aboutsummaryrefslogtreecommitdiffstats
path: root/3rdparty/QtPropertyBrowser/examples/object_controller/CMakeLists.txt
blob: 390d01730195e196fdd6777f67322c7f383e2dd5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
# Tell CMake to run moc when necessary:
set(CMAKE_AUTOMOC ON)

# As moc files are generated in the binary dir, tell CMake
# to always look for includes there:
set(CMAKE_INCLUDE_CURRENT_DIR ON)

SET(example_name object_controller)

SET(KIT_SRCS
  main.cpp
  objectcontroller.cpp
  )
  
ADD_EXECUTABLE(${example_name} ${KIT_SRCS})
TARGET_LINK_LIBRARIES(${example_name} ${PROJECT_NAME})
s in a slightly different way from symmetric encryption. Someone with the public key is able to encrypt a message, providing confidentiality, and then only the person in possession of the private key is able to decrypt it. Cryptography supports three different sets of asymmetric algorithms: RSA, DSA, and Elliptic Curve. .. toctree:: :maxdepth: 1 dsa ec rsa dh serialization interfaces utils .. _`proof of identity`: https://en.wikipedia.org/wiki/Public-key_infrastructure