diff options
author | Satish Kumar <satish.kumar01@arm.com> | 2021-08-24 09:30:51 +0100 |
---|---|---|
committer | David Hu <david.hu@arm.com> | 2021-08-31 03:51:35 +0200 |
commit | 5a5714967a42a24a864d87033d632a8349b4f180 (patch) | |
tree | 60487becdc95135f9c1aa03b1a4f7fb1583af3d5 /platform | |
parent | 00c1106624d733aade448659258bfd1088575b76 (diff) | |
download | trusted-firmware-m-5a5714967a42a24a864d87033d632a8349b4f180.tar.gz |
platform/diphda: use the latest tfm_rpc_psa* api declarations
The new tfm_rpc_psa* api declarations have removed the use of
caller type flag (secure or non-secure). This commit adapts to
the change and solves the issue of build failure.
Change-Id: I9dec58e357096dddec16209479387e4ee7aa57d4
Signed-off-by: Satish Kumar <satish.kumar01@arm.com>
Diffstat (limited to 'platform')
-rw-r--r-- | platform/ext/target/arm/diphda/openamp/tfm_spe_dual_core_psa_client_secure_lib.c | 10 |
1 files changed, 4 insertions, 6 deletions
diff --git a/platform/ext/target/arm/diphda/openamp/tfm_spe_dual_core_psa_client_secure_lib.c b/platform/ext/target/arm/diphda/openamp/tfm_spe_dual_core_psa_client_secure_lib.c index 398f9981d2..5b6f950605 100644 --- a/platform/ext/target/arm/diphda/openamp/tfm_spe_dual_core_psa_client_secure_lib.c +++ b/platform/ext/target/arm/diphda/openamp/tfm_spe_dual_core_psa_client_secure_lib.c @@ -23,8 +23,6 @@ typedef struct output_buffer_with_payload { uint8_t payload[]; /* outdata follows */ } output_buffer_with_payload_t; -#define NS_CALLER_FLAG (true) - static void prepare_and_send_output_msg(int32_t reply, int32_t request_id) { s_openamp_msg_t msg; @@ -256,13 +254,13 @@ void deliver_msg_to_tfm_spe(void *private) break; case OPENAMP_PSA_VERSION: spm_params.sid = s_map_entry->msg.params.psa_version_params.sid; - psa_ret = tfm_rpc_psa_version(&spm_params, NS_CALLER_FLAG); + psa_ret = tfm_rpc_psa_version(&spm_params); send_service_reply_to_non_secure(psa_ret, s_map_entry); break; case OPENAMP_PSA_CONNECT: spm_params.sid = s_map_entry->msg.params.psa_connect_params.sid; spm_params.version = s_map_entry->msg.params.psa_connect_params.version; - psa_ret = tfm_rpc_psa_connect(&spm_params, NS_CALLER_FLAG); + psa_ret = tfm_rpc_psa_connect(&spm_params); if (psa_ret != PSA_SUCCESS) { send_service_reply_to_non_secure(psa_ret, s_map_entry); } @@ -273,7 +271,7 @@ void deliver_msg_to_tfm_spe(void *private) send_service_reply_to_non_secure(psa_ret, s_map_entry); break; } - psa_ret = tfm_rpc_psa_call(&spm_params, NS_CALLER_FLAG); + psa_ret = tfm_rpc_psa_call(&spm_params); if (psa_ret != PSA_SUCCESS) { send_service_reply_to_non_secure(psa_ret, s_map_entry); break; @@ -281,7 +279,7 @@ void deliver_msg_to_tfm_spe(void *private) break; case OPENAMP_PSA_CLOSE: spm_params.handle = s_map_entry->msg.params.psa_close_params.handle; - tfm_rpc_psa_close(&spm_params, NS_CALLER_FLAG); + tfm_rpc_psa_close(&spm_params); break; default: LOG_MSG("msg type did not recognized\r\n"); |