1541LPT (2)

From: Baltissen, GJPAA (Ruud) (ruud.baltissen_at_abp.nl)
Date: 2006-06-02 12:14:16

Hallo allemaal,

It seems I have managed to squeeze all my 1541LPT routines inside the
JiffyDOS ROM as well, although not tested yet. I also worked out a mechanism
that enables a user to ask the PC what D64 images are available. If all this
works out fine, I think I can present 1541LPT as version 1.0.

The next step is to go beyond the 1541 limitation. The first part of the
solution is quite simple IMHO: intercept the commands before they are
executed. The only entry point I have found so far is the routine that
starts interpreting the command at $C146. If you know more entry points,
please let me know.

The second part is more difficult: handling the 'communication' with the C64
(or other computer). 1) Data has to be sent to C64. The problem is finding
the location of the routine(s) that take care of that. 2) Data has to be
received. At what point must I intercept it?
Any info you have is welcome as well!

Many thanks in advance!

    / __|__
   / /  |_/     Groetjes, Ruud
   \ \__|_\
    \___|       URL: Ruud.C64.org


De informatie in dit e-mailbericht is vertrouwelijk en uitsluitend bestemd voor de geadresseerde. Wanneer u dit bericht per abuis ontvangt, verzoeken wij u contact op te nemen met de afzender per kerende e-mail. Verder verzoeken wij u in dat geval dit e-mailbericht te vernietigen en de inhoud ervan aan niemand openbaar te maken. Wij aanvaarden geen aansprakelijkheid voor onjuiste, onvolledige dan wel ontijdige overbrenging van de inhoud van een verzonden e-mailbericht, noch voor daarbij overgebrachte virussen.

The information contained in this e-mail is confidential and may be privileged. It may be read, copied and used only by the intended recipient. If you have received it in error, please contact the sender immediately by return e-mail; please delete in this case the e-mail and do not disclose its contents to any person. We don't accept liability for any errors, omissions, delays of receipt or viruses in the contents of this message which arise as a result of e-mail transmission.

       Message was sent through the cbm-hackers mailing list

Archive generated by hypermail pre-2.1.8.