Remove workaround for non-zero shared_secret array

PSA_KEY_AGREEMENT_MAX_SHARED_SECRET_SIZE is always greater
than 1 so no need for the workaround on the original patch

Signed-off-by: Antonio de Angelis <antonio.deangelis@arm.com>
diff --git a/library/psa_crypto.c b/library/psa_crypto.c
index 3c21ae7..fade286 100644
--- a/library/psa_crypto.c
+++ b/library/psa_crypto.c
@@ -4948,13 +4948,8 @@
                                                size_t peer_key_length)
 {
     psa_status_t status;
-#if PSA_KEY_AGREEMENT_MAX_SHARED_SECRET_SIZE != 0
     uint8_t shared_secret[PSA_KEY_AGREEMENT_MAX_SHARED_SECRET_SIZE];
-    size_t shared_secret_length = sizeof(shared_secret);
-#else
-    uint8_t *shared_secret = NULL;
     size_t shared_secret_length = 0;
-#endif
     psa_algorithm_t ka_alg = PSA_ALG_KEY_AGREEMENT_GET_BASE(operation->alg);
 
     /* Step 1: run the secret agreement algorithm to generate the shared
@@ -4963,7 +4958,7 @@
                                             private_key,
                                             peer_key, peer_key_length,
                                             shared_secret,
-                                            shared_secret_length,
+                                            sizeof(shared_secret),
                                             &shared_secret_length);
     if (status != PSA_SUCCESS) {
         goto exit;