]> git.cameronkatri.com Git - bsdgames-darwin.git/blob - hack/hack.worn.c
- enlarge buffer to avoid snprintf() truncation
[bsdgames-darwin.git] / hack / hack.worn.c
1 /* $NetBSD: hack.worn.c,v 1.7 2009/08/12 07:28:41 dholland Exp $ */
2
3 /*
4 * Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
5 * Amsterdam
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
10 * met:
11 *
12 * - Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 *
15 * - Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * - Neither the name of the Stichting Centrum voor Wiskunde en
20 * Informatica, nor the names of its contributors may be used to endorse or
21 * promote products derived from this software without specific prior
22 * written permission.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
25 * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
26 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
27 * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
28 * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
29 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
30 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
31 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
32 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
33 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
34 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35 */
36
37 /*
38 * Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
39 * All rights reserved.
40 *
41 * Redistribution and use in source and binary forms, with or without
42 * modification, are permitted provided that the following conditions
43 * are met:
44 * 1. Redistributions of source code must retain the above copyright
45 * notice, this list of conditions and the following disclaimer.
46 * 2. Redistributions in binary form must reproduce the above copyright
47 * notice, this list of conditions and the following disclaimer in the
48 * documentation and/or other materials provided with the distribution.
49 * 3. The name of the author may not be used to endorse or promote products
50 * derived from this software without specific prior written permission.
51 *
52 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
53 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
54 * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
55 * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
56 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
57 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
58 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
59 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
60 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
61 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
62 */
63
64 #include <sys/cdefs.h>
65 #ifndef lint
66 __RCSID("$NetBSD: hack.worn.c,v 1.7 2009/08/12 07:28:41 dholland Exp $");
67 #endif /* not lint */
68
69 #include "hack.h"
70 #include "extern.h"
71
72 static struct worn {
73 long w_mask;
74 struct obj **w_obj;
75 } worn[] = {
76 {
77 W_ARM, &uarm
78 },
79 {
80 W_ARM2, &uarm2
81 },
82 {
83 W_ARMH, &uarmh
84 },
85 {
86 W_ARMS, &uarms
87 },
88 {
89 W_ARMG, &uarmg
90 },
91 {
92 W_RINGL, &uleft
93 },
94 {
95 W_RINGR, &uright
96 },
97 {
98 W_WEP, &uwep
99 },
100 {
101 W_BALL, &uball
102 },
103 {
104 W_CHAIN, &uchain
105 },
106 {
107 0, 0
108 }
109 };
110
111 void
112 setworn(struct obj *obj, long mask)
113 {
114 struct worn *wp;
115 struct obj *oobj;
116
117 for (wp = worn; wp->w_mask; wp++)
118 if (wp->w_mask & mask) {
119 oobj = *(wp->w_obj);
120 if (oobj && !(oobj->owornmask & wp->w_mask))
121 impossible("Setworn: mask = %ld.", wp->w_mask);
122 if (oobj)
123 oobj->owornmask &= ~wp->w_mask;
124 if (obj && oobj && wp->w_mask == W_ARM) {
125 if (uarm2) {
126 impossible("Setworn: uarm2 set?");
127 } else
128 setworn(uarm, W_ARM2);
129 }
130 *(wp->w_obj) = obj;
131 if (obj)
132 obj->owornmask |= wp->w_mask;
133 }
134 if (uarm2 && !uarm) {
135 uarm = uarm2;
136 uarm2 = 0;
137 uarm->owornmask ^= (W_ARM | W_ARM2);
138 }
139 }
140
141 /* called e.g. when obj is destroyed */
142 void
143 setnotworn(struct obj *obj)
144 {
145 struct worn *wp;
146
147 for (wp = worn; wp->w_mask; wp++)
148 if (obj == *(wp->w_obj)) {
149 *(wp->w_obj) = 0;
150 obj->owornmask &= ~wp->w_mask;
151 }
152 if (uarm2 && !uarm) {
153 uarm = uarm2;
154 uarm2 = 0;
155 uarm->owornmask ^= (W_ARM | W_ARM2);
156 }
157 }