1 /* $NetBSD: hack.search.c,v 1.5 2003/04/02 18:36:40 jsm Exp $ */
4 * Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
12 * - Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
15 * - Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * - Neither the name of the Stichting Centrum voor Wiskunde en
20 * Informatica, nor the names of its contributors may be used to endorse or
21 * promote products derived from this software without specific prior
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
25 * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
26 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
27 * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
28 * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
29 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
30 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
31 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
32 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
33 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
34 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
38 * Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
39 * All rights reserved.
41 * Redistribution and use in source and binary forms, with or without
42 * modification, are permitted provided that the following conditions
44 * 1. Redistributions of source code must retain the above copyright
45 * notice, this list of conditions and the following disclaimer.
46 * 2. Redistributions in binary form must reproduce the above copyright
47 * notice, this list of conditions and the following disclaimer in the
48 * documentation and/or other materials provided with the distribution.
49 * 3. The name of the author may not be used to endorse or promote products
50 * derived from this software without specific prior written permission.
52 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
53 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
54 * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
55 * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
56 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
57 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
58 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
59 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
60 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
61 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
64 #include <sys/cdefs.h>
66 __RCSID("$NetBSD: hack.search.c,v 1.5 2003/04/02 18:36:40 jsm Exp $");
74 { /* returns number of things found */
83 for (lx
= u
.ux
; (num
= levl
[lx
- 1][u
.uy
].typ
) && num
!= CORR
; lx
--);
84 for (hx
= u
.ux
; (num
= levl
[hx
+ 1][u
.uy
].typ
) && num
!= CORR
; hx
++);
85 for (ly
= u
.uy
; (num
= levl
[u
.ux
][ly
- 1].typ
) && num
!= CORR
; ly
--);
86 for (hy
= u
.uy
; (num
= levl
[u
.ux
][hy
+ 1].typ
) && num
!= CORR
; hy
++);
88 for (zy
= ly
; zy
<= hy
; zy
++)
89 for (zx
= lx
; zx
<= hx
; zx
++) {
90 if (levl
[zx
][zy
].typ
== SDOOR
) {
91 levl
[zx
][zy
].typ
= DOOR
;
94 } else if (levl
[zx
][zy
].typ
== SCORR
) {
95 levl
[zx
][zy
].typ
= CORR
;
96 atl(zx
, zy
, CORR_SYM
);
98 } else if ((ttmp
= t_at(zx
, zy
)) != NULL
) {
99 if (ttmp
->ttyp
== PIERC
) {
100 (void) makemon(PM_PIERCER
, zx
, zy
);
103 } else if (!ttmp
->tseen
) {
105 if (!vism_at(zx
, zy
))
109 } else if ((mtmp
= m_at(zx
, zy
)) != NULL
)
126 pline("What are you looking for? The exit?");
128 for (x
= u
.ux
- 1; x
< u
.ux
+ 2; x
++)
129 for (y
= u
.uy
- 1; y
< u
.uy
+ 2; y
++)
130 if (x
!= u
.ux
|| y
!= u
.uy
) {
131 if (levl
[x
][y
].typ
== SDOOR
) {
134 levl
[x
][y
].typ
= DOOR
;
135 levl
[x
][y
].seen
= 0; /* force prl */
138 } else if (levl
[x
][y
].typ
== SCORR
) {
141 levl
[x
][y
].typ
= CORR
;
142 levl
[x
][y
].seen
= 0; /* force prl */
147 * Be careful not to find
148 * anything in an SCORR or
151 if ((mtmp
= m_at(x
, y
)) != NULL
)
154 pline("You find a mimic.");
157 for (trap
= ftrap
; trap
; trap
= trap
->ntrap
)
158 if (trap
->tx
== x
&& trap
->ty
== y
&&
159 !trap
->tseen
&& !rn2(8)) {
161 pline("You find a%s.", traps
[trap
->ttyp
]);
162 if (trap
->ttyp
== PIERC
) {
164 (void) makemon(PM_PIERCER
, x
, y
);
185 for (trap
= ftrap
; trap
; trap
= trap
->ntrap
)
186 if (trap
->tx
== x
&& trap
->ty
== y
&& trap
->tseen
) {
188 if ((u
.dz
< 0) != (!xdnstair
&& trap
->ttyp
== TRAPDOOR
))
190 pline("That is a%s.", traps
[trap
->ttyp
]);
193 pline("I can't see a trap there.");
198 wakeup(struct monst
*mtmp
)
206 /* NOTE: we must check if(mtmp->mimic) before calling this routine */
208 seemimic(struct monst
*mtmp
)
211 mtmp
->mappearance
= 0;