Moxa UC-8481-T-LX [71/90] Software lock

Moxa UC-8410-T-LX [71/90] Software lock
UC-8410/8416/8418/8430 Programmer's Guide
5-19
i = write(fd1, &txframe, sizeof(txframe));
printf(“Write port1 data return = %d\n”, i);
printf(“Write data contexts are following :\n”);
for ( i=0; i<MAX_CAN_DATA_LENGTH; i++ )
printf("%c", txframe.data.array[i]);
printf("\n");
usleep(1);
i = read(fd2, &rxframe, sizeof(rxframe));
printf(“Read port2 data return = %d\n”, i);
printf(“Receive frame id = %d, length = %d\n”, rxframe.id, rxframe.data_length);
printf(“Receive data contexts are following :\n”);
for ( i=0; i<MAX_CAN_DATA_LENGTH; i++ )
printf("%c", rxframe.data.array[i]);
printf("\n");
close(fd1);
close(fd2);
return 0;
}
Makefile
CROSS_COMPILE=xscale-linux-
CC=$(CROSS_COMPILE)gcc
LD=$(CROSS_COMPILE)ld
STRIP=$(CROSS_COMPILE)strip
#STRIP=$(CROSS_COMPILE)strip -s
TARGET=tcan
TARGET1=canttrw
all: debug release
debug: $(TARGET).c $(TARGET1).c moxacan_ioctl.h
$(CC) -ggdb -o $(TARGET)-debug $(TARGET).c
$(CC) -ggdb -o $(TARGET1)-debug $(TARGET1).c
release: $(TARGET).c $(TARGET1).c moxacan_ioctl.h
$(CC) -o $(TARGET)-release $(TARGET).c
$(CC) -o $(TARGET1)-release $(TARGET1).c
$(STRIP) $(TARGET)-release $(TARGET1)-release
clean:
rm -f *.o $(TARGET)-debug $(TARGET)-release $(TARGET1)-debug $(TARGET1)-release
Note: Only UC-8418-LX support CAN port communication.
Software Lock
“Software Lock” is an innovative technology developed by the Moxa engineering team, and can be used by a
system integrator or developer to protect applications from being copied. An application is compiled into a
binary format bound to the embedded computer, and the operating system that the application runs on. As
long as it is obtained from the computer, it can be installed on the same hardware and under the same
operating system, resulting in a loss of the add-on value created by the developer.
Users can deploy this data encryption method to develop the software for the applications. The binary file
associated with each of your applications needs to undergo an additional encryption process after you have
developed it. The process requires you to install an encryption key in the target computer.
1. Choose an encryption key (e.g.,”ABigKey”) and install it in the target computer by a pre-utility program
called ‘setkey’.
#setkey ABigKey

Содержание

Похожие устройства

Скачать