There is nothing special to i.MX8.
The RNG generates cryptographically-strong, random data. CAAM 's RNG utilizes a true
random-number generator (TRNG) as well as a pseudo random-number generator
(PRNG) to achieve both true randomness and cryptographic strength.
The random numbers generated by the RNG are intended for direct use as secret keys,
per-message secrets, random challenges, and other similar quantities used in
cryptographic algorithms. Note that before data can be obtained from the RNG, it must be
instantiated in a particular mode by executing the appropriate descriptor. Also, a
descriptor must be executed to load the JDKEK, TDKEK and TDSK registers with data
from the RNG.
As for exact registers (SCU_HP0, SCU_HP1, etc) you can refer Security Reference Manual for these processors.
Have a great day,
Victor
-----------------------------------------------------------------------------------------------------------------------
Note: If this post answers your question, please click the Correct Answer button. Thank you!
-----------------------------------------------------------------------------------------------------------------------