Home | History | Annotate | Line # | Download | only in trek
attack.c revision 1.2
      1 /*
      2  * Copyright (c) 1980 Regents of the University of California.
      3  * All rights reserved.
      4  *
      5  * Redistribution and use in source and binary forms, with or without
      6  * modification, are permitted provided that the following conditions
      7  * are met:
      8  * 1. Redistributions of source code must retain the above copyright
      9  *    notice, this list of conditions and the following disclaimer.
     10  * 2. Redistributions in binary form must reproduce the above copyright
     11  *    notice, this list of conditions and the following disclaimer in the
     12  *    documentation and/or other materials provided with the distribution.
     13  * 3. All advertising materials mentioning features or use of this software
     14  *    must display the following acknowledgement:
     15  *	This product includes software developed by the University of
     16  *	California, Berkeley and its contributors.
     17  * 4. Neither the name of the University nor the names of its contributors
     18  *    may be used to endorse or promote products derived from this software
     19  *    without specific prior written permission.
     20  *
     21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     31  * SUCH DAMAGE.
     32  */
     33 
     34 #ifndef lint
     35 /*static char sccsid[] = "from: @(#)attack.c	5.4 (Berkeley) 6/1/90";*/
     36 static char rcsid[] = "$Id: attack.c,v 1.2 1993/08/01 18:50:53 mycroft Exp $";
     37 #endif /* not lint */
     38 
     39 # include	"trek.h"
     40 
     41 /*
     42 **  Klingon Attack Routine
     43 **
     44 **	This routine performs the Klingon attack provided that
     45 **	(1) Something happened this move (i.e., not free), and
     46 **	(2) You are not cloaked.  Note that if you issue the
     47 **	cloak command, you are not considered cloaked until you
     48 **	expend some time.
     49 **
     50 **	Klingons are permitted to move both before and after the
     51 **	attack.  They will tend to move toward you before the
     52 **	attack and away from you after the attack.
     53 **
     54 **	Under certain conditions you can get a critical hit.  This
     55 **	sort of hit damages devices.  The probability that a given
     56 **	device is damaged depends on the device.  Well protected
     57 **	devices (such as the computer, which is in the core of the
     58 **	ship and has considerable redundancy) almost never get
     59 **	damaged, whereas devices which are exposed (such as the
     60 **	warp engines) or which are particularly delicate (such as
     61 **	the transporter) have a much higher probability of being
     62 **	damaged.
     63 **
     64 **	The actual amount of damage (i.e., how long it takes to fix
     65 **	it) depends on the amount of the hit and the "damfac[]"
     66 **	entry for the particular device.
     67 **
     68 **	Casualties can also occur.
     69 */
     70 
     71 attack(resting)
     72 int	resting;	/* set if attack while resting */
     73 {
     74 	register int		hit, i, l;
     75 	int			maxhit, tothit, shldabsb;
     76 	double			chgfac, propor, extradm;
     77 	double			dustfac, tothe;
     78 	int			cas;
     79 	int			hitflag;
     80 
     81 	if (Move.free)
     82 		return;
     83 	if (Etc.nkling <= 0 || Quad[Ship.quadx][Ship.quady].stars < 0)
     84 		return;
     85 	if (Ship.cloaked && Ship.cloakgood)
     86 		return;
     87 	/* move before attack */
     88 	klmove(0);
     89 	if (Ship.cond == DOCKED)
     90 	{
     91 		if (!resting)
     92 			printf("Starbase shields protect the %s\n", Ship.shipname);
     93 		return;
     94 	}
     95 	/* setup shield effectiveness */
     96 	chgfac = 1.0;
     97 	if (Move.shldchg)
     98 		chgfac = 0.25 + 0.50 * franf();
     99 	maxhit = tothit = 0;
    100 	hitflag = 0;
    101 
    102 	/* let each Klingon do his damndest */
    103 	for (i = 0; i < Etc.nkling; i++)
    104 	{
    105 		/* if he's low on power he won't attack */
    106 		if (Etc.klingon[i].power < 20)
    107 			continue;
    108 		if (!hitflag)
    109 		{
    110 			printf("\nStardate %.2f: Klingon attack:\n",
    111 				Now.date);
    112 			hitflag++;
    113 		}
    114 		/* complete the hit */
    115 		dustfac = 0.90 + 0.01 * franf();
    116 		tothe = Etc.klingon[i].avgdist;
    117 		hit = Etc.klingon[i].power * pow(dustfac, tothe) * Param.hitfac;
    118 		/* deplete his energy */
    119 		dustfac = Etc.klingon[i].power;
    120 		Etc.klingon[i].power = dustfac * Param.phasfac * (1.0 + (franf() - 0.5) * 0.2);
    121 		/* see how much of hit shields will absorb */
    122 		shldabsb = 0;
    123 		if (Ship.shldup || Move.shldchg)
    124 		{
    125 			propor = Ship.shield;
    126 			propor /= Param.shield;
    127 			shldabsb = propor * chgfac * hit;
    128 			if (shldabsb > Ship.shield)
    129 				shldabsb = Ship.shield;
    130 			Ship.shield -= shldabsb;
    131 		}
    132 		/* actually do the hit */
    133 		printf("HIT: %d units", hit);
    134 		if (!damaged(SRSCAN))
    135 			printf(" from %d,%d", Etc.klingon[i].x, Etc.klingon[i].y);
    136 		cas = (shldabsb * 100) / hit;
    137 		hit -= shldabsb;
    138 		if (shldabsb > 0)
    139 			printf(", shields absorb %d%%, effective hit %d\n",
    140 				cas, hit);
    141 		else
    142 			printf("\n");
    143 		tothit += hit;
    144 		if (hit > maxhit)
    145 			maxhit = hit;
    146 		Ship.energy -= hit;
    147 		/* see if damages occurred */
    148 		if (hit >= (15 - Game.skill) * (25 - ranf(12)))
    149 		{
    150 			printf("CRITICAL HIT!!!\n");
    151 			/* select a device from probability vector */
    152 			cas = ranf(1000);
    153 			for (l = 0; cas >= 0; l++)
    154 				cas -= Param.damprob[l];
    155 			l -= 1;
    156 			/* compute amount of damage */
    157 			extradm = (hit * Param.damfac[l]) / (75 + ranf(25)) + 0.5;
    158 			/* damage the device */
    159 			damage(l, extradm);
    160 			if (damaged(SHIELD))
    161 			{
    162 				if (Ship.shldup)
    163 					printf("Sulu: Shields knocked down, captain.\n");
    164 				Ship.shldup = 0;
    165 				Move.shldchg = 0;
    166 			}
    167 		}
    168 		if (Ship.energy <= 0)
    169 			lose(L_DSTRYD);
    170 	}
    171 
    172 	/* see what our casualities are like */
    173 	if (maxhit >= 200 || tothit >= 500)
    174 	{
    175 		cas = tothit * 0.015 * franf();
    176 		if (cas >= 2)
    177 		{
    178 			printf("McCoy: we suffered %d casualties in that attack.\n",
    179 				cas);
    180 			Game.deaths += cas;
    181 			Ship.crew -= cas;
    182 		}
    183 	}
    184 
    185 	/* allow Klingons to move after attacking */
    186 	klmove(1);
    187 
    188 	return;
    189 }
    190