ssl_server2: refactor opaque code

Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com>
diff --git a/programs/ssl/ssl_server2.c b/programs/ssl/ssl_server2.c
index 356e33a..71a2b52 100644
--- a/programs/ssl/ssl_server2.c
+++ b/programs/ssl/ssl_server2.c
@@ -2607,6 +2607,16 @@
                                 (unsigned int) -ret );
                 goto exit;
             }
+
+            if( ( ret = mbedtls_pk_wrap_as_opaque( &pkey, &key_slot,
+                                                   psa_alg,
+                                                   psa_usage,
+                                                   psa_alg2 ) ) != 0 )
+            {
+                mbedtls_printf( " failed\n  !  "
+                                "mbedtls_pk_wrap_as_opaque returned -0x%x\n\n", (unsigned int)  -ret );
+                goto exit;
+            }
         }
         else
         {
@@ -2625,20 +2635,19 @@
                     psa_alg2 = PSA_ALG_NONE;
                     psa_usage = PSA_KEY_USAGE_SIGN_HASH;
                 }
+
+                if( ( ret = mbedtls_pk_wrap_as_opaque( &pkey, &key_slot,
+                                                       psa_alg,
+                                                       psa_usage,
+                                                       psa_alg2 ) ) != 0 )
+                {
+                    mbedtls_printf( " failed\n  !  "
+                                    "mbedtls_pk_wrap_as_opaque returned -0x%x\n\n", (unsigned int)  -ret );
+                    goto exit;
+                }
             }
         }
 
-        if( ( ret = mbedtls_pk_wrap_as_opaque( &pkey, &key_slot,
-                                                psa_alg,
-                                                psa_usage,
-                                                psa_alg2 ) ) != 0 )
-        {
-            mbedtls_printf( " failed\n  !  "
-                            "mbedtls_pk_wrap_as_opaque returned -0x%x\n\n", (unsigned int)  -ret );
-            goto exit;
-        }
-
-
         if ( strcmp( opt.key2_opaque_alg1, DFL_KEY_OPAQUE_ALG ) != 0 )
         {
             ret = key_opaque_set_alg_usage( opt.key2_opaque_alg1,
@@ -2650,6 +2659,16 @@
                                 (unsigned int) -ret );
                 goto exit;
             }
+
+            if( ( ret = mbedtls_pk_wrap_as_opaque( &pkey2, &key_slot2,
+                                                   psa_alg,
+                                                   psa_usage,
+                                                   psa_alg2 ) ) != 0 )
+            {
+                mbedtls_printf( " failed\n  !  "
+                                "mbedtls_pk_wrap_as_opaque returned -0x%x\n\n", (unsigned int)  -ret );
+                goto exit;
+            }
         }
         else
         {
@@ -2668,17 +2687,17 @@
                     psa_alg2 = PSA_ALG_NONE;
                     psa_usage = PSA_KEY_USAGE_SIGN_HASH;
                 }
-            }
-        }
 
-        if( ( ret = mbedtls_pk_wrap_as_opaque( &pkey2, &key_slot2,
-                                                psa_alg,
-                                                psa_usage,
-                                                psa_alg2 ) ) != 0 )
-        {
-            mbedtls_printf( " failed\n  !  "
-                            "mbedtls_pk_wrap_as_opaque returned -0x%x\n\n", (unsigned int)  -ret );
-            goto exit;
+                if( ( ret = mbedtls_pk_wrap_as_opaque( &pkey2, &key_slot2,
+                                                       psa_alg,
+                                                       psa_usage,
+                                                       psa_alg2 ) ) != 0 )
+                {
+                    mbedtls_printf( " failed\n  !  "
+                                    "mbedtls_pk_wrap_as_opaque returned -0x%x\n\n", (unsigned int)  -ret );
+                    goto exit;
+                }
+            }
         }
     }
 #endif /* MBEDTLS_USE_PSA_CRYPTO */