Attachment: binWCyl9GMv0u.bin
Description: remove-DTMF.patch.gz

Tue Sep 27 23:58:32 ADT 2005  [EMAIL PROTECTED]
  * remove DTMF
  The big refactoring broke DTMF because it changed where PT bytes were stored.
  This patch removes the broken left-overs of DTMF.  Perhaps a patch that fixed
  DTMF would be preferable...
  
diff -rN -u old-tailor1406/shtoom/shtoom/rtp/protocol.py 
new-tailor1406/shtoom/shtoom/rtp/protocol.py
--- old-tailor1406/shtoom/shtoom/rtp/protocol.py        2005-09-27 
23:59:41.127431504 -0300
+++ new-tailor1406/shtoom/shtoom/rtp/protocol.py        2005-09-27 
23:59:41.255412048 -0300
@@ -312,13 +312,6 @@
         ts = ts & (2**32 - 1)
         return ts
 
-    def startDTMF(self, digit):
-        self._pendingDTMF.append(NTE(digit, self.ts))
-
-    def stopDTMF(self, digit):
-        if self._pendingDTMF[-1].getKey() == digit:
-            self._pendingDTMF[-1].end()
-
     def genRandom(self, bits):
         """Generate up to 128 bits of randomness."""
         if os.path.exists("/dev/urandom"):
@@ -352,13 +345,3 @@
         # Wrapping
         if self.ts >= TWO_TO_THE_32ND:
             self.ts = self.ts - TWO_TO_THE_32ND
-
-        # Now send any pending DTMF keystrokes
-        if self._pendingDTMF:
-            payload = self._pendingDTMF[0].getPayload(self.ts)
-            if payload:
-                ntept = self.ptdict.get(PT_NTE)
-                if ntept is not None:
-                    self._send_packet(pt=ntept, data=payload)
-                if self._pendingDTMF[0].isDone():
-                    self._pendingDTMF = self._pendingDTMF[1:]

_______________________________________________
Shtoom mailing list
[email protected]
http://mail.python.org/mailman/listinfo/shtoom

Reply via email to