Use rand instead of srand
diff --git a/tests/fuzz/fuzz_client.c b/tests/fuzz/fuzz_client.c
index 2f439f5..b9cdddd 100644
--- a/tests/fuzz/fuzz_client.c
+++ b/tests/fuzz/fuzz_client.c
@@ -70,7 +70,7 @@
     ret = mbedtls_ctr_drbg_random(p_rng, output, output_len);
     for (i=0; i<output_len; i++) {
         //replace result with pseudo random
-        output[i] = (unsigned char) random();
+        output[i] = (unsigned char) rand();
     }
     return( ret );
 }
@@ -85,7 +85,7 @@
     //ret = mbedtls_entropy_func(data, output, len);
     for (i=0; i<len; i++) {
         //replace result with pseudo random
-        output[i] = (unsigned char) random();
+        output[i] = (unsigned char) rand();
     }
     return( 0 );
 }
@@ -182,7 +182,7 @@
     //There may be other options to add :
     // mbedtls_ssl_conf_cert_profile, mbedtls_ssl_conf_sig_hashes
 
-    srandom(1);
+    srand(1);
     mbedtls_ssl_conf_rng( &conf, dummy_random, &ctr_drbg );
 
     if( mbedtls_ssl_setup( &ssl, &conf ) != 0 )