hack.worn.c 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161
  1. /* $NetBSD: hack.worn.c,v 1.5 2003/04/02 18:36:42 jsm Exp $ */
  2. /*
  3. * Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
  4. * Amsterdam
  5. * All rights reserved.
  6. *
  7. * Redistribution and use in source and binary forms, with or without
  8. * modification, are permitted provided that the following conditions are
  9. * met:
  10. *
  11. * - Redistributions of source code must retain the above copyright notice,
  12. * this list of conditions and the following disclaimer.
  13. *
  14. * - Redistributions in binary form must reproduce the above copyright
  15. * notice, this list of conditions and the following disclaimer in the
  16. * documentation and/or other materials provided with the distribution.
  17. *
  18. * - Neither the name of the Stichting Centrum voor Wiskunde en
  19. * Informatica, nor the names of its contributors may be used to endorse or
  20. * promote products derived from this software without specific prior
  21. * written permission.
  22. *
  23. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
  24. * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
  25. * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
  26. * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
  27. * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
  28. * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
  29. * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
  30. * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
  31. * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
  32. * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
  33. * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  34. */
  35. /*
  36. * Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
  37. * All rights reserved.
  38. *
  39. * Redistribution and use in source and binary forms, with or without
  40. * modification, are permitted provided that the following conditions
  41. * are met:
  42. * 1. Redistributions of source code must retain the above copyright
  43. * notice, this list of conditions and the following disclaimer.
  44. * 2. Redistributions in binary form must reproduce the above copyright
  45. * notice, this list of conditions and the following disclaimer in the
  46. * documentation and/or other materials provided with the distribution.
  47. * 3. The name of the author may not be used to endorse or promote products
  48. * derived from this software without specific prior written permission.
  49. *
  50. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
  51. * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
  52. * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
  53. * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
  54. * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
  55. * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
  56. * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
  57. * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
  58. * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
  59. * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  60. */
  61. #include <sys/cdefs.h>
  62. #ifndef lint
  63. __RCSID("$NetBSD: hack.worn.c,v 1.5 2003/04/02 18:36:42 jsm Exp $");
  64. #endif /* not lint */
  65. #include "hack.h"
  66. #include "extern.h"
  67. struct worn {
  68. long w_mask;
  69. struct obj **w_obj;
  70. } worn[] = {
  71. {
  72. W_ARM, &uarm
  73. },
  74. {
  75. W_ARM2, &uarm2
  76. },
  77. {
  78. W_ARMH, &uarmh
  79. },
  80. {
  81. W_ARMS, &uarms
  82. },
  83. {
  84. W_ARMG, &uarmg
  85. },
  86. {
  87. W_RINGL, &uleft
  88. },
  89. {
  90. W_RINGR, &uright
  91. },
  92. {
  93. W_WEP, &uwep
  94. },
  95. {
  96. W_BALL, &uball
  97. },
  98. {
  99. W_CHAIN, &uchain
  100. },
  101. {
  102. 0, 0
  103. }
  104. };
  105. void
  106. setworn(obj, mask)
  107. struct obj *obj;
  108. long mask;
  109. {
  110. struct worn *wp;
  111. struct obj *oobj;
  112. for (wp = worn; wp->w_mask; wp++)
  113. if (wp->w_mask & mask) {
  114. oobj = *(wp->w_obj);
  115. if (oobj && !(oobj->owornmask & wp->w_mask))
  116. impossible("Setworn: mask = %ld.", wp->w_mask);
  117. if (oobj)
  118. oobj->owornmask &= ~wp->w_mask;
  119. if (obj && oobj && wp->w_mask == W_ARM) {
  120. if (uarm2) {
  121. impossible("Setworn: uarm2 set?");
  122. } else
  123. setworn(uarm, W_ARM2);
  124. }
  125. *(wp->w_obj) = obj;
  126. if (obj)
  127. obj->owornmask |= wp->w_mask;
  128. }
  129. if (uarm2 && !uarm) {
  130. uarm = uarm2;
  131. uarm2 = 0;
  132. uarm->owornmask ^= (W_ARM | W_ARM2);
  133. }
  134. }
  135. /* called e.g. when obj is destroyed */
  136. void
  137. setnotworn(obj)
  138. struct obj *obj;
  139. {
  140. struct worn *wp;
  141. for (wp = worn; wp->w_mask; wp++)
  142. if (obj == *(wp->w_obj)) {
  143. *(wp->w_obj) = 0;
  144. obj->owornmask &= ~wp->w_mask;
  145. }
  146. if (uarm2 && !uarm) {
  147. uarm = uarm2;
  148. uarm2 = 0;
  149. uarm->owornmask ^= (W_ARM | W_ARM2);
  150. }
  151. }