Fix psa_raw_key_agreement status code
The raw_key_agreement operation is using the wrong status code when the
provided buffer is too small, which makes PSA API test 243 fail. Fix
this issue.
Signed-off-by: Balint Dobszay <balint.dobszay@arm.com>
Change-Id: I8d823dd6da2f4d699fc8f1f96e0e4f8e9d854dd2
diff --git a/components/service/crypto/client/caller/packed-c/crypto_caller_key_derivation.h b/components/service/crypto/client/caller/packed-c/crypto_caller_key_derivation.h
index 496f07e..763e2af 100644
--- a/components/service/crypto/client/caller/packed-c/crypto_caller_key_derivation.h
+++ b/components/service/crypto/client/caller/packed-c/crypto_caller_key_derivation.h
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 2021, Arm Limited and Contributors. All rights reserved.
+ * Copyright (c) 2021-2022, Arm Limited and Contributors. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
@@ -524,7 +524,7 @@
}
else {
/* Insufficient buffer space */
- psa_status = PSA_ERROR_INVALID_ARGUMENT;
+ psa_status = PSA_ERROR_BUFFER_TOO_SMALL;
}
}
else {