|
1 /**************************************************************************** |
|
2 ** |
|
3 ** Copyright (C) 2010 Nokia Corporation and/or its subsidiary(-ies). |
|
4 ** All rights reserved. |
|
5 ** Contact: Nokia Corporation (qt-info@nokia.com) |
|
6 ** |
|
7 ** This file is part of the documentation of the Qt Toolkit. |
|
8 ** |
|
9 ** $QT_BEGIN_LICENSE:LGPL$ |
|
10 ** No Commercial Usage |
|
11 ** This file contains pre-release code and may not be distributed. |
|
12 ** You may use this file in accordance with the terms and conditions |
|
13 ** contained in the Technology Preview License Agreement accompanying |
|
14 ** this package. |
|
15 ** |
|
16 ** GNU Lesser General Public License Usage |
|
17 ** Alternatively, this file may be used under the terms of the GNU Lesser |
|
18 ** General Public License version 2.1 as published by the Free Software |
|
19 ** Foundation and appearing in the file LICENSE.LGPL included in the |
|
20 ** packaging of this file. Please review the following information to |
|
21 ** ensure the GNU Lesser General Public License version 2.1 requirements |
|
22 ** will be met: http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html. |
|
23 ** |
|
24 ** In addition, as a special exception, Nokia gives you certain additional |
|
25 ** rights. These rights are described in the Nokia Qt LGPL Exception |
|
26 ** version 1.1, included in the file LGPL_EXCEPTION.txt in this package. |
|
27 ** |
|
28 ** If you have questions regarding the use of this file, please contact |
|
29 ** Nokia at qt-info@nokia.com. |
|
30 ** |
|
31 ** |
|
32 ** |
|
33 ** |
|
34 ** |
|
35 ** |
|
36 ** |
|
37 ** |
|
38 ** $QT_END_LICENSE$ |
|
39 ** |
|
40 ****************************************************************************/ |
|
41 |
|
42 /*! |
|
43 \example network/torrent |
|
44 \title Torrent Example |
|
45 |
|
46 The Torrent example is a functional BitTorrent client that |
|
47 illustrates how to write a complex TCP/IP application using Qt. |
|
48 |
|
49 \image torrent-example.png |
|
50 |
|
51 \section1 License Information |
|
52 |
|
53 The implementation of the US Secure Hash Algorithm 1 (SHA1) in this example is |
|
54 derived from the original description in \l{RFC 3174}. |
|
55 |
|
56 \legalese |
|
57 Copyright (C) The Internet Society (2001). All Rights Reserved. |
|
58 |
|
59 This document and translations of it may be copied and furnished to |
|
60 others, and derivative works that comment on or otherwise explain it |
|
61 or assist in its implementation may be prepared, copied, published |
|
62 and distributed, in whole or in part, without restriction of any |
|
63 kind, provided that the above copyright notice and this paragraph are |
|
64 included on all such copies and derivative works. However, this |
|
65 document itself may not be modified in any way, such as by removing |
|
66 the copyright notice or references to the Internet Society or other |
|
67 Internet organizations, except as needed for the purpose of |
|
68 developing Internet standards in which case the procedures for |
|
69 copyrights defined in the Internet Standards process must be |
|
70 followed, or as required to translate it into languages other than |
|
71 English. |
|
72 |
|
73 The limited permissions granted above are perpetual and will not be |
|
74 revoked by the Internet Society or its successors or assigns. |
|
75 |
|
76 This document and the information contained herein is provided on an |
|
77 "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING |
|
78 TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING |
|
79 BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION |
|
80 HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF |
|
81 MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. |
|
82 \endlegalese |
|
83 */ |