hack.rumors.c 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151
  1. /* $NetBSD: hack.rumors.c,v 1.5 2003/04/02 18:36:39 jsm Exp $ */
  2. /*
  3. * Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
  4. * Amsterdam
  5. * All rights reserved.
  6. *
  7. * Redistribution and use in source and binary forms, with or without
  8. * modification, are permitted provided that the following conditions are
  9. * met:
  10. *
  11. * - Redistributions of source code must retain the above copyright notice,
  12. * this list of conditions and the following disclaimer.
  13. *
  14. * - Redistributions in binary form must reproduce the above copyright
  15. * notice, this list of conditions and the following disclaimer in the
  16. * documentation and/or other materials provided with the distribution.
  17. *
  18. * - Neither the name of the Stichting Centrum voor Wiskunde en
  19. * Informatica, nor the names of its contributors may be used to endorse or
  20. * promote products derived from this software without specific prior
  21. * written permission.
  22. *
  23. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
  24. * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
  25. * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
  26. * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
  27. * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
  28. * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
  29. * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
  30. * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
  31. * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
  32. * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
  33. * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  34. */
  35. /*
  36. * Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
  37. * All rights reserved.
  38. *
  39. * Redistribution and use in source and binary forms, with or without
  40. * modification, are permitted provided that the following conditions
  41. * are met:
  42. * 1. Redistributions of source code must retain the above copyright
  43. * notice, this list of conditions and the following disclaimer.
  44. * 2. Redistributions in binary form must reproduce the above copyright
  45. * notice, this list of conditions and the following disclaimer in the
  46. * documentation and/or other materials provided with the distribution.
  47. * 3. The name of the author may not be used to endorse or promote products
  48. * derived from this software without specific prior written permission.
  49. *
  50. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
  51. * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
  52. * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
  53. * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
  54. * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
  55. * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
  56. * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
  57. * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
  58. * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
  59. * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  60. */
  61. #include <sys/cdefs.h>
  62. #ifndef lint
  63. __RCSID("$NetBSD: hack.rumors.c,v 1.5 2003/04/02 18:36:39 jsm Exp $");
  64. #endif /* not lint */
  65. #include "hack.h" /* for RUMORFILE and BSD (strchr) */
  66. #include "extern.h"
  67. #define CHARSZ 8 /* number of bits in a char */
  68. int n_rumors = 0;
  69. int n_used_rumors = -1;
  70. char *usedbits;
  71. void
  72. init_rumors(rumf)
  73. FILE *rumf;
  74. {
  75. int i;
  76. n_used_rumors = 0;
  77. while (skipline(rumf))
  78. n_rumors++;
  79. rewind(rumf);
  80. i = n_rumors / CHARSZ;
  81. usedbits = (char *) alloc((unsigned) (i + 1));
  82. for (; i >= 0; i--)
  83. usedbits[i] = 0;
  84. }
  85. int
  86. skipline(rumf)
  87. FILE *rumf;
  88. {
  89. char line[COLNO];
  90. while (1) {
  91. if (!fgets(line, sizeof(line), rumf))
  92. return (0);
  93. if (strchr(line, '\n'))
  94. return (1);
  95. }
  96. }
  97. void
  98. outline(rumf)
  99. FILE *rumf;
  100. {
  101. char line[COLNO];
  102. char *ep;
  103. if (!fgets(line, sizeof(line), rumf))
  104. return;
  105. if ((ep = strchr(line, '\n')) != 0)
  106. *ep = 0;
  107. pline("This cookie has a scrap of paper inside! It reads: ");
  108. pline(line);
  109. }
  110. void
  111. outrumor()
  112. {
  113. int rn, i;
  114. FILE *rumf;
  115. if (n_rumors <= n_used_rumors ||
  116. (rumf = fopen(RUMORFILE, "r")) == (FILE *) 0)
  117. return;
  118. if (n_used_rumors < 0)
  119. init_rumors(rumf);
  120. if (!n_rumors)
  121. goto none;
  122. rn = rn2(n_rumors - n_used_rumors);
  123. i = 0;
  124. while (rn || used(i)) {
  125. (void) skipline(rumf);
  126. if (!used(i))
  127. rn--;
  128. i++;
  129. }
  130. usedbits[i / CHARSZ] |= (1 << (i % CHARSZ));
  131. n_used_rumors++;
  132. outline(rumf);
  133. none:
  134. (void) fclose(rumf);
  135. }
  136. int
  137. used(i)
  138. int i;
  139. {
  140. return (usedbits[i / CHARSZ] & (1 << (i % CHARSZ)));
  141. }