[entropy/doc] consistent block references

Change the doc files to reference entropy_src consistently.

Signed-off-by: Mark Branstad <mark.branstad@wdc.com>
diff --git a/hw/ip/csrng/doc/_index.md b/hw/ip/csrng/doc/_index.md
index 835c8fb..b0d58a1 100644
--- a/hw/ip/csrng/doc/_index.md
+++ b/hw/ip/csrng/doc/_index.md
@@ -144,13 +144,14 @@
 -----------------------------|------------------|-----------------------------|---------------
 `otp_en_csrng_sw_app_read_i` | `input `         | `otp_en_t `                 | An efuse that will enable firmware to access the NIST ctr_drbg internal state through registers.
 `lc_hw_debug_en_i`           | `input`          | `lc_tx_t `                  | A life-cycle that will allow disabling of the AES encryption block, to be used for debug only.
-`entropy_src_hw_if_o`        | `output`         | `entropy_src_hw_if_req_t`   | Seed request made to the Entropy_src module.
-`entropy_src_hw_if_i`        | `input`          | `entropy_src_hw_if_rsp_t`   | Seed response from the Entropy_src module. 
-`cs_aes_halt_i`              | `input`          | `cs_aes_halt_req_t`         | Request to CSRNG from Entropy_Src to halt requests to the AES block for power leveling purposes.
-`cs_aes_halt_o`              | `output`         | `cs_aes_halt_rsp_t`         | Response from CSRNG to Entropy_Src that all requests to AES block are halted.
+`entropy_src_hw_if_o`        | `output`         | `entropy_src_hw_if_req_t`   | Seed request made to the ENTROPY_SRC module.
+`entropy_src_hw_if_i`        | `input`          | `entropy_src_hw_if_rsp_t`   | Seed response from the ENTROPY_SRC module.
+`cs_aes_halt_i`              | `input`          | `cs_aes_halt_req_t`         | Request to CSRNG from ENTROPY_SRC to halt requests to the AES block for power leveling purposes.
+`cs_aes_halt_o`              | `output`         | `cs_aes_halt_rsp_t`         | Response from CSRNG to ENTROPY_SRC that all requests to AES block are halted.
 `csrng_cmd_i`                | `input`          | `csrng_req_t`               | Application interface request to CSRNG from an EDN block.
 `csrng_cmd_o`                | `output`         | `csrng_rsp_t`               | Application interface response from CSRNG to an EDN block.
 
+
 ## Design Details
 
 #### Non-blocking Commands
@@ -391,7 +392,7 @@
 This 129-bit bus consists of 128-bits, `genbits_bus`, for the random bit sequence itself, along with a single bit flag, `genbits_fips`, indicating whether the bits were considered fully in accordance with FIPS standards.
 
 There are two cases when the sequence will not be FIPS compliant:
-- Early in the boot sequence, the `entropy_src` generates a seed from the first 384 bits pulled from the noise source.
+- Early in the boot sequence, the `ENTROPY_SRC` generates a seed from the first 384 bits pulled from the noise source.
 This initial seed is tested to ensure some minimum quality for obfuscation use- cases, but this boot seed is not expected to be full-entropy nor do these health checks meet the 1024-bit requirement for start-up health checks required by NIST 800-90B.
 - If `flag0` is asserted during instantiation, the resulting DRBG instance will have a fully-deterministic seed, determined only by user input data.
 Such a seed will be created only using factory-entropy and will lack the physical-entropy required by NIST SP 800-90A, and thus this DRBG instance will not be FIPS compliant.
@@ -501,7 +502,7 @@
 
 The `cs_entropy_req` interrupt will assert when csrng requests for entropy from ENTROPY_SRC.
 
-The `cs_hw_inst_exc` interrupt will assert when any of the hardware-controlled CSRNG instances encounters an exception while executing a command, either due to errors on the command sequencing, or an exception within the `entropy_src` IP.
+The `cs_hw_inst_exc` interrupt will assert when any of the hardware-controlled CSRNG instances encounters an exception while executing a command, either due to errors on the command sequencing, or an exception within the `ENTROPY_SRC` IP.
 
