]>
git.cameronkatri.com Git - bsdgames-darwin.git/blob - hack/hack.do_name.c
1 /* $NetBSD: hack.do_name.c,v 1.7 2008/01/28 06:55:41 dholland Exp $ */
4 * Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
12 * - Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
15 * - Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * - Neither the name of the Stichting Centrum voor Wiskunde en
20 * Informatica, nor the names of its contributors may be used to endorse or
21 * promote products derived from this software without specific prior
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
25 * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
26 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
27 * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
28 * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
29 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
30 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
31 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
32 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
33 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
34 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
38 * Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
39 * All rights reserved.
41 * Redistribution and use in source and binary forms, with or without
42 * modification, are permitted provided that the following conditions
44 * 1. Redistributions of source code must retain the above copyright
45 * notice, this list of conditions and the following disclaimer.
46 * 2. Redistributions in binary form must reproduce the above copyright
47 * notice, this list of conditions and the following disclaimer in the
48 * documentation and/or other materials provided with the distribution.
49 * 3. The name of the author may not be used to endorse or promote products
50 * derived from this software without specific prior written permission.
52 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
53 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
54 * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
55 * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
56 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
57 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
58 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
59 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
60 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
61 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
64 #include <sys/cdefs.h>
66 __RCSID("$NetBSD: hack.do_name.c,v 1.7 2008/01/28 06:55:41 dholland Exp $");
80 pline("(For instructions type a ?)");
84 while ((c
= readchar()) != '.') {
85 for (i
= 0; i
< 8; i
++)
87 if (1 <= cx
+ xdir
[i
] && cx
+ xdir
[i
] <= COLNO
)
89 if (0 <= cy
+ ydir
[i
] && cy
+ ydir
[i
] <= ROWNO
- 1)
94 pline("Use [hjkl] to move the cursor to %s.", goal
);
95 pline("Type a . when you are at the right place.");
97 pline("Unknown direction: '%s' (%s).",
99 force
? "use hjkl or ." : "aborted");
121 struct monst
*mtmp
, *mtmp2
;
122 cc
= getpos(0, "the monster you want to name");
129 if (cx
== u
.ux
&& cy
== u
.uy
)
130 pline("This ugly monster is called %s and cannot be renamed.",
133 pline("There is no monster there.");
137 pline("I see no monster there.");
140 if (!cansee(cx
, cy
)) {
141 pline("I cannot see a monster there.");
144 pline("What do you want to call %s? ", lmonnam(mtmp
));
147 if (!*buf
|| *buf
== '\033')
149 lth
= strlen(buf
) + 1;
154 mtmp2
= newmonst(mtmp
->mxlth
+ lth
);
156 for (i
= 0; i
< mtmp
->mxlth
; i
++)
157 ((char *) mtmp2
->mextra
)[i
] = ((char *) mtmp
->mextra
)[i
];
158 mtmp2
->mnamelth
= lth
;
159 (void) strcpy(NAME(mtmp2
), buf
);
160 replmon(mtmp
, mtmp2
);
165 * This routine changes the address of obj . Be careful not to call it
166 * when there might be pointers around in unknown places. For now: only
167 * when obj is in the inventory.
173 struct obj
*otmp
, *otmp2
;
176 pline("What do you want to name %s? ", doname(obj
));
179 if (!*buf
|| *buf
== '\033')
181 lth
= strlen(buf
) + 1;
188 otmp2
->onamelth
= lth
;
189 (void) strcpy(ONAME(otmp2
), buf
);
191 setworn((struct obj
*) 0, obj
->owornmask
);
192 setworn(otmp2
, otmp2
->owornmask
);
195 * do freeinv(obj); etc. by hand in order to preserve the position of
196 * this object in the inventory
201 for (otmp
= invent
;; otmp
= otmp
->nobj
) {
203 panic("Do_oname: cannot find obj.");
204 if (otmp
->nobj
== obj
) {
210 obfree(obj
, otmp2
); /* now unnecessary: no pointers on bill */
212 free((char *) obj
); /* let us hope nobody else saved a pointer */
220 pline("Do you want to name an individual object? [ny] ");
221 switch (readchar()) {
225 obj
= getobj("#", "name");
230 obj
= getobj("?!=/", "call");
250 pline("Call %s %s: ", strchr(vowels
, *str
) ? "an" : "a", str
);
253 if (!*buf
|| *buf
== '\033')
255 str
= newstring(strlen(buf
) + 1);
256 (void) strcpy(str
, buf
);
257 str1
= &(objects
[obj
->otyp
].oc_uname
);
263 const char *const ghostnames
[] = {/* these names should have length < PL_NSIZ */
264 "adri", "andries", "andreas", "bert", "david", "dirk", "emile",
265 "frans", "fred", "greg", "hether", "jay", "john", "jon", "kay",
266 "kenny", "maud", "michiel", "mike", "peter", "robert", "ron",
275 static char buf
[BUFSZ
]; /* %% */
276 if (mtmp
->mnamelth
&& !vb
) {
277 (void) strcpy(buf
, NAME(mtmp
));
280 switch (mtmp
->data
->mlet
) {
283 const char *gn
= (char *) mtmp
->mextra
;
284 if (!*gn
) { /* might also look in scorefile */
285 gn
= ghostnames
[rn2(SIZE(ghostnames
))];
288 strcpy((char *) mtmp
->mextra
, !rn2(5) ? plname
: gn
);
290 (void) sprintf(buf
, "%s's ghost", gn
);
295 (void) strcpy(buf
, shkname(mtmp
));
298 /* fall into next case */
300 (void) sprintf(buf
, "the %s%s",
301 mtmp
->minvis
? "invisible " : "",
304 if (vb
&& mtmp
->mnamelth
) {
305 (void) strcat(buf
, " called ");
306 (void) strcat(buf
, NAME(mtmp
));
315 return (xmonnam(mtmp
, 1));
322 return (xmonnam(mtmp
, 0));
329 char *bp
= monnam(mtmp
);
330 if ('a' <= *bp
&& *bp
<= 'z')
340 char *bp
= monnam(mtmp
);
341 static char buf
[BUFSZ
]; /* %% */
343 if (!strncmp(bp
, "the ", 4))
345 (void) sprintf(buf
, "the %s %s", adj
, bp
);
354 char *bp
= amonnam(mtmp
, adj
);
364 char *bp
= Monnam(mtmp
);
365 if (!strncmp(bp
, "The ", 4)) {