This article is for informational purposes. Always refer to the latest official NXP documentation for your specific processor part number.
Introduction In the era of edge computing, critical infrastructure, and connected industrial systems, security is no longer a feature—it is a foundational requirement. For developers working with NXP’s QorIQ series of processors (P Series, T Series, and LS Series), the Trust Architecture (TA) provides a hardware-based root of trust. Version 2.1 of this architecture represents a significant evolution in secure boot, debug security, and lifecycle management.
| Level | Access | Requirement | |-------|--------|--------------| | Disabled | No debug | Final product | | Unlocked | Full JTAG | Correct challenge-response | | Limited | Data memory only | Partial key |
./cst -s -i boot_image.ini -o signed_image.bin The header output includes signature, key index, and monotonic counter. The guide warns: Fusing is irreversible. Use the pbl_fuse tool or a JTAG programmer. Example fuse commands for SRKH (address 0x1E0):