home *** CD-ROM | disk | FTP | other *** search
/ PC PowerPlay 56 / CDPowerplay56Disc2.iso / demos / blade / data1.cab / Program_Executable_Files / Scripts / Combos / VmpCombos.pyc (.txt) < prev    next >
Encoding:
Python Compiled Bytecode  |  2000-10-27  |  951 b   |  29 lines

  1. # Source Generated with Decompyle++
  2. # File: in.pyc (Python 1.5)
  3.  
  4. import Bladex
  5. ATK_UNIQUE = 0
  6. ATK_RANDOM = 1
  7. ATK_SEQUENTIAL = 2
  8. Bladex.SetActionEventTable('Vmp', 'disappear', 'ATTACKING')
  9. Bladex.SetActionEventTable('Vmp', 'g_01', 'ATTACKING')
  10. Bladex.SetActionEventTable('Vmp', 'g_06', 'ATTACKING')
  11. Bladex.SetActionEventTable('Vmp', 'g_07', 'ATTACKING')
  12. Bladex.SetActionEventTable('Vmp', 'g_26', 'ATTACKING')
  13. vmp = Bladex.GetCharType('Vamp', 'Vmp')
  14. vmp.AddAttack('disappear', 'Vmp_disappear')
  15. vmp.AttackTypeFlag('disappear', ATK_UNIQUE)
  16. vmp.AddLevels('Vmp_disappears', 0, 0)
  17. vmp.AddAttack('g_01', 'Vmp_g_01')
  18. vmp.AttackTypeFlag('g_01', ATK_UNIQUE)
  19. vmp.AddLevels('Vmp_g_01', 0, 0)
  20. vmp.AddAttack('g_06', 'Vmp_g_06')
  21. vmp.AttackTypeFlag('g_06', ATK_UNIQUE)
  22. vmp.AddLevels('Vmp_g_06', 0, 0)
  23. vmp.AddAttack('g_07', 'Vmp_g_07')
  24. vmp.AttackTypeFlag('g_07', ATK_UNIQUE)
  25. vmp.AddLevels('Vmp_g_07', 0, 0)
  26. vmp.AddAttack('g_26', 'Vmp_g_26')
  27. vmp.AttackTypeFlag('g_26', ATK_UNIQUE)
  28. vmp.AddLevels('Vmp_g_26', 0, 0)
  29.