diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-15 19:43:11 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-15 19:43:11 +0000 |
commit | fc22b3d6507c6745911b9dfcc68f1e665ae13dbc (patch) | |
tree | ce1e3bce06471410239a6f41282e328770aa404a /upstream/fedora-40/man6 | |
parent | Initial commit. (diff) | |
download | manpages-l10n-fc22b3d6507c6745911b9dfcc68f1e665ae13dbc.tar.xz manpages-l10n-fc22b3d6507c6745911b9dfcc68f1e665ae13dbc.zip |
Adding upstream version 4.22.0.upstream/4.22.0
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'upstream/fedora-40/man6')
39 files changed, 7199 insertions, 0 deletions
diff --git a/upstream/fedora-40/man6/adventure.6 b/upstream/fedora-40/man6/adventure.6 new file mode 100644 index 00000000..cc8c7a85 --- /dev/null +++ b/upstream/fedora-40/man6/adventure.6 @@ -0,0 +1,55 @@ +.\" $NetBSD: adventure.6,v 1.4 2003/08/07 09:36:50 agc Exp $ +.\" +.\" Copyright (c) 1991, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" The game adventure was originally written in Fortran by Will Crowther +.\" and Don Woods. It was later translated to C and enhanced by Jim +.\" Gillogly. This code is derived from software contributed to Berkeley +.\" by Jim Gillogly at The Rand Corporation. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)adventure.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd May 31, 1993 +.Dt ADVENTURE 6 +.Os +.Sh NAME +.Nm adventure +.Nd an exploration game +.Sh SYNOPSIS +.Nm +.Op saved-file +.Sh DESCRIPTION +The object of the game is to locate and explore Colossal Cave, find the +treasures hidden there, and bring them back to the building with you. +The program is self-descriptive to a point, but part of the game is to +discover its rules. +.Pp +To terminate a game, enter +.Dq quit ; +to save a game for later resumption, enter +.Dq suspend . diff --git a/upstream/fedora-40/man6/arithmetic.6 b/upstream/fedora-40/man6/arithmetic.6 new file mode 100644 index 00000000..b8d4d8f9 --- /dev/null +++ b/upstream/fedora-40/man6/arithmetic.6 @@ -0,0 +1,106 @@ +.\" $NetBSD: arithmetic.6,v 1.11 2003/08/07 09:36:52 agc Exp $ +.\" +.\" Copyright (c) 1989, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" This code is derived from software contributed to Berkeley by +.\" Eamonn McManus of Trinity College Dublin. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)arithmetic.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd May 31, 1993 +.Dt ARITHMETIC 6 +.Os +.Sh NAME +.Nm arithmetic +.Nd quiz on simple arithmetic +.Sh SYNOPSIS +.Nm +.Op Fl o Ar +\-x/ +.Op Fl r Ar range +.Sh DESCRIPTION +.Nm +asks you to solve problems in simple arithmetic. +Each question must be answered correctly before going on to the next. +After every 20 problems, it prints the score so far and the time taken. +You can quit at any time by typing the interrupt or end-of-file character. +.Pp +The options are as follows: +.Bl -tag -width indent +.It Fl o +By default, +.Nm +asks questions on addition of numbers from 0 to 10, and corresponding +subtraction. +By supplying one or more of the characters +.Ar +\-x/ , +you can ask for problems in addition, subtraction, multiplication, and +division, respectively. +If you give one of these characters more than once, that kind of problem +will be asked correspondingly more often. +.It Fl r +If a +.Ar range +is supplied, +.Nm +selects the numbers in its problems in the following way. +For addition and multiplication, the numbers to be added or multiplied +are between 0 and +.Ar range , +inclusive. +For subtraction and division, both the required result and the number to +divide by or subtract will be between 0 and +.Ar range . +(Of course, +.Nm +will not ask you to divide by 0.) +The default +.I range +is 10. +.El +.Pp +When you get a problem wrong, +.Nm +will remember the numbers involved, and will tend to select those numbers +more often than others, in problems of the same sort. +Eventually it will forgive and forget. +.Pp +.Nm +cannot be persuaded to tell you the right answer. +You must work it out for yourself. +.Sh DIAGNOSTICS +.Dq What? +if you get a question wrong. +.Dq Right! +if you get it right. +.Dq Please type a number. +if +.Nm +doesn't understand what you typed. +.Sh SEE ALSO +.Xr bc 1 , +.Xr dc 1 diff --git a/upstream/fedora-40/man6/atc.6 b/upstream/fedora-40/man6/atc.6 new file mode 100644 index 00000000..9448c0a7 --- /dev/null +++ b/upstream/fedora-40/man6/atc.6 @@ -0,0 +1,502 @@ +.\" Automatically generated from atc/atc.6.in. Do not edit. +.\" $NetBSD: atc.6,v 1.21 2004/01/01 16:31:37 wiz Exp $ +.\" +.\" Copyright (c) 1990, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" This code is derived from software contributed to Berkeley by +.\" Ed James. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)atc.6 8.1 (Berkeley) 5/31/93 +.\" +.\" Copyright (c) 1986 Ed James. All rights reserved. +.\" +.Dd January 1, 2004 +.Dt ATC 6 +.Os +.Sh NAME +.Nm atc +.Nd air traffic controller game +.Sh SYNOPSIS +.Nm atc +.Op Fl u?lstp +.Op Fl gf Ar "game name" +.Op Fl r Ar "random seed" +.Sh DESCRIPTION +.Nm +lets you try your hand at the nerve wracking duties of the air traffic +controller without endangering the lives of millions of travelers each year. +Your responsibilities require you to direct the flight of jets +and prop planes into and out of the flight arena and airports. +The speed (update time) and frequency of the planes depend on the +difficulty of the chosen arena. +.Sh OPTIONS +.Bl -tag -width flag +.It Fl u +Print the usage line and exit. +.It Fl \&? +Same as +.Fl u . +.It Fl l +Print a list of available games and exit. +The first game name printed is the default game. +.It Fl s +Print the score list (formerly the Top Ten list). +.It Fl t +Same as +.Fl s . +.It Fl p +Print the path to the special directory where +.Nm +expects to find its private files. +This is used during the installation of the program. +.It Fl g Ar game +Play the named game. +If the game listed is not one of the ones printed from the +.Fl l +option, the default game is played. +.It Fl f Ar game +Same as +.Fl g . +.It Fl r Ar seed +Set the random seed. +The purpose of this flag is questionable. +.El +.Sh GOALS +Your goal in +.Nm +is to keep the game going as long as possible. +There is no winning state, except to beat the times of other players. +You will need to: launch planes at airports (by instructing them to +increase their altitude); land planes at airports (by instructing them to +go to altitude zero when exactly over the airport); and maneuver planes +out of exit points. +.Pp +Several things will cause the end of the game. +Each plane has a destination (see information area), and +sending a plane to the wrong destination is an error. +Planes can run out of fuel, or can collide. +Collision is defined as adjacency in all three dimensions. +A plane leaving the arena +in any other way than through its destination exit is an error as well. +.Pp +Scores are sorted in order of the number of planes safe. +The other statistics are provided merely for fun. +There is no penalty for +taking longer than another player (except in the case of ties). +.Pp +Suspending a game is not permitted. +If you get a talk message, tough. +When was the last time an Air Traffic Controller got called away to the phone? +.Sh THE DISPLAY +Depending on the terminal you run +.Nm +on, the screen will be divided into 4 areas. +It should be stressed that the terminal driver portion of the +game was designed to be reconfigurable, so the display format can vary +depending on the version you are playing. +The descriptions here are based on the ascii version of the game. +The game rules and input format, however, should remain consistent. +Control-L redraws the screen, should it become muddled. +.Ss RADAR +The first screen area is the radar display, showing the relative locations +of the planes, airports, standard entry/exit points, radar +beacons, and ``lines'' which simply serve to aid you in guiding +the planes. +.Pp +Planes are shown as a single letter with an altitude. +If the numerical altitude is a single digit, then it represents +thousands of feet. +Some distinction is made between the prop planes and the jets. +On ascii terminals, prop planes are +represented by a upper case letter, jets by a lower case letter. +.Pp +Airports are shown as a number and some indication of the direction +planes must be going to land at the airport. +On ascii terminals, this is one of `^', `\*[Gt]', `\*[Lt]', and `v', to indicate +north (0 degrees), east (90), west (270) and south (180), respectively. +The planes will also take off in this direction. +.Pp +Beacons are represented as circles or asterisks and a number. +Their purpose is to offer a place of easy reference to the plane pilots. +See +.Sx THE DELAY COMMAND +section below. +.Pp +Entry/exit points are displayed as numbers along the border of the +radar screen. +Planes will enter the arena from these points without warning. +These points have a direction associated with them, and +planes will always enter the arena from this direction. +On the ascii version of +.Nm , +this direction is not displayed. +It will become apparent what this direction is as the game progresses. +.Pp +Incoming planes will always enter at the same altitude: 7000 feet. +For a plane to successfully depart through an entry/exit point, +it must be flying at 9000 feet. +It is not necessary for the planes to be flying in any particular +direction when they leave the arena (yet). +.Ss INFORMATION AREA +The second area of the display is the information area, which lists +the time (number of updates since start), and the number of planes you +have directed safely out of the arena. +Below this is a list of planes currently in the air, followed by a +blank line, and then a list of planes on the ground (at airports). +Each line lists the plane name and its current altitude, +an optional asterisk indicating low fuel, the plane's destination, +and the plane's current command. +Changing altitude is not considered +to be a command and is therefore not displayed. +The following are some possible information lines: +.Pp +.Bd -literal -offset indent +B4*A0: Circle @ b1 +g7 E4: 225 +.Ed +.Pp +The first example shows a prop plane named `B' that is flying at 4000 feet. +It is low on fuel (note the `*'). +Its destination is Airport #0. +The next command it expects to do is circle when it reaches Beacon #1. +The second example shows a jet named `g' at 7000 feet, destined for +Exit #4. +It is just now executing a turn to 225 degrees (South-West). +.Ss INPUT AREA +The third area of the display is the input area. +It is here that your input is reflected. +See the +.Sx INPUT +heading of this manual for more details. +.Ss AUTHOR AREA +This area is used simply to give credit where credit is due. :-) +.Sh INPUT +A