mirror of
https://github.com/ioquake/ioq3.git
synced 2024-11-13 00:24:10 +00:00
* Fix a bunch of compile warnings
* Only call pkg-config if it exists * Remove cl_consoleHistory from README
This commit is contained in:
parent
c45d5403a5
commit
a857487f9b
4 changed files with 54 additions and 38 deletions
2
Makefile
2
Makefile
|
@ -160,6 +160,7 @@ TEMPDIR=/tmp
|
||||||
|
|
||||||
# set PKG_CONFIG_PATH to influence this, e.g.
|
# set PKG_CONFIG_PATH to influence this, e.g.
|
||||||
# PKG_CONFIG_PATH=/opt/cross/i386-mingw32msvc/lib/pkgconfig
|
# PKG_CONFIG_PATH=/opt/cross/i386-mingw32msvc/lib/pkgconfig
|
||||||
|
ifeq ($(shell which pkg-config > /dev/null; echo $$?),0)
|
||||||
CURL_CFLAGS=$(shell pkg-config --cflags libcurl)
|
CURL_CFLAGS=$(shell pkg-config --cflags libcurl)
|
||||||
CURL_LIBS=$(shell pkg-config --libs libcurl)
|
CURL_LIBS=$(shell pkg-config --libs libcurl)
|
||||||
OPENAL_CFLAGS=$(shell pkg-config --cflags openal)
|
OPENAL_CFLAGS=$(shell pkg-config --cflags openal)
|
||||||
|
@ -167,6 +168,7 @@ OPENAL_LIBS=$(shell pkg-config --libs openal)
|
||||||
# FIXME: introduce CLIENT_CFLAGS
|
# FIXME: introduce CLIENT_CFLAGS
|
||||||
SDL_CFLAGS=$(shell pkg-config --cflags sdl|sed 's/-Dmain=SDL_main//')
|
SDL_CFLAGS=$(shell pkg-config --cflags sdl|sed 's/-Dmain=SDL_main//')
|
||||||
SDL_LIBS=$(shell pkg-config --libs sdl)
|
SDL_LIBS=$(shell pkg-config --libs sdl)
|
||||||
|
endif
|
||||||
|
|
||||||
# version info
|
# version info
|
||||||
VERSION=1.35
|
VERSION=1.35
|
||||||
|
|
1
README
1
README
|
@ -134,7 +134,6 @@ New cvars
|
||||||
backend
|
backend
|
||||||
s_muteWhenMinimized - mute sound when minimized
|
s_muteWhenMinimized - mute sound when minimized
|
||||||
in_joystickNo - select which joystick to use
|
in_joystickNo - select which joystick to use
|
||||||
cl_consoleHistory - read only, stores the console history
|
|
||||||
cl_platformSensitivity - read only, indicates the mouse input
|
cl_platformSensitivity - read only, indicates the mouse input
|
||||||
scaling
|
scaling
|
||||||
r_ext_texture_filter_anisotropic - anisotropic texture filtering
|
r_ext_texture_filter_anisotropic - anisotropic texture filtering
|
||||||
|
|
|
@ -873,10 +873,13 @@ S_AL_UpdateEntityPosition
|
||||||
static
|
static
|
||||||
void S_AL_UpdateEntityPosition( int entityNum, const vec3_t origin )
|
void S_AL_UpdateEntityPosition( int entityNum, const vec3_t origin )
|
||||||
{
|
{
|
||||||
S_AL_SanitiseVector( (vec_t *)origin );
|
vec3_t sanOrigin;
|
||||||
|
|
||||||
|
VectorCopy( origin, sanOrigin );
|
||||||
|
S_AL_SanitiseVector( sanOrigin );
|
||||||
if ( entityNum < 0 || entityNum > MAX_GENTITIES )
|
if ( entityNum < 0 || entityNum > MAX_GENTITIES )
|
||||||
Com_Error( ERR_DROP, "S_UpdateEntityPosition: bad entitynum %i", entityNum );
|
Com_Error( ERR_DROP, "S_UpdateEntityPosition: bad entitynum %i", entityNum );
|
||||||
VectorCopy( origin, entityList[entityNum].origin );
