1 /* $NetBSD: hack.rumors.c,v 1.9 2011/08/06 20:18:26 dholland Exp $ */ 2 3 /* 4 * Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica, 5 * Amsterdam 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions are 10 * met: 11 * 12 * - Redistributions of source code must retain the above copyright notice, 13 * this list of conditions and the following disclaimer. 14 * 15 * - Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * - Neither the name of the Stichting Centrum voor Wiskunde en 20 * Informatica, nor the names of its contributors may be used to endorse or 21 * promote products derived from this software without specific prior 22 * written permission. 23 * 24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS 25 * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 26 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A 27 * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER 28 * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 29 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 30 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 31 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 32 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 33 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 34 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35 */ 36 37 /* 38 * Copyright (c) 1982 Jay Fenlason <hack@gnu.org> 39 * All rights reserved. 40 * 41 * Redistribution and use in source and binary forms, with or without 42 * modification, are permitted provided that the following conditions 43 * are met: 44 * 1. Redistributions of source code must retain the above copyright 45 * notice, this list of conditions and the following disclaimer. 46 * 2. Redistributions in binary form must reproduce the above copyright 47 * notice, this list of conditions and the following disclaimer in the 48 * documentation and/or other materials provided with the distribution. 49 * 3. The name of the author may not be used to endorse or promote products 50 * derived from this software without specific prior written permission. 51 * 52 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, 53 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY 54 * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL 55 * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 56 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 57 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; 58 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 59 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR 60 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF 61 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 62 */ 63 64 #include "hack.h" /* for RUMORFILE and BSD (strchr) */ 65 #include "extern.h" 66 #define CHARSZ 8 /* number of bits in a char */ 67 68 static int n_rumors = 0; 69 static int n_used_rumors = -1; 70 static char *usedbits; 71 72 static void init_rumors(FILE *); 73 static int skipline(FILE *); 74 static void outline(FILE *); 75 static int used(int); 76 77 static void 78 init_rumors(FILE *rumf) 79 { 80 int i; 81 n_used_rumors = 0; 82 while (skipline(rumf)) 83 n_rumors++; 84 rewind(rumf); 85 i = n_rumors / CHARSZ; 86 usedbits = alloc(i + 1); 87 for (; i >= 0; i--) 88 usedbits[i] = 0; 89 } 90 91 static int 92 skipline(FILE *rumf) 93 { 94 char line[COLNO]; 95 while (1) { 96 if (!fgets(line, sizeof(line), rumf)) 97 return (0); 98 if (strchr(line, '\n')) 99 return (1); 100 } 101 } 102 103 static void 104 outline(FILE *rumf) 105 { 106 char line[COLNO]; 107 char *ep; 108 if (!fgets(line, sizeof(line), rumf)) 109 return; 110 if ((ep = strchr(line, '\n')) != 0) 111 *ep = 0; 112 pline("This cookie has a scrap of paper inside! It reads: "); 113 pline("%s", line); 114 } 115 116 void 117 outrumor(void) 118 { 119 int rn, i; 120 FILE *rumf; 121 if (n_rumors <= n_used_rumors || 122 (rumf = fopen(RUMORFILE, "r")) == (FILE *) 0) 123 return; 124 if (n_used_rumors < 0) 125 init_rumors(rumf); 126 if (!n_rumors) 127 goto none; 128 rn = rn2(n_rumors - n_used_rumors); 129 i = 0; 130 while (rn || used(i)) { 131 (void) skipline(rumf); 132 if (!used(i)) 133 rn--; 134 i++; 135 } 136 usedbits[i / CHARSZ] |= (1 << (i % CHARSZ)); 137 n_used_rumors++; 138 outline(rumf); 139 none: 140 (void) fclose(rumf); 141 } 142 143 static int 144 used(int i) 145 { 146 return (usedbits[i / CHARSZ] & (1 << (i % CHARSZ))); 147 } 148