9 +7,7 @@ import ( "crypto/x509" "encoding/asn1" "encoding/hex" - "encoding/pem" "fmt" - "os" "reflect" "slices" "time" @@ -81,14 +79,6 @@ func VerifyAttestationPure(in *VerifyAttestationInputPure) (VerifyAttestationOut // get the leaf certificate (first in chain) leafCert := chain[0] - pblock := pem.Block{ - Type: "CERTIFICATE", - Bytes: leafCert.Raw, - } - if err := pem.Encode(os.Stdout, &pblock); err != nil { - panic(err) - } - fmt.Println() // > 2. Create clientDataHash as the SHA256 hash of the one-time challenge your server sends // > to your app before performing the attestation, diff --git a/appattest/verify_chain.go b/appattest/verify_chain.go index 0d3fd53..525bde4 100644 --- a/appattest/verify_chain.go +++ b/appattest/verify_chain.go @@ -42,7 +42,6 @@ func validateKeyUsage(cert *x509.Certificate, isCA bool) error { return fmt.Errorf("CA certificate missing Certificate Sign key usage") } } else { - fmt.Println(cert.KeyUsage) if cert.KeyUsage&x509.KeyUsageDigitalSignature == 0 { return fmt.Errorf("end entity certificate missing required key usage (Digital Signature)") }