Use PSA error code

Signed-off-by: Gabor Mezei <gabor.mezei@arm.com>
diff --git a/library/ssl_tls13_invasive.h b/library/ssl_tls13_invasive.h
index 5a9d536..1008b2d 100644
--- a/library/ssl_tls13_invasive.h
+++ b/library/ssl_tls13_invasive.h
@@ -46,7 +46,7 @@
  *                         pseudorandom key in \p prk.
  *
  *  \return 0 on success.
- *  \return #MBEDTLS_ERR_HKDF_BAD_INPUT_DATA when the parameters are invalid.
+ *  \return #PSA_ERROR_INVALID_ARGUMENT when the parameters are invalid.
  *  \return An PSA_ERROR_* error for errors returned from the underlying
  *          PSA layer.
  */
diff --git a/library/ssl_tls13_keys.c b/library/ssl_tls13_keys.c
index 429d124..aee2a85 100644
--- a/library/ssl_tls13_keys.c
+++ b/library/ssl_tls13_keys.c
@@ -148,7 +148,7 @@
     unsigned char null_salt[PSA_MAC_MAX_SIZE] = { '\0' };
     mbedtls_svc_key_id_t key = MBEDTLS_SVC_KEY_ID_INIT;
     psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
-    psa_status_t ret = MBEDTLS_ERR_SSL_INTERNAL_ERROR;
+    psa_status_t ret = PSA_ERROR_CORRUPTION_DETECTED;
 
     if( salt == NULL || salt_len == 0 )
     {
@@ -156,14 +156,14 @@
 
         if( salt_len != 0 )
         {
-            return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA );
+            return( PSA_ERROR_INVALID_ARGUMENT );
         }
 
         hash_len = PSA_HASH_LENGTH( alg );
 
         if( hash_len == 0 )
         {
-            return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA );
+            return( PSA_ERROR_INVALID_ARGUMENT );
         }
 
         salt = null_salt;