The "GR-PEACH_Audio_Playback_Sample" is a sample code that can provides high-resolution audio playback of FLAC format files. It also allows the user to audio-playback control functions such as play, pause, and stop by manipulating key switches.

Dependencies:   R_BSP TLV320_RBSP USBHost_custom

Note

For a sample program of with LCD Board,
please refer to GR-PEACH_Audio_Playback_7InchLCD_Sample.

Introduction

The "GR-PEACH_Audio_Playback_Sample" is a sample code that can provides high-resolution audio playback of FLAC format files. It also allows the user to audio-playback control functions such as play, pause, and stop by manipulating key switches.

1. Overview of the Sample Code

1.1 Software Block Diagram

Figure 1.1 shows the software block diagram.

/media/uploads/dkato/audioplayback_figure1_1x.png

1.2 Pin Definitions

Table 1.1 shows the pins that this sample code are to use.

/media/uploads/dkato/audioplayback_table1_1.png

2. Sample Code Operating Environment

This sample code runs in GR-PEACH + the Audio/Camera shield for the GR-PEACH environment. This section explains the functions of the ports that are used by this sample code.

2.1 Operating Environment

Figure 2.1 shows the configuration of the operating environment for running this sample code.

/media/uploads/dkato/audioplayback_figure2_1.png /media/uploads/1050186/figure2_2.png /media/uploads/dkato/audioplayback_figure2_3.png

2.2 List of User Operations

A list of user operations on the command line, TFT touch keys, and switch key that the user can perform for this sample code is shown in. Table 2.1.

/media/uploads/dkato/audioplayback_table2_1x.png

3. Function Outline

The functions of this sample code are summarized in Table 3.1 to Table 3.3.

/media/uploads/dkato/audioplayback_table3_1.png /media/uploads/dkato/audioplayback_table3_2.png /media/uploads/dkato/audioplayback_table3_3.png /media/uploads/dkato/audioplayback_figure3_1.png

3.1 Playback Control

The playback control that the sample code supports include play, pause, stop, skip to next, and skip to previous.

3.2 Trick Play Control

Manipulating "Repeat" alternates between "Repeat mode On" and "Repeat mode Off". The default mode is "Repeat mode On". When the repeat mode is on, the playback of the first song starts after the playback of the last song is finished. When the repeat mode is off, the sample code enters the stopped state after the playback of the last song is finished.

3.3 Acquisition of the Song Information

The information of the song being played is obtained by operating the "Play info" during the playback of the song. Table 3.4 lists the items of information that can be obtained by the "Play info" operation.

/media/uploads/dkato/audioplayback_table3_4.png

3.4 How the Folder Structure is Analyzed

The sample coded analyzes the folder structure in the breadth-first search order. The order in which files are numbered is illustrated in Table 3.5. The sample code does not sort the files by file or folder name.

/media/uploads/dkato/audioplayback_table3_5.png

4.Others

The default setting of serial communication (baud rate etc.) in mbed is shown the following link.
Please refer to the link and change the settings of your PC terminal software.
The default value of baud rate in mbed is 9600, and this application uses baud rate 9600.
https://developer.mbed.org/teams/Renesas/wiki/GR-PEACH-Getting-Started#install-the-usb-serial-communication

Committer:
dkato
Date:
Fri Oct 16 04:28:07 2015 +0000
Revision:
0:ee40da884cfc
first commit

Who changed what in which revision?

