Fix parantheses on return and sizeof statements.

Used script:
```
import re
import sys

for arg in sys.argv[1:]:
    print(arg)
    with open(arg, 'r') as file:
        content = file.read()
        content = re.sub(r"return\s?\((?!.*\).*\()\s*\n?(.*)\n?\);", r"return \1;", \
            content, flags = re.M)
        content = re.sub(r"sizeof ([^\(][a-zA-Z0-9_\[\]]*)", r"sizeof(\1)",\
            content, flags = re.M)
    with open(arg, 'w') as file:
        file.write(content)

```
Executed with:
` find . -regextype posix-egrep -regex ".*\.([hc]|fmt|function)" | xargs -L1 python script.py`

Signed-off-by: Mateusz Starzyk <mateusz.starzyk@mobica.com>
diff --git a/tests/suites/test_suite_pk.function b/tests/suites/test_suite_pk.function
index 56cc45b..454bfac 100644
--- a/tests/suites/test_suite_pk.function
+++ b/tests/suites/test_suite_pk.function
@@ -48,7 +48,7 @@
         int ret;
         if( ( ret = mbedtls_ecp_group_load( &mbedtls_pk_ec( *pk )->grp,
                                             parameter ) ) != 0 )
-            return( ret );
+            return ret ;
 
         return mbedtls_ecp_gen_keypair( &mbedtls_pk_ec( *pk )->grp,
                                         &mbedtls_pk_ec( *pk )->d,
@@ -56,7 +56,7 @@
                                         mbedtls_test_rnd_std_rand, NULL );
     }
 #endif
-    return( -1 );
+    return -1 ;
 }
 
 #if defined(MBEDTLS_RSA_C)
@@ -81,7 +81,7 @@
 }
 size_t mbedtls_rsa_key_len_func( void *ctx )
 {
-    return( ((const mbedtls_rsa_context *) ctx)->len );
+    return ((const mbedtls_rsa_context *) ctx)->len ;
 }
 #endif /* MBEDTLS_RSA_C */
 
@@ -107,7 +107,7 @@
     PSA_ASSERT( psa_generate_key( &attributes, &key ) );
 
 exit:
-    return( key );
+    return key ;
 }
 #endif /* MBEDTLS_USE_PSA_CRYPTO */
 /* END_HEADER */
@@ -604,7 +604,7 @@
 
         slen = sizeof( sig );
         ret = mbedtls_pk_sign_restartable( &prv, md_alg, hash, hlen,
-                                           sig, sizeof sig, &slen,
+                                           sig, sizeof(sig), &slen,
                                            mbedtls_test_rnd_std_rand, NULL,
                                            &rs_ctx );
         TEST_ASSERT( ret == MBEDTLS_ERR_ECP_IN_PROGRESS );
@@ -640,15 +640,15 @@
     mbedtls_pk_init( &pk );
     USE_PSA_INIT( );
 
-    memset( hash, 0x2a, sizeof hash );
-    memset( sig, 0, sizeof sig );
+    memset( hash, 0x2a, sizeof(hash) );
+    memset( sig, 0, sizeof(sig) );
 
     TEST_ASSERT( mbedtls_pk_setup( &pk, mbedtls_pk_info_from_type( type ) ) == 0 );
     TEST_ASSERT( pk_genkey( &pk, parameter ) == 0 );
 
     TEST_ASSERT( mbedtls_pk_sign_restartable( &pk, MBEDTLS_MD_SHA256,
                                               hash, hash_len,
-                                              sig, sizeof sig, &sig_len,
+                                              sig, sizeof(sig), &sig_len,
                                               mbedtls_test_rnd_std_rand, NULL,
                                               rs_ctx ) == sign_ret );
     if( sign_ret == 0 )
@@ -673,7 +673,7 @@
     }
 
     TEST_ASSERT( mbedtls_pk_sign( &pk, MBEDTLS_MD_SHA256, hash, hash_len,
-                                  sig, sizeof sig, &sig_len,
+                                  sig, sizeof(sig), &sig_len,
                                   mbedtls_test_rnd_std_rand,
                                   NULL ) == sign_ret );
     if( sign_ret == 0 )
@@ -688,12 +688,12 @@
     {
         hash[0]++;
         TEST_ASSERT( mbedtls_pk_verify_restartable( &pk, MBEDTLS_MD_SHA256,
-                     hash, sizeof hash, sig, sig_len, rs_ctx ) != 0 );
+                     hash, sizeof(hash), sig, sig_len, rs_ctx ) != 0 );
         hash[0]--;
 
         sig[0]++;
         TEST_ASSERT( mbedtls_pk_verify_restartable( &pk, MBEDTLS_MD_SHA256,
-                     hash, sizeof hash, sig, sig_len, rs_ctx ) != 0 );
+                     hash, sizeof(hash), sig, sig_len, rs_ctx ) != 0 );
         sig[0]--;
     }
 
@@ -835,8 +835,8 @@
     if( SIZE_MAX <= UINT_MAX )
         return;
 
-    memset( hash, 0x2a, sizeof hash );
-    memset( sig, 0, sizeof sig );
+    memset( hash, 0x2a, sizeof(hash) );
+    memset( sig, 0, sizeof(sig) );
 
     mbedtls_pk_init( &pk );
 
@@ -853,7 +853,7 @@
                     sig, sig_len ) == MBEDTLS_ERR_PK_BAD_INPUT_DATA );
 
