3 Conclusions
This document describes how a TrustZone-based application can be developed involving two developers working on the Secure and Non-Secure portions of the end application.
- The two developers discuss and agree on the peripherals and memory regions configured in a Secure or Non-Secure mode. The developers develop Secure and Non-Secure applications separately.
- Secure application developer shares the Secure application programmed device, Secure gateway library file, and Non-Secure entry header file to the Non-Secure application developer.
- The Non-Secure application developer uses the SG library and Non-Secure entry header file provided by the Secure application developer, and implements the Non-Secure part of the end application by calling the functionality implemented in the pre-programmed device.