1 /* $NetBSD: hack.worn.c,v 1.7 2009/08/12 07:28:41 dholland Exp $ */ 2 3 /* 4 * Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica, 5 * Amsterdam 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions are 10 * met: 11 * 12 * - Redistributions of source code must retain the above copyright notice, 13 * this list of conditions and the following disclaimer. 14 * 15 * - Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * - Neither the name of the Stichting Centrum voor Wiskunde en 20 * Informatica, nor the names of its contributors may be used to endorse or 21 * promote products derived from this software without specific prior 22 * written permission. 23 * 24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS 25 * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 26 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A 27 * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER 28 * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 29 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 30 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 31 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 32 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 33 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 34 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35 */ 36 37 /* 38 * Copyright (c) 1982 Jay Fenlason <hack@gnu.org> 39 * All rights reserved. 40 * 41 * Redistribution and use in source and binary forms, with or without 42 * modification, are permitted provided that the following conditions 43 * are met: 44 * 1. Redistributions of source code must retain the above copyright 45 * notice, this list of conditions and the following disclaimer. 46 * 2. Redistributions in binary form must reproduce the above copyright 47 * notice, this list of conditions and the following disclaimer in the 48 * documentation and/or other materials provided with the distribution. 49 * 3. The name of the author may not be used to endorse or promote products 50 * derived from this software without specific prior written permission. 51 * 52 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, 53 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY 54 * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL 55 * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 56 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 57 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; 58 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 59 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR 60 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF 61 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 62 */ 63 64 #include <sys/cdefs.h> 65 #ifndef lint 66 __RCSID("$NetBSD: hack.worn.c,v 1.7 2009/08/12 07:28:41 dholland Exp $"); 67 #endif /* not lint */ 68 69 #include "hack.h" 70 #include "extern.h" 71 72 static struct worn { 73 long w_mask; 74 struct obj **w_obj; 75 } worn[] = { 76 { 77 W_ARM, &uarm 78 }, 79 { 80 W_ARM2, &uarm2 81 }, 82 { 83 W_ARMH, &uarmh 84 }, 85 { 86 W_ARMS, &uarms 87 }, 88 { 89 W_ARMG, &uarmg 90 }, 91 { 92 W_RINGL, &uleft 93 }, 94 { 95 W_RINGR, &uright 96 }, 97 { 98 W_WEP, &uwep 99 }, 100 { 101 W_BALL, &uball 102 }, 103 { 104 W_CHAIN, &uchain 105 }, 106 { 107 0, 0 108 } 109 }; 110 111 void 112 setworn(struct obj *obj, long mask) 113 { 114 struct worn *wp; 115 struct obj *oobj; 116 117 for (wp = worn; wp->w_mask; wp++) 118 if (wp->w_mask & mask) { 119 oobj = *(wp->w_obj); 120 if (oobj && !(oobj->owornmask & wp->w_mask)) 121 impossible("Setworn: mask = %ld.", wp->w_mask); 122 if (oobj) 123 oobj->owornmask &= ~wp->w_mask; 124 if (obj && oobj && wp->w_mask == W_ARM) { 125 if (uarm2) { 126 impossible("Setworn: uarm2 set?"); 127 } else 128 setworn(uarm, W_ARM2); 129 } 130 *(wp->w_obj) = obj; 131 if (obj) 132 obj->owornmask |= wp->w_mask; 133 } 134 if (uarm2 && !uarm) { 135 uarm = uarm2; 136 uarm2 = 0; 137 uarm->owornmask ^= (W_ARM | W_ARM2); 138 } 139 } 140 141 /* called e.g. when obj is destroyed */ 142 void 143 setnotworn(struct obj *obj) 144 { 145 struct worn *wp; 146 147 for (wp = worn; wp->w_mask; wp++) 148 if (obj == *(wp->w_obj)) { 149 *(wp->w_obj) = 0; 150 obj->owornmask &= ~wp->w_mask; 151 } 152 if (uarm2 && !uarm) { 153 uarm = uarm2; 154 uarm2 = 0; 155 uarm->owornmask ^= (W_ARM | W_ARM2); 156 } 157 } 158