2 Development Flow
The Secure application developer and the Non-Secure application developer have a discussion and reach an agreement regarding the peripherals and memory regions that will be used to create Secure and Non-Secure applications.
The Secure application developer and the Non-Secure application developer have a discussion and reach an agreement regarding the peripherals and memory regions that will be used to create Secure and Non-Secure applications.
The online versions of the documents are provided as a courtesy. Verify all content and data in the device’s PDF documentation found on the device product page.