a missing conflit
Change-Id: I3afa8ca3a9d08d6483dafe55109f69de3ba9e86b
diff --git a/src/ca-module.cpp b/src/ca-module.cpp
index 2a9b5d7..c9a52c7 100644
--- a/src/ca-module.cpp
+++ b/src/ca-module.cpp
@@ -303,17 +303,11 @@
}
// verify the self-signed certificate, the request, and the token
-<<<<<<< HEAD
if (!m_config.m_caPrefix.isPrefixOf(clientCert->getName()) // under ca prefix
|| !security::v2::Certificate::isValidName(clientCert->getName()) // is valid cert name
|| clientCert->getName().size() < m_config.m_caPrefix.size() + IS_SUBNAME_MIN_OFFSET
|| clientCert->getName().size() >
m_config.m_caPrefix.size() + IS_SUBNAME_MIN_OFFSET - 1 + m_config.m_maxSuffixLength) {
-=======
- if (!m_config.m_caPrefix.isPrefixOf(clientCert->getName()) // under ca prefix
- || !security::v2::Certificate::isValidName(clientCert->getName()) // is valid cert name
- || clientCert->getName().size() < m_config.m_caPrefix.size() + IS_SUBNAME_MIN_OFFSET) {
->>>>>>> apply Error Data packet in challenge status
_LOG_ERROR("Invalid self-signed certificate name " << clientCert->getName());
return;
}
@@ -341,17 +335,11 @@
}
// verify the certificate
-<<<<<<< HEAD
if (!m_config.m_caPrefix.isPrefixOf(clientCert->getName()) // under ca prefix
|| !security::v2::Certificate::isValidName(clientCert->getName()) // is valid cert name
|| clientCert->getName().size() < m_config.m_caPrefix.size() + IS_SUBNAME_MIN_OFFSET
|| clientCert->getName().size() >
m_config.m_caPrefix.size() + IS_SUBNAME_MIN_OFFSET - 1 + m_config.m_maxSuffixLength) {
-=======
- if (!m_config.m_caPrefix.isPrefixOf(clientCert->getName()) // under ca prefix
- || !security::v2::Certificate::isValidName(clientCert->getName()) // is valid cert name
- || clientCert->getName().size() < m_config.m_caPrefix.size() + IS_SUBNAME_MIN_OFFSET) {
->>>>>>> apply Error Data packet in challenge status
_LOG_ERROR("Invalid certificate name " << clientCert->getName());
return;
}