]> git.cameronkatri.com Git - bsdgames-darwin.git/blob - hack/hack.rumors.c
Hack is now BSD-licensed. Thanks to Andries Brouwer, Jay Fenlason and
[bsdgames-darwin.git] / hack / hack.rumors.c
1 /* $NetBSD: hack.rumors.c,v 1.5 2003/04/02 18:36:39 jsm Exp $ */
2
3 /*
4 * Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
5 * Amsterdam
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
10 * met:
11 *
12 * - Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 *
15 * - Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * - Neither the name of the Stichting Centrum voor Wiskunde en
20 * Informatica, nor the names of its contributors may be used to endorse or
21 * promote products derived from this software without specific prior
22 * written permission.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
25 * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
26 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
27 * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
28 * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
29 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
30 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
31 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
32 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
33 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
34 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35 */
36
37 /*
38 * Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
39 * All rights reserved.
40 *
41 * Redistribution and use in source and binary forms, with or without
42 * modification, are permitted provided that the following conditions
43 * are met:
44 * 1. Redistributions of source code must retain the above copyright
45 * notice, this list of conditions and the following disclaimer.
46 * 2. Redistributions in binary form must reproduce the above copyright
47 * notice, this list of conditions and the following disclaimer in the
48 * documentation and/or other materials provided with the distribution.
49 * 3. The name of the author may not be used to endorse or promote products
50 * derived from this software without specific prior written permission.
51 *
52 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
53 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
54 * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
55 * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
56 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
57 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
58 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
59 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
60 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
61 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
62 */
63
64 #include <sys/cdefs.h>
65 #ifndef lint
66 __RCSID("$NetBSD: hack.rumors.c,v 1.5 2003/04/02 18:36:39 jsm Exp $");
67 #endif /* not lint */
68
69 #include "hack.h" /* for RUMORFILE and BSD (strchr) */
70 #include "extern.h"
71 #define CHARSZ 8 /* number of bits in a char */
72 int n_rumors = 0;
73 int n_used_rumors = -1;
74 char *usedbits;
75
76 void
77 init_rumors(rumf)
78 FILE *rumf;
79 {
80 int i;
81 n_used_rumors = 0;
82 while (skipline(rumf))
83 n_rumors++;
84 rewind(rumf);
85 i = n_rumors / CHARSZ;
86 usedbits = (char *) alloc((unsigned) (i + 1));
87 for (; i >= 0; i--)
88 usedbits[i] = 0;
89 }
90
91 int
92 skipline(rumf)
93 FILE *rumf;
94 {
95 char line[COLNO];
96 while (1) {
97 if (!fgets(line, sizeof(line), rumf))
98 return (0);
99 if (strchr(line, '\n'))
100 return (1);
101 }
102 }
103
104 void
105 outline(rumf)
106 FILE *rumf;
107 {
108 char line[COLNO];
109 char *ep;
110 if (!fgets(line, sizeof(line), rumf))
111 return;
112 if ((ep = strchr(line, '\n')) != 0)
113 *ep = 0;
114 pline("This cookie has a scrap of paper inside! It reads: ");
115 pline(line);
116 }
117
118 void
119 outrumor()
120 {
121 int rn, i;
122 FILE *rumf;
123 if (n_rumors <= n_used_rumors ||
124 (rumf = fopen(RUMORFILE, "r")) == (FILE *) 0)
125 return;
126 if (n_used_rumors < 0)
127 init_rumors(rumf);
128 if (!n_rumors)
129 goto none;
130 rn = rn2(n_rumors - n_used_rumors);
131 i = 0;
132 while (rn || used(i)) {
133 (void) skipline(rumf);
134 if (!used(i))
135 rn--;
136 i++;
137 }
138 usedbits[i / CHARSZ] |= (1 << (i % CHARSZ));
139 n_used_rumors++;
140 outline(rumf);
141 none:
142 (void) fclose(rumf);
143 }
144
145 int
146 used(i)
147 int i;
148 {
149 return (usedbits[i / CHARSZ] & (1 << (i % CHARSZ)));
150 }