Improve mbedtls_pkcs5_pbes2_ext function test data

Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
diff --git a/tests/suites/test_suite_pkcs5.function b/tests/suites/test_suite_pkcs5.function
index 47de85e..200bdc3 100644
--- a/tests/suites/test_suite_pkcs5.function
+++ b/tests/suites/test_suite_pkcs5.function
@@ -30,7 +30,7 @@
 /* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */
 void pbes2_encrypt(int params_tag, data_t *params_hex, data_t *pw,
                    data_t *data, int outsize, int ref_ret,
-                   data_t *ref_out, int ref_out_len)
+                   data_t *ref_out)
 {
     int my_ret;
     mbedtls_asn1_buf params;
@@ -40,7 +40,6 @@
 #endif
     MD_PSA_INIT();
     /* Those parameters are only used when MBEDTLS_CIPHER_PADDING_PKCS7 is enabled */
-    (void) ref_out_len;
     (void) outsize;
 
     params.tag = params_tag;
@@ -49,9 +48,9 @@
 
     ASSERT_ALLOC(my_out, ref_out->len);
 
-    my_ret = mbedtls_pkcs5_pbes2(&params, MBEDTLS_PKCS5_ENCRYPT,
-                                 pw->x, pw->len, data->x, data->len, my_out);
     if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) {
+        my_ret = mbedtls_pkcs5_pbes2(&params, MBEDTLS_PKCS5_ENCRYPT,
+                                     pw->x, pw->len, data->x, data->len, my_out);
         TEST_EQUAL(my_ret, ref_ret);
     }
     if (ref_ret == 0) {
@@ -66,7 +65,7 @@
     TEST_EQUAL(my_ret, ref_ret);
     if (ref_ret == 0) {
         ASSERT_COMPARE(my_out, my_out_len,
-                       ref_out->x, ref_out_len);
+                       ref_out->x, ref_out->len);
     }
 #endif
 
@@ -77,9 +76,9 @@
 /* END_CASE */
 
 /* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */
-void mbedtls_pkcs5_pbes2(int params_tag, data_t *params_hex, data_t *pw,
-                         data_t *data, int outsize, int ref_ret,
-                         data_t *ref_out, int ref_out_len)
+void pbes2_decrypt(int params_tag, data_t *params_hex, data_t *pw,
+                   data_t *data, int outsize, int ref_ret,
+                   data_t *ref_out)
 {
     int my_ret;
     mbedtls_asn1_buf params;
@@ -90,19 +89,17 @@
 
     MD_PSA_INIT();
     /* Those parameters are only used when MBEDTLS_CIPHER_PADDING_PKCS7 is enabled */
-    (void) ref_out_len;
     (void) outsize;
 
-
     params.tag = params_tag;
     params.p = params_hex->x;
     params.len = params_hex->len;
 
     ASSERT_ALLOC(my_out, ref_out->len);
 
-    my_ret = mbedtls_pkcs5_pbes2(&params, MBEDTLS_PKCS5_DECRYPT,
-                                 pw->x, pw->len, data->x, data->len, my_out);
     if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) {
+        my_ret = mbedtls_pkcs5_pbes2(&params, MBEDTLS_PKCS5_DECRYPT,
+                                     pw->x, pw->len, data->x, data->len, my_out);
         TEST_EQUAL(my_ret, ref_ret);
     }
     if (ref_ret == 0) {
@@ -116,7 +113,7 @@
     TEST_EQUAL(my_ret, ref_ret);
     if (ref_ret == 0) {
         ASSERT_COMPARE(my_out, my_out_len,
-                       ref_out->x, ref_out_len);
+                       ref_out->x, ref_out->len);
     }
 #endif