UserRevisionLine numberNew contents of line
dkato 0:ee40da884cfc 1 /* libFLAC - Free Lossless Audio Codec library
dkato 0:ee40da884cfc 2 * Copyright (C) 2001-2009 Josh Coalson
dkato 0:ee40da884cfc 3 * Copyright (C) 2011-2014 Xiph.Org Foundation
dkato 0:ee40da884cfc 4 *
dkato 0:ee40da884cfc 5 * Redistribution and use in source and binary forms, with or without
dkato 0:ee40da884cfc 6 * modification, are permitted provided that the following conditions
dkato 0:ee40da884cfc 7 * are met:
dkato 0:ee40da884cfc 8 *
dkato 0:ee40da884cfc 9 * - Redistributions of source code must retain the above copyright
dkato 0:ee40da884cfc 10 * notice, this list of conditions and the following disclaimer.
dkato 0:ee40da884cfc 11 *
dkato 0:ee40da884cfc 12 * - Redistributions in binary form must reproduce the above copyright
dkato 0:ee40da884cfc 13 * notice, this list of conditions and the following disclaimer in the
dkato 0:ee40da884cfc 14 * documentation and/or other materials provided with the distribution.
dkato 0:ee40da884cfc 15 *
dkato 0:ee40da884cfc 16 * - Neither the name of the Xiph.org Foundation nor the names of its
dkato 0:ee40da884cfc 17 * contributors may be used to endorse or promote products derived from
dkato 0:ee40da884cfc 18 * this software without specific prior written permission.
dkato 0:ee40da884cfc 19 *
dkato 0:ee40da884cfc 20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
dkato 0:ee40da884cfc 21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
dkato 0:ee40da884cfc 22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
dkato 0:ee40da884cfc 23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR
dkato 0:ee40da884cfc 24 * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
dkato 0:ee40da884cfc 25 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
dkato 0:ee40da884cfc 26 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
dkato 0:ee40da884cfc 27 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
dkato 0:ee40da884cfc 28 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
dkato 0:ee40da884cfc 29 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
dkato 0:ee40da884cfc 30 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
dkato 0:ee40da884cfc 31 */
dkato 0:ee40da884cfc 32
dkato 0:ee40da884cfc 33 #ifndef FLAC__PRIVATE__BITMATH_H
dkato 0:ee40da884cfc 34 #define FLAC__PRIVATE__BITMATH_H
dkato 0:ee40da884cfc 35
dkato 0:ee40da884cfc 36 #include "FLAC/ordinals.h"
dkato 0:ee40da884cfc 37 #include "FLAC/assert.h"
dkato 0:ee40da884cfc 38
dkato 0:ee40da884cfc 39 /* for CHAR_BIT */
dkato 0:ee40da884cfc 40 #include <limits.h>
dkato 0:ee40da884cfc 41 #include "share/compat.h"
dkato 0:ee40da884cfc 42
dkato 0:ee40da884cfc 43 #if defined(_MSC_VER) && (_MSC_VER >= 1400)
dkato 0:ee40da884cfc 44 #include <intrin.h> /* for _BitScanReverse* */
dkato 0:ee40da884cfc 45 #endif
dkato 0:ee40da884cfc 46
dkato 0:ee40da884cfc 47 /* Will never be emitted for MSVC, GCC, Intel compilers */
dkato 0:ee40da884cfc 48 static inline unsigned int FLAC__clz_soft_uint32(unsigned int word)
dkato 0:ee40da884cfc 49 {
dkato 0:ee40da884cfc 50 static const unsigned char byte_to_unary_table[] = {
dkato 0:ee40da884cfc 51 8, 7, 6, 6, 5, 5, 5, 5, 4, 4, 4, 4, 4, 4, 4, 4,
dkato 0:ee40da884cfc 52 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3,
dkato 0:ee40da884cfc 53 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
dkato 0:ee40da884cfc 54 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
