Fix parantheses on return and sizeof statements.

Used script:
```
import re
import sys

for arg in sys.argv[1:]:
    print(arg)
    with open(arg, 'r') as file:
        content = file.read()
        content = re.sub(r"return\s?\((?!.*\).*\()\s*\n?(.*)\n?\);", r"return \1;", \
            content, flags = re.M)
        content = re.sub(r"sizeof ([^\(][a-zA-Z0-9_\[\]]*)", r"sizeof(\1)",\
            content, flags = re.M)
    with open(arg, 'w') as file:
        file.write(content)

```
Executed with:
` find . -regextype posix-egrep -regex ".*\.([hc]|fmt|function)" | xargs -L1 python script.py`

Signed-off-by: Mateusz Starzyk <mateusz.starzyk@mobica.com>
diff --git a/library/ssl_misc.h b/library/ssl_misc.h
index cc19f47..de33e4e 100644
--- a/library/ssl_misc.h
+++ b/library/ssl_misc.h
@@ -350,7 +350,7 @@
     do {                                                                 \
         if( mbedtls_ssl_chk_buf_ptr( ( cur ), ( end ), ( need ) ) != 0 ) \
         {                                                                \
-            return( MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL );                  \
+            return MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL ;                  \
         }                                                                \
     } while( 0 )
 
@@ -753,10 +753,10 @@
         const mbedtls_ssl_transform *transform )
 {
 #if defined(MBEDTLS_SSL_SOME_SUITES_USE_MAC)
-    return( transform->maclen == 0 && transform->taglen != 0 );
+    return transform->maclen == 0 && transform->taglen != 0 ;
 #else
     (void) transform;
-    return( 1 );
+    return 1 ;
 #endif
 }
 
@@ -1015,10 +1015,10 @@
     {
         *psk = NULL;
         *psk_len = 0;
-        return( MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED );
+        return MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED ;
     }
 
-    return( 0 );
+    return 0 ;
 }
 
 #if defined(MBEDTLS_USE_PSA_CRYPTO)
@@ -1033,12 +1033,12 @@
     const mbedtls_ssl_context *ssl )
 {
     if( ! mbedtls_svc_key_id_is_null( ssl->handshake->psk_opaque ) )
-        return( ssl->handshake->psk_opaque );
+        return ssl->handshake->psk_opaque ;
 
     if( ! mbedtls_svc_key_id_is_null( ssl->conf->psk_opaque ) )
-        return( ssl->conf->psk_opaque );
+        return ssl->conf->psk_opaque ;
 
-    return( MBEDTLS_SVC_KEY_ID_INIT );
+    return MBEDTLS_SVC_KEY_ID_INIT ;
 }
 #endif /* MBEDTLS_USE_PSA_CRYPTO */
 
@@ -1076,7 +1076,7 @@
             return srtp_profile_value;
         default: break;
     }
-    return( MBEDTLS_TLS_SRTP_UNSET );
+    return MBEDTLS_TLS_SRTP_UNSET ;
 }
 #endif
 
@@ -1090,7 +1090,7 @@
     else
         key_cert = ssl->conf->key_cert;
 
-    return( key_cert == NULL ? NULL : key_cert->key );
+    return key_cert == NULL ? NULL : key_cert->key ;
 }
 
 static inline mbedtls_x509_crt *mbedtls_ssl_own_cert( mbedtls_ssl_context *ssl )
@@ -1102,7 +1102,7 @@
     else
         key_cert = ssl->conf->key_cert;
 
-    return( key_cert == NULL ? NULL : key_cert->cert );
+    return key_cert == NULL ? NULL : key_cert->cert ;
 }
 
 /*
@@ -1134,12 +1134,12 @@
 #if defined(MBEDTLS_SSL_PROTO_DTLS)
     if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM )
     {
-        return( 13 );
+        return 13 ;
     }
     else
 #endif /* MBEDTLS_SSL_PROTO_DTLS */
     {
-        return( 5 );
+        return 5 ;
     }
 }
 
@@ -1152,11 +1152,11 @@
 {
 #if defined(MBEDTLS_SSL_PROTO_DTLS)
     if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM )
-        return( 12 );
+        return 12 ;
 #else
     ((void) ssl);
 #endif
-    return( 4 );
+    return 4 ;
 }
 
 #if defined(MBEDTLS_SSL_PROTO_DTLS)
@@ -1192,7 +1192,7 @@
         diff |= x ^ y;
     }
 
-    return( diff );
+    return diff ;
 }
 
 #if defined(MBEDTLS_SSL_PROTO_TLS1_2)
@@ -1222,11 +1222,11 @@
 {
 #if defined(MBEDTLS_SSL_PROTO_DTLS)
     if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM )
-        return( 2 );
+        return 2 ;
 #else
     ((void) ssl);
 #endif
-    return( 0 );
+    return 0 ;
 }
 
 #if defined(MBEDTLS_SSL_PROTO_DTLS)