bits to byte on rsa and public key testdata
diff --git a/api-tests/dev_apis/crypto/test_c016/test_data.h b/api-tests/dev_apis/crypto/test_c016/test_data.h
index 4ab7e63..23f1e2b 100644
--- a/api-tests/dev_apis/crypto/test_c016/test_data.h
+++ b/api-tests/dev_apis/crypto/test_c016/test_data.h
@@ -112,8 +112,10 @@
 	                   | PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE,
     .alg             = PSA_ALG_RSA_PKCS1V15_SIGN_RAW,
     .bits            = 2048,
-    .expected_range  = {PSA_EXPORT_KEY_OUTPUT_SIZE(PSA_KEY_TYPE_RSA_KEY_PAIR, 2048), \
-	                    PSA_EXPORT_KEY_PAIR_MAX_SIZE},
+    .expected_range  = {1, BITS_TO_BYTES(MIN(PSA_EXPORT_KEY_OUTPUT_SIZE(\
+	                    PSA_KEY_TYPE_RSA_KEY_PAIR, 2048), \
+                        PSA_EXPORT_KEY_PAIR_MAX_SIZE))},
+
     .expected_status = PSA_SUCCESS
 },
 #endif
@@ -143,8 +145,9 @@
 	                   | PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE,
     .alg             = PSA_ALG_RSA_PKCS1V15_SIGN_RAW,
     .bits            = 2048,
-    .expected_range  = {PSA_EXPORT_KEY_OUTPUT_SIZE(PSA_KEY_TYPE_RSA_PUBLIC_KEY, 2048),\
-	                    PSA_EXPORT_PUBLIC_KEY_MAX_SIZE},
+    .expected_range  = {1, BITS_TO_BYTES(MIN(PSA_EXPORT_KEY_OUTPUT_SIZE(\
+	                    PSA_KEY_TYPE_RSA_PUBLIC_KEY, 2048), \
+                        PSA_EXPORT_PUBLIC_KEY_MAX_SIZE))},
     .expected_status = PSA_ERROR_NOT_SUPPORTED
 },
 #endif
diff --git a/api-tests/val/nspe/val_crypto.h b/api-tests/val/nspe/val_crypto.h
index 86f41e8..a11369b 100644
--- a/api-tests/val/nspe/val_crypto.h
+++ b/api-tests/val/nspe/val_crypto.h
@@ -21,6 +21,7 @@
 #include "val.h"
 
 #define BYTES_TO_BITS(byte)             (byte * 8)
+#define BITS_TO_BYTES(bits)             (((bits) + 7) / 8)
 
 /* Size */
 #define AES_16B_KEY_SIZE                16