|
VectorCopy( sanOrigin, entityList[entityNum].origin );
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@ -1070,12 +1073,17 @@ S_AL_AddLoopingSound
|
||||||
static
|
static
|
||||||
void S_AL_AddLoopingSound( int entityNum, const vec3_t origin, const vec3_t velocity, sfxHandle_t sfx )
|
void S_AL_AddLoopingSound( int entityNum, const vec3_t origin, const vec3_t velocity, sfxHandle_t sfx )
|
||||||
{
|
{
|
||||||
|
vec3_t sanOrigin, sanVelocity;
|
||||||
|
|
||||||
if(S_AL_CheckInput(entityNum, sfx))
|
if(S_AL_CheckInput(entityNum, sfx))
|
||||||
return;
|
return;
|
||||||
|
|
||||||
S_AL_SanitiseVector( (vec_t *)origin );
|
VectorCopy( origin, sanOrigin );
|
||||||
S_AL_SanitiseVector( (vec_t *)velocity );
|
VectorCopy( velocity, sanVelocity );
|
||||||
S_AL_SrcLoop(SRCPRI_ENTITY, sfx, origin, velocity, entityNum);
|
S_AL_SanitiseVector( sanOrigin );
|
||||||
|
S_AL_SanitiseVector( sanVelocity );
|
||||||
|
|
||||||
|
S_AL_SrcLoop(SRCPRI_ENTITY, sfx, sanOrigin, sanVelocity, entityNum);
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@ -1086,20 +1094,24 @@ S_AL_AddRealLoopingSound
|
||||||
static
|
static
|
||||||
void S_AL_AddRealLoopingSound( int entityNum, const vec3_t origin, const vec3_t velocity, sfxHandle_t sfx )
|
void S_AL_AddRealLoopingSound( int entityNum, const vec3_t origin, const vec3_t velocity, sfxHandle_t sfx )
|
||||||
{
|
{
|
||||||
|
vec3_t sanOrigin, sanVelocity;
|
||||||
|
|
||||||
if(S_AL_CheckInput(entityNum, sfx))
|
if(S_AL_CheckInput(entityNum, sfx))
|
||||||
return;
|
return;
|
||||||
|
|
||||||
S_AL_SanitiseVector( (vec_t *)origin );
|
VectorCopy( origin, sanOrigin );
|
||||||
S_AL_SanitiseVector( (vec_t *)velocity );
|
VectorCopy( velocity, sanVelocity );
|
||||||
|
S_AL_SanitiseVector( sanOrigin );
|
||||||
|
S_AL_SanitiseVector( sanVelocity );
|
||||||
|
|
||||||
// There are certain maps (*cough* Q3:TA mpterra*) that have large quantities
|
// There are certain maps (*cough* Q3:TA mpterra*) that have large quantities
|
||||||
// of ET_SPEAKERS in the PVS at any given time. OpenAL can't cope with mixing
|
// of ET_SPEAKERS in the PVS at any given time. OpenAL can't cope with mixing
|
||||||
// large numbers of sounds, so this culls them by distance
|
// large numbers of sounds, so this culls them by distance
|
||||||
if( DistanceSquared( origin, lastListenerOrigin ) > (s_alMaxDistance->value + s_alGraceDistance->value) *
|
if( DistanceSquared( sanOrigin, lastListenerOrigin ) > (s_alMaxDistance->value + s_alGraceDistance->value) *
|
||||||
(s_alMaxDistance->value + s_alGraceDistance->value) )
|
(s_alMaxDistance->value + s_alGraceDistance->value) )
|
||||||
return;
|
return;
|
||||||
|
|
||||||
S_AL_SrcLoop(SRCPRI_AMBIENT, sfx, origin, velocity, entityNum);
|
S_AL_SrcLoop(SRCPRI_AMBIENT, sfx, sanOrigin, sanVelocity, entityNum);
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
|
|
