<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HSE RNG performance on RDB3 SDK BSP39 in S32G</title>
    <link>https://community.nxp.com/t5/S32G/HSE-RNG-performance-on-RDB3-SDK-BSP39/m-p/1800425#M5845</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, I know that&amp;nbsp;&lt;SPAN&gt;/dev/hwrng should be one of sources of&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;/dev/random, but I think the performance between these two device diffs too much, so I want to know what causes this difference and the real performance of HSE RNG.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Zhantao&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 02 Feb 2024 02:57:04 GMT</pubDate>
    <dc:creator>hittzt</dc:creator>
    <dc:date>2024-02-02T02:57:04Z</dc:date>
    <item>
      <title>HSE RNG performance on RDB3 SDK BSP39</title>
      <link>https://community.nxp.com/t5/S32G/HSE-RNG-performance-on-RDB3-SDK-BSP39/m-p/1798313#M5815</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Recently, I tested HSE rng performance based on SDK BSP39 release codes, results as following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;root@nxp-s32g:~# dmesg | grep hse&lt;BR /&gt;[ 2.242979] hse-uio 40210000.mu0b: standard firmware, version 2.22.0&lt;BR /&gt;[ 2.248118] hse-uio 40210000.mu0b: successfully registered device&lt;BR /&gt;[ 2.372888] hse 40211000.mu1b: standard firmware, version 2.22.0&lt;BR /&gt;[ 2.379794] hse 40211000.mu1b: registered algs sha1,hmac(sha1)&lt;BR /&gt;[ 2.384559] hse 40211000.mu1b: registered algs sha224,hmac(sha224)&lt;BR /&gt;[ 2.389713] hse 40211000.mu1b: registered algs sha256,hmac(sha256)&lt;BR /&gt;[ 2.394839] hse 40211000.mu1b: registered algs sha384,hmac(sha384)&lt;BR /&gt;[ 2.399969] hse 40211000.mu1b: registered algs sha512,hmac(sha512)&lt;BR /&gt;[ 2.405020] hse 40211000.mu1b: registered alg ctr(aes)&lt;BR /&gt;[ 2.409007] hse 40211000.mu1b: registered alg cbc(aes)&lt;BR /&gt;[ 2.418716] hse 40211000.mu1b: registered alg ecb(aes)&lt;BR /&gt;[ 2.422709] hse 40211000.mu1b: registered alg cfb(aes)&lt;BR /&gt;[ 2.426699] hse 40211000.mu1b: registered alg ofb(aes)&lt;BR /&gt;[ 2.430701] hse 40211000.mu1b: registered alg gcm(aes)&lt;BR /&gt;[ 2.434686] hse 40211000.mu1b: registered hwrng-hse&lt;BR /&gt;[ 2.438327] hse 40211000.mu1b: device ready, status 0x4B20&lt;BR /&gt;root@nxp-s32g:~#&lt;BR /&gt;root@nxp-s32g:~#&lt;BR /&gt;root@nxp-s32g:~# time rngtest -c 1000 &amp;lt; /dev/hwrng&lt;BR /&gt;rngtest 6.15&lt;BR /&gt;Copyright (c) 2004 by Henrique de Moraes Holschuh&lt;BR /&gt;This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.&lt;/P&gt;&lt;P&gt;rngtest: starting FIPS tests...&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[ 367.785712] kworker/dying (11) used greatest stack depth: 8528 bytes left&lt;BR /&gt;[ 739.821032] kmemleak: 24 new suspected memory leaks (see /sys/kernel/debug/kmemleak)&lt;BR /&gt;rngtest: bits received from input: 20000032&lt;BR /&gt;rngtest: FIPS 140-2 successes: 1000&lt;BR /&gt;rngtest: FIPS 140-2 failures: 0&lt;BR /&gt;rngtest: FIPS 140-2(2001-10-10) Monobit: 0&lt;BR /&gt;rngtest: FIPS 140-2(2001-10-10) Poker: 0&lt;BR /&gt;rngtest: FIPS 140-2(2001-10-10) Runs: 0&lt;BR /&gt;rngtest: FIPS 140-2(2001-10-10) Long run: 0&lt;BR /&gt;rngtest: FIPS 140-2(2001-10-10) Continuous run: 0&lt;BR /&gt;rngtest: input channel speed: (min=8.984; avg=14.473; max=15.834)Kibits/s&lt;BR /&gt;rngtest: FIPS tests speed: (min=20.356; avg=57.682; max=59.791)Mibits/s&lt;BR /&gt;rngtest: Program run time: 1349844876 microseconds&lt;/P&gt;&lt;P&gt;real 22m29.886s&lt;BR /&gt;user 0m0.349s&lt;BR /&gt;sys 0m1.621s&lt;BR /&gt;root@nxp-s32g:~#&lt;BR /&gt;root@nxp-s32g:~#&lt;BR /&gt;&lt;A href="mailto:root@nxp-s32g:~" target="_blank"&gt;root@nxp-s32g:~#&lt;/A&gt;&lt;/P&gt;&lt;P&gt;And to compare, I also test /dev/random performance:&lt;/P&gt;&lt;P&gt;root@nxp-s32g:~#&lt;BR /&gt;root@nxp-s32g:~# time rngtest -c 1000 &amp;lt; /dev/random&lt;BR /&gt;rngtest 6.15&lt;BR /&gt;Copyright (c) 2004 by Henrique de Moraes Holschuh&lt;BR /&gt;This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.&lt;/P&gt;&lt;P&gt;rngtest: starting FIPS tests...