[dv/kmac] fix entropy_mode randomization

this PR addresses #6495.

We don't support the timers in the kmac TB yet, so for a given test we
should ensure that the entropy_mode is the same for all hashing
operations.

Signed-off-by: Udi Jonnalagadda <udij@google.com>
diff --git a/hw/ip/kmac/dv/env/seq_lib/kmac_smoke_vseq.sv b/hw/ip/kmac/dv/env/seq_lib/kmac_smoke_vseq.sv
index 20519f9..0a6cc58 100644
--- a/hw/ip/kmac/dv/env/seq_lib/kmac_smoke_vseq.sv
+++ b/hw/ip/kmac/dv/env/seq_lib/kmac_smoke_vseq.sv
@@ -46,10 +46,6 @@
     en_sideload == 0;
   }
 
-  constraint entropy_mode_c {
-    entropy_mode inside {EntropyModeSw, EntropyModeEdn};
-  }
-
   constraint entropy_ready_c {
     entropy_ready == 1;
   }
@@ -82,6 +78,7 @@
   // a message hash.
   virtual task pre_start();
     do_kmac_init = 0;
+    entropy_mode.rand_mode(0);
     super.pre_start();
   endtask
 
@@ -92,6 +89,9 @@
     logic [keymgr_pkg::KeyWidth-1:0] sideload_share1;
 
     `uvm_info(`gfn, $sformatf("Starting %0d message hashes", num_trans), UVM_LOW)
+
+    `DV_CHECK_STD_RANDOMIZE_WITH_FATAL(entropy_mode, entropy_mode inside {EntropyModeSw, EntropyModeEdn};)
+
     for (int i = 0; i < num_trans; i++) begin
       bit [7:0] share0[];
       bit [7:0] share1[];