Update test

Testing the hash length in this context is not applicable because there is no way
to specify it when calling mbedtls_psa_hkdf_extract.
Change to test invalid `alg` parameter.

Signed-off-by: Gabor Mezei <gabor.mezei@arm.com>
diff --git a/tests/suites/test_suite_ssl.data b/tests/suites/test_suite_ssl.data
index 6f89695..9e189a3 100644
--- a/tests/suites/test_suite_ssl.data
+++ b/tests/suites/test_suite_ssl.data
@@ -4420,7 +4420,7 @@
 depends_on:PSA_WANT_ALG_SHA_1
 psa_hkdf_extract:PSA_ALG_HMAC(PSA_ALG_SHA_1):"0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c":"":"2adccada18779e7c2077ad2eb19d3f3e731385dd"
 
-SSL TLS 1.3 Key schedule: HKDF extract fails with hash_len of 0
+SSL TLS 1.3 Key schedule: HKDF extract fails with wrong hash alg
 psa_hkdf_extract_ret:0:MBEDTLS_ERR_SSL_BAD_INPUT_DATA
 
 SSL TLS 1.3 Key schedule: HKDF RFC5869 Test Vector #1 Expand
diff --git a/tests/suites/test_suite_ssl.function b/tests/suites/test_suite_ssl.function
index c01204e..c35e243 100644
--- a/tests/suites/test_suite_ssl.function
+++ b/tests/suites/test_suite_ssl.function
@@ -3842,7 +3842,7 @@
 /* END_CASE */
 
 /* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS:MBEDTLS_SSL_PROTO_TLS1_3 */
-void psa_hkdf_extract_ret( int hash_len, int ret )
+void psa_hkdf_extract_ret( int alg, int ret )
 {
     int output_ret;
     unsigned char *salt = NULL;
@@ -3850,13 +3850,13 @@
     unsigned char *prk = NULL;
     size_t salt_len, ikm_len, prk_len;
 
-    salt_len = hash_len;
     ASSERT_ALLOC( prk, PSA_MAC_MAX_SIZE);
+    salt_len = 0;
     ikm_len = 0;
     prk_len = 0;
 
     PSA_ASSERT( psa_crypto_init() );
-    output_ret = mbedtls_psa_hkdf_extract( 0, salt, salt_len,
+    output_ret = mbedtls_psa_hkdf_extract( alg, salt, salt_len,
                                            ikm, ikm_len,
                                            prk, PSA_MAC_MAX_SIZE, &prk_len );
     TEST_ASSERT( output_ret == ret );