if (def->os.firmwareFeatures) {
reqSecureBoot = def->os.firmwareFeatures[VIR_DOMAIN_OS_DEF_FIRMWARE_FEATURE_SECURE_BOOT];
- if (reqSecureBoot != VIR_TRISTATE_BOOL_ABSENT) {
- if (reqSecureBoot == VIR_TRISTATE_BOOL_YES && !supportsSecureBoot) {
- VIR_DEBUG("User requested Secure Boot, firmware '%s' doesn't support it",
- path);
- return false;
- }
-
- if (reqSecureBoot == VIR_TRISTATE_BOOL_NO && supportsSecureBoot) {
- VIR_DEBUG("User refused Secure Boot, firmware '%s' supports it", path);
- return false;
- }
+ if (reqSecureBoot == VIR_TRISTATE_BOOL_YES && !supportsSecureBoot) {
+ VIR_DEBUG("User requested Secure Boot, firmware '%s' doesn't support it",
+ path);
+ return false;
+ }
+ if (reqSecureBoot == VIR_TRISTATE_BOOL_NO && supportsSecureBoot) {
+ VIR_DEBUG("User refused Secure Boot, firmware '%s' supports it", path);
+ return false;
}
reqEnrolledKeys = def->os.firmwareFeatures[VIR_DOMAIN_OS_DEF_FIRMWARE_FEATURE_ENROLLED_KEYS];
- if (reqEnrolledKeys != VIR_TRISTATE_BOOL_ABSENT) {
- if (reqEnrolledKeys == VIR_TRISTATE_BOOL_YES && !hasEnrolledKeys) {
- VIR_DEBUG("User requested Enrolled keys, firmware '%s' doesn't have them",
- path);
- return false;
- }
-
- if (reqEnrolledKeys == VIR_TRISTATE_BOOL_NO && hasEnrolledKeys) {
- VIR_DEBUG("User refused Enrolled keys, firmware '%s' has them", path);
- return false;
- }
+ if (reqEnrolledKeys == VIR_TRISTATE_BOOL_YES && !hasEnrolledKeys) {
+ VIR_DEBUG("User requested Enrolled keys, firmware '%s' doesn't have them",
+ path);
+ return false;
+ }
+ if (reqEnrolledKeys == VIR_TRISTATE_BOOL_NO && hasEnrolledKeys) {
+ VIR_DEBUG("User refused Enrolled keys, firmware '%s' has them", path);
+ return false;
}
}