command completion interface is built into the game. +At any time, typing `?' will list possible input characters. +Typing a backspace (your erase character) backs up, erasing the last part +of the command. +When a command is complete, a return enters it, and +any semantic checking is done at that time. +If no errors are detected, the command is sent to the appropriate plane. +If an error is discovered +during the check, the offending statement will be underscored and a +(hopefully) descriptive message will be printed under it. +.Pp +The command syntax is broken into two parts: +.Em Immediate Only +and +.Em Delayable +commands. +.Em Immediate Only +commands happen on the next update. +.Em Delayable +commands also happen on the next update unless they +are followed by an optional predicate called the +.Em Delay +command. +.Pp +In the following tables, the syntax +.Em [0\-9] +means any single digit, and +.Aq Em dir +refers to a direction, given by the keys around the `s' key: ``wedcxzaq''. +In absolute references, `q' refers to North-West or 315 degrees, and `w' +refers to North, or 0 degrees. +In relative references, `q' refers to \-45 degrees or 45 degrees left, and `w' +refers to 0 degrees, or no change in direction. +.Pp +All commands start with a plane letter. +This indicates the recipient of the command. +Case is ignored. +.Ss IMMEDIATE ONLY COMMANDS +.Bl -tag -width "aaaa" +.It "a [ cd+- ]" Em number +Altitude: Change a plane's altitude, possibly requesting takeoff. +`+' and `-' are the same as `c' and `d'. +.Bl -tag -width "aaaaaaaaaa" -compact +.It a Em number +Climb or descend to the given altitude (in thousands of feet). +.It ac Em number +Climb: relative altitude change. +.It ad Em number +Descend: relative altitude change. +.El +.It m +Mark: Display in highlighted mode. +Plane and command information is displayed normally. +.It i +Ignore: Do not display highlighted. +Command is displayed as a line of dashes if there is no command. +.It u +Unmark: Same as ignore, but if a delayed command is processed, +the plane will become marked. +This is useful if you want to forget about a plane during part, +but not all, of its journey. +.El +.Ss DELAYABLE COMMANDS +.Bl -tag -width "aaaa" +.It "c [ lr ]" +Circle: Have the plane circle. +.Bl -tag -width "aaaaaaaaaa" -compact +.It cl +Left: Circle counterclockwise. +.It cr +Right: Circle clockwise (default). +.El +.It "t [ l-r+LR ] [ dir ] or tt [ abe* ]" Em number +Turn: Change direction. +.Bl -tag -width "aaaaaaaaaa" -compact +.It "t\*[Lt]dir\*[Gt]" +Turn to direction: Turn to the absolute compass heading given. +The shortest turn will be taken. +.It "tl [ dir ]" +Left: Turn counterclockwise: 45 degrees by default, or the amount +specified in +.Aq dir +(not +.Em to +.Aq dir . ) +`w' (0 degrees) is no turn. +`e' is 45 degrees; `q' gives \-45 degrees counterclockwise, that is, +45 degrees clockwise. +.It "t- [ dir ]" +Same as left. +.It "tr [ dir ]" +Right: Turn clockwise, 45 degrees by default, or the amount specified in +.Aq dir . +.It "t+ [ dir ]" +Same as right. +.It tL +Hard left: Turn counterclockwise 90 degrees. +.It tR +Hard right: Turn clockwise 90 degrees. +.It "tt [abe*]" +Towards: Turn towards a beacon, airport or exit. +The turn is just an estimate. +.It "tta" Em number +Turn towards the given airport. +.It "ttb" Em number +Turn towards the specified beacon. +.It "tte" Em number +Turn towards an exit. +.It "tt*" Em number +Same as ttb. +.El +.El +.Ss THE DELAY COMMAND +The +.Em Delay +(a/@) command may be appended to any +.Em Delayable +command. +It allows the controller to instruct a plane to do an action when the +plane reaches a particular beacon (or other objects in future versions). +.Bl -tag -width "aaaa" +.It ab Em number +Do the delayable command when the plane reaches the specified beacon. +The `b' for ``beacon'' is redundant to allow for expansion. +`@' can be used instead of `a'. +.El +.Ss MARKING, UNMARKING AND IGNORING +Planes are +.Em marked +by default when they enter the arena. +This means they are displayed in highlighted mode on the radar display. +A plane may also be either +.Em unmarked +or +.Em ignored . +An +.Em ignored +plane is drawn in unhighlighted mode, and a line of dashes is displayed in +the command field of the information area. +The plane will remain this way until a mark command has been issued. +Any other command will be issued, but the command line will return to a +line of dashes when the command is completed. +.Pp +An +.Em unmarked +plane is treated the same as an +.Em ignored +plane, except that it will automatically switch to +.Em marked +status when a delayed command has been processed. +This is useful if you want to forget about a plane for a while, but its +flight path has not yet been completely set. +.Pp +As with all of the commands, marking, unmarking and ignoring will take effect +at the beginning of the next update. +Do not be surprised if the plane does +not immediately switch to unhighlighted mode. +.Ss EXAMPLES +.Bl -tag -width gtte4ab2 -offset indent +.It atlab1 +Plane A: turn left at beacon #1 +.It cc +Plane C: circle +.It gtte4ab2 +Plane G: turn towards exit #4 at beacon #2 +.It ma+2 +Plane M: altitude: climb 2000 feet +.It stq +Plane S: turn to 315 +.It xi +Plane X: ignore +.El +.Sh OTHER INFORMATION +.Bl -bullet +.It +Jets move every update; prop planes move every other update. +.It +All planes turn at most 90 degrees per movement. +.It +Planes enter at 7000 feet and leave at 9000 feet. +.It +Planes flying at an altitude of 0 crash if they are not over an airport. +.It +Planes waiting at airports can only be told to take off (climb in altitude). +.It +Pressing return (that is, entering an empty command) will perform the +next update immediately. +This allows you to ``fast forward'' +the game clock if nothing interesting is happening. +.El +.Sh NEW GAMES +The +.Pa Game_List +file lists the currently available play fields. +New field description file names must be placed in this file to be playable. +If a player specifies a game not in this file, his score will not be logged. +.Pp +The game field description files are broken into two parts. +The first part is the definition section. +Here, the four tunable game parameters must be set. +These variables are set with the syntax: +.Pp +.Dl "variable = number;" +.Pp +Variable may be one of: +.Li update , +indicating the number of seconds between forced updates; +.Li newplane , +indicating (about) the number of updates between new plane entries; +.Li width , +indicating the width of the play field; or +.Li height , +indicating the height of the play field. +.Pp +The second part of the field description files describes the locations +of the exits, the beacons, the airports and the lines. +The syntax is as follows: +.Pp +.Bd -literal -offset indent +.Bl -tag -width airport: -compact +.It beacon : +(x y) ... ; +.It airport : +(x y direction) ... ; +.It exit : +(x y direction) ... ; +.It line : +[ (x1 y1) (x2 y2) ] ... ; +.El +.Ed +.Pp +For beacons, a simple x, y coordinate pair is used (enclosed in parenthesis). +Airports and exits require a third value, which is one of the directions +.Em wedcxzaq . +For airports, this is the direction that planes must be going to take +off and land, and for exits, this is the direction that planes will be +going when they +.Em enter +the arena. +This may not seem intuitive, but as there is no restriction on +direction of exit, this is appropriate. +Lines are slightly different, since they need two coordinate pairs to +specify the line endpoints. +These endpoints must be enclosed in square brackets. +.Pp +All statements are semi-colon (;) terminated. +Multiple item statements accumulate. +Each definition must occur exactly once, before any item statements. +Comments begin with a hash (#) symbol and terminate with a newline. +The coordinates are between zero and width-1 and height-1 inclusive. +All of the exit coordinates must lie on the borders, and +all of the beacons and airports must lie inside of the borders. +Line endpoints may be anywhere within the field, so long as +the lines are horizontal, vertical or +.Em exactly +diagonal. +.Ss FIELD FILE EXAMPLE +.Bd -literal +# This is the default game. + +update = 5; +newplane = 5; +width = 30; +height = 21; + +exit: ( 12 0 x ) ( 29 0 z ) ( 29 7 a ) ( 29 17 a ) + ( 9 20 e ) ( 0 13 d ) ( 0 7 d ) ( 0 0 c ) ; + +beacon: ( 12 7 ) ( 12 17 ) ; + +airport: ( 20 15 w ) ( 20 18 d ) ; + +line: [ ( 1 1 ) ( 6 6 ) ] + [ ( 12 1 ) ( 12 6 ) ] + [ ( 13 7 ) ( 28 7 ) ] + [ ( 28 1 ) ( 13 16 ) ] + [ ( 1 13 ) ( 11 13 ) ] + [ ( 12 8 ) ( 12 16 ) ] + [ ( 11 18 ) ( 10 19 ) ] + [ ( 13 17 ) ( 28 17 ) ] + [ ( 1 7 ) ( 11 7 ) ] ; + +.Ed +.Sh FILES +Files are kept in a special directory. +See the +.Sx OPTIONS +section for a way to print this path out. +It is normally +.Pa /usr/share/bsd-games//atc . +.Pp +This directory contains the file +.Pa Game_List , +which holds the list of playable games, as well as the games themselves. +.Pp +The scores are kept in +.Pa /var/games//atc_score . +.Sh AUTHOR +Ed James, UC Berkeley: edjames@ucbvax.berkeley.edu, ucbvax!edjames +.Pp +This game is based on someone's description of the overall flavor +of a game written for some unknown PC many years ago, maybe. +.Sh BUGS +The screen sometimes refreshes after you have quit. diff --git a/upstream/fedora-40/man6/backgammon.6 b/upstream/fedora-40/man6/backgammon.6 new file mode 100644 index 00000000..617758c1 --- /dev/null +++ b/upstream/fedora-40/man6/backgammon.6 @@ -0,0 +1,182 @@ +.\" Automatically generated from backgammon/backgammon/backgammon.6.in. Do not edit. +.\" $NetBSD: backgammon.6,v 1.11 2003/08/07 09:36:55 agc Exp $ +.\" +.\" Copyright (c) 1980, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)backgammon.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd May 31, 1993 +.Dt BACKGAMMON 6 +.Os +.Sh NAME +.Nm backgammon +.Nd the game of backgammon +.br +.Nm teachgammon +.Nd learn to play backgammon +.Sh SYNOPSIS +.Nm +.Op Fl +.Op Fl nrwb +.Op Fl pr +.Op Fl pw +.Op Fl pb +.Op Fl t Ar term +.Op Fl s Ar file +.br +.Nm teachgammon +.Sh DESCRIPTION +This program lets you play backgammon against the computer +or against a "friend". +All commands are only one letter, so you don't need to type a carriage return, +except at the end of a move. +The program is mostly self-explanatory, +so that a question mark (?) will usually get some help. +If you answer `y' when the program asks if you want the rules, +you will get text explaining the rules of the game, some hints on strategy, +instructions on how to use the program, +and a tutorial consisting of a practice game against the computer. +A description of how to use the program can be +obtained by answering `y' when it asks if you want instructions. +.Pp +The possible arguments for backgammon +(most are unnecessary but some are very convenient) +consist of: +.Bl -tag -width indent +.It Fl n +don't ask for rules or instructions +.It Fl r +player is red (implies n) +.It Fl w +player is white (implies n) +.It Fl b +two players, red and white (implies n) +.It Fl pr +print the board before red's turn +.It Fl pw +print the board before white's turn +.It Fl pb +print the board before both player's turn +.It Fl t Ar term +terminal is type +.Ar term , +uses +.Pa /usr/share/misc/termcap +.It Fl s Ar file +recover previously saved game from +.Ar file +.El +.Pp +.