home *** CD-ROM | disk | FTP | other *** search
/ PC PowerPlay 56 / CDPowerplay56Disc2.iso / demos / blade / data1.cab / Program_Executable_Files / Scripts / Combos / LchCombos.pyc (.txt) < prev    next >
Encoding:
Python Compiled Bytecode  |  2000-10-27  |  1.5 KB  |  46 lines

  1. # Source Generated with Decompyle++
  2. # File: in.pyc (Python 1.5)
  3.  
  4. import Bladex
  5. ATK_UNIQUE = 0
  6. ATK_RANDOM = 1
  7. ATK_SEQUENTIAL = 2
  8. Bladex.SetActionEventTable('Lch', 'g_spit', 'ATTACKING')
  9. Bladex.SetActionEventTable('Lch', 'spit_drag', 'ATTACKING')
  10. Bladex.SetActionEventTable('Lch', 'g_12', 'ATTACKING')
  11. Bladex.SetActionEventTable('Lch', 'g_13', 'ATTACKING')
  12. Bladex.SetActionEventTable('Lch', 'g_16', 'ATTACKING')
  13. Bladex.SetActionEventTable('Lch', 'g_18', 'ATTACKING')
  14. Bladex.SetActionEventTable('Lch', 'g_claw1', 'ATTACKING')
  15. Bladex.SetActionEventTable('Lch', 'g_claw2', 'ATTACKING')
  16. Bladex.SetActionEventTable('Lch', 'g_claw3', 'ATTACKING')
  17. lch = Bladex.GetCharType('Lich', 'Lch')
  18. ATK_UNIQUE = 0
  19. lch.AddAttack('SP1', 'Lch_g_spit')
  20. lch.AttackTypeFlag('SP1', ATK_UNIQUE)
  21. lch.AddLevels('Lch_g_spit', 0, 0)
  22. lch.AddAttack('SP2', 'Lch_spit_drag')
  23. lch.AttackTypeFlag('SP2', ATK_UNIQUE)
  24. lch.AddLevels('Lch_spit_drag', 0, 0)
  25. lch.AddAttack('G12', 'Lch_g_12')
  26. lch.AttackTypeFlag('G12', ATK_UNIQUE)
  27. lch.AddLevels('Lch_g_12', 0, 0)
  28. lch.AddAttack('G13', 'Lch_g_13')
  29. lch.AttackTypeFlag('G13', ATK_UNIQUE)
  30. lch.AddLevels('Lch_g_13', 0, 0)
  31. lch.AddAttack('G16', 'Lch_g_16')
  32. lch.AttackTypeFlag('G16', ATK_UNIQUE)
  33. lch.AddLevels('Lch_g_16', 0, 0)
  34. lch.AddAttack('G18', 'Lch_g_18')
  35. lch.AttackTypeFlag('G18', ATK_UNIQUE)
  36. lch.AddLevels('Lch_g_18', 0, 0)
  37. lch.AddAttack('C1', 'Lch_g_claw1')
  38. lch.AttackTypeFlag('C1', ATK_UNIQUE)
  39. lch.AddLevels('Lch_claw1', 0, 0)
  40. lch.AddAttack('C2', 'Lch_g_claw2')
  41. lch.AttackTypeFlag('C2', ATK_UNIQUE)
  42. lch.AddLevels('Lch_claw2', 0, 0)
  43. lch.AddAttack('C3', 'Lch_g_claw3')
  44. lch.AttackTypeFlag('C3', ATK_UNIQUE)
  45. lch.AddLevels('Lch_claw3', 0, 0)
  46.