dkato 0:ee40da884cfc 55 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
dkato 0:ee40da884cfc 56 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
dkato 0:ee40da884cfc 57 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
dkato 0:ee40da884cfc 58 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
dkato 0:ee40da884cfc 59 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
dkato 0:ee40da884cfc 60 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
dkato 0:ee40da884cfc 61 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
dkato 0:ee40da884cfc 62 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
dkato 0:ee40da884cfc 63 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
dkato 0:ee40da884cfc 64 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
dkato 0:ee40da884cfc 65 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
dkato 0:ee40da884cfc 66 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
dkato 0:ee40da884cfc 67 };
dkato 0:ee40da884cfc 68
dkato 0:ee40da884cfc 69 return (word) > 0xffffff ? byte_to_unary_table[(word) >> 24] :
dkato 0:ee40da884cfc 70 (word) > 0xffff ? byte_to_unary_table[(word) >> 16] + 8 :
dkato 0:ee40da884cfc 71 (word) > 0xff ? byte_to_unary_table[(word) >> 8] + 16 :
dkato 0:ee40da884cfc 72 byte_to_unary_table[(word)] + 24;
dkato 0:ee40da884cfc 73 }
dkato 0:ee40da884cfc 74
dkato 0:ee40da884cfc 75 static inline unsigned int FLAC__clz_uint32(FLAC__uint32 v)
dkato 0:ee40da884cfc 76 {
dkato 0:ee40da884cfc 77 /* Never used with input 0 */
dkato 0:ee40da884cfc 78 FLAC__ASSERT(v > 0);
dkato 0:ee40da884cfc 79 #if defined(__INTEL_COMPILER)
dkato 0:ee40da884cfc 80 return _bit_scan_reverse(v) ^ 31U;
dkato 0:ee40da884cfc 81 #elif defined(__GNUC__) && (__GNUC__ >= 4 || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4))
dkato 0:ee40da884cfc 82 /* This will translate either to (bsr ^ 31U), clz , ctlz, cntlz, lzcnt depending on
dkato 0:ee40da884cfc 83 * -march= setting or to a software routine in exotic machines. */
dkato 0:ee40da884cfc 84 return __builtin_clz(v);
dkato 0:ee40da884cfc 85 #elif defined(_MSC_VER) && (_MSC_VER >= 1400)
dkato 0:ee40da884cfc 86 {
dkato 0:ee40da884cfc 87 unsigned long idx;
dkato 0:ee40da884cfc 88 _BitScanReverse(&idx, v);
dkato 0:ee40da884cfc 89 return idx ^ 31U;
dkato 0:ee40da884cfc 90 }
dkato 0:ee40da884cfc 91 #else
dkato 0:ee40da884cfc 92 return FLAC__clz_soft_uint32(v);
dkato 0:ee40da884cfc 93 #endif
dkato 0:ee40da884cfc 94 }
dkato 0:ee40da884cfc 95
dkato 0:ee40da884cfc 96 /* This one works with input 0 */
dkato 0:ee40da884cfc 97 static inline unsigned int FLAC__clz2_uint32(FLAC__uint32 v)
dkato 0:ee40da884cfc 98 {
dkato 0:ee40da884cfc 99 if (!v)
dkato 0:ee40da884cfc 100 return 32;
dkato 0:ee40da884cfc 101 return FLAC__clz_uint32(v);
dkato 0:ee40da884cfc 102 }
dkato 0:ee40da884cfc 103
dkato 0:ee40da884cfc 104 /* An example of what FLAC__bitmath_ilog2() computes:
dkato 0:ee40da884cfc 105 *
dkato 0:ee40da884cfc 106 * ilog2( 0) = assertion failure
dkato 0:ee40da884cfc 107 * ilog2( 1) = 0
dkato 0:ee40da884cfc 108 * ilog2( 2) = 1
dkato 0:ee40da884cfc 109 * ilog2( 3) = 1
dkato 0:ee40da884cfc 110 * ilog2( 4) = 2
dkato 0:ee40da884cfc 111 * ilog2( 5) = 2
dkato 0:ee40da884cfc 112 * ilog2( 6) = 2
dkato 0:ee40da884cfc 113 * ilog2( 7) = 2
dkato 0:ee40da884cfc 114 * ilog2( 8) = 3
dkato 0:ee40da884cfc 115 * ilog2( 9) = 3
dkato 0:ee40da884cfc 116 * ilog2(10) = 3
dkato 0:ee40da884cfc 117 * ilog2(11) = 3