@ -483,7 +483,7 @@ qboolean Sys_GetPacket( netadr_t *net_from, msg_t *net_message ) {
|
||||||
if(ip_socket != INVALID_SOCKET)
|
if(ip_socket != INVALID_SOCKET)
|
||||||
{
|
{
|
||||||
fromlen = sizeof(from);
|
fromlen = sizeof(from);
|
||||||
ret = recvfrom( ip_socket, net_message->data, net_message->maxsize, 0, (struct sockaddr *) &from, &fromlen );
|
ret = recvfrom( ip_socket, (void *)net_message->data, net_message->maxsize, 0, (struct sockaddr *) &from, &fromlen );
|
||||||
|
|
||||||
if (ret == SOCKET_ERROR)
|
if (ret == SOCKET_ERROR)
|
||||||
{
|
{
|
||||||
|
@ -527,7 +527,7 @@ qboolean Sys_GetPacket( netadr_t *net_from, msg_t *net_message ) {
|
||||||
if(ip6_socket != INVALID_SOCKET)
|
if(ip6_socket != INVALID_SOCKET)
|
||||||
{
|
{
|
||||||
fromlen = sizeof(from);
|
fromlen = sizeof(from);
|
||||||
ret = recvfrom(ip6_socket, net_message->data, net_message->maxsize, 0, (struct sockaddr *) &from, &fromlen);
|
ret = recvfrom(ip6_socket, (void *)net_message->data, net_message->maxsize, 0, (struct sockaddr *) &from, &fromlen);
|
||||||
|
|
||||||
if (ret == SOCKET_ERROR)
|
if (ret == SOCKET_ERROR)
|
||||||
{
|
{
|
||||||
|
@ -555,7 +555,7 @@ qboolean Sys_GetPacket( netadr_t *net_from, msg_t *net_message ) {
|
||||||
if(multicast6_socket != INVALID_SOCKET && multicast6_socket != ip6_socket)
|
if(multicast6_socket != INVALID_SOCKET && multicast6_socket != ip6_socket)
|
||||||
{
|
{
|
||||||
fromlen = sizeof(from);
|
fromlen = sizeof(from);
|
||||||
ret = recvfrom(multicast6_socket, net_message->data, net_message->maxsize, 0, (struct sockaddr *) &from, &fromlen);
|
ret = recvfrom(multicast6_socket, (void *)net_message->data, net_message->maxsize, 0, (struct sockaddr *) &from, &fromlen);
|
||||||
|
|
||||||
if (ret == SOCKET_ERROR)
|
if (ret == SOCKET_ERROR)
|
||||||
{
|
{
|
||||||
|
@ -835,7 +835,6 @@ int NET_IP6Socket( char *net_interface, int port, struct sockaddr_in6 *bindto, i
|
||||||
SOCKET newsocket;
|
SOCKET newsocket;
|
||||||
struct sockaddr_in6 address;
|
struct sockaddr_in6 address;
|
||||||
qboolean _true = qtrue;
|
qboolean _true = qtrue;
|
||||||
int i = 1;
|
|
||||||
|
|
||||||
*err = 0;
|
*err = 0;
|
||||||
|
|
||||||
|
@ -865,12 +864,16 @@ int NET_IP6Socket( char *net_interface, int port, struct sockaddr_in6 *bindto, i
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifdef IPV6_V6ONLY
|
#ifdef IPV6_V6ONLY
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
|
||||||
// ipv4 addresses should not be allowed to connect via this socket.
|
// ipv4 addresses should not be allowed to connect via this socket.
|
||||||
if(setsockopt(newsocket, IPPROTO_IPV6, IPV6_V6ONLY, (char *) &i, sizeof(i)) == SOCKET_ERROR)
|
if(setsockopt(newsocket, IPPROTO_IPV6, IPV6_V6ONLY, (char *) &i, sizeof(i)) == SOCKET_ERROR)
|
||||||
{
|
{
|
||||||
// win32 systems don't seem to support this anyways.
|
// win32 systems don't seem to support this anyways.
