Difference between revisions of "Hacker Guide/Access"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
= Usage = | = Usage = | ||
− | As the name suggests, these modules are designed to be the first and last elements of a modules chain. Access [[Hacker' | + | As the name suggests, these modules are designed to be the first and last elements of a modules chain. Access [[Documentation:Hacker's Guide/Access|input]] and [[Documentation:Hacker's Guide/Access output|output]] handles most of the basic I/O for VLC. Protocol implementations, device access (like V4L2), file access and network I/O are all examples of access modules. |
= Functionnality = | = Functionnality = | ||
− | Generally speaking, [[Hacker' | + | Generally speaking, [[Documentation:Hacker's Guide/Access|access input]] will provide Read() functions and [[Documentation:Hacker's Guide/Access output|output]] Write(). Both needs to provide Seek() and Control() even if the underlying architecture does not support these actions. In this case, Seek() and Control() should return VLC_EGENERIC, althout Control() might need to answer ACCESS_OUT_CONTROLS_PACE requests. See modules/acces_output/http.c about using a source without seeking. |
Revision as of 19:12, 14 August 2009
Usage
As the name suggests, these modules are designed to be the first and last elements of a modules chain. Access input and output handles most of the basic I/O for VLC. Protocol implementations, device access (like V4L2), file access and network I/O are all examples of access modules.
Functionnality
Generally speaking, access input will provide Read() functions and output Write(). Both needs to provide Seek() and Control() even if the underlying architecture does not support these actions. In this case, Seek() and Control() should return VLC_EGENERIC, althout Control() might need to answer ACCESS_OUT_CONTROLS_PACE requests. See modules/acces_output/http.c about using a source without seeking.