Remove workaround for non-zero shared_secret array
PSA_KEY_AGREEMENT_MAX_SHARED_SECRET_SIZE is always greater
than 1 so no need for the workaround on the original patch
Signed-off-by: Antonio de Angelis <antonio.deangelis@arm.com>
diff --git a/library/psa_crypto.c b/library/psa_crypto.c
index 3c21ae7..fade286 100644
--- a/library/psa_crypto.c
+++ b/library/psa_crypto.c
@@ -4948,13 +4948,8 @@
size_t peer_key_length)
{
psa_status_t status;
-#if PSA_KEY_AGREEMENT_MAX_SHARED_SECRET_SIZE != 0
uint8_t shared_secret[PSA_KEY_AGREEMENT_MAX_SHARED_SECRET_SIZE];
- size_t shared_secret_length = sizeof(shared_secret);
-#else
- uint8_t *shared_secret = NULL;
size_t shared_secret_length = 0;
-#endif
psa_algorithm_t ka_alg = PSA_ALG_KEY_AGREEMENT_GET_BASE(operation->alg);
/* Step 1: run the secret agreement algorithm to generate the shared
@@ -4963,7 +4958,7 @@
private_key,
peer_key, peer_key_length,
shared_secret,
- shared_secret_length,
+ sizeof(shared_secret),
&shared_secret_length);
if (status != PSA_SUCCESS) {
goto exit;