* Copyright (c) 1992, 1993
* The Regents of the University of California. All rights reserved.
* This code is derived from software contributed to Berkeley by
* Rodney Ruddock of the University of Guelph.
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the University of
* California, Berkeley and its contributors.
* 4. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
static char sccsid
[] = "@(#)m.c 8.1 (Berkeley) 5/31/93";
* Move the specified lines to the new location. It's quick 'cause
* just a couple of pointers are redirected.
LINE
*l_dest
=NULL
, *l_old_top
, *l_old_bottom
;
if (((ss
= getc(inputt
)) != '\n') && (ss
!= EOF
)) {
l_dest
= address_conv(NULL
, inputt
, errnum
);
(ungetc(ss
, inputt
), *errnum
= -1);
strcpy(help_msg
, "bad destination address");
if (Start_default
&& End_default
)
strcpy(help_msg
, "buffer empty");
Start_default
= End_default
= 0;
/* Do some address checking. */
if ((l_dest
) && ((l_dest
== Start
) ||
(address_check(l_dest
, Start
) == -1)) &&
(address_check(End
, l_dest
) == -1)) {
strcpy(help_msg
, "destination address in address range");
* Some more address checking. These are "legal" command constructions
* but are kind-a useless since the buffer doesn't change.
if ((Start
== l_dest
) || (End
== l_dest
))
if ((Start
== top
) && (End
== bottom
))
if ((Start
== top
) && (l_dest
== NULL
))
u_add_stk(&(End
->below
->above
));
u_add_stk(&(Start
->above
->below
));
u_add_stk(&(Start
->above
->below
));
Start
->above
->below
= End
->below
;
u_add_stk(&(End
->below
->above
));
End
->below
->above
= Start
->above
;
u_add_stk(&(Start
->above
));
u_add_stk(&(End
->below
));
u_add_stk(&(l_old_top
->above
));
if (l_dest
== l_old_bottom
) {
u_add_stk(&(End
->below
));
u_add_stk(&(Start
->above
));
u_add_stk(&(l_dest
->below
));
u_add_stk(&(Start
->above
));
u_add_stk(&(End
->below
));
End
->below
= l_dest
->below
;
u_add_stk(&(l_dest
->below
->above
));
l_dest
->below
->above
= End
;
u_add_stk(&(l_dest
->below
));