&lt;BR /&gt;rngtest: bits received from input: 20000032&lt;BR /&gt;rngtest: FIPS 140-2 successes: 999&lt;BR /&gt;rngtest: FIPS 140-2 failures: 1&lt;BR /&gt;rngtest: FIPS 140-2(2001-10-10) Monobit: 0&lt;BR /&gt;rngtest: FIPS 140-2(2001-10-10) Poker: 0&lt;BR /&gt;rngtest: FIPS 140-2(2001-10-10) Runs: 1&lt;BR /&gt;rngtest: FIPS 140-2(2001-10-10) Long run: 0&lt;BR /&gt;rngtest: FIPS 140-2(2001-10-10) Continuous run: 0&lt;BR /&gt;rngtest: input channel speed: (min=307.637; avg=681.878; max=706.425)Mibits/s&lt;BR /&gt;rngtest: FIPS tests speed: (min=54.033; avg=59.311; max=59.980)Mibits/s&lt;BR /&gt;rngtest: Program run time: 349912 microseconds&lt;/P&gt;&lt;P&gt;real 0m0.353s&lt;BR /&gt;user 0m0.317s&lt;BR /&gt;sys 0m0.036s&lt;BR /&gt;&lt;A href="mailto:root@nxp-s32g:~" target="_blank"&gt;root@nxp-s32g:~#&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The diff of time spend by these hwrng and random is too large.&lt;/P&gt;&lt;P&gt;Would you please help to confirm the issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Zhantao&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 05:58:11 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32G/HSE-RNG-performance-on-RDB3-SDK-BSP39/m-p/1798313#M5815</guid>
      <dc:creator>hittzt</dc:creator>
      <dc:date>2024-01-31T05:58:11Z</dc:date>
    </item>
    <item>
      <title>Re: HSE RNG performance on RDB3 SDK BSP39</title>
      <link>https://community.nxp.com/t5/S32G/HSE-RNG-performance-on-RDB3-SDK-BSP39/m-p/1798962#M5824</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;For what we can see, HSE performance information seems to be confidential, can you help us opening a ticket under the NXP online services?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We do apologize for the inconvenience.&lt;/P&gt;
&lt;P&gt;Please, let us know.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 18:27:29 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32G/HSE-RNG-performance-on-RDB3-SDK-BSP39/m-p/1798962#M5824</guid>
      <dc:creator>Daniel-Aguirre</dc:creator>
      <dc:date>2024-01-31T18:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: HSE RNG performance on RDB3 SDK BSP39</title>
      <link>https://community.nxp.com/t5/S32G/HSE-RNG-performance-on-RDB3-SDK-BSP39/m-p/1799536#M5832</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;On the topic of comparing performance of /dev/random vs. /dev/hwrng, it's expected to have a difference of several orders of magnitude considering that:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;/dev/random is a &lt;STRONG&gt;pseudo&lt;/STRONG&gt; random number generator - it's seeded from time to time (rarely) from the kernel entropy pool; HSE RNG is one of the contributors to the pool, but it's not the only source&lt;/LI&gt;
&lt;LI&gt;/dev/hwrng is a &lt;STRONG&gt;hardware / true&lt;/STRONG&gt; random number generator - all bits extracted from it are entropy generated by HSE RNG&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 01 Feb 2024 06:03:25 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32G/HSE-RNG-performance-on-RDB3-SDK-BSP39/m-p/1799536#M5832</guid>
      <dc:creator>horiageanta</dc:creator>
      <dc:date>2024-02-01T06:03:25Z</dc:date>
    </item>
    <item>
      <title>Re: HSE RNG performance on RDB3 SDK BSP39</title>
      <link>https://community.nxp.com/t5/S32G/HSE-RNG-performance-on-RDB3-SDK-BSP39/m-p/1800425#M5845</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, I know that&amp;nbsp;&lt;SPAN&gt;/dev/hwrng should be one of sources of&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;/dev/random, but I think the performance between these two device diffs too much, so I want to know what causes this difference and the real performance of HSE RNG.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Zhantao&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2024 02:57:04 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32G/HSE-RNG-performance-on-RDB3-SDK-BSP39/m-p/1800425#M5845</guid>
      <dc:creator>hittzt</dc:creator>
      <dc:date>2024-02-02T02:57:04Z</dc:date>
    </item>
  </channel>
</rss>