dkato 0:ee40da884cfc 118 * ilog2(12) = 3
dkato 0:ee40da884cfc 119 * ilog2(13) = 3
dkato 0:ee40da884cfc 120 * ilog2(14) = 3
dkato 0:ee40da884cfc 121 * ilog2(15) = 3
dkato 0:ee40da884cfc 122 * ilog2(16) = 4
dkato 0:ee40da884cfc 123 * ilog2(17) = 4
dkato 0:ee40da884cfc 124 * ilog2(18) = 4
dkato 0:ee40da884cfc 125 */
dkato 0:ee40da884cfc 126
dkato 0:ee40da884cfc 127 static inline unsigned FLAC__bitmath_ilog2(FLAC__uint32 v)
dkato 0:ee40da884cfc 128 {
dkato 0:ee40da884cfc 129 FLAC__ASSERT(v > 0);
dkato 0:ee40da884cfc 130 #if defined(__INTEL_COMPILER)
dkato 0:ee40da884cfc 131 return _bit_scan_reverse(v);
dkato 0:ee40da884cfc 132 #elif defined(_MSC_VER) && (_MSC_VER >= 1400)
dkato 0:ee40da884cfc 133 {
dkato 0:ee40da884cfc 134 unsigned long idx;
dkato 0:ee40da884cfc 135 _BitScanReverse(&idx, v);
dkato 0:ee40da884cfc 136 return idx;
dkato 0:ee40da884cfc 137 }
dkato 0:ee40da884cfc 138 #else
dkato 0:ee40da884cfc 139 return sizeof(FLAC__uint32) * CHAR_BIT - 1 - FLAC__clz_uint32(v);
dkato 0:ee40da884cfc 140 #endif
dkato 0:ee40da884cfc 141 }
dkato 0:ee40da884cfc 142
dkato 0:ee40da884cfc 143
dkato 0:ee40da884cfc 144 #ifdef FLAC__INTEGER_ONLY_LIBRARY /* Unused otherwise */
dkato 0:ee40da884cfc 145
dkato 0:ee40da884cfc 146 static inline unsigned FLAC__bitmath_ilog2_wide(FLAC__uint64 v)
dkato 0:ee40da884cfc 147 {
dkato 0:ee40da884cfc 148 FLAC__ASSERT(v > 0);
dkato 0:ee40da884cfc 149 #if defined(__GNUC__) && (__GNUC__ >= 4 || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4))
dkato 0:ee40da884cfc 150 return sizeof(FLAC__uint64) * CHAR_BIT - 1 - __builtin_clzll(v);
dkato 0:ee40da884cfc 151 /* Sorry, only supported in x64/Itanium.. and both have fast FPU which makes integer-only encoder pointless */
dkato 0:ee40da884cfc 152 #elif (defined(_MSC_VER) && (_MSC_VER >= 1400)) && (defined(_M_IA64) || defined(_M_X64))
dkato 0:ee40da884cfc 153 {
dkato 0:ee40da884cfc 154 unsigned long idx;
dkato 0:ee40da884cfc 155 _BitScanReverse64(&idx, v);
dkato 0:ee40da884cfc 156 return idx;
dkato 0:ee40da884cfc 157 }
dkato 0:ee40da884cfc 158 #else
dkato 0:ee40da884cfc 159 /* Brain-damaged compilers will use the fastest possible way that is,
dkato 0:ee40da884cfc 160 de Bruijn sequences (http://supertech.csail.mit.edu/papers/debruijn.pdf)
dkato 0:ee40da884cfc 161 (C) Timothy B. Terriberry (tterribe@xiph.org) 2001-2009 CC0 (Public domain).
dkato 0:ee40da884cfc 162 */
dkato 0:ee40da884cfc 163 {
dkato 0:ee40da884cfc 164 static const unsigned char DEBRUIJN_IDX64[64]={
dkato 0:ee40da884cfc 165 0, 1, 2, 7, 3,13, 8,19, 4,25,14,28, 9,34,20,40,
dkato 0:ee40da884cfc 166 5,17,26,38,15,46,29,48,10,31,35,54,21,50,41,57,
dkato 0:ee40da884cfc 167 63, 6,12,18,24,27,33,39,16,37,45,47,30,53,49,56,
dkato 0:ee40da884cfc 168 62,11,23,32,36,44,52,55,61,22,43,51,60,42,59,58
dkato 0:ee40da884cfc 169 };
dkato 0:ee40da884cfc 170 v|= v>>1;
dkato 0:ee40da884cfc 171 v|= v>>2;
dkato 0:ee40da884cfc 172 v|= v>>4;
dkato 0:ee40da884cfc 173 v|= v>>8;
dkato 0:ee40da884cfc 174 v|= v>>16;
dkato 0:ee40da884cfc 175 v|= v>>32;
dkato 0:ee40da884cfc 176 v= (v>>1)+1;
dkato 0:ee40da884cfc 177 return DEBRUIJN_IDX64[v*0x218A392CD3D5DBF>>58&0x3F];
dkato 0:ee40da884cfc 178 }
dkato 0:ee40da884cfc 179 #endif
dkato 0:ee40da884cfc 180 }
dkato 0:ee40da884cfc 181 #endif
dkato 0:ee40da884cfc 182
dkato 0:ee40da884cfc 183 unsigned FLAC__bitmath_silog2(int v);
dkato 0:ee40da884cfc 184 unsigned FLAC__bitmath_silog2_wide(FLAC__int64 v);
dkato 0:ee40da884cfc 185
dkato 0:ee40da884cfc 186 #endif