     TEST_ASSERT( mbedtls_pk_sign( &pk, MBEDTLS_MD_NONE, hash, hash_len,
-                                  sig, sizeof sig, &sig_len,
+                                  sig, sizeof(sig), &sig_len,
                                   mbedtls_test_rnd_std_rand, NULL )
                  == MBEDTLS_ERR_PK_BAD_INPUT_DATA );
 
@@ -881,11 +881,11 @@
     mbedtls_rsa_init( &raw );
     mbedtls_pk_init( &rsa ); mbedtls_pk_init( &alt );
 
-    memset( hash, 0x2a, sizeof hash );
-    memset( sig, 0, sizeof sig );
-    memset( msg, 0x2a, sizeof msg );
-    memset( ciph, 0, sizeof ciph );
-    memset( test, 0, sizeof test );
+    memset( hash, 0x2a, sizeof(hash) );
+    memset( sig, 0, sizeof(sig) );
+    memset( msg, 0x2a, sizeof(msg) );
+    memset( ciph, 0, sizeof(ciph) );
+    memset( test, 0, sizeof(test) );
 
     /* Initiliaze PK RSA context with random key */
     TEST_ASSERT( mbedtls_pk_setup( &rsa,
@@ -909,34 +909,34 @@
     /* Test signature */
 #if SIZE_MAX > UINT_MAX
     TEST_ASSERT( mbedtls_pk_sign( &alt, MBEDTLS_MD_NONE, hash, SIZE_MAX,
-                                  sig, sizeof sig, &sig_len,
+                                  sig, sizeof(sig), &sig_len,
                                   mbedtls_test_rnd_std_rand, NULL )
                  == MBEDTLS_ERR_PK_BAD_INPUT_DATA );
 #endif /* SIZE_MAX > UINT_MAX */
-    TEST_ASSERT( mbedtls_pk_sign( &alt, MBEDTLS_MD_NONE, hash, sizeof hash,
-                                  sig, sizeof sig, &sig_len,
+    TEST_ASSERT( mbedtls_pk_sign( &alt, MBEDTLS_MD_NONE, hash, sizeof(hash),
+                                  sig, sizeof(sig), &sig_len,
                                   mbedtls_test_rnd_std_rand, NULL )
                  == 0 );
     TEST_ASSERT( sig_len == RSA_KEY_LEN );
     TEST_ASSERT( mbedtls_pk_verify( &rsa, MBEDTLS_MD_NONE,
-                            hash, sizeof hash, sig, sig_len ) == 0 );
+                            hash, sizeof(hash), sig, sig_len ) == 0 );
 
     /* Test decrypt */
-    TEST_ASSERT( mbedtls_pk_encrypt( &rsa, msg, sizeof msg,
-                             ciph, &ciph_len, sizeof ciph,
+    TEST_ASSERT( mbedtls_pk_encrypt( &rsa, msg, sizeof(msg),
+                             ciph, &ciph_len, sizeof(ciph),
                              mbedtls_test_rnd_std_rand, NULL ) == 0 );
     TEST_ASSERT( mbedtls_pk_decrypt( &alt, ciph, ciph_len,
-                             test, &test_len, sizeof test,
+                             test, &test_len, sizeof(test),
                              mbedtls_test_rnd_std_rand, NULL ) == 0 );
-    TEST_ASSERT( test_len == sizeof msg );
+    TEST_ASSERT( test_len == sizeof(msg) );
     TEST_ASSERT( memcmp( test, msg, test_len ) == 0 );
 
     /* Test forbidden operations */
-    TEST_ASSERT( mbedtls_pk_encrypt( &alt, msg, sizeof msg,
-                             ciph, &ciph_len, sizeof ciph,
+    TEST_ASSERT( mbedtls_pk_encrypt( &alt, msg, sizeof(msg),
+                             ciph, &ciph_len, sizeof(ciph),
                              mbedtls_test_rnd_std_rand, NULL ) == ret );
     TEST_ASSERT( mbedtls_pk_verify( &alt, MBEDTLS_MD_NONE,
-                            hash, sizeof hash, sig, sig_len ) == ret );
+                            hash, sizeof(hash), sig, sig_len ) == ret );
     TEST_ASSERT( mbedtls_pk_debug( &alt, dbg_items ) == ret );
 
 exit:
@@ -999,11 +999,11 @@
     TEST_EQUAL( psa_get_key_lifetime( &attributes ),
                 PSA_KEY_LIFETIME_VOLATILE );
 
-    memset( hash, 0x2a, sizeof hash );
-    memset( sig, 0, sizeof sig );
+    memset( hash, 0x2a, sizeof(hash) );
+    memset( sig, 0, sizeof(sig) );
 
     TEST_ASSERT( mbedtls_pk_sign( &pk, MBEDTLS_MD_SHA256,
-                 hash, sizeof hash, sig, sizeof sig, &sig_len,
+                 hash, sizeof(hash), sig, sizeof(sig), &sig_len,
                  NULL, NULL ) == 0 );
 
     /* Export underlying public key for re-importing in a psa context. */
@@ -1024,7 +1024,7 @@
     TEST_ASSERT( mbedtls_pk_parse_public_key( &pk, pkey_legacy_start,
                                               klen_legacy ) == 0 );
     TEST_ASSERT( mbedtls_pk_verify( &pk, MBEDTLS_MD_SHA256,
-                            hash, sizeof hash, sig, sig_len ) == 0 );
+                            hash, sizeof(hash), sig, sig_len ) == 0 );
 
 exit:
     /*