Lines Matching full:environment
35 * The secure processing environment (secure boot and TF-M) starts first
51 | Secure Processing Environment (SPE) | | NSPE |
62 Communication between the (Zephyr) Non-Secure Processing Environment (NSPE) and
63 the (TF-M) Secure Processing Environment image happens based on a set of PSA
103 processing environment which, depending on the isolation level chosen when
111 non-secure environment, and has the least privilege in the system. This is the
123 boundary is between the secure and non-secure processing environment,
181 Secure Processing Environment
185 will begin execution in the **secure processing environment**. This is where
225 private keys are only ever accessible to the secure processing environment.
228 should the key material ever be exposed to the NS environment.
231 processing environment as a one-way operation, such as during a factory
258 Non-Secure Processing Environment
272 environment.