\" +.\" Arguments may be optionally preceded by a `-'. +.\" Several arguments may be concatenated together, +.\" but not after `s' or `t' arguments, +.\" since they can be followed by an arbitrary string. +Any unrecognized arguments are ignored. +An argument of a lone `-' gets a description of possible arguments. +.Pp +If +.Ar term +has capabilities for direct cursor movement (see +.Xr termcap 5 ) +.Nm +``fixes'' the board after each move, +so the board does not need to be reprinted, +unless the screen suffers some horrendous malady. +Also, any `p' option will be ignored. +(The `t' option is not necessary unless the terminal type does not match +the entry in the +.Pa /usr/share/misc/termcap +data base.) +.Sh QUICK REFERENCE +When the program prompts by typing only your color, +type a space or carriage return to roll, or +.Bl -tag -width indent +.It Ic d +to double +.It Ic p +to print the board +.It Ic q +to quit +.It Ic s +to save the game for later +.El +.Pp +When the program prompts with 'Move:', type +.Bl -tag -width indent +.It Ic p +to print the board +.It Ic q +to quit +.It Ic s +to save the game +.El +.Pp +or a +.Em move , +which is a sequence of +.Bl -tag -width indent +.It Ic s-f +move from +.Ic s +to +.Ic f +.It Ic s/r +move one man on +.Ic s +the roll +.Ic r +separated by commas or spaces and ending with a newline. +Available abbreviations are +.Bl -tag -width indent +.It Ic s-f1-f2 +means +.Ic s-f1,f1-f2 +.It Ic s/r1r2 +means +.Ic s/r1,s/r2 +.El +.El +.Pp +Use +.Ic b +for bar and +.Ic h +for home, +or 0 or 25 as appropriate. +.Sh AUTHOR +.An Alan Char +.Sh FILES +.Bl -tag -width /usr/share/misc/termcap -compact +.It Pa /usr/bin/teachgammon +rules and tutorial +.It Pa /usr/share/misc/termcap +terminal capabilities +.El +.Sh BUGS +The program's strategy needs much work. diff --git a/upstream/fedora-40/man6/battlestar.6 b/upstream/fedora-40/man6/battlestar.6 new file mode 100644 index 00000000..0d1602ba --- /dev/null +++ b/upstream/fedora-40/man6/battlestar.6 @@ -0,0 +1,174 @@ +.\" $NetBSD: battlestar.6,v 1.14 2003/08/07 09:37:00 agc Exp $ +.\" +.\" Copyright (c) 1983, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)battlestar.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd September 7, 2000 +.Dt BATTLESTAR 6 +.Os +.Sh NAME +.Nm battlestar +.Nd a tropical adventure game +.Sh SYNOPSIS +.Nm +.Op Fl r +.Op Ar saved-file +.Sh DESCRIPTION +.Nm +is an adventure game in the classic style. +However, it's slightly less of a puzzle and more a game of exploration. +There are a few magical words in the game, but on the whole, simple English +should suffice to make one's desires understandable to the parser. +.Sh THE SETTING +In the days before the darkness came, when battlestars ruled the heavens... +.Bd -literal -offset indent +Three He made and gave them to His daughters, +Beautiful nymphs, the goddesses of the waters. +One to bring good luck and simple feats of wonder, +Two to wash the lands and churn the waves asunder, +Three to rule the world and purge the skies with thunder. +.Ed +.Pp +In those times great wizards were known and their powers were beyond belief. +They could take any object from thin air, and, uttering the word +.Sq su +could disappear. +.Pp +In those times men were known for their lust for gold and desire to +wear fine weapons. +Swords and coats of mail were fashioned that could withstand a laser blast. +.Pp +But when the darkness fell, the rightful reigns were toppled. +Swords and helms and heads of state went rolling across the grass. +The entire fleet of battlestars was reduced to a single ship. +.Sh SAMPLE COMMANDS +.Bd -literal -offset indent +take --- take an object +drop --- drop an object + +wear --- wear an object you are holding +draw --- carry an object you are wearing + +put on --- take an object and wear it +take off -- draw an object and drop it + +throw \*[Lt]object\*[Gt] \*[Lt]direction\*[Gt] + +! \*[Lt]shell esc\*[Gt] +.Ed +.Sh IMPLIED OBJECTS +.Bd -literal -offset indent +\*[Gt]-: take watermelon +watermelon: +Taken. +\*[Gt]-: eat +watermelon: +Eaten. +\*[Gt]-: take knife and sword and apple, drop all +knife: +Taken. +broadsword: +Taken. +apple: +Taken. +knife: +Dropped. +broadsword: +Dropped. +apple: +Dropped. +\*[Gt]-: get +knife: +Taken. +.Ed +.Pp +Notice that the "shadow" of the next word stays around if you +want to take advantage of it. +That is, saying "take knife" and then "drop" +will drop the knife you just took. +.Sh SCORE \*[Am] INVEN +The two commands +.Dq score +and +.Dq inven +will print out your current status in the game. +.Sh SAVING A GAME +The command +.Dq save +will save your game in a file called +.Pa .Bstar +in your home directory by default. +You can recover a saved game by using the +.Fl r +option when you start up the +game, or by giving the name of the saved file as an argument. +Save files will be saved to and restored from your home directory unless a +path is specified - i.e., +.Dq Li battlestar -r savedgame +will look for +.Pa savedgame +in your home directory, but +.Dq Li battlestar -r ./savedgame +will look in the current directory. +.Dq Li battlestar -r +will look for the default file, +.Pa .Bstar +in your home directory. +.Sh DIRECTIONS +The compass directions N, S, E, and W can be used if you have a compass. +If you don't have a compass, you'll have to say R, L, A, or B, which +stand for Right, Left, Ahead, and Back. +Directions printed in room descriptions are +always printed in R, L, A, and B relative directions. +.Sh HISTORY +I wrote Battlestar in 1979 in order to experiment with the niceties of +the C Language. +Most interesting things that happen in the game are hardwired into the +code, so don't send me any hate mail about it! +Instead, enjoy art for art's sake! +.Sh AUTHOR +.An David Riggle +.Sh INSPIRATION \*[Am] ASSISTANCE +.Bl -item -compact +.It +Chris Guthrie +.It +Peter Da Silva +.It +Kevin Brown +.It +Edward Wang +.It +Ken Arnold \*[Am] Company +.El +.Sh BUGS +Countless. +.Sh FAN MAIL +Send to edward%ucbarpa@berkeley.arpa, chris%ucbcory@berkeley.arpa, +riggle.pa@xerox.arpa. diff --git a/upstream/fedora-40/man6/bcd.6 b/upstream/fedora-40/man6/bcd.6 new file mode 100644 index 00000000..f07acb5c --- /dev/null +++ b/upstream/fedora-40/man6/bcd.6 @@ -0,0 +1,85 @@ +.\" $NetBSD: bcd.6,v 1.16 2003/08/07 09:37:04 agc Exp $ +.\" +.\" Copyright (c) 1988, 1991, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)bcd.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd November 26, 2002 +.Dt BCD 6 +.Os +.Sh NAME +.Nm bcd , +.Nm ppt , +.Nm morse +.Nd "reformat input as punch cards, paper tape or morse code" +.Sh SYNOPSIS +.Nm +.Op Ar string ... +.Nm ppt +.Op Fl d Ns \&| Ns Ar string ... +.Nm morse +.Op Fl ds Ar string ... +.Sh DESCRIPTION +The +.Nm , +.Nm ppt +and +.Nm morse +commands read the given input and reformat it in the form of +punched cards, paper tape or morse code respectively. +Acceptable input are command line arguments or the standard input. +.Pp +Available option: +.Bl -tag -width flag +.It Fl s +The +.Fl s +option for morse produces dots and dashes rather than words. +.It Fl d +Decode +.Nm ppt +output, or +.Nm morse +output consisting of dots and slashes (as generated by using the +.Fl s +option). +.El +.Sh SEE ALSO +.Rs +.%B "ISO 1681:1973: Information processing--Unpunched paper cards--Specification" +.Re +.Rs +.%B "ISO 1682:1973: Information processing--80 columns punched paper cards--Dimensions and location of rectangular punched holes" +.Re +.Rs +.%B "ECMA-10: ECMA Standard for Data Interchange on Punched Tape" +.Re +.Rs +.%B "ITU-T Recommendation F.1: Operational provisions for the international public telegram service" +.%O "Division B, I. Morse code" +.Re diff --git a/upstream/fedora-40/man6/boggle.6 b/upstream/fedora-40/man6/boggle.6 new file mode 100644 index 00000000..6befc4f6 --- /dev/null +++ b/upstream/fedora-40/man6/boggle.6 @@ -0,0 +1,122 @@ +.\" $NetBSD: boggle.6,v 1.7 2003/08/07 09:37:05 agc Exp $ +.\" +.\" Copyright (c) 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" This code is derived from software contributed to Berkeley by +.\" Barry Brachman. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)boggle.6 8.1 (Berkeley) 6/11/93 +.\" +.Dd April 1, 2001 +.Dt BOGGLE 6 +.Os +.Sh NAME +.Nm boggle +.Nd word search game +.Sh SYNOPSIS +.Nm +.Op Fl bd +.Op Fl s Ar seed +.Op Fl t Ar time +.Op Fl w Ar length +.Op + Op + +.Op boardspec +.Sh DESCRIPTION +The object of +.Nm +is to find as many words as possible on the Boggle board within the three +minute time limit. +A Boggle board is a four by four arrangement of Boggle cubes, each side of +each cube displaying a letter of the alphabet or `qu'. +Words are formed by finding a sequence of cubes (letters) that are in the +game's dictionary. +The (N+1)th cube in the word must be horizontally, +vertically, or diagonally adjacent to the Nth cube. +Cubes cannot be reused. +Words consist solely of lower case letters and must be at least 3 letters long. +.Pp +Command line flags can be given to change the rules of the game. +.Bl -tag -width boardspec +.It Fl b +Run +.Nm +in batch mode. +A +.Ar boardspec +must also be given. +The dictionary is read from stdin and a list of words appearing in +.Ar boardspec +is printed to stdout. +.It Fl d +Enable debugging output. +.It Fl s Ar seed +Specify a seed +.Ar seed +other than the time of day. +.It Fl t Ar time +Set the time limit for each game from the default 3 minutes to +.Ar time +seconds. +.It Fl w Ar length +Change the minimum word length from 3 letters to +.Ar length . +.It Ar + +This flag allows a cube to be used multiple times, but not in succession. +.It Ar ++ +This flag allows the same cubes to be considered adjacent to itself. +.It Ar boardspec +A starting board position can be specified on the command line by +listing the board left to right and top to bottom. +.El +.Pp +Help is available during play by typing +.Sq Ic \&? . +More detailed information on the game is given there. +.Sh BUGS +If there are a great many words in the cube the final display of the words +may scroll off of the screen. +(On a 25 line screen about 130 words can be displayed.) +.Pp +No word can contain a +.Sq q +that is not immediately followed by a +.Sq u . +.Pp +When using the +.Ar + +or +.Ar ++ +options the display of words found in the board doesn't indicate reused cubes. +.Sh AUTHOR +Boggle is a trademark of Parker Brothers. +.Pp +Barry Brachman +.br +Dept. of Computer Science +.br +University of British Columbia diff --git a/upstream/fedora-40/man6/bsd-fbg.6 b/upstream/fedora-40/man6/bsd-fbg.6 new file mode 100644 index 00000000..e0b6d0e7 --- /dev/null +++ b/upstream/fedora-40/man6/bsd-fbg.6 @@ -0,0 +1,158 @@ +.