User`s manual

UC-8410/8416/8418/8430 Programmer's Guide
5-20
NOTE: Use the following command to clear the encryption key on the target computer.
#setkey ““
2. Develop and compile your program on the development PC.
3. On the development PC, run the utility program ‘binencryptor’ to encrypt your program with an encryption
key.
#binencryptor yourProgram ABigKey
4. Upload the encrypted program file to the target computer by FTP or NFS and test the program.
The encryption key is a computer-wise key. This means that the computer has only one key installed.
Running the program ‘setkey’ multiple times overrides the existing key.
To prove the effectiveness of this software protection mechanism, prepare a target computer on which an
encryption key has not been installed, or install a key different from that used to encrypt your program. In
either case, the encrypted program fails immediately.
This mechanism also allows computers with an encryption key installed to bypass programs that are not
encrypted. This is handy in the development phase since you can develop your programs and test them
cleanly on the target computer.
Qt-embedded
The UC-8430 offers the QT library which helps programmers design the UI framework. See the following for
details.
QT programming development flow chart.
Write the QT program to run the in thetarget environment. A basic QT program is shown below.
#include <QtGui>
#include <QApplication>
#include <QLabel>
1. QT Programming
3. Cross-compiling
#include <QtGui>
#include <QApplication>
int main(int argc, char *argv[])
{
QApplication app(argc, argv);
//
4. Upload to target and
test
2. QT Program Testing X86