xref: /dragonfly/games/hack/def.monst.h (revision 26720ae0)
1 /*	$NetBSD: def.monst.h,v 1.9 2011/08/16 09:26:22 christos Exp $	*/
2 
3 /*
4  * Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
5  * Amsterdam
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions are
10  * met:
11  *
12  * - Redistributions of source code must retain the above copyright notice,
13  * this list of conditions and the following disclaimer.
14  *
15  * - Redistributions in binary form must reproduce the above copyright
16  * notice, this list of conditions and the following disclaimer in the
17  * documentation and/or other materials provided with the distribution.
18  *
19  * - Neither the name of the Stichting Centrum voor Wiskunde en
20  * Informatica, nor the names of its contributors may be used to endorse or
21  * promote products derived from this software without specific prior
22  * written permission.
23  *
24  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
25  * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
26  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
27  * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
28  * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
29  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
30  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
31  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
32  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
33  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
34  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35  */
36 
37 /*
38  * Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
39  * All rights reserved.
40  *
41  * Redistribution and use in source and binary forms, with or without
42  * modification, are permitted provided that the following conditions
43  * are met:
44  * 1. Redistributions of source code must retain the above copyright
45  *    notice, this list of conditions and the following disclaimer.
46  * 2. Redistributions in binary form must reproduce the above copyright
47  *    notice, this list of conditions and the following disclaimer in the
48  *    documentation and/or other materials provided with the distribution.
49  * 3. The name of the author may not be used to endorse or promote products
50  *    derived from this software without specific prior written permission.
51  *
52  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
53  * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
54  * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL
55  * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
56  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
57  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
58  * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
59  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
60  * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
61  * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
62  */
63 
64 #ifndef _DEF_MONST_H_
65 #define _DEF_MONST_H_
66 struct monst {
67 	struct monst *nmon;
68 	const struct permonst *data;
69 	unsigned m_id;
70 	xchar mx,my;
71 	xchar mdx,mdy;		/* if mdispl then pos where last displayed */
72 #define	MTSZ	4
73 	coord mtrack[MTSZ];	/* monster track */
74 	schar mhp,mhpmax;
75 	char mappearance;	/* nonzero for undetected 'M's and for '1's */
76 	Bitfield(mimic,1);	/* undetected mimic */
77 	Bitfield(mdispl,1);	/* mdx,mdy valid */
78 	Bitfield(minvis,1);	/* invisible */
79 	Bitfield(cham,1);	/* shape-changer */
80 	Bitfield(mhide,1);	/* hides beneath objects */
81 	Bitfield(mundetected,1);	/* not seen in present hiding place */
82 	Bitfield(mspeed,2);
83 	Bitfield(msleep,1);
84 	Bitfield(mfroz,1);
85 	Bitfield(mconf,1);
86 	Bitfield(mflee,1);	/* fleeing */
87 	Bitfield(mfleetim,7);	/* timeout for mflee */
88 	Bitfield(mcan,1);	/* has been cancelled */
89 	Bitfield(mtame,1);		/* implies peaceful */
90 	Bitfield(mpeaceful,1);	/* does not attack unprovoked */
91 	Bitfield(isshk,1);	/* is shopkeeper */
92 	Bitfield(isgd,1);	/* is guard */
93 	Bitfield(mcansee,1);	/* cansee 1, temp.blinded 0, blind 0 */
94 	Bitfield(mblinded,7);	/* cansee 0, temp.blinded n, blind 0 */
95 	Bitfield(mtrapped,1);	/* trapped in a pit or bear trap */
96 	Bitfield(mnamelth,6);	/* length of name (following mxlth) */
97 #ifndef NOWORM
98 	Bitfield(wormno,5);	/* at most 31 worms on any level */
99 #endif /* NOWORM */
100 	unsigned mtrapseen;	/* bitmap of traps we've been trapped in */
101 	long mlstmv;	/* prevent two moves at once */
102 	struct obj *minvent;
103 	long mgold;
104 	unsigned mxlth;		/* length of following data */
105 	/* in order to prevent alignment problems mextra should
106 	   be (or follow) a long int */
107 	long mextra[1];		/* monster dependent info */
108 };
109 
110 #define newmonst(xl)	((struct monst *) alloc((xl) + sizeof(struct monst)))
111 
112 extern struct monst *fmon;
113 extern struct monst *fallen_down;
114 
115 extern void *monster_private(struct monst *);
116 
117 /* these are in mspeed */
118 #define MSLOW 1 /* slow monster */
119 #define MFAST 2 /* speeded monster */
120 
121 #define	NAME(mtmp)	(((char *) mtmp->mextra) + mtmp->mxlth)
122 #define	MREGEN		"TVi1"
123 #define	UNDEAD		"ZVW "
124 #endif /* _DEF_MONST_H_ */
125