def.monst.h 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123
  1. /* $NetBSD: def.monst.h,v 1.7 2003/04/02 18:36:34 jsm Exp $ */
  2. /*
  3. * Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
  4. * Amsterdam
  5. * All rights reserved.
  6. *
  7. * Redistribution and use in source and binary forms, with or without
  8. * modification, are permitted provided that the following conditions are
  9. * met:
  10. *
  11. * - Redistributions of source code must retain the above copyright notice,
  12. * this list of conditions and the following disclaimer.
  13. *
  14. * - Redistributions in binary form must reproduce the above copyright
  15. * notice, this list of conditions and the following disclaimer in the
  16. * documentation and/or other materials provided with the distribution.
  17. *
  18. * - Neither the name of the Stichting Centrum voor Wiskunde en
  19. * Informatica, nor the names of its contributors may be used to endorse or
  20. * promote products derived from this software without specific prior
  21. * written permission.
  22. *
  23. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
  24. * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
  25. * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
  26. * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
  27. * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
  28. * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
  29. * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
  30. * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
  31. * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
  32. * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
  33. * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  34. */
  35. /*
  36. * Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
  37. * All rights reserved.
  38. *
  39. * Redistribution and use in source and binary forms, with or without
  40. * modification, are permitted provided that the following conditions
  41. * are met:
  42. * 1. Redistributions of source code must retain the above copyright
  43. * notice, this list of conditions and the following disclaimer.
  44. * 2. Redistributions in binary form must reproduce the above copyright
  45. * notice, this list of conditions and the following disclaimer in the
  46. * documentation and/or other materials provided with the distribution.
  47. * 3. The name of the author may not be used to endorse or promote products
  48. * derived from this software without specific prior written permission.
  49. *
  50. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
  51. * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
  52. * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
  53. * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
  54. * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
  55. * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
  56. * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
  57. * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
  58. * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
  59. * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  60. */
  61. #ifndef _DEF_MONST_H_
  62. #define _DEF_MONST_H_
  63. struct monst {
  64. struct monst *nmon;
  65. const struct permonst *data;
  66. unsigned m_id;
  67. xchar mx,my;
  68. xchar mdx,mdy; /* if mdispl then pos where last displayed */
  69. #define MTSZ 4
  70. coord mtrack[MTSZ]; /* monster track */
  71. schar mhp,mhpmax;
  72. char mappearance; /* nonzero for undetected 'M's and for '1's */
  73. Bitfield(mimic,1); /* undetected mimic */
  74. Bitfield(mdispl,1); /* mdx,mdy valid */
  75. Bitfield(minvis,1); /* invisible */
  76. Bitfield(cham,1); /* shape-changer */
  77. Bitfield(mhide,1); /* hides beneath objects */
  78. Bitfield(mundetected,1); /* not seen in present hiding place */
  79. Bitfield(mspeed,2);
  80. Bitfield(msleep,1);
  81. Bitfield(mfroz,1);
  82. Bitfield(mconf,1);
  83. Bitfield(mflee,1); /* fleeing */
  84. Bitfield(mfleetim,7); /* timeout for mflee */
  85. Bitfield(mcan,1); /* has been cancelled */
  86. Bitfield(mtame,1); /* implies peaceful */
  87. Bitfield(mpeaceful,1); /* does not attack unprovoked */
  88. Bitfield(isshk,1); /* is shopkeeper */
  89. Bitfield(isgd,1); /* is guard */
  90. Bitfield(mcansee,1); /* cansee 1, temp.blinded 0, blind 0 */
  91. Bitfield(mblinded,7); /* cansee 0, temp.blinded n, blind 0 */
  92. Bitfield(mtrapped,1); /* trapped in a pit or bear trap */
  93. Bitfield(mnamelth,6); /* length of name (following mxlth) */
  94. #ifndef NOWORM
  95. Bitfield(wormno,5); /* at most 31 worms on any level */
  96. #endif /* NOWORM */
  97. unsigned mtrapseen; /* bitmap of traps we've been trapped in */
  98. long mlstmv; /* prevent two moves at once */
  99. struct obj *minvent;
  100. long mgold;
  101. unsigned mxlth; /* length of following data */
  102. /* in order to prevent alignment problems mextra should
  103. be (or follow) a long int */
  104. long mextra[1]; /* monster dependent info */
  105. };
  106. #define newmonst(xl) (struct monst *) alloc((unsigned)(xl) + sizeof(struct monst))
  107. extern struct monst *fmon;
  108. extern struct monst *fallen_down;
  109. /* these are in mspeed */
  110. #define MSLOW 1 /* slow monster */
  111. #define MFAST 2 /* speeded monster */
  112. #define NAME(mtmp) (((char *) mtmp->mextra) + mtmp->mxlth)
  113. #define MREGEN "TVi1"
  114. #define UNDEAD "ZVW "
  115. #endif /* _DEF_MONST_H_ */