Fix psa_raw_key_agreement status code

The raw_key_agreement operation is using the wrong status code when the
provided buffer is too small, which makes PSA API test 243 fail. Fix
this issue.

Signed-off-by: Balint Dobszay <balint.dobszay@arm.com>
Change-Id: I8d823dd6da2f4d699fc8f1f96e0e4f8e9d854dd2
diff --git a/components/service/crypto/client/caller/packed-c/crypto_caller_key_derivation.h b/components/service/crypto/client/caller/packed-c/crypto_caller_key_derivation.h
index 496f07e..763e2af 100644
--- a/components/service/crypto/client/caller/packed-c/crypto_caller_key_derivation.h
+++ b/components/service/crypto/client/caller/packed-c/crypto_caller_key_derivation.h
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2021, Arm Limited and Contributors. All rights reserved.
+ * Copyright (c) 2021-2022, Arm Limited and Contributors. All rights reserved.
  *
  * SPDX-License-Identifier: BSD-3-Clause
  */
@@ -524,7 +524,7 @@
 					}
 					else {
 						/* Insufficient buffer space */
-						psa_status = PSA_ERROR_INVALID_ARGUMENT;
+						psa_status = PSA_ERROR_BUFFER_TOO_SMALL;
 					}
 				}
 				else {