\" Automatically generated from tetris/tetris.6.in. Do not edit. +.\" $NetBSD: tetris.6,v 1.10 2003/08/07 09:37:48 agc Exp $ +.\" +.\" Copyright (c) 1992, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" This code is derived from software contributed to Berkeley by +.\" Nancy L. Tinkham and Darren F. Provine. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)tetris.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd May 31, 1993 +.Dt BSD-FBG 6 +.Os +.Sh NAME +.Nm bsd-fbg +.Nd a falling block game +.Sh SYNOPSIS +.Nm +.Op Fl ps +.Op Fl k Ar keys +.Op Fl l Ar level +.Sh DESCRIPTION +The +.Nm +command runs a display-based game which must be played on a CRT terminal. +The object is to fit the shapes together forming complete rows, +which then vanish. +When the shapes fill up to the top, the game ends. +You can optionally select a level of play, or custom-select control keys. +.Pp +The default level of play is 2. +.Pp +The default control keys are as follows: +.Pp +.Bl -tag -width "xxspacexx" -compact -offset indent +.It j +move left +.It k +rotate 1/4 turn counterclockwise +.It l +move right +.It Aq space +drop +.It p +pause +.It q +quit +.El +.Pp +The options are as follows: +.Bl -tag -width indent +.It Fl k +The default control keys can be changed using the +.Fl k +option. +The +.Ar keys +argument must have the six keys in order, and, remember to quote any +space or tab characters from the shell. +For example: +.sp +.Dl "bsd-fbg -l 2 -k 'jkl pq'" +.sp +will play the default games, i.e. level 2 and with the default +control keys. +The current key settings are displayed at the bottom of the screen +during play. +.It Fl l +Select a level of play. +.It Fl s +Display the top scores. +.It Fl p +Switch on previewing of the shape that will appear next. +.El +.Pp +.Sh PLAY +At the start of the game, a shape will appear at the top of the screen, +falling one square at a time. +The speed at which it falls is determined directly by the level: +if you select level 2, the blocks will fall twice per second; +at level 9, they fall 9 times per second. +(As the game goes on, things speed up, +no matter what your initial selection.) +When this shape +.Dq touches down +on the bottom of the field, another will appear at the top. +.Pp +You can move shapes to the left or right, rotate them counterclockwise, +or drop them to the bottom by pressing the appropriate keys. +As you fit them together, completed horizontal rows vanish, +and any blocks above fall down to fill in. +When the blocks stack up to the top of the screen, the game is over. +.Sh SCORING +You get one point for every block you fit into the stack, +and one point for every space a block falls when you hit the drop key. +(Dropping the blocks is therefore a good way to increase your score.) +Your total score is the product of the level of play +and your accumulated +.ie t points\(em200 +.el points -- 200 +points on level 3 gives you a score of 600. +Each player gets at most one entry on any level, +for a total of nine scores in the high scores file. +Players who no longer have accounts are limited to one score. +Also, scores over 5 years old are expired. +The exception to these conditions is that the highest score on a given +level is +.Em always +kept, +so that following generations can pay homage to those who have +wasted serious amounts of time. +.Pp +The score list is produced at the end of the game. +The printout includes each player's overall ranking, +name, score, and how many points were scored on what level. +Scores which are the highest on a given level +are marked with asterisks +.Dq * . +.Sh FILES +.Bl -tag -width /var/games/bsd-fbg.scoresxx +.It /var/games/bsd-fbg.scores +high score file +.El +.Sh BUGS +The higher levels are unplayable without a fast terminal connection. +.Sh AUTHORS +Adapted from a 1989 International Obfuscated C Code Contest winner by +Chris Torek and Darren F. Provine. +.Pp +Manual adapted from the original entry written by Nancy L. Tinkham and +Darren F. Provine. +.Pp +Code for previewing next shape added by Hubert Feyrer in 1999. diff --git a/upstream/fedora-40/man6/caesar.6 b/upstream/fedora-40/man6/caesar.6 new file mode 100644 index 00000000..b959e3b9 --- /dev/null +++ b/upstream/fedora-40/man6/caesar.6 @@ -0,0 +1,72 @@ +.\" $NetBSD: caesar.6,v 1.9 2003/08/07 09:37:07 agc Exp $ +.\" +.\" Copyright (c) 1989, 1991, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)caesar.6 8.2 (Berkeley) 11/16/93 +.\" +.Dd November 16, 1993 +.Dt CAESAR 6 +.Os +.Sh NAME +.Nm caesar , +.Nm rot13 +.Nd decrypt caesar ciphers +.Sh SYNOPSIS +.Nm +.Op Ar rotation +.Sh DESCRIPTION +The +.Nm +utility attempts to decrypt caesar ciphers using English letter frequency +statistics. +.Nm +reads from the standard input and writes to the standard output. +.Pp +The optional numerical argument +.Ar rotation +may be used to specify a specific rotation value. +.Pp +The frequency (from most common to least) of English letters is as follows: +.Pp +.Bd -filled -offset indent +ETAONRISHDLFCMUGPYWBVKXJQZ +.Ed +.Pp +Their frequencies as a percentage are as follows: +.Pp +.Bd -filled -offset indent +E(13), T(10.5), A(8.1), O(7.9), N(7.1), R(6.8), I(6.3), S(6.1), H(5.2), +D(3.8), L(3.4), F(2.9), C(2.7), M(2.5), U(2.4), G(2), +P(1.9), Y(1.9), W(1.5), B(1.4), V(.9), K(.4), X(.15), J(.13), Q(.11), Z(.07). +.Ed +.Pp +Rotated postings to +.Tn USENET +and some of the databases used by the +.Xr fortune 6 +program are rotated by 13 characters. diff --git a/upstream/fedora-40/man6/canfield.6 b/upstream/fedora-40/man6/canfield.6 new file mode 100644 index 00000000..aebff753 --- /dev/null +++ b/upstream/fedora-40/man6/canfield.6 @@ -0,0 +1,123 @@ +.\" Automatically generated from canfield/canfield/canfield.6.in. Do not edit. +.\" $NetBSD: canfield.6,v 1.9 2003/08/07 09:37:07 agc Exp $ +.\" +.\" Copyright (c) 1983, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)canfield.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd May 31, 1993 +.Dt CANFIELD 6 +.Os +.Sh NAME +.Nm canfield , +.Nm cfscores +.Nd the solitaire card game canfield +.Sh SYNOPSIS +.Nm +.Nm cfscores +.Op Fl a +.Op Ar user +.Sh DESCRIPTION +If you have never played solitaire before, it is recommended +that you consult a solitaire instruction book. In +Canfield, tableau cards may be built on each other downward +in alternate colors. An entire pile must be moved as a unit +in building. Top cards of the piles are available +to be played on foundations, but never into empty spaces. +.Pp +Spaces must be filled from the stock. The top card of +the stock also is available to be played on foundations or +built on tableau piles. After the stock is exhausted, +tableau spaces may be filled from the talon and the player may +keep them open until he wishes to use them. +.Pp +Cards are dealt from the hand to the talon by threes +and this repeats until there are no more cards in the hand +or the player quits. +To have cards dealt onto the talon the player types +.Sq Ic ht +for his move. +Foundation base cards are also automatically moved to the foundation +when they become available. +.Pp +The command +.Sq Ic c +causes +.Nm +to maintain card counting statistics on the bottom of the screen. +When properly used this can greatly increase one's chances of winning. +.Pp +The rules for betting are somewhat less strict than +those used in the official version of the game. +The initial deal costs $13. +You may quit at this point or inspect the game. +Inspection costs $13 and allows you to make as many +moves as possible without moving any cards from your hand to the talon. +(The initial deal places three cards on the talon; +if all these cards are used, three more are made available.) +Finally, if the game seems interesting, +you must pay the final installment of $26. +At this point you are +credited at the rate of $5 for each card on the foundation; +as the game progresses you are credited with $5 for each +card that is moved to the foundation. +Each run through the hand after the first costs $5. +The card counting feature +costs $1 for each unknown card that is identified. +If the information is toggled on, you are only charged for cards +that became visible since it was last turned on. +Thus the maximum cost of information is $34. +Playing time is charged at a rate of $1 per minute. +.Pp +With no arguments, the program +.Nm cfscores +prints out the current status of your canfield account. +If a +.Ar user +name is specified, it prints out the status of their canfield account. +If the +.Fl a +flag is specified, +it prints out the canfield accounts for all users that have +played the game since the database was set up. +.Sh FILES +.Bl -tag -width /usr/bin/canfield -compact +.It Pa /usr/bin/canfield +the game itself +.It Pa /usr/bin/cfscores +the database printer +.It Pa /var/games//cfscores +the database of scores +.El +.Sh BUGS +It is impossible to cheat. +.Sh AUTHORS +Originally written: Steve Levine. +.Pp +Further random hacking by: Steve Feldman, Kirk McKusick, +Mikey Olson, and Eric Allman. diff --git a/upstream/fedora-40/man6/cribbage.6 b/upstream/fedora-40/man6/cribbage.6 new file mode 100644 index 00000000..9bfdf804 --- /dev/null +++ b/upstream/fedora-40/man6/cribbage.6 @@ -0,0 +1,186 @@ +.\" Automatically generated from cribbage/cribbage.6.in. Do not edit. +.\" $NetBSD: cribbage.6,v 1.11 2003/08/07 09:37:09 agc Exp $ +.\" +.\" Copyright (c) 1980, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)cribbage.