Fix memory leak when importing an RSA key that is too large
diff --git a/library/psa_crypto.c b/library/psa_crypto.c
index 19db5a9..1d5337b 100644
--- a/library/psa_crypto.c
+++ b/library/psa_crypto.c
@@ -514,7 +514,10 @@
                     mbedtls_rsa_context *rsa = mbedtls_pk_rsa( pk );
                     size_t bits = mbedtls_rsa_get_bitlen( rsa );
                     if( bits > PSA_VENDOR_RSA_MAX_KEY_BITS )
-                        return( PSA_ERROR_NOT_SUPPORTED );
+                    {
+                        status = PSA_ERROR_NOT_SUPPORTED;
+                        break;
+                    }
                     slot->data.rsa = rsa;
                 }
                 else