 The `cs_fifo_err` interrupt will assert when any of the csrng FIFOs has a malfunction.
 The conditions that cause this to happen are either when there is a push to a full FIFO or a pull from an empty FIFO.
diff --git a/hw/ip/entropy_src/doc/_index.md b/hw/ip/entropy_src/doc/_index.md
index 25d33ab..f56bdbc 100644
--- a/hw/ip/entropy_src/doc/_index.md
+++ b/hw/ip/entropy_src/doc/_index.md
@@ -197,15 +197,15 @@
 -------------------------------|------------------|-----------------------------|---------------
 `otp_en_entropy_src_fw_read_i` | `input `         | `otp_en_t `                 | An efuse that will enable firmware to access final entropy through a register.
 `otp_en_entropy_src_fw_over_i` | `input `         | `otp_en_t `                 | An efuse that will enable firmware to access post-health check raw entropy through a register FIFO.
-`rng_fips_o`                   | `output`         | `logic `                    | Output that indicates to the RNG AST block that Entropy_src block is generating fips level entropy.
-`entropy_src_hw_if_i`          | `input`          | `entropy_src_hw_if_req_t`   | Seed request made to the Entropy_src module.
-`entropy_src_hw_if_o`          | `output`         | `entropy_src_hw_if_rsp_t`   | Seed response from the Entropy_src module. 
-`entropy_src_rng_i`            | `input`          | `entropy_src_hw_if_req_t`   | Request made from RNG AST to the Entropy_src module to provide raw noise bits.
-`entropy_src_rng_o`            | `output`         | `entropy_src_rng_rsp_t`     | Response to RNG AST from the Entropy_src module that raw noise bits were received.
-`cs_aes_halt_o`                | `output`         | `cs_aes_halt_req_t`         | Request from Entropy_Src tp CSRNG that all requests to AES block are halted.
-`cs_aes_halt_i`                | `input`          | `cs_aes_halt_rsp_t`         | Response from CSRNG from Entropy_Src that the AES block is halted for power leveling purposes.
-`entropy_src_xht_o`            | `output`         | `entropy_src_xht_req_t`     | Request from Entropy_Src to an external health test block, which is optional.
-`entropy_src_xht_i`            | `input`          | `entropy_src_xht_rsp_t`     | Response to Entropy_Src from an external health test block, which is optional.
+`rng_fips_o`                   | `output`         | `logic `                    | Output that indicates to the RNG AST block that ENTROPY_SRC module is generating fips level entropy.
+`entropy_src_hw_if_i`          | `input`          | `entropy_src_hw_if_req_t`   | Seed request made to the ENTROPY_SRC module.
+`entropy_src_hw_if_o`          | `output`         | `entropy_src_hw_if_rsp_t`   | Seed response from the ENTROPY_SRC module.
+`entropy_src_rng_i`            | `input`          | `entropy_src_hw_if_req_t`   | Request made from RNG AST to the ENTROPY_SRC module to provide raw noise bits.
+`entropy_src_rng_o`            | `output`         | `entropy_src_rng_rsp_t`     | Response to RNG AST from the ENTROPY_SRC module that raw noise bits were received.
+`cs_aes_halt_o`                | `output`         | `cs_aes_halt_req_t`         | Request from ENTROPY_SRC tp CSRNG that all requests to AES block are halted.
+`cs_aes_halt_i`                | `input`          | `cs_aes_halt_rsp_t`         | Response from CSRNG from ENTROPY_SRC that the AES block is halted for power leveling purposes.
+`entropy_src_xht_o`            | `output`         | `entropy_src_xht_req_t`     | Request from ENTROPY_SRC to an external health test block, which is optional.
+`entropy_src_xht_i`            | `input`          | `entropy_src_xht_rsp_t`     | Response to ENTROPY_SRC from an external health test block, which is optional.
 
 
 ## Design Details