Add supported_curves/groups extension

This allows us to use a ciphersuite that will still be supported in 4.0.

Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
diff --git a/tests/suites/test_suite_ssl.function b/tests/suites/test_suite_ssl.function
index 34671c7..a70fb77 100644
--- a/tests/suites/test_suite_ssl.function
+++ b/tests/suites/test_suite_ssl.function
@@ -5039,8 +5039,9 @@
 /* END_CASE */
 
 /* BEGIN_CASE */
-void inject_client_content_on_the_wire(int state, data_t *hello, char *log_pattern,
-                                       int expected_ret)
+void inject_client_content_on_the_wire(int pk_alg,
+                                       int state, data_t *data,
+                                       char *log_pattern, int expected_ret)
 {
     /* This function allows us to inject content at a specific state
      * in the handshake, or when it's completed. The content is injected
@@ -5069,7 +5070,9 @@
     srv_pattern.pattern = log_pattern;
     options.srv_log_obj = &srv_pattern;
     options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
-    mbedtls_debug_set_threshold(3);
+    mbedtls_debug_set_threshold(5);
+
+    options.pk_alg = pk_alg;
 
     ret = mbedtls_test_ssl_endpoint_init(&server, MBEDTLS_SSL_IS_SERVER,
                                          &options, NULL, NULL, NULL);
@@ -5088,8 +5091,8 @@
     TEST_EQUAL(ret, 0);
 
     /* Send the crafted message */
-    ret = mbedtls_test_mock_tcp_send_b(&client.socket, hello->x, hello->len);
-    TEST_ASSERT(ret >= 0 && (size_t) ret == hello->len);
+    ret = mbedtls_test_mock_tcp_send_b(&client.socket, data->x, data->len);
+    TEST_ASSERT(ret >= 0 && (size_t) ret == data->len);
 
     /* Have the server process it.
      * Need the loop because a server that support 1.3 and 1.2