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd May 31, 1993 +.Dt CRIBBAGE 6 +.Os +.Sh NAME +.Nm cribbage +.Nd the card game cribbage +.Sh SYNOPSIS +.Nm +.Op Fl eqr +.Sh DESCRIPTION +.Nm +plays the card game cribbage, with the program playing one hand +and the user the other. +The program will initially ask the user if the rules of the game are +needed \(en if so, it will print out the appropriate section from +.Em According to Hoyle +with +.Xr more 1 . +.Pp +.Nm +options include: +.Bl -tag -width indent +.It Fl e +When the player makes a mistake scoring his hand or crib, provide an +explanation of the correct score. +(This is especially useful for beginning players.) +.It Fl q +Print a shorter form of all messages \(en this is only recommended for +users who have played the game without specifying this option. +.It Fl r +Instead of asking the player to cut the deck, the program will randomly +cut the deck. +.El +.Pp +.Nm +first asks the player whether he wishes to play a short game ( +.Dq once around , +to 61) or a long game ( +.Dq twice around , +to 121). +A response of +.Sq Ic s +will result in a short game, any other response will play a long game. +.Pp +At the start of the first game, the program +asks the player to cut the deck to determine who gets the first crib. +The user should respond with a number between 0 and +51, indicating how many cards down the deck is to be cut. +The player who cuts the lower ranked card gets the first crib. +If more than one game is played, the +loser of the previous game gets the first crib in the current game. +.Pp +For each hand, the program first prints the player's hand, +whose crib it is, and then asks the player +to discard two cards into the crib. +The cards are prompted for one per line, and are typed as explained below. +.Pp +After discarding, the program cuts the deck (if it is the player's +crib) or asks the player to cut the deck (if it's its crib); in the latter +case, the appropriate response is a number from 0 to 39 indicating +how far down the remaining 40 cards are to be cut. +.Pp +After cutting the deck, play starts with the non-dealer (the person +who doesn't have the crib) leading the first card. +Play continues, as per cribbage, until all cards are exhausted. +The program keeps track of the scoring of all points and the total of +the cards on the table. +.Pp +After play, the hands are scored. +The program requests the player to +score his hand (and the crib, if it is his) by printing out the +appropriate cards (and the cut card enclosed in brackets). +Play continues until one player reaches the game limit (61 or 121). +.Pp +A carriage return when a numeric input is expected is equivalent +to typing the lowest legal value; when cutting the deck this +is equivalent to choosing the top card. +.Pp +Cards are specified as rank followed by suit. +The ranks may be specified +as one of: +.Sq a , +.Sq 2 , +.Sq 3 , +.Sq 4 , +.Sq 5 , +.Sq 6 , +.Sq 7 , +.Sq 8 , +.Sq 9 , +.Sq t , +.Sq j , +.Sq q , +and +.Sq k , +or alternatively, one of: +.Sq ace , +.Sq two , +.Sq three , +.Sq four , +.Sq five , +.Sq six , +.Sq seven , +.Sq eight , +.Sq nine , +.Sq ten , +.Sq jack , +.Sq queen , +and +.Sq king . +Suits may be specified as: +.Sq s , +.Sq h , +.Sq d , +and +.Sq c , +or alternatively as: +.Sq spades , +.Sq hearts , +.Sq diamonds , +and +.Sq clubs . +A card may be specified as: +.Dq Ao rank Ac \ Aq suit , +or: +.Dq Ao rank Ac of Aq suit . +If the single letter rank and suit designations are used, the space +separating the suit and rank may be left out. +Also, if only one card +of the desired rank is playable, typing the rank is sufficient. +For example, if your hand was +.Dq 2H, 4D, 5C, 6H, JC, and KD +and it was desired to discard the king of diamonds, any of +the following could be typed: +.Sq k , +.Sq king , +.Sq kd , +.Sq k d , +.Sq k of d , +.Sq king d , +.Sq king of d , +.Sq k diamonds , +.Sq k of diamonds , +.Sq king diamonds , +.Sq king of diamonds . +.Sh FILES +.Bl -tag -width /usr/share/bsd-games//cribbage.instr -compact +.It Pa /usr/bin/cribbage +.It Pa /var/games//criblog +.It Pa /usr/share/bsd-games//cribbage.instr +.El +.Sh AUTHORS +Earl T. Cohen wrote the logic. +Ken Arnold added the screen oriented interface. diff --git a/upstream/fedora-40/man6/dab.6 b/upstream/fedora-40/man6/dab.6 new file mode 100644 index 00000000..a5feab51 --- /dev/null +++ b/upstream/fedora-40/man6/dab.6 @@ -0,0 +1,110 @@ +.\" $NetBSD: dab.6,v 1.1.1.1 2003/12/26 17:57:04 christos Exp $ +.\" +.\" Copyright (c) 2003 Thomas Klausner. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. The name of the author may not be used to endorse or promote products +.\" derived from this software without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR +.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES +.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. +.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, +.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT +.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF +.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +.\" +.Dd December 24, 2003 +.Dt DAB 6 +.Os +.Sh NAME +.Nm dab +.Nd Dots and Boxes game +.Sh SYNOPSIS +.Nm +.Op Fl aw +.Op Fl n Ar ngames +.Op Fl p Ao Ar c|h Ac Ns Ao Ar c|h Ac +.Op Ar xdim Oo Ar ydim Oc +.Sh DESCRIPTION +.Nm +is a game where each player tries to complete the most +boxes. +A turn consists of putting one border of a box; the player +setting the fourth and final border of a box gets the +point for the box and has another turn. +.Pp +The keys used are the vi keys: +.Ic k +for up, +.Ic j +for down, +.Ic h +for left, and +.Ic l +for right. +To switch between even and odd rows, use one of the following +keys: +.Ic u +.Pq diagonal right up , +.Ic y +.Pq diagonal left up , +.Ic b +.Pq diagonal left down , +.Ic n +.Pq diagonal right down ; +.Aq Ic space +sets a new border, +.Ic CTRL-L +and +.Ic CTRL-R +redraw the screen, and +.Ic q +quits the game. +.Pp +Support options are: +.Bl -tag -width XXnXngamesXXXXX +.It Fl a +Don't use the alternate character set. +.It Fl n Ar ngames +.Ar ngames +games will be played. +.Pq Especially useful in Fl p Ar cc No mode. +.It Fl p Ao Ar c|h Ac Ns Ao Ar c|h Ac +Select which of the two players is a human +or a computer. +The first argument is the first player; +.Ic c +stands for computer and +.Ic h +for human. +.It Fl w +Wait for a character press between games. +.El +.Pp +.Ar xdim +and +.Ar ydim +define the size of the board in the x and y +dimensions. +.Sh AUTHORS +.An Christos Zoulas +.Aq christos@NetBSD.org +.Sh SEE ALSO +.Rs +.%A Elwyn R. Berlekamp +.%T The Dots and Boxes Game: Sophisticated Child's Play +.%D 2000 +.%I A K Peters +.%O http://www.akpeters.com/book.asp?bID=111 +.Re diff --git a/upstream/fedora-40/man6/fortune.6 b/upstream/fedora-40/man6/fortune.6 new file mode 100644 index 00000000..f561390f --- /dev/null +++ b/upstream/fedora-40/man6/fortune.6 @@ -0,0 +1,242 @@ +'\" t +.\" Title: FORTUNE +.\" Author: [FIXME: author] [see http://www.docbook.org/tdg5/en/html/author] +.\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/> +.\" Date: 19 April 94 [May. 97] +.\" Manual: UNIX Reference Manual +.\" Source: BSD Experimental +.\" Language: English +.\" +.TH "FORTUNE" "6" "19 April 94 [May\&. 97]" "BSD Experimental" "UNIX Reference Manual" +.\" ----------------------------------------------------------------- +.\" * Define some portability stuff +.\" ----------------------------------------------------------------- +.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +.\" http://bugs.debian.org/507673 +.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html +.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +.ie \n(.g .ds Aq \(aq +.el .ds Aq ' +.\" ----------------------------------------------------------------- +.\" * set default formatting +.\" ----------------------------------------------------------------- +.\" disable hyphenation +.nh +.\" disable justification (adjust text to left margin only) +.ad l +.\" ----------------------------------------------------------------- +.\" * MAIN CONTENT STARTS HERE * +.\" ----------------------------------------------------------------- + +.SH "NAME" +fortune \- print a random, hopefully interesting, adage + +.SH "SYNOPSIS" +.HP \w'\fBfortune\fR\ 'u + + \fBfortune\fR [\-acefilosw] + [\-n\ \fIlength\fR] + [\-m\ \fIpattern\fR] + [[\fIn%\fR]\ \fIfile/dir/all\fR] + +.SH "DESCRIPTION" +.PP +When +\fBfortune\fR +is run with no arguments it prints out a random epigram\&. Epigrams are divided into several categories\&. + +.SS "Options" +.PP +The options are as follows: + +.PP +\fB\-a\fR +.RS 4 + +Choose from all lists of maxims\&. + +.RE +.PP +\fB\-c\fR +.RS 4 + +Show the cookie file from which the fortune came\&. + +.RE +.PP +\fB\-e\fR +.RS 4 + +Consider all fortune files to be of equal size (see discussion below on multiple files)\&. + +.RE +.PP +\fB\-f\fR +.RS 4 + +Print out the list of files which would be searched, but don\*(Aqt print a fortune\&. + +.RE +.PP +\fB\-l\fR +.RS 4 + +Long dictums only\&. See +\fB\-n\fR +on how \(lqlong\(rq is defined in this sense\&. + +.RE +.PP +\fB\-m \fR\fIpattern\fR +.RS 4 + +Print out all fortunes which match the basic regular expression +\fIpattern\fR\&. The syntax of these expressions depends on how your system defines +\fBre_comp\fR(3) +or +\fBregcomp\fR(3), but it should nevertheless be similar to the syntax used in +\fBgrep\fR(1)\&. + +The fortunes are output to standard output, while the names of the file from which each fortune comes are printed to standard error\&. Either or both can be redirected; if standard output is redirected to a file, the result is a valid fortunes database file\&. If standard error is +\fIalso\fR +redirected to this file, the result is +\fIstill valid\fR, +\fBbut there will be \(lqbogus\(rq\fR +\fBfortunes\fR, i\&.e\&. the filenames themselves, in parentheses\&. This can be useful if you wish to remove the gathered matches from their original files, since each filename\-record will precede the records from the file it names\&. + +.RE +.PP +\fB\-n \fR\fIlength\fR +.RS 4 + +Set the longest fortune length (in characters) considered to be \(lqshort\(rq (the default is 160)\&. All fortunes longer than this are considered \(lqlong\(rq\&. Be careful! If you set the length too short and ask for short fortunes, or too long and ask for long ones, fortune goes into a never\-ending thrash loop\&. + +.RE + +.PP +\fB\-s\fR +.RS 4 + +Short apothegms only\&. See +\fB\-n\fR +on which fortunes are considered \(lqshort\(rq\&. + +.RE +.PP +\fB\-i\fR +.RS 4 + +Ignore case for +\fB\-m\fR +patterns\&. + +.RE +.PP +\fB\-w\fR +.RS 4 + +Wait before termination for an amount of time calculated from the number of characters in the message\&. This is useful if it is executed as part of the logout procedure to guarantee that the message can be read before the screen is cleared\&. + +.RE + +.PP +The user may specify alternate sayings\&. You can specify a specific file, a directory which contains one or more files, or the special word +\fIall\fR +which says to use all the standard databases\&. Any of these may be preceded by a percentage, which is a number +\fIn\fR +between 0 and 100 inclusive, followed by a +\fI%\fR\&. If it is, there will be a +\fIn\fR +percent probability that an adage will be picked from that file or directory\&. If the percentages do not sum to 100, and there are specifications without percentages, the remaining percent will apply to those files and/or directories, in which case the probability of selecting from one of them will be based on their relative sizes\&. + +.PP +As an example, given two databases +\fIfunny\fR +and +\fInot\-funny\fR, with +\fIfunny\fR +twice as big (in number of fortunes, not raw file size), saying + +.PP +\fBfortune\fR +\fIfunny not\-funny\fR + +.PP +will get you fortunes out of +\fIfunny\fR +two\-thirds of the time\&. The command + +.PP +\fBfortune\fR +90% +\fIfunny\fR +10% +\fInot\-funny\fR + +.PP +will pick out 90% of its fortunes from +\fIfunny\fR +(the \(lq10% not\-funny\(rq is unnecessary, since 10% is all that\*(Aqs left)\&. + +.PP +The +\fB\-e\fR +option says to consider all files equal; thus + +.PP +\fBfortune \-e\fR +\fIfunny not\-funny\fR + +.PP +is equivalent to + +.PP +\fBfortune\fR +50% +\fIfunny\fR +50% +\fInot\-funny\fR + +.SH "FILES" +.PP +Note: these are the defaults as defined at compile time\&. + +.PP +\fI/usr/share/games/fortune\fR +Directory for innoffensive fortunes\&. + +.PP +If a particular set of fortunes is particularly unwanted, there is an easy solution: delete the associated +\fB\&.dat\fR +file\&. This leaves the data intact, should the file later be wanted, but since +\fBfortune\fR +no longer finds the pointers file, it ignores the text file\&. + +.SH "BUGS" +.PP +The supplied fortune databases have been attacked, in order to correct orthographical and grammatical errors, and particularly to reduce redundancy and repetition and redundancy\&. But especially to avoid repetitiousness\&. This has not been a complete success\&. In the process, some fortunes may also have been lost\&. + +.PP +The fortune databases are now divided into a larger number of smaller files, some organized by format (poetry, definitions), and some by content (religion, politics)\&. + +.SH "HISTORY" +.PP +This version of fortune is based on the NetBSD fortune 1\&.4, but with a number of bug fixes and enhancements\&. + +.PP +The original fortune/strfile format used a single file; strfile read the text file and converted it to null\-delimited strings, which were stored after the table of pointers in the \&.dat file\&. By NetBSD fortune 1\&.4, this had changed to two separate files: the \&.dat file was only the header (the table of pointers, plus flags; see +\fIstrfile\&.h\fR), and the text strings were left in their own file\&. The potential problem with this is that text file and header file may get out of synch, but the advantage is that the text files can be easily edited without resorting to unstr, and there is a potential savings in disk space (on the assumption that the sysadmin kept both \&.dat file with strings and the text file)\&. + +.PP +Many of the enhancements made over the NetBSD version assumed a Linux system, and thus caused it to fail under other platforms, including BSD\&. The source code has since been made more generic, and currently works on SunOS 4\&.x as well as Linux, with support for more platforms expected in the future\&. Note that some bugs were inadvertently discovered and fixed during this process\&. + +.PP +At a guess, a great many people have worked on this program, many without leaving attributions\&. + +.SH "SEE ALSO" +.PP +\fBre_comp\fR(3), +\fBregcomp\fR(3), +\fBstrfile\fR(1), +\fBunstr\fR(1) + diff --git a/upstream/fedora-40/man6/go-fish.6 b/upstream/fedora-40/man6/go-fish.6 new file mode 100644 index 00000000..46eef2bf --- /dev/null +++ b/upstream/fedora-40/man6/go-fish.6 @@ -0,0 +1,87 @@ +.\" $NetBSD: fish.6,v 1.8 2003/08/07 09:37:13 agc Exp $ +.\" +.\" Copyright (c) 1990, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)fish.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd May 31, 1993 +.Dt GO-FISH 6 +.Os +.Sh NAME +.Nm go-fish +.Nd play +.Dq Go Fish +.Sh SYNOPSIS +.Nm +.Op Fl p +.Sh DESCRIPTION +.Nm +is the game +.Dq Go Fish , +a traditional children's card game. +.Pp +The computer deals the player and itself seven cards, and places +the rest of the deck face-down (figuratively). +The object of the game is to collect +.Dq books , +or all of the members of a single rank. +For example, collecting four 2's would give the player a +.Dq book of 2's . +.Pp +The options are as follows: +.Bl -tag -width indent +.It Fl p +Professional mode. +.El +.Pp +The computer makes a random decision as to who gets to start the +game, and then the computer and player take turns asking each other +for cards of a specified rank. +If the asked player has any cards of the requested rank, they give +them up to the asking player. +A player must have at least one of the cards of the rank they request +in their hand. +When a player asks for a rank of which the other player has no +cards, the asker is told to +.Dq Go Fish! . +Then, the asker draws a card from the non-dealt cards. +If they draw the card they asked for, they continue their turn, asking +for more ranks from the other player. +Otherwise, the other player gets a turn. +.Pp +When a player completes a book, either by getting cards from the +other player or drawing from the deck, they set those cards aside and +the rank is no longer in play. +.Pp +The game ends when either player no longer has any cards in their hand. +The player with the most books wins. +.Pp +.Nm +provides instructions as to what input it accepts. +.Sh BUGS +The computer cheats only rarely. diff --git a/upstream/fedora-40/man6/gomoku.6 b/upstream/fedora-40/man6/gomoku.6 new file mode 100644 index 00000000..024da85e --- /dev/null +++ b/upstream/fedora-40/man6/gomoku.6 @@ -0,0 +1,95 @@ +.\" $NetBSD: gomoku.6,v 1.10 2003/08/07 09:37:17 agc Exp $ +.\" +.\" Copyright (c) 1994 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" This code is derived from software contributed to Berkeley by +.\" Ralph Campbell. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)gomoku.6 8.2 (Berkeley) 8/4/94 +.\" +.Dd August 4, 1994 +.Dt GOMOKU 6 +.Os +.Sh NAME +.Nm gomoku +.Nd game of 5 in a row +.Sh SYNOPSIS +.Nm +.Op Fl bcdu +.Op Fl D Ar debugfile +.Op Ar inputfile +.Sh DESCRIPTION +.Nm +is a two player game where the object is to get 5 in a row horizontally, +vertically or diagonally on a 19 by 19 grid. +By convention, black always moves first. +With no arguments, +.Nm +will display a playing board and prompt for moves from the user. +Valid moves are a letter for the column and a number for the row of an empty +board location. +Entering ``quit" or ``resign" will end the game. +You can save the current state of the game by entering ``save" and +supplying a file name when prompted. +The optional file +.Ar inputfile +can be used to restore a saved game. +.Pp +The options are: +.Bl -tag -width Ds +.It Fl b +This option sets background mode. +Input moves are read from standard input, +the computer picks a move, and prints it to standard output. +The first input line should be either ``black" or ``white" to specify whether +.Nm +has the first move or not respectively. +This option was intended for game tournaments where a referee program handles +the board display and pits one program against another. +.It Fl c +Computer versus computer. +.Nm +will play a game against itself. +This is mostly used for testing. +.It Fl d +Print debugging information. +Repeating this option more than once yields more detailed information. +.It Fl D Ar debugfile +Print the debug information to +.Ar debugfile +instead of to the standard output. +.It Fl u +User versus user. +This is mostly used for testing. +.El +.Sh AUTHOR +.An Ralph Campbell +.Sh ACKNOWLEDGEMENTS +The board display routines were based on the +.Nm goref +program written by Peter Langston. diff --git a/upstream/fedora-40/man6/hack.6 b/upstream/fedora-40/man6/hack.6 new file mode 100644 index 00000000..68eaf9f7 --- /dev/null +++ b/upstream/fedora-40/man6/hack.6 @@ -0,0 +1,210 @@ +.\" Automatically generated from hack/hack.6.in. Do not edit. +.\" $NetBSD: hack.6,v 1.14 2004/06/01 10:10:06 wiz Exp $ -*- nroff -*- +.\" +.\" Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica, +.\" Amsterdam +.\" All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions are +.\" met: +.\" +.\" - Redistributions of source code must retain the above copyright notice, +.\" this list of conditions and the following disclaimer. +.\" +.\" - Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" +.\" - Neither the name of the Stichting Centrum voor Wiskunde en +.\" Informatica, nor the names of its contributors may be used to endorse or +.\" promote products derived from this software without specific prior +.\" written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS +.\" IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED +.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A +.\" PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER +.\" OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, +.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, +.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR +.\" PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +.\" LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS +.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +.\" +.\" +.\" Copyright (c) 1982 Jay Fenlason <hack@gnu.org> +.\" All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. The name of the author may not be used to endorse or promote products +.\" derived from this software without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, +.\" INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY +.\" AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL +.\" THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, +.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, +.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; +.\" OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, +.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR +.\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF +.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +.