Rename psa_key_derivation_input_raw

The function dispatches between all the available methods and
does not just handle the raw key derivation case like the name suggests.
diff --git a/library/psa_crypto.c b/library/psa_crypto.c
index 1e20f47..96150f8 100644
--- a/library/psa_crypto.c
+++ b/library/psa_crypto.c
@@ -4791,7 +4791,7 @@
 #endif /* PSA_PRE_1_0_KEY_DERIVATION */
 #endif /* MBEDTLS_MD_C */
 
-static psa_status_t psa_key_derivation_input_raw(
+static psa_status_t psa_key_derivation_input_internal(
     psa_key_derivation_operation_t *operation,
     psa_key_derivation_step_t step,
     const uint8_t *data,
@@ -4856,8 +4856,8 @@
         case PSA_KEY_DERIVATION_INPUT_SALT:
         case PSA_KEY_DERIVATION_INPUT_INFO:
         case PSA_KEY_DERIVATION_INPUT_SEED:
-            return( psa_key_derivation_input_raw( operation, step,
-                                                  data, data_length ) );
+            return( psa_key_derivation_input_internal( operation, step,
+                                                       data, data_length ) );
         default:
             return( PSA_ERROR_INVALID_ARGUMENT );
     }
@@ -4884,10 +4884,10 @@
      * and leak values derived from the key. So be conservative. */
     if( step != PSA_KEY_DERIVATION_INPUT_SECRET )
         return( PSA_ERROR_INVALID_ARGUMENT );
-    return( psa_key_derivation_input_raw( operation,
-                                          step,
-                                          slot->data.raw.data,
-                                          slot->data.raw.bytes ) );
+    return( psa_key_derivation_input_internal( operation,
+                                               step,
+                                               slot->data.raw.data,
+                                               slot->data.raw.bytes ) );
 }
 
 
@@ -4999,8 +4999,9 @@
 
     /* Step 2: set up the key derivation to generate key material from
      * the shared secret. */
-    status = psa_key_derivation_input_raw( operation, step,
-                                           shared_secret, shared_secret_length );
+    status = psa_key_derivation_input_internal( operation, step,
+                                                shared_secret,
+                                                shared_secret_length );
 
 exit:
     mbedtls_platform_zeroize( shared_secret, shared_secret_length );