Use remove_key_data_from_memory instead of wipe_key_slot

Since the loading attempt of a builtin key might be followed by trying
to load a persistent key, we can only wipe the allocated key data, not
the associated metadata.

Signed-off-by: Steven Cooreman <steven.cooreman@silabs.com>
diff --git a/library/psa_crypto_slot_management.c b/library/psa_crypto_slot_management.c
index bdb45ee..f9ea369 100644
--- a/library/psa_crypto_slot_management.c
+++ b/library/psa_crypto_slot_management.c
@@ -327,7 +327,7 @@
 
 exit:
     if( status != PSA_SUCCESS )
-        psa_wipe_key_slot( slot );
+        psa_remove_key_data_from_memory( slot );
     return( status );
 }
 #endif /* MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS */