PKCS11: Parametrize buffers

Change magic numbers to more descriptive names
diff --git a/library/pkcs11_client.c b/library/pkcs11_client.c
index 833ae72..1e662f8 100644
--- a/library/pkcs11_client.c
+++ b/library/pkcs11_client.c
@@ -368,7 +368,7 @@
     case CKK_ECDSA:
         can_do = MBEDTLS_PK_ECKEY;
         {
-            unsigned char ecParams[16];
+            unsigned char ecParams[MBEDTLS_OID_EC_GRP_MAX_SIZE];
             mbedtls_asn1_buf params_asn1;
             mbedtls_ecp_group_id grp_id;
             const mbedtls_ecp_curve_info *curve_info;
diff --git a/tests/suites/test_suite_pkcs11_client.function b/tests/suites/test_suite_pkcs11_client.function
index 87d1a61..16ad240 100644
--- a/tests/suites/test_suite_pkcs11_client.function
+++ b/tests/suites/test_suite_pkcs11_client.function
@@ -110,8 +110,7 @@
         {CKA_DECRYPT, &ck_true, sizeof( ck_true )},
         {CKA_SIGN, &ck_true, sizeof( ck_true )},
     };
-    CK_ULONG ck_rsa_key_size = RSA_KEY_SIZE_BITS;
-    unsigned char ecParams[16];
+    unsigned char ecParams[MBEDTLS_OID_EC_GRP_MAX_SIZE];
     size_t ecParams_length;
 
     switch( key_type )
@@ -201,8 +200,8 @@
 #if defined(MBEDTLS_ECDSA_C)
     case MBEDTLS_PK_ECDSA:
         {
-            unsigned char ecParams[16];
-            unsigned char ecPoint[128];
+            unsigned char ecParams[MBEDTLS_OID_EC_GRP_MAX_SIZE];
+            unsigned char ecPoint[MBEDTLS_ECP_MAX_PT_LEN];
             CK_ATTRIBUTE public_attributes[] = {
                 {CKA_EC_PARAMS, ecParams, sizeof( ecParams )},
                 {CKA_EC_POINT, ecPoint, sizeof( ecPoint )},
@@ -246,7 +245,7 @@
         break;
     }
 
-    /* Sign with the token and verify in software */
+    /* Sign with cryptoki and verify with mbed TLS */
     TEST_ASSERT( mbedtls_pk_sign( &pkcs11_ctx, MBEDTLS_MD_SHA256,
                                   hash_value, 32,
                                   sig_buffer, &sig_length,
@@ -276,7 +275,7 @@
     CK_OBJECT_HANDLE hPublicKey = CK_INVALID_HANDLE;
     CK_OBJECT_HANDLE hPrivateKey = CK_INVALID_HANDLE;
     unsigned char hash_value[32] = "Fake hash, it doesn't matter....";
-    unsigned char sig_buffer[4096];
+    unsigned char sig_buffer[MBEDTLS_MPI_MAX_SIZE];
     size_t sig_length = sizeof( sig_buffer );
 
     mbedtls_pk_init( &pkcs11_ctx );
@@ -336,7 +335,7 @@
     CK_OBJECT_HANDLE hPublicKey = CK_INVALID_HANDLE;
     CK_OBJECT_HANDLE hPrivateKey = CK_INVALID_HANDLE;
     unsigned char hash_value[32] = "Fake hash, it doesn't matter....";
-    unsigned char sig_buffer[4096];
+    unsigned char sig_buffer[MBEDTLS_MPI_MAX_SIZE];
     size_t sig_length = sizeof( sig_buffer );
 
     mbedtls_pk_init( &pkcs11_ctx );
@@ -395,7 +394,7 @@
     CK_OBJECT_HANDLE hPublicKey = CK_INVALID_HANDLE;
     CK_OBJECT_HANDLE hPrivateKey = CK_INVALID_HANDLE;
     unsigned char hash_value[32] = "Fake hash, it doesn't matter....";
-    unsigned char sig_buffer[4096];
+    unsigned char sig_buffer[MBEDTLS_MPI_MAX_SIZE];
     size_t sig_length = sizeof( sig_buffer );
 
     mbedtls_pk_init( &pkcs11_ctx );