xref: /dragonfly/games/hack/hack.worn.c (revision e0eb7cf0)
1 /*	$NetBSD: hack.worn.c,v 1.7 2009/08/12 07:28:41 dholland Exp $	*/
2 
3 /*
4  * Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
5  * Amsterdam
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions are
10  * met:
11  *
12  * - Redistributions of source code must retain the above copyright notice,
13  * this list of conditions and the following disclaimer.
14  *
15  * - Redistributions in binary form must reproduce the above copyright
16  * notice, this list of conditions and the following disclaimer in the
17  * documentation and/or other materials provided with the distribution.
18  *
19  * - Neither the name of the Stichting Centrum voor Wiskunde en
20  * Informatica, nor the names of its contributors may be used to endorse or
21  * promote products derived from this software without specific prior
22  * written permission.
23  *
24  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
25  * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
26  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
27  * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
28  * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
29  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
30  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
31  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
32  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
33  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
34  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35  */
36 
37 /*
38  * Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
39  * All rights reserved.
40  *
41  * Redistribution and use in source and binary forms, with or without
42  * modification, are permitted provided that the following conditions
43  * are met:
44  * 1. Redistributions of source code must retain the above copyright
45  *    notice, this list of conditions and the following disclaimer.
46  * 2. Redistributions in binary form must reproduce the above copyright
47  *    notice, this list of conditions and the following disclaimer in the
48  *    documentation and/or other materials provided with the distribution.
49  * 3. The name of the author may not be used to endorse or promote products
50  *    derived from this software without specific prior written permission.
51  *
52  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
53  * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
54  * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL
55  * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
56  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
57  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
58  * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
59  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
60  * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
61  * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
62  */
63 
64 #include "hack.h"
65 #include "extern.h"
66 
67 static struct worn {
68 	long            w_mask;
69 	struct obj    **w_obj;
70 }               worn[] = {
71 	{
72 		W_ARM, &uarm
73 	},
74 	{
75 		W_ARM2, &uarm2
76 	},
77 	{
78 		W_ARMH, &uarmh
79 	},
80 	{
81 		W_ARMS, &uarms
82 	},
83 	{
84 		W_ARMG, &uarmg
85 	},
86 	{
87 		W_RINGL, &uleft
88 	},
89 	{
90 		W_RINGR, &uright
91 	},
92 	{
93 		W_WEP, &uwep
94 	},
95 	{
96 		W_BALL, &uball
97 	},
98 	{
99 		W_CHAIN, &uchain
100 	},
101 	{
102 		0, 0
103 	}
104 };
105 
106 void
107 setworn(struct obj *obj, long mask)
108 {
109 	struct worn    *wp;
110 	struct obj     *oobj;
111 
112 	for (wp = worn; wp->w_mask; wp++)
113 		if (wp->w_mask & mask) {
114 			oobj = *(wp->w_obj);
115 			if (oobj && !(oobj->owornmask & wp->w_mask))
116 				impossible("Setworn: mask = %ld.", wp->w_mask);
117 			if (oobj)
118 				oobj->owornmask &= ~wp->w_mask;
119 			if (obj && oobj && wp->w_mask == W_ARM) {
120 				if (uarm2) {
121 					impossible("Setworn: uarm2 set?");
122 				} else
123 					setworn(uarm, W_ARM2);
124 			}
125 			*(wp->w_obj) = obj;
126 			if (obj)
127 				obj->owornmask |= wp->w_mask;
128 		}
129 	if (uarm2 && !uarm) {
130 		uarm = uarm2;
131 		uarm2 = 0;
132 		uarm->owornmask ^= (W_ARM | W_ARM2);
133 	}
134 }
135 
136 /* called e.g. when obj is destroyed */
137 void
138 setnotworn(struct obj *obj)
139 {
140 	struct worn    *wp;
141 
142 	for (wp = worn; wp->w_mask; wp++)
143 		if (obj == *(wp->w_obj)) {
144 			*(wp->w_obj) = 0;
145 			obj->owornmask &= ~wp->w_mask;
146 		}
147 	if (uarm2 && !uarm) {
148 		uarm = uarm2;
149 		uarm2 = 0;
150 		uarm->owornmask ^= (W_ARM | W_ARM2);
151 	}
152 }
153