]>
git.cameronkatri.com Git - bsdgames-darwin.git/blob - hack/hack.do_name.c
1 /* $NetBSD: hack.do_name.c,v 1.6 2003/04/02 18:36:36 jsm Exp $ */
4 * Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
12 * - Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
15 * - Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * - Neither the name of the Stichting Centrum voor Wiskunde en
20 * Informatica, nor the names of its contributors may be used to endorse or
21 * promote products derived from this software without specific prior
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
25 * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
26 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
27 * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
28 * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
29 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
30 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
31 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
32 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
33 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
34 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
38 * Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
39 * All rights reserved.
41 * Redistribution and use in source and binary forms, with or without
42 * modification, are permitted provided that the following conditions
44 * 1. Redistributions of source code must retain the above copyright
45 * notice, this list of conditions and the following disclaimer.
46 * 2. Redistributions in binary form must reproduce the above copyright
47 * notice, this list of conditions and the following disclaimer in the
48 * documentation and/or other materials provided with the distribution.
49 * 3. The name of the author may not be used to endorse or promote products
50 * derived from this software without specific prior written permission.
52 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
53 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
54 * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
55 * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
56 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
57 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
58 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
59 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
60 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
61 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
64 #include <sys/cdefs.h>
66 __RCSID("$NetBSD: hack.do_name.c,v 1.6 2003/04/02 18:36:36 jsm Exp $");
80 pline("(For instructions type a ?)");
84 while ((c
= readchar()) != '.') {
85 for (i
= 0; i
< 8; i
++)
87 if (1 <= cx
+ xdir
[i
] && cx
+ xdir
[i
] <= COLNO
)
89 if (0 <= cy
+ ydir
[i
] && cy
+ ydir
[i
] <= ROWNO
- 1)
94 pline("Use [hjkl] to move the cursor to %s.", goal
);
95 pline("Type a . when you are at the right place.");
97 pline("Unknown direction: '%s' (%s).",
99 force
? "use hjkl or ." : "aborted");
120 struct monst
*mtmp
, *mtmp2
;
121 cc
= getpos(0, "the monster you want to name");
128 if (cx
== u
.ux
&& cy
== u
.uy
)
129 pline("This ugly monster is called %s and cannot be renamed.",
132 pline("There is no monster there.");
136 pline("I see no monster there.");
139 if (!cansee(cx
, cy
)) {
140 pline("I cannot see a monster there.");
143 pline("What do you want to call %s? ", lmonnam(mtmp
));
146 if (!*buf
|| *buf
== '\033')
148 lth
= strlen(buf
) + 1;
153 mtmp2
= newmonst(mtmp
->mxlth
+ lth
);
155 for (i
= 0; i
< mtmp
->mxlth
; i
++)
156 ((char *) mtmp2
->mextra
)[i
] = ((char *) mtmp
->mextra
)[i
];
157 mtmp2
->mnamelth
= lth
;
158 (void) strcpy(NAME(mtmp2
), buf
);
159 replmon(mtmp
, mtmp2
);
164 * This routine changes the address of obj . Be careful not to call it
165 * when there might be pointers around in unknown places. For now: only
166 * when obj is in the inventory.
172 struct obj
*otmp
, *otmp2
;
175 pline("What do you want to name %s? ", doname(obj
));
178 if (!*buf
|| *buf
== '\033')
180 lth
= strlen(buf
) + 1;
187 otmp2
->onamelth
= lth
;
188 (void) strcpy(ONAME(otmp2
), buf
);
190 setworn((struct obj
*) 0, obj
->owornmask
);
191 setworn(otmp2
, otmp2
->owornmask
);
194 * do freeinv(obj); etc. by hand in order to preserve the position of
195 * this object in the inventory
200 for (otmp
= invent
;; otmp
= otmp
->nobj
) {
202 panic("Do_oname: cannot find obj.");
203 if (otmp
->nobj
== obj
) {
209 obfree(obj
, otmp2
); /* now unnecessary: no pointers on bill */
211 free((char *) obj
); /* let us hope nobody else saved a pointer */
219 pline("Do you want to name an individual object? [ny] ");
220 switch (readchar()) {
224 obj
= getobj("#", "name");
229 obj
= getobj("?!=/", "call");
249 pline("Call %s %s: ", strchr(vowels
, *str
) ? "an" : "a", str
);
252 if (!*buf
|| *buf
== '\033')
254 str
= newstring(strlen(buf
) + 1);
255 (void) strcpy(str
, buf
);
256 str1
= &(objects
[obj
->otyp
].oc_uname
);
262 const char *const ghostnames
[] = {/* these names should have length < PL_NSIZ */
263 "adri", "andries", "andreas", "bert", "david", "dirk", "emile",
264 "frans", "fred", "greg", "hether", "jay", "john", "jon", "kay",
265 "kenny", "maud", "michiel", "mike", "peter", "robert", "ron",
274 static char buf
[BUFSZ
]; /* %% */
275 if (mtmp
->mnamelth
&& !vb
) {
276 (void) strcpy(buf
, NAME(mtmp
));
279 switch (mtmp
->data
->mlet
) {
282 const char *gn
= (char *) mtmp
->mextra
;
283 if (!*gn
) { /* might also look in scorefile */
284 gn
= ghostnames
[rn2(SIZE(ghostnames
))];
287 strcpy((char *) mtmp
->mextra
, !rn2(5) ? plname
: gn
);
289 (void) sprintf(buf
, "%s's ghost", gn
);
294 (void) strcpy(buf
, shkname(mtmp
));
297 /* fall into next case */
299 (void) sprintf(buf
, "the %s%s",
300 mtmp
->minvis
? "invisible " : "",
303 if (vb
&& mtmp
->mnamelth
) {
304 (void) strcat(buf
, " called ");
305 (void) strcat(buf
, NAME(mtmp
));
314 return (xmonnam(mtmp
, 1));
321 return (xmonnam(mtmp
, 0));
328 char *bp
= monnam(mtmp
);
329 if ('a' <= *bp
&& *bp
<= 'z')
339 char *bp
= monnam(mtmp
);
340 static char buf
[BUFSZ
]; /* %% */
342 if (!strncmp(bp
, "the ", 4))
344 (void) sprintf(buf
, "the %s %s", adj
, bp
);
353 char *bp
= amonnam(mtmp
, adj
);
363 char *bp
= Monnam(mtmp
);
364 if (!strncmp(bp
, "The ", 4)) {