mpg123

mpg123
Original author(s) Michael Hipp, Oliver Fromme
Initial release before 1999
Stable release
1.23.4 / May 11, 2016 (2016-05-11)
Development status Active
Written in C, Assembly
Operating system Windows and Linux (not compiled)
Type Audio player
License GNU Lesser General Public License version 2.1
Website mpg123.org

mpg123 is a free and open-source audio player. As the name suggests, it supports MPEG audio formats, including MP3. It is a console application, meaning that it has no graphical user interface. Builds are only available for Windows; Linux users need to compile mpg123 themselves.[1]

mpg123's Assembly code is optimized with SIMD instructions to improve the performance of the iDCT part of the MPEG decoding.

mpg123's decoding library, libmpg123 is used by XMMS and Audacious for MP3 playback and can be used in Winamp via a plugin.[2]

History

The last stable version (0.59r) produced by the original authors, Michael Hipp and Oliver Fromme, dated 19 June 1999, was licensed under a non-commercial, no-derivative proprietary software license, although the source code was available. This also led to mpg321, a fork of the program.[3] The official development of mpg123 and its library, mpglib, had ceased for several years, and as some serious security holes emerged,[1][4] patches were submitted by third party developers for the Debian and Gentoo Linux packages, as well as the FreeBSD ports collection.

In 2006, a new maintainer stepped up, reinstating work towards the release of a new official mpg123 package entirely under the LGPL. Near the end of 2007, after several releases in the 0.6.x series that included all known security fixes, version 1.0 was released under the LGPL v2.1, with libmpg123 branded as a full-featured replacement for mpglib.

See also

References

  1. 1 2 "mpg123: Downloads".
  2. kjoonlee (2004-02-09). "Otachan's in_!mpg123, Alternative Winamp mp3 playback plugin". Retrieved 2015-07-04.
  3. Olli Rajala. "About mpg321". Retrieved 2015-07-04.
  4. "Mpg123: Security Vulnerabilities". cvedetails.com. Retrieved 2015-07-04.
This article is issued from Wikipedia - version of the 8/1/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.