|
||||||
Com_DPrintf("WARNING: NET_IP6Socket: setsockopt IPV6_V6ONLY: %s\n", NET_ErrorString());
|
Com_DPrintf("WARNING: NET_IP6Socket: setsockopt IPV6_V6ONLY: %s\n", NET_ErrorString());
|
||||||
}
|
}
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if( !net_interface || !net_interface[0] || !Q_stricmp(net_interface, "localhost") ) {
|
if( !net_interface || !net_interface[0] || !Q_stricmp(net_interface, "localhost") ) {
|
||||||
|
@ -1074,14 +1077,14 @@ void NET_OpenSocks( int port ) {
|
||||||
if ( rfc1929 ) {
|
if ( rfc1929 ) {
|
||||||
buf[2] = 2; // method #2 - method id #02: username/password
|
buf[2] = 2; // method #2 - method id #02: username/password
|
||||||
}
|
}
|
||||||
if ( send( socks_socket, buf, len, 0 ) == SOCKET_ERROR ) {
|
if ( send( socks_socket, (void *)buf, len, 0 ) == SOCKET_ERROR ) {
|
||||||
err = socketError;
|
err = socketError;
|
||||||
Com_Printf( "NET_OpenSocks: send: %s\n", NET_ErrorString() );
|
Com_Printf( "NET_OpenSocks: send: %s\n", NET_ErrorString() );
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
// get the response
|
// get the response
|
||||||
len = recv( socks_socket, buf, 64, 0 );
|
len = recv( socks_socket, (void *)buf, 64, 0 );
|
||||||
if ( len == SOCKET_ERROR ) {
|
if ( len == SOCKET_ERROR ) {
|
||||||
err = socketError;
|
err = socketError;
|
||||||
Com_Printf( "NET_OpenSocks: recv: %s\n", NET_ErrorString() );
|
Com_Printf( "NET_OpenSocks: recv: %s\n", NET_ErrorString() );
|
||||||
|
@ -1121,14 +1124,14 @@ void NET_OpenSocks( int port ) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// send it
|
// send it
|
||||||
if ( send( socks_socket, buf, 3 + ulen + plen, 0 ) == SOCKET_ERROR ) {
|
if ( send( socks_socket, (void *)buf, 3 + ulen + plen, 0 ) == SOCKET_ERROR ) {
|
||||||
err = socketError;
|
err = socketError;
|
||||||
Com_Printf( "NET_OpenSocks: send: %s\n", NET_ErrorString() );
|
Com_Printf( "NET_OpenSocks: send: %s\n", NET_ErrorString() );
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
// get the response
|
// get the response
|
||||||
len = recv( socks_socket, buf, 64, 0 );
|
len = recv( socks_socket, (void *)buf, 64, 0 );
|
||||||
if ( len == SOCKET_ERROR ) {
|
if ( len == SOCKET_ERROR ) {
|
||||||
err = socketError;
|
err = socketError;
|
||||||
Com_Printf( "NET_OpenSocks: recv: %s\n", NET_ErrorString() );
|
Com_Printf( "NET_OpenSocks: recv: %s\n", NET_ErrorString() );
|
||||||
|
@ -1151,14 +1154,14 @@ void NET_OpenSocks( int port ) {
|
||||||
buf[3] = 1; // address type: IPV4
|
buf[3] = 1; // address type: IPV4
|
||||||
*(int *)&buf[4] = INADDR_ANY;
|
*(int *)&buf[4] = INADDR_ANY;
|
||||||
*(short *)&buf[8] = htons( (short)port ); // port
|
*(short *)&buf[8] = htons( (short)port ); // port
|
||||||
if ( send( socks_socket, buf, 10, 0 ) == SOCKET_ERROR ) {
|
if ( send( socks_socket, (void *)buf, 10, 0 ) == SOCKET_ERROR ) {
|
||||||
err = socketError;
|
err = socketError;
|
||||||
Com_Printf( "NET_OpenSocks: send: %s\n", NET_ErrorString() );
|
Com_Printf( "NET_OpenSocks: send: %s\n", NET_ErrorString() );
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
// get the response
|
// get the response
|
||||||
len = recv( socks_socket, buf, 64, 0 );
|
len = recv( socks_socket, (void *)buf, 64, 0 );
|
||||||
if( len == SOCKET_ERROR ) {
|
if( len == SOCKET_ERROR ) {
|
||||||
err = socketError;
|
err = socketError;
|
||||||
Com_Printf( "NET_OpenSocks: recv: %s\n", NET_ErrorString() );
|
Com_Printf( "NET_OpenSocks: recv: %s\n", NET_ErrorString() );
|
||||||
|
|
Loading…
Reference in a new issue