Update test

Testing the hash length in this context is not applicable because there is no way
to specify it when calling mbedtls_psa_hkdf_extract.
Change to test invalid `alg` parameter.

Signed-off-by: Gabor Mezei <gabor.mezei@arm.com>
diff --git a/tests/suites/test_suite_ssl.function b/tests/suites/test_suite_ssl.function
index c01204e..c35e243 100644
--- a/tests/suites/test_suite_ssl.function
+++ b/tests/suites/test_suite_ssl.function
@@ -3842,7 +3842,7 @@
 /* END_CASE */
 
 /* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS:MBEDTLS_SSL_PROTO_TLS1_3 */
-void psa_hkdf_extract_ret( int hash_len, int ret )
+void psa_hkdf_extract_ret( int alg, int ret )
 {
     int output_ret;
     unsigned char *salt = NULL;
@@ -3850,13 +3850,13 @@
     unsigned char *prk = NULL;
     size_t salt_len, ikm_len, prk_len;
 
-    salt_len = hash_len;
     ASSERT_ALLOC( prk, PSA_MAC_MAX_SIZE);
+    salt_len = 0;
     ikm_len = 0;
     prk_len = 0;
 
     PSA_ASSERT( psa_crypto_init() );
-    output_ret = mbedtls_psa_hkdf_extract( 0, salt, salt_len,
+    output_ret = mbedtls_psa_hkdf_extract( alg, salt, salt_len,
                                            ikm, ikm_len,
                                            prk, PSA_MAC_MAX_SIZE, &prk_len );
     TEST_ASSERT( output_ret == ret );