\" +.Dd March 31, 1985 +.Dt HACK 6 +.Os +.Sh NAME +.Nm hack +.Nd exploring The Dungeons of Doom +.Sh SYNOPSIS +.Nm +.Op Fl d Ar directory +.Op Fl n +.Op Fl u Ar playername +.Nm +.Op Fl d Ar directory +.Op Fl s +.Op Fl X +.Op Ar playername ... +.Sh DESCRIPTION +.Nm +is a display oriented dungeons \*[Am] dragons-like game. +Both display and command structure resemble rogue. +(For a game with the same structure but entirely different display - +a real cave instead of dull rectangles - try Quest.) +.Pp +To get started you really only need to know two commands. +The command +.Ic \&? +will give you a list of the available commands and the command +.Ic / +will identify the things you see on the screen. +.Pp +To win the game (as opposed to merely playing to beat other people's high +scores) you must locate the Amulet of Yendor which is somewhere below +the 20th level of the dungeon and get it out. +Nobody has achieved this yet and if somebody does, he will probably go +down in history as a hero among heroes. +.Pp +When the game ends, either by your death, when you quit, or if you escape +from the caves, +.Nm +will give you (a fragment of) the list of top scorers. +The scoring is based on many aspects of your behavior but a rough estimate +is obtained by taking the amount of gold you've found in the cave plus four +times your (real) experience. +Precious stones may be worth a lot of gold when brought to the exit. +There is a 10% penalty for getting yourself killed. +.Pp +The administration of the game is kept in the directory specified with the +.Fl d +option, or, if no such option is given, in the directory specified by +the environment variable +.Ev HACKDIR , +or, if no such variable exists, in the current directory. +This same directory contains several auxiliary files such as lockfiles and +the list of topscorers and a subdirectory +.Pa save +where games are saved. +The game administrator may however choose to install hack with a fixed +playing ground, usually +.Pa /var/games/hack . +.Pp +The +.Fl n +option suppresses printing of the news. +.Pp +The +.Fl u +.Ar playername +option supplies the answer to the question "Who are you?". +When +.Ar playername +has as suffix one of +.Em -T , +.Em -S , +.Em -K , +.Em -F , +.Em -C , +or +.Em -W , +then this supplies the answer to the question "What kind of character ... ?". +.Pp +The +.Fl s +option will print out the list of your scores. +It may be followed by arguments +.Fl X +where X is one of the letters C, F, K, S, T, W to print the scores of +Cavemen, Fighters, Knights, Speleologists, Tourists or Wizards. +It may also be followed by one or more player names to print the scores of the +players mentioned. +.Sh AUTHORS +Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) wrote the +original hack, very much like rogue (but full of bugs). +.br +Andries Brouwer continuously deformed their sources into the current +version - in fact an entirely different game. +.Sh FILES +.Bl -tag -width 24n -compact +.It Pa hack +The hack program. +.It Pa data, rumors +Data files used by hack. +.It Pa help, hh +Help data files. +.It Pa record +The list of topscorers. +.It Pa save +A subdirectory containing the saved games. +.It Pa bones_dd +Descriptions of the ghost and belongings of a deceased adventurer. +.It Pa xlock.dd +Description of a dungeon level. +.It Pa safelock +Lock file for xlock. +.It Pa record_lock +Lock file for record. +.El +.Sh ENVIRONMENT +.Bl -tag -width 24n -compact +.It Ev USER No or Ev LOGNAME +Your login name. +.It Ev HOME +Your home directory. +.It Ev SHELL +Your shell. +.It Ev TERM +The type of your terminal. +.It Ev HACKPAGER, PAGER +Pager used instead of default pager. +.It Ev MAIL +Mailbox file. +.It Ev MAILREADER +Reader used instead of default (probably +.Pa /usr/bin/mail ) . +.It Ev HACKDIR +Playground. +.It Ev HACKOPTIONS +String predefining several hack options (see help file). +.El +.Pp +Several other environment variables are used in debugging (wizard) mode, +like +.Ev GENOCIDED , +.Ev INVENT , +.Ev MAGIC +and +.Ev SHOPTYPE . +.Sh BUGS +Probably infinite. +Mail complaints to mcvax!aeb . diff --git a/upstream/fedora-40/man6/hangman.6 b/upstream/fedora-40/man6/hangman.6 new file mode 100644 index 00000000..6b2753d2 --- /dev/null +++ b/upstream/fedora-40/man6/hangman.6 @@ -0,0 +1,66 @@ +.\" Automatically generated from hangman/hangman.6.in. Do not edit. +.\" $NetBSD: hangman.6,v 1.12 2003/08/07 09:37:21 agc Exp $ +.\" +.\" Copyright (c) 1983, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)hangman.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd May 31, 1993 +.Dt HANGMAN 6 +.Os +.Sh NAME +.Nm hangman +.Nd computer version of the game hangman +.Sh SYNOPSIS +.Nm +.Op Fl d Ar wordlist +.Op Fl m Ar minlen +.Sh DESCRIPTION +In +.Nm , +the computer picks a word from the on-line word list +and you must try to guess it. +The computer keeps track of which letters have been guessed +and how many wrong guesses you have made on the screen in a graphic fashion. +.Sh OPTIONS +.Bl -tag -width flag +.It Fl d +Use the specified +.Ar wordlist +instead of the default one named below. +.It Fl m +Set the minimum word length to use. +The default is 6 letters. +.El +.Sh FILES +.Bl -tag -width /usr/share/dict/words -compact +.It Pa /usr/share/dict/words +On-line word list +.El +.Sh AUTHORS +.An Ken Arnold diff --git a/upstream/fedora-40/man6/hunt.6 b/upstream/fedora-40/man6/hunt.6 new file mode 100644 index 00000000..f80e2454 --- /dev/null +++ b/upstream/fedora-40/man6/hunt.6 @@ -0,0 +1,414 @@ +.\" Automatically generated from hunt/hunt/hunt.6.in. Do not edit. +.\" $NetBSD: hunt.6,v 1.11 2003/06/11 12:00:21 wiz Exp $ +.\" +.\" hunt +.\" +.\" Copyright (c) 1983-2003, Regents of the University of California. +.\" All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions are +.\" met: +.\" +.\" + Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" + Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" + Neither the name of the University of California, San Francisco nor +.\" the names of its contributors may be used to endorse or promote +.\" products derived from this software without specific prior written +.\" permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS +.\" IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED +.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A +.\" PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +.\" OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +.\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +.\" LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +.\" OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +.\" +.Dd April 4, 2001 +.Dt HUNT 6 +.Sh NAME +.Nm hunt +.Nd a multi-player multi-terminal game +.Sh SYNOPSIS +.Nm +.Op Fl bcfmqSs +.Op Fl n Ar name +.Op Fl t Ar team +.Op Fl p Ar port +.Op Fl w Ar message +.Op Ar host +.Sh DESCRIPTION +The object of the game +.Nm +is to kill off the other players. +There are no rooms, no treasures, and no monsters. +Instead, you wander around a maze, find grenades, trip mines, and shoot down +walls and players. +The more players you kill before you die, the better your score is. +If the +.Fl m +flag is given, you enter the game as a monitor +(you can see the action but you cannot play). +.Pp +.Nm +normally looks for an active game on the local network; +if none is found, it starts one up on the local host. +The location of the game may be specified by giving the +.Ar host +argument. +This presupposes that a hunt game is already running on that host, see +.Xr huntd 6 +for details on how to set up a game on a specific host. +If more than one game if found, you may pick which game to play in. +.Pp +If the +.Fl q +flag is given, +.Nm +queries the local network (or specific host) +and reports on all active games found. +This is useful for shell startup scripts, e.g., +.Xr csh 1 Ns 's +.Pa .login . +.Pp +The player name may be specified on the command line by using the +.Fl n +option. +.Pp +The +.Fl c , +.Fl s , +and +.Fl f +options are for entering the game cloaked, scanning, or flying respectively. +.Pp +The +.Fl b +option turns off beeping when you reach the typeahead limit. +.Pp +The +.Fl t +option aids team playing by making everyone else on one's team +appear as the team name. +A team name is a single digit to avoid conflicting with other characters +used in the game. +.Pp +The +.Fl p Ar port +option allows the rendezvous port number to be set. +This is a useful way for people playing on dialup lines to avoid playing +with people on 9600 baud terminals. +.Pp +The +.Fl w Ar message +option is the only way to send a message to everyone else's screen when +you start up. +It is most often used to say +.Dq eat slime death - NickD's coming in . +.Pp +When you die and are asked if you wish to re-enter the game, +there are other answers than just yes or no. +You can also reply with a +.Ic w +for write a message before continuing or +.Ic o +to change how you enter the game (cloaked, scanning, or flying). +.Pp +To be notified automatically when a +.Nm +starts up, add your login to the +.Em hunt-players +mailing list (see +.Xr huntd 6 ) . +.Sh PLAYING HINTS +.Nm +only works on CRT (vdt) terminals with at least 24 lines, 80 columns, and +cursor addressing. +The screen is divided in to 3 areas. +On the right hand side is the status area. +It shows damage sustained, charges remaining, who's in the game, +who's scanning (the +.Dq * +in front of the name), who's cloaked (the +.Dq + +in front of the name), and other players' scores. +The rest of the screen is taken up by your map of the maze. +The 24th line is used for longer messages that don't fit in the status area. +.Pp +.Nm +uses the same keys to move as +.Xr vi 1 +does, i.e., +.Ic h , +.Ic j , +.Ic k , +and +.Ic l +for left, down, up, right respectively. +To change which direction you're facing in the maze, +use the upper case version of the movement key (i.e., +.Ic HJKL ) . +You can only fire or throw things in the direction you're facing. +.Bl -tag -width xxxxxxx +Other commands are: +.It Ic f No or Ic 1 +Fire a bullet (Takes 1 charge) +.It Ic g No or Ic 2 +Throw grenade (Takes 9 charges) +.It Ic F No or Ic 3 +Throw satchel charge (Takes 25 charges) +.It Ic G No or Ic 4 +Throw bomb (Takes 49 charges) +.It Ic 5 +Throw big bomb (Takes 81 charges) +.It Ic 6 +Throw even bigger bomb (Takes 121 charges) +.It Ic 7 +Throw even more big bomb (Takes 169 charges) +.It Ic 8 +Throw even more bigger bomb (Takes 225 charges) +.It Ic 9 +Throw very big bomb (Takes 289 charges) +.It Ic 0 +Throw very, very big bomb (Takes 361 charges) +.It Ic @ +Throw biggest bomb (Takes 441 charges) +.It Ic o +Throw small slime (Takes 5 charges) +.It Ic O +Throw big slime (Takes 10 charges) +.It Ic p +Throw bigger slime (Takes 15 charges) +.It Ic P +Throw biggest slime (Takes 20 charges) +.It Ic s +Scan (show where other players are) (Takes 1 charge) +.It Ic c +Cloak (hide from scanners) (Takes 1 charge) +.It Ic ^L +Redraw screen +.It Ic q +Quit +.El +.Pp +The symbols on the screen are: +.Bl -tag -width xxxxx -compact -offset indent +.It -|+ +walls +.It /\e +diagonal (deflecting) walls +.It # +doors (dispersion walls) +.It ; +small mine +.It g +large mine +.It : +bullet +.It o +grenade +.It O +satchel charge +.It @ +bomb +.It s +small slime +.It $ +big slime +.It \*[Gt]\*[Lt]^v +you facing right, left, up, or down +.It }{i! +other players facing right, left, up, or down +.It * +explosion +.It \e|/ +.It -*- +grenade and large mine explosion +.It /|\e +.El +.Pp +Other helpful hints: +.Bl -bullet +.It +You can only fire in the direction you are facing. +.It +You can only fire three shots in a row, then the gun must cool off. +.It +Shots move 5 times faster than you do. +.It +To stab someone, you face that player and move at them. +.It +Stabbing does 2 points worth of damage and shooting does 5 points. +.It +Slime does 5 points of damage each time it hits. +.It +You start with 15 charges and get 5 more every time a player enters +or re-enters. +.It +Grenade explosions cover a 3 by 3 area, each larger bomb cover a +correspondingly larger area (ranging from 5 by 5 to 21 by 21). +All explosions are centered around the square the shot hits and +do the most damage in the center. +.It +Slime affects all squares it oozes over. +The number of squares is equal to the number of charges used. +.It +One small mine and one large mine is placed in the maze for every new player. +A mine has a 2% probability of tripping when you walk forward on to it; +50% when going sideways; 95% when backing up. +Tripping a mine costs you 5 points or 10 points respectively. +Defusing a mine is worth 1 charge or 9 charges respectively. +.It +You cannot see behind you. +.It +Cloaking consumes 1 ammo charge per 20 of your moves. +.It +Scanning consumes 1 ammo charge per (20 \(mu the number of players) +of other player moves. +.It +Turning on cloaking turns off scanning \(em turning on scanning turns off +cloaking. +.It +When you kill someone, +you get 2 more damage capacity points and 2 damage points get taken away. +.It +Maximum typeahead is 5 characters. +.It +A shot destroys normal (i.e., non-diagonal, non-door) walls. +.It +Diagonal walls deflect shots and change orientation. +.It +Doors disperse shots in random directions (up, down, left, right). +.It +Diagonal walls and doors cannot be destroyed by direct shots but may +be destroyed by an adjacent grenade explosion. +.It +Slime goes around walls, not through them. +.It +Walls regenerate, reappearing in the order they were destroyed. +One percent of the regenerated walls will be diagonal walls or doors. +When a wall is generated directly beneath a player, he is thrown in +a random direction for a random period of time. +When he lands, he sustains damage (up to 20 percent of the amount of +damage already sustained); i.e., the less damage he had, the more nimble +he is and therefore less likely to hurt himself on landing. +.\"MP +.\"There is a volcano close to the center of the maze which goes off +.\"close to every 30 deaths. +.It +Every 30 deaths or so, a +.Dq \&? +will appear. +It is a wandering bomb which will explode when it hits someone, or +when it is slimed. +.It +If no one moves, everything stands still. +.It +The environment variable +.Ev HUNT +is checked to get the player name. +If you don't have this variable set, +.Nm +will ask you what name you want to play under. +If you wish to set other options than just your name, +you can enumerate the options as follows: +.Dl setenv HUNT "name=Sneaky,team=1,cloak,mapkey=zoFfGg1f2g3F4G" +sets the player name to Sneaky, sets the team to one, +sets the enter game attribute to cloaked, and the maps +.Ic z +to +.Ic o , F +to +.Ic f , G +to +.Ic g , 1 +to +.Ic f , 2 +to +.Ic g , 3 +to +.Ic F , +and +.Ic 4 +to +.Ic G . +The +.Ar mapkey +option must be last. +Other options are: +.Ar scan , fly , nobeep , port=string , host=string , +and +.Ar message=string , +which correspond to the command line options. +String options cannot contain commas since commas +are used to separate options. +.It +It's a boring game if you're the only one playing. +.El +.Pp +Your score is the decayed average of the ratio of number of kills to number +of times you entered the game and is only kept for the duration +of a single session of +.Nm . +.Pp +.Nm +normally drives up the load average to be approximately +(number_of_players + 0.5) greater than it would be without a +.Nm +game executing. +.Sh STATISTICS +The +.Fl S +option fetches the current game statistics. +The meaning of the column headings are as follows: +.Bl -tag -width ducked +.It score +the player's last score +.It ducked +how many shots a player ducked +.It absorb +how many shots a player absorbed +.It faced +how many shots were fired at player's face +.It shot +how many shots were fired at player +.It robbed +how many of player's shots were absorbed +.It missed +how many of player's shots were ducked +.It slimeK +how many slime kills player had +.It enemy +how many enemies were killed +.tI friend +how many friends were killed (self and same team) +.It deaths +how many times player died +.It still +how many times player died without typing in any commands +.It saved +how many times a shot/bomb would have killed player if he hadn't +ducked or absorbed it. +.El +.Sh SEE ALSO +.Xr huntd 6 +.Sh AUTHORS +Conrad Huang, Ken Arnold, and Greg Couch; +.br +University of California, San Francisco, Computer Graphics Lab +.Sh ACKNOWLEDGEMENTS +We thank Don Kneller, +John Thomason, Eric Pettersen, Mark Day, +and Scott Weiner for providing +endless hours of play-testing to improve the character of the game. +We hope their significant others will forgive them; we certainly don't. +.Sh BUGS +To keep up the pace, not everything is as realistic as possible. diff --git a/upstream/fedora-40/man6/huntd.6 b/upstream/fedora-40/man6/huntd.6 new file mode 100644 index 00000000..425d8ad1 --- /dev/null +++ b/upstream/fedora-40/man6/huntd.6 @@ -0,0 +1,125 @@ +.\" Automatically generated from hunt/huntd/huntd.6.in. Do not edit. +.\" $NetBSD: huntd.6,v 1.7 2003/06/11 12:00:22 wiz Exp $ +.\" +.\" huntd +.\" +.\" Copyright (c) 1983-2003, Regents of the University of California. +.\" All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions are +.\" met: +.\" +.\" + Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" + Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" + Neither the name of the University of California, San Francisco nor +.\" the names of its contributors may be used to endorse or promote +.\" products derived from this software without specific prior written +.\" permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS +.\" IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED +.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A +.\" PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +.\" OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +.\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +.\" LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +.\" OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +.\" +.Dd April 4, 2001 +.Dt HUNTD 6 +.Sh NAME +.Nm huntd +.Nd hunt daemon, back-end for hunt game +.Sh SYNOPSIS +.Nm +.Op Fl s +.Op Fl p Ar port +.Sh DESCRIPTION +.Nm +controls the multi-player +.Xr hunt 6 +game. +When it starts up, it tries to notify all members of the +.Em hunt-players +mailing list (see +.Xr sendmail 8 ) +by faking a +.Xr talk 1 +request from user +.Dq Hunt Game . +.Pp +The +.Fl s +option is for running +.Nm +forever (server mode). +This is similar to running it under the control of +.Xr inetd 8 +(see below), but it consumes a process table entry when no one is playing. +.Pp +The +.Fl p +option changes the UDP port number used to rendezvous with the player +process and thus allows for private games of hunt. +This option turns off the notification of players on the +.Em hunt-players +mailing list. +.Ss INETD +To run +.Nm +from +.Xr inetd 8 , +you'll need to +put the +.Nm hunt +service in +.Pa /etc/services : +.Bd -literal +hunt 26740/udp # multi-player/multi-host mazewars +.Ed +and +add the following line to +.Pa /etc/inetd.conf : +.Bd -literal -offset indent -compact +hunt dgram udp wait nobody /usr/sbin/huntd huntd +.Ed +Do not use any of the command line options; if you want +.Xr inetd 8 +to start up +.Nm +on a private port, change the port listed for +.Nm hunt +in +.Pa /etc/services . +.Sh NETWORK RENDEZVOUS +When +.Xr hunt 6 +starts up, it broadcasts on the local area net +(using the broadcast address for each interface) to find a +.Nm hunt +game in progress. +If a +.Nm +hears the request, it sends back the port number for the +.Nm hunt +process to connect to. +Otherwise, the +.Nm hunt +process starts up a +.Nm +on the local machine and tries to rendezvous with it. +.Sh SEE ALSO +.Xr talk 1 , +.Xr hunt 6 , +.Xr sendmail 8 +.Sh AUTHORS +Conrad Huang, Ken Arnold, and Greg Couch; +.br +University of California, San Francisco, Computer Graphics Lab diff --git a/upstream/fedora-40/man6/intro.6 b/upstream/fedora-40/man6/intro.6 new file mode 100644 index 00000000..b737c052 --- /dev/null +++ b/upstream/fedora-40/man6/intro.6 @@ -0,0 +1,17 @@ +.\" Copyright (c) 1993 Michael Haardt (michael@moria.de), +.\" Fri Apr 2 11:32:09 MET DST 1993 +.\" +.\" SPDX-License-Identifier: GPL-2.0-or-later +.\" +.\" Modified Sat Jul 24 17:19:57 1993 by Rik Faith (faith@cs.unc.edu) +.TH intro 6 2022-10-30 "Linux man-pages 6.06" +.SH NAME +intro \- introduction to games +.SH DESCRIPTION +Section 6 of the manual describes the games and funny little programs +available on the system. +.SH NOTES +.SS Authors and copyright conditions +Look at the header of the manual page source for the author(s) and copyright +conditions. +Note that these can be different from page to page! diff --git a/upstream/fedora-40/man6/mille.6 b/upstream/fedora-40/man6/mille.6 new file mode 100644 index 00000000..ca6a828d --- /dev/null +++ b/upstream/fedora-40/man6/mille.6 @@ -0,0 +1,388 @@ +.\" $NetBSD: mille.6,v 1.9 2003/08/07 09:37:25 agc Exp $ +.\" +.\" Copyright (c) 1983, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)mille.6 8.3 (Berkeley) 6/1/94 +.\" +.TH MILLE 6 "June 1, 1994" +.UC 4 +.SH NAME +mille \- play Mille Bornes +.SH SYNOPSIS +.B mille +[ file ] +.SH DESCRIPTION +.I Mille +plays a two-handed game reminiscent of +the Parker Brother's game of Mille Bornes with you. +The rules are described below. +If a file name is given on the command line, +the game saved in that file is started. +.PP +When a game is started up, +the bottom of the score window will contain a list of commands. +They are: +.IP P +Pick a card from the deck. +This card is placed in the `P' slot in your hand. +.IP D +Discard a card from your hand. +To indicate which card, type the number of the card in the hand +(or \*(lqP\*(rq for the just-picked card) followed +by a \*[Lt]RETURN\*[Gt] or \*[Lt]SPACE\*[Gt]. +The \*[Lt]RETURN or \*[Lt]SPACE\*[Gt] is required to allow recovery from typos +which can be very expensive, like discarding safeties. +.IP U +Use a card. +The card is again indicated by its number, +followed by a \*[Lt]RETURN\*[Gt] or \*[Lt]SPACE\*[Gt]. +.IP O +Toggle ordering the hand. +By default off, if turned on it will sort the cards in your hand appropriately. +This is not recommended for the impatient on slow terminals. +.IP Q +Quit the game. +This will ask for confirmation, just to be sure. +Hitting \*[Lt]DELETE\*[Gt] (or \*[Lt]RUBOUT\*[Gt]) is equivalent. +.IP S +Save the game in a file. +If the game was started from a file, +you will be given an opportunity to save it on the same file. +If you don't wish to, or you did not start from a file, +you will be asked for the file name. +If you