Fixing PSA return status
Signed-off-by: pespacek <peter.spacek@silabs.com>
diff --git a/library/ssl_tls13_generic.c b/library/ssl_tls13_generic.c
index b89f587..a90ddba 100644
--- a/library/ssl_tls13_generic.c
+++ b/library/ssl_tls13_generic.c
@@ -922,7 +922,8 @@
     size_t signature_len = 0;
     unsigned char verify_hash[ MBEDTLS_MD_MAX_SIZE ];
     size_t verify_hash_len;
-
+    psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
+    
     *out_len = 0;
 
     own_key = mbedtls_ssl_own_key( ssl );
@@ -984,11 +985,12 @@
     /* Hash verify buffer with indicated hash function */
     psa_algorithm = mbedtls_psa_translate_md( md_alg );
 
-    if( psa_hash_compute( psa_algorithm,
-                          verify_buffer,
-                          verify_buffer_len,
-                          verify_hash,sizeof( verify_hash ),
-                          &verify_hash_len ) != PSA_SUCCESS )
+    status = psa_hash_compute( psa_algorithm,
+                               verify_buffer,
+                               verify_buffer_len,
+                               verify_hash,sizeof( verify_hash ),
+                               &verify_hash_len );
+    if( status != PSA_SUCCESS )
         return( psa_ssl_status_to_mbedtls( status ) );
 
     MBEDTLS_SSL_DEBUG_BUF( 3, "verify hash", verify_hash, verify_hash_len );