Improve return code

CORRUPTION_DETECTED should be reserved for cases that are impossible,
short of physical corruption during execution or a major bug in the
code. We shouldn't use this for the kind of mistakes that can happen
during configuration or integration, such as calling a driver on a key
type that it doesn't support.

Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
diff --git a/3rdparty/p256-m/p256-m_driver_entrypoints.c b/3rdparty/p256-m/p256-m_driver_entrypoints.c
index 0ca5583..b75c06c 100644
--- a/3rdparty/p256-m/p256-m_driver_entrypoints.c
+++ b/3rdparty/p256-m/p256-m_driver_entrypoints.c
@@ -130,7 +130,7 @@
 
     /* Validate sizes, as p256-m expects fixed-size buffers */
     if (key_buffer_size != PRIVKEY_SIZE) {
-        return PSA_ERROR_CORRUPTION_DETECTED;
+        return PSA_ERROR_INVALID_ARGUMENT;
     }
     if (data_size < PSA_PUBKEY_SIZE) {
         return PSA_ERROR_BUFFER_TOO_SMALL;
@@ -231,7 +231,7 @@
 
     /* Validate sizes, as p256-m expects fixed-size buffers */
     if (key_buffer_size != PRIVKEY_SIZE) {
-        return PSA_ERROR_CORRUPTION_DETECTED;
+        return PSA_ERROR_INVALID_ARGUMENT;
     }
     if (signature_size < SIGNATURE_SIZE) {
         return PSA_ERROR_BUFFER_TOO_SMALL;
@@ -257,7 +257,7 @@
 {
     /* Validate sizes, as p256-m expects fixed-size buffers */
     if (key_buffer_size != PSA_PUBKEY_SIZE || *key_buffer != PSA_PUBKEY_HEADER_BYTE) {
-        return PSA_ERROR_CORRUPTION_DETECTED;
+        return PSA_ERROR_INVALID_ARGUMENT;
     }
     if (signature_length != SIGNATURE_SIZE) {
         return PSA_ERROR_INVALID_SIGNATURE;