binWCyl9GMv0u.bin
Description: remove-DTMF.patch.gz
Tue Sep 27 23:58:32 ADT 2005 [EMAIL PROTECTED]
* remove DTMF
The big refactoring broke DTMF because it changed where PT bytes were stored.
This patch removes the broken left-overs of DTMF. Perhaps a patch that fixed
DTMF would be preferable...
diff -rN -u old-tailor1406/shtoom/shtoom/rtp/protocol.py
new-tailor1406/shtoom/shtoom/rtp/protocol.py
--- old-tailor1406/shtoom/shtoom/rtp/protocol.py 2005-09-27
23:59:41.127431504 -0300
+++ new-tailor1406/shtoom/shtoom/rtp/protocol.py 2005-09-27
23:59:41.255412048 -0300
@@ -312,13 +312,6 @@
ts = ts & (2**32 - 1)
return ts
- def startDTMF(self, digit):
- self._pendingDTMF.append(NTE(digit, self.ts))
-
- def stopDTMF(self, digit):
- if self._pendingDTMF[-1].getKey() == digit:
- self._pendingDTMF[-1].end()
-
def genRandom(self, bits):
"""Generate up to 128 bits of randomness."""
if os.path.exists("/dev/urandom"):
@@ -352,13 +345,3 @@
# Wrapping
if self.ts >= TWO_TO_THE_32ND:
self.ts = self.ts - TWO_TO_THE_32ND
-
- # Now send any pending DTMF keystrokes
- if self._pendingDTMF:
- payload = self._pendingDTMF[0].getPayload(self.ts)
- if payload:
- ntept = self.ptdict.get(PT_NTE)
- if ntept is not None:
- self._send_packet(pt=ntept, data=payload)
- if self._pendingDTMF[0].isDone():
- self._pendingDTMF = self._pendingDTMF[1:]_______________________________________________ Shtoom mailing list [email protected] http://mail.python.org/mailman/listinfo/shtoom
