diff --git a/CMakeLists.txt b/CMakeLists.txt
index bcaaefd9ff1ab656731af2b61957dcc045782950..c4fcc8f9a428891e832b939520fd8c53ba61b4e6 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -2,7 +2,7 @@ project(cellframe-sdk C)
 cmake_minimum_required(VERSION 2.8)
 
 set(CMAKE_C_STANDARD 11)
-set(CELLFRAME_SDK_NATIVE_VERSION "2.4-3")
+set(CELLFRAME_SDK_NATIVE_VERSION "2.5-0")
 add_definitions ("-DCELLFRAME_SDK_VERSION=\"${CELLFRAME_SDK_NATIVE_VERSION}\"")
 
 set(DAPSDK_MODULES "")
diff --git a/dap-sdk/crypto/src/dap_cert.c b/dap-sdk/crypto/src/dap_cert.c
index 2916d19b6707d73da4597d8231f928bc3d99400e..b9bc42688635fe060bd631c36eb9c7d60f9a03d0 100755
--- a/dap-sdk/crypto/src/dap_cert.c
+++ b/dap-sdk/crypto/src/dap_cert.c
@@ -207,11 +207,11 @@ dap_cert_t * dap_cert_generate_mem_with_seed(const char * a_cert_name, dap_enc_k
     if ( l_enc_key ){
         dap_cert_t * l_cert = dap_cert_new(a_cert_name);
         l_cert->enc_key = l_enc_key;
-        log_it(L_DEBUG,"Certificate generated");
+        //log_it(L_DEBUG,"Certificate generated");
         //dap_cert_item_t * l_cert_item = DAP_NEW_Z(dap_cert_item_t);
         //snprintf(l_cert_item->name,sizeof(l_cert_item->name),"%s",a_cert_name);
         //HASH_ADD_STR(s_certs,name,l_cert_item);
-        log_it(L_DEBUG,"Certificate name %s recorded", a_cert_name);
+        //log_it(L_DEBUG,"Certificate name %s recorded", a_cert_name);
         return l_cert;
     } else {
         log_it(L_ERROR,"Can't generate key in memory!");
diff --git a/dap-sdk/crypto/src/dap_cert_file.c b/dap-sdk/crypto/src/dap_cert_file.c
index cad1955c2d228d65d6a7e3399cfe6f212950b8d5..7a733e50b6550763a24c1940f5c96fdba8b97c7e 100755
--- a/dap-sdk/crypto/src/dap_cert_file.c
+++ b/dap-sdk/crypto/src/dap_cert_file.c
@@ -238,15 +238,15 @@ uint8_t* dap_cert_mem_save(dap_cert_t * a_cert, uint32_t *a_cert_size_out)
     l_hdr.type = dap_cert_FILE_TYPE_PUBLIC;
     if ( l_priv_key_data ){
         l_hdr.type =  dap_cert_FILE_TYPE_PRIVATE;
-        log_it(L_DEBUG,"Private key size %u",l_priv_key_data_size);
+        //log_it(L_DEBUG,"Private key size %u",l_priv_key_data_size);
     }
     if (l_pub_key_data){
-        log_it(L_DEBUG,"Public key size %u",l_pub_key_data_size);
+        //log_it(L_DEBUG,"Public key size %u",l_pub_key_data_size);
     }else{
         log_it(L_ERROR,"No public or private key in certificate, nothing to save");
         goto lb_exit;
     }
-    log_it(L_DEBUG,"Key private data size %u",l_key->_inheritor_size);
+    //log_it(L_DEBUG,"Key private data size %u",l_key->_inheritor_size);
 
     l_hdr.version = dap_cert_FILE_VERSION;
     l_hdr.data_size = l_pub_key_data_size;
@@ -290,7 +290,7 @@ lb_exit:
         DAP_DELETE(l_metadata);
     }
 
-    log_it(L_NOTICE,"Certificate \"%s\" successfully serialized",a_cert->name);
+    //log_it(L_NOTICE,"Certificate \"%s\" successfully serialized",a_cert->name);
 
     if(a_cert_size_out)
         *a_cert_size_out = l_data_offset;
@@ -378,7 +378,7 @@ dap_cert_t* dap_cert_mem_load(const void * a_data, size_t a_data_size)
             l_data_offset += l_hdr.metadata_size;
         }
         dap_enc_key_update(l_ret->enc_key);
-        log_it(L_NOTICE,"Successfully loaded certificate %s", l_ret->name);
+        //log_it(L_NOTICE,"Successfully loaded certificate %s", l_ret->name);
     }else
         log_it(L_ERROR,"Unrecognizable certificate version, corrupted file or you have too old software");