aboutsummaryrefslogtreecommitdiff
path: root/platform
diff options
context:
space:
mode:
authorSatish Kumar <satish.kumar01@arm.com>2021-08-24 09:30:51 +0100
committerDavid Hu <david.hu@arm.com>2021-08-31 03:51:35 +0200
commit5a5714967a42a24a864d87033d632a8349b4f180 (patch)
tree60487becdc95135f9c1aa03b1a4f7fb1583af3d5 /platform
parent00c1106624d733aade448659258bfd1088575b76 (diff)
downloadtrusted-firmware-m-5a5714967a42a24a864d87033d632a8349b4f180.tar.gz
platform/diphda: use the latest tfm_rpc_psa* api declarations
The new tfm_rpc_psa* api declarations have removed the use of caller type flag (secure or non-secure). This commit adapts to the change and solves the issue of build failure. Change-Id: I9dec58e357096dddec16209479387e4ee7aa57d4 Signed-off-by: Satish Kumar <satish.kumar01@arm.com>
Diffstat (limited to 'platform')
-rw-r--r--platform/ext/target/arm/diphda/openamp/tfm_spe_dual_core_psa_client_secure_lib.c10
1 files changed, 4 insertions, 6 deletions
diff --git a/platform/ext/target/arm/diphda/openamp/tfm_spe_dual_core_psa_client_secure_lib.c b/platform/ext/target/arm/diphda/openamp/tfm_spe_dual_core_psa_client_secure_lib.c
index 398f9981d2..5b6f950605 100644
--- a/platform/ext/target/arm/diphda/openamp/tfm_spe_dual_core_psa_client_secure_lib.c
+++ b/platform/ext/target/arm/diphda/openamp/tfm_spe_dual_core_psa_client_secure_lib.c
@@ -23,8 +23,6 @@ typedef struct output_buffer_with_payload {
uint8_t payload[]; /* outdata follows */
} output_buffer_with_payload_t;
-#define NS_CALLER_FLAG (true)
-
static void prepare_and_send_output_msg(int32_t reply, int32_t request_id)
{
s_openamp_msg_t msg;
@@ -256,13 +254,13 @@ void deliver_msg_to_tfm_spe(void *private)
break;
case OPENAMP_PSA_VERSION:
spm_params.sid = s_map_entry->msg.params.psa_version_params.sid;
- psa_ret = tfm_rpc_psa_version(&spm_params, NS_CALLER_FLAG);
+ psa_ret = tfm_rpc_psa_version(&spm_params);
send_service_reply_to_non_secure(psa_ret, s_map_entry);
break;
case OPENAMP_PSA_CONNECT:
spm_params.sid = s_map_entry->msg.params.psa_connect_params.sid;
spm_params.version = s_map_entry->msg.params.psa_connect_params.version;
- psa_ret = tfm_rpc_psa_connect(&spm_params, NS_CALLER_FLAG);
+ psa_ret = tfm_rpc_psa_connect(&spm_params);
if (psa_ret != PSA_SUCCESS) {
send_service_reply_to_non_secure(psa_ret, s_map_entry);
}
@@ -273,7 +271,7 @@ void deliver_msg_to_tfm_spe(void *private)
send_service_reply_to_non_secure(psa_ret, s_map_entry);
break;
}
- psa_ret = tfm_rpc_psa_call(&spm_params, NS_CALLER_FLAG);
+ psa_ret = tfm_rpc_psa_call(&spm_params);
if (psa_ret != PSA_SUCCESS) {
send_service_reply_to_non_secure(psa_ret, s_map_entry);
break;
@@ -281,7 +279,7 @@ void deliver_msg_to_tfm_spe(void *private)
break;
case OPENAMP_PSA_CLOSE:
spm_params.handle = s_map_entry->msg.params.psa_close_params.handle;
- tfm_rpc_psa_close(&spm_params, NS_CALLER_FLAG);
+ tfm_rpc_psa_close(&spm_params);
break;
default:
LOG_MSG("msg type did not recognized\r\n");