inet6: require RTF_ANNOUNCE to proxy NS
[dragonfly.git] / games / hack / hack.worn.c
blob156519ac793f5902b632c45e77474ad6ea42b531
1 /* $NetBSD: hack.worn.c,v 1.7 2009/08/12 07:28:41 dholland Exp $ */
3 /*
4 * Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
5 * Amsterdam
6 * All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
10 * met:
12 * - Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
15 * - Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * - Neither the name of the Stichting Centrum voor Wiskunde en
20 * Informatica, nor the names of its contributors may be used to endorse or
21 * promote products derived from this software without specific prior
22 * written permission.
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
25 * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
26 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
27 * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
28 * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
29 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
30 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
31 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
32 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
33 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
34 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
38 * Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
39 * All rights reserved.
41 * Redistribution and use in source and binary forms, with or without
42 * modification, are permitted provided that the following conditions
43 * are met:
44 * 1. Redistributions of source code must retain the above copyright
45 * notice, this list of conditions and the following disclaimer.
46 * 2. Redistributions in binary form must reproduce the above copyright
47 * notice, this list of conditions and the following disclaimer in the
48 * documentation and/or other materials provided with the distribution.
49 * 3. The name of the author may not be used to endorse or promote products
50 * derived from this software without specific prior written permission.
52 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
53 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
54 * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
55 * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
56 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
57 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
58 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
59 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
60 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
61 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
64 #include "hack.h"
65 #include "extern.h"
67 static struct worn {
68 long w_mask;
69 struct obj **w_obj;
70 } worn[] = {
72 W_ARM, &uarm
75 W_ARM2, &uarm2
78 W_ARMH, &uarmh
81 W_ARMS, &uarms
84 W_ARMG, &uarmg
87 W_RINGL, &uleft
90 W_RINGR, &uright
93 W_WEP, &uwep
96 W_BALL, &uball
99 W_CHAIN, &uchain
102 0, 0
106 void
107 setworn(struct obj *obj, long mask)
109 struct worn *wp;
110 struct obj *oobj;
112 for (wp = worn; wp->w_mask; wp++)
113 if (wp->w_mask & mask) {
114 oobj = *(wp->w_obj);
115 if (oobj && !(oobj->owornmask & wp->w_mask))
116 impossible("Setworn: mask = %ld.", wp->w_mask);
117 if (oobj)
118 oobj->owornmask &= ~wp->w_mask;
119 if (obj && oobj && wp->w_mask == W_ARM) {
120 if (uarm2) {
121 impossible("Setworn: uarm2 set?");
122 } else
123 setworn(uarm, W_ARM2);
125 *(wp->w_obj) = obj;
126 if (obj)
127 obj->owornmask |= wp->w_mask;
129 if (uarm2 && !uarm) {
130 uarm = uarm2;
131 uarm2 = 0;
132 uarm->owornmask ^= (W_ARM | W_ARM2);
136 /* called e.g. when obj is destroyed */
137 void
138 setnotworn(struct obj *obj)
140 struct worn *wp;
142 for (wp = worn; wp->w_mask; wp++)
143 if (obj == *(wp->w_obj)) {
144 *(wp->w_obj) = 0;
145 obj->owornmask &= ~wp->w_mask;
147 if (uarm2 && !uarm) {
148 uarm = uarm2;
149 uarm2 = 0;
150 uarm->owornmask ^= (W_ARM | W_ARM2);