Replace MBED_RANDOM_SEED_ITS_UID with MBEDTLS_RANDOM_SEED_ITS_UID

Update mbedtls_psa_inject_entropy function documentation
diff --git a/include/psa/crypto_extra.h b/include/psa/crypto_extra.h
index 1313492..880e09c 100644
--- a/include/psa/crypto_extra.h
+++ b/include/psa/crypto_extra.h
@@ -35,7 +35,7 @@
 #endif
 
 /* UID for secure storage seed */
-#define MBED_RANDOM_SEED_ITS_UID 0xFFFFFF52
+#define MBEDTLS_RANDOM_SEED_ITS_UID 0xFFFFFF52
 
 /**
  * \brief Library deinitialization.
@@ -91,11 +91,11 @@
  *
  * \param seed[in]      Buffer containing the seed value to inject.
  * \param seed_size     Size of the \p seed buffer.
- *                      The size of the seed must be equal or larger than any
- *                      of the values defined both in
- *                      #MBEDTLS_ENTROPY_MIN_PLATFORM
- *                      and in the #MBEDTLS_ENTROPY_BLOCK_SIZE defines
- *                      and at most #MBEDTLS_ENTROPY_MAX_SEED_SIZE bytes.
+ *                      The size of the seed in bytes must be greater
+ *                      or equal to both #MBEDTLS_ENTROPY_MIN_PLATFORM
+ *                      and #MBEDTLS_ENTROPY_BLOCK_SIZE.
+ *                      It must be less or equal to
+ *                      #MBEDTLS_ENTROPY_MAX_SEED_SIZE.
  *
  * \retval #PSA_SUCCESS
  *         The seed value was injected successfully. The random generator
diff --git a/library/psa_crypto.c b/library/psa_crypto.c
index 26bea19..fe73d1d 100644
--- a/library/psa_crypto.c
+++ b/library/psa_crypto.c
@@ -4240,10 +4240,10 @@
           ( seed_size > MBEDTLS_ENTROPY_MAX_SEED_SIZE ) )
             return( PSA_ERROR_INVALID_ARGUMENT );
 
-    status = psa_its_get_info( MBED_RANDOM_SEED_ITS_UID, &p_info );
+    status = psa_its_get_info( MBEDTLS_RANDOM_SEED_ITS_UID, &p_info );
     if( PSA_ITS_ERROR_KEY_NOT_FOUND == status ) /* No seed exists */
     {
-        status = psa_its_set( MBED_RANDOM_SEED_ITS_UID, seed_size, seed, 0 );
+        status = psa_its_set( MBEDTLS_RANDOM_SEED_ITS_UID, seed_size, seed, 0 );
     }
     else if( PSA_ITS_SUCCESS == status )
     {
diff --git a/tests/suites/test_suite_psa_crypto_entropy.function b/tests/suites/test_suite_psa_crypto_entropy.function
index 1cb58b9..4be2c5a 100644
--- a/tests/suites/test_suite_psa_crypto_entropy.function
+++ b/tests/suites/test_suite_psa_crypto_entropy.function
@@ -40,7 +40,7 @@
     {
         seed[i] = i;
     }
-    its_status =  psa_its_remove(MBED_RANDOM_SEED_ITS_UID);
+    its_status =  psa_its_remove(MBEDTLS_RANDOM_SEED_ITS_UID);
     TEST_ASSERT( (its_status == PSA_ITS_SUCCESS) || (its_status == PSA_ITS_ERROR_KEY_NOT_FOUND) );
     status = mbedtls_psa_inject_entropy( seed, seed_length_a );
     TEST_ASSERT( status == expected_status_a );
@@ -51,7 +51,7 @@
     TEST_ASSERT( memcmp( output , zeros, sizeof( output ) ) != 0 );
 exit:
     mbedtls_free( seed );
-    psa_its_remove(MBED_RANDOM_SEED_ITS_UID);
+    psa_its_remove(MBEDTLS_RANDOM_SEED_ITS_UID);
     mbedtls_psa_crypto_free( );
 }
 /* END_CASE */
@@ -68,11 +68,11 @@
     {
         seed[i] = i;
     }
-    its_status =  psa_its_remove(MBED_RANDOM_SEED_ITS_UID);
+    its_status =  psa_its_remove(MBEDTLS_RANDOM_SEED_ITS_UID);
     TEST_ASSERT( (its_status == PSA_ITS_SUCCESS) || (its_status == PSA_ITS_ERROR_KEY_NOT_FOUND) );
     status = mbedtls_psa_inject_entropy( seed, MBEDTLS_ENTROPY_BLOCK_SIZE );
     TEST_ASSERT( status == PSA_SUCCESS );
-    its_status =  psa_its_remove(MBED_RANDOM_SEED_ITS_UID);
+    its_status =  psa_its_remove(MBEDTLS_RANDOM_SEED_ITS_UID);
     TEST_ASSERT( its_status == PSA_ITS_SUCCESS );
     TEST_ASSERT( psa_crypto_init( ) == PSA_SUCCESS );
     status = mbedtls_psa_inject_entropy( seed, MBEDTLS_ENTROPY_BLOCK_SIZE );
@@ -82,7 +82,7 @@
     status = mbedtls_psa_inject_entropy( seed, MBEDTLS_ENTROPY_BLOCK_SIZE );
     TEST_ASSERT( status == PSA_ERROR_NOT_PERMITTED );
 exit:
-    psa_its_remove(MBED_RANDOM_SEED_ITS_UID);
+    psa_its_remove(MBEDTLS_RANDOM_SEED_ITS_UID);
     mbedtls_psa_crypto_free( );
 }
 /* END_CASE */