]>
git.cameronkatri.com Git - bsdgames-darwin.git/blob - hack/hack.do_name.c
1 /* $NetBSD: hack.do_name.c,v 1.8 2009/06/07 18:30:39 dholland Exp $ */
4 * Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
12 * - Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
15 * - Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * - Neither the name of the Stichting Centrum voor Wiskunde en
20 * Informatica, nor the names of its contributors may be used to endorse or
21 * promote products derived from this software without specific prior
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
25 * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
26 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
27 * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
28 * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
29 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
30 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
31 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
32 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
33 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
34 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
38 * Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
39 * All rights reserved.
41 * Redistribution and use in source and binary forms, with or without
42 * modification, are permitted provided that the following conditions
44 * 1. Redistributions of source code must retain the above copyright
45 * notice, this list of conditions and the following disclaimer.
46 * 2. Redistributions in binary form must reproduce the above copyright
47 * notice, this list of conditions and the following disclaimer in the
48 * documentation and/or other materials provided with the distribution.
49 * 3. The name of the author may not be used to endorse or promote products
50 * derived from this software without specific prior written permission.
52 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
53 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
54 * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
55 * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
56 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
57 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
58 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
59 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
60 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
61 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
64 #include <sys/cdefs.h>
66 __RCSID("$NetBSD: hack.do_name.c,v 1.8 2009/06/07 18:30:39 dholland Exp $");
74 getpos(int force
, const char *goal
)
78 pline("(For instructions type a ?)");
82 while ((c
= readchar()) != '.') {
83 for (i
= 0; i
< 8; i
++)
85 if (1 <= cx
+ xdir
[i
] && cx
+ xdir
[i
] <= COLNO
)
87 if (0 <= cy
+ ydir
[i
] && cy
+ ydir
[i
] <= ROWNO
- 1)
92 pline("Use [hjkl] to move the cursor to %s.", goal
);
93 pline("Type a . when you are at the right place.");
95 pline("Unknown direction: '%s' (%s).",
97 force
? "use hjkl or ." : "aborted");
119 struct monst
*mtmp
, *mtmp2
;
120 cc
= getpos(0, "the monster you want to name");
127 if (cx
== u
.ux
&& cy
== u
.uy
)
128 pline("This ugly monster is called %s and cannot be renamed.",
131 pline("There is no monster there.");
135 pline("I see no monster there.");
138 if (!cansee(cx
, cy
)) {
139 pline("I cannot see a monster there.");
142 pline("What do you want to call %s? ", lmonnam(mtmp
));
145 if (!*buf
|| *buf
== '\033')
147 lth
= strlen(buf
) + 1;
152 mtmp2
= newmonst(mtmp
->mxlth
+ lth
);
154 for (i
= 0; i
< mtmp
->mxlth
; i
++)
155 ((char *) mtmp2
->mextra
)[i
] = ((char *) mtmp
->mextra
)[i
];
156 mtmp2
->mnamelth
= lth
;
157 (void) strcpy(NAME(mtmp2
), buf
);
158 replmon(mtmp
, mtmp2
);
163 * This routine changes the address of obj . Be careful not to call it
164 * when there might be pointers around in unknown places. For now: only
165 * when obj is in the inventory.
168 do_oname(struct obj
*obj
)
170 struct obj
*otmp
, *otmp2
;
173 pline("What do you want to name %s? ", doname(obj
));
176 if (!*buf
|| *buf
== '\033')
178 lth
= strlen(buf
) + 1;
185 otmp2
->onamelth
= lth
;
186 (void) strcpy(ONAME(otmp2
), buf
);
188 setworn((struct obj
*) 0, obj
->owornmask
);
189 setworn(otmp2
, otmp2
->owornmask
);
192 * do freeinv(obj); etc. by hand in order to preserve the position of
193 * this object in the inventory
198 for (otmp
= invent
;; otmp
= otmp
->nobj
) {
200 panic("Do_oname: cannot find obj.");
201 if (otmp
->nobj
== obj
) {
207 obfree(obj
, otmp2
); /* now unnecessary: no pointers on bill */
209 free((char *) obj
); /* let us hope nobody else saved a pointer */
217 pline("Do you want to name an individual object? [ny] ");
218 switch (readchar()) {
222 obj
= getobj("#", "name");
227 obj
= getobj("?!=/", "call");
235 docall(struct obj
*obj
)
246 pline("Call %s %s: ", strchr(vowels
, *str
) ? "an" : "a", str
);
249 if (!*buf
|| *buf
== '\033')
251 str
= newstring(strlen(buf
) + 1);
252 (void) strcpy(str
, buf
);
253 str1
= &(objects
[obj
->otyp
].oc_uname
);
259 const char *const ghostnames
[] = {/* these names should have length < PL_NSIZ */
260 "adri", "andries", "andreas", "bert", "david", "dirk", "emile",
261 "frans", "fred", "greg", "hether", "jay", "john", "jon", "kay",
262 "kenny", "maud", "michiel", "mike", "peter", "robert", "ron",
267 xmonnam(struct monst
*mtmp
, int vb
)
269 static char buf
[BUFSZ
]; /* %% */
270 if (mtmp
->mnamelth
&& !vb
) {
271 (void) strcpy(buf
, NAME(mtmp
));
274 switch (mtmp
->data
->mlet
) {
277 const char *gn
= (char *) mtmp
->mextra
;
278 if (!*gn
) { /* might also look in scorefile */
279 gn
= ghostnames
[rn2(SIZE(ghostnames
))];
282 strcpy((char *) mtmp
->mextra
, !rn2(5) ? plname
: gn
);
284 (void) sprintf(buf
, "%s's ghost", gn
);
289 (void) strcpy(buf
, shkname(mtmp
));
292 /* fall into next case */
294 (void) sprintf(buf
, "the %s%s",
295 mtmp
->minvis
? "invisible " : "",
298 if (vb
&& mtmp
->mnamelth
) {
299 (void) strcat(buf
, " called ");
300 (void) strcat(buf
, NAME(mtmp
));
306 lmonnam(struct monst
*mtmp
)
308 return (xmonnam(mtmp
, 1));
312 monnam(struct monst
*mtmp
)
314 return (xmonnam(mtmp
, 0));
318 Monnam(struct monst
*mtmp
)
320 char *bp
= monnam(mtmp
);
321 if ('a' <= *bp
&& *bp
<= 'z')
327 amonnam(struct monst
*mtmp
, const char *adj
)
329 char *bp
= monnam(mtmp
);
330 static char buf
[BUFSZ
]; /* %% */
332 if (!strncmp(bp
, "the ", 4))
334 (void) sprintf(buf
, "the %s %s", adj
, bp
);
339 Amonnam(struct monst
*mtmp
, const char *adj
)
341 char *bp
= amonnam(mtmp
, adj
);
348 Xmonnam(struct monst
*mtmp
)
350 char *bp
= Monnam(mtmp
);
351 if (!strncmp(bp
, "The ", 4)) {