Related articles |
---|
[6 earlier articles] |
Re: Making C compiler generate obfuscated code Pidgeot18@gmail.com (Joshua Cranmer) (2010-12-16) |
Re: Making C compiler generate obfuscated code martin@gkc.org.uk (Martin Ward) (2010-12-17) |
Re: Making C compiler generate obfuscated code gah@ugcs.caltech.edu (glen herrmannsfeldt) (2010-12-18) |
Re: Making C compiler generate obfuscated code rpw3@rpw3.org (2010-12-18) |
Re: Making C compiler generate obfuscated code DrDiettrich1@aol.com (Hans-Peter Diettrich) (2010-12-16) |
Re: Making C compiler generate obfuscated code torbenm@diku.dk (2010-12-20) |
Re: Making C compiler generate obfuscated code gneuner2@comcast.net (George Neuner) (2010-12-21) |
Re: Making C compiler generate obfuscated code gneuner2@comcast.net (George Neuner) (2010-12-21) |
Re: Making C compiler generate obfuscated code walter@bytecraft.com (Walter Banks) (2010-12-21) |
Re: Making C compiler generate obfuscated code gah@ugcs.caltech.edu (glen herrmannsfeldt) (2010-12-21) |
Re: Making C compiler generate obfuscated code martin@gkc.org.uk (Martin Ward) (2010-12-22) |
Re: Making C compiler generate obfuscated code DrDiettrich1@aol.com (Hans-Peter Diettrich) (2010-12-22) |
Re: Making C compiler generate obfuscated code gneuner2@comcast.net (George Neuner) (2010-12-23) |
[2 later articles] |
From: | George Neuner <gneuner2@comcast.net> |
Newsgroups: | comp.compilers |
Date: | Tue, 21 Dec 2010 01:30:32 -0500 |
Organization: | A noiseless patient Spider |
References: | 10-12-017 10-12-023 10-12-025 10-12-027 10-12-028 |
Keywords: | C, code, history |
Posted-Date: | 21 Dec 2010 09:36:48 EST |
On Sat, 18 Dec 2010 06:23:36 +0000 (UTC), glen herrmannsfeldt
<gah@ugcs.caltech.edu> wrote:
>Along the line of such tricks, there are stories of Apple II ROM
>cloners claiming that so many such tricks were used that the Apple
>implementation was the only one possible in the available number of
>bytes. Then, since it was the only one possible, it should not
>protected against cloning.
I've heard these claims about the Apple II ROM for thirty years and I
think they are bogus. I learned assembly programming on a IIe and it
was impossible to get much done without a good understanding of the
ROM routines. Many subroutines had multiple entry points and many
were routinely reused from different contexts, but I don't believe the
Apple's ROM was any more complex than any other computer ROM of that
era (or indeed any 8-bit device today).
The major stumbling block to cloning the Apple IIe without licensing
the ROM code was Applesoft FP BASIC, which was implemented using a
bytecoded 16-bit virtual machine interpreter called Sweet16.
Approximately 5KB of Sweet16 code was included in the 16KB Apple IIe
ROM. The cloners couldn't copy the Sweet16 code, nor could they
figure out how to fit a non-infringing work-alike BASIC into the same
address space.
There were a few other issues with the ROM code for the custom disk
controller and video (in particular the hi-res graphics IIRC). Here
the problem was not having Wozniak's hardware ... work-alike code for
OTS video display and disk controllers couldn't be fit into the same
address space.
There eventually were a number of legal Apple IIe and //c clones, but,
AFAIK, all of them had much larger ROMs than the machine they copied
and had to use bank-switching and address shadowing to present a
compatible memory map for existing Apple programs.
YMMV but I don't consider implementing a virtual machine to be a
"trick". Wozniak created Sweet16 to make programming easier ... it
ultimately saved some ROM space, but it was never intended to deceive
anyone ... the Sweet16 interpreter and the fact that it was used was
documented in the Apple ][ Integer BASIC manual. I don't recall if
Sweet16 ever was mentioned in the FP BASIC manual, but FP BASIC was an
extension of Integer BASIC and so, ISTM, anyone interested should have
inferred that Sweet16 had been used in FP BASIC's implementation as
well.
George
Return to the
comp.compilers page.
Search the
comp.compilers archives again.