forget to save
Change-Id: I573dee29c59c6a6a373969f1b1aa72581ce8015f
diff --git a/src/ca-module.cpp b/src/ca-module.cpp
index 86e705f..2f2ba91 100644
--- a/src/ca-module.cpp
+++ b/src/ca-module.cpp
@@ -235,7 +235,6 @@
(uint8_t*)&saltInt, sizeof(saltInt), aesKey, sizeof(aesKey));
// verify identity name
-<<<<<<< HEAD
if (!m_config.m_caItem.m_caPrefix.isPrefixOf(clientCert->getIdentity())
|| !security::Certificate::isValidName(clientCert->getName())
|| clientCert->getIdentity().size() <= m_config.m_caItem.m_caPrefix.size()) {
@@ -243,13 +242,6 @@
m_face.put(generateErrorDataPacket(request.getName(), ErrorCode::NAME_NOT_ALLOWED,
"An invalid certificate name is being requested."));
return;
-=======
- if (!m_config.m_caItem.m_caPrefix.isPrefixOf(clientCert->getIdentity()) || !security::v2::Certificate::isValidName(clientCert->getName()) || clientCert->getIdentity().size() <= m_config.m_caItem.m_caPrefix.size()) {
- _LOG_ERROR("An invalid certificate name is being requested " << clientCert->getName());
- m_face.put(generateErrorDataPacket(request.getName(), ErrorCode::NAME_NOT_ALLOWED,
- "An invalid certificate name is being requested."));
- return;
->>>>>>> fix test errors
}
if (m_config.m_caItem.m_maxSuffixLength) {
if (clientCert->getIdentity().size() > m_config.m_caItem.m_caPrefix.size() + *m_config.m_caItem.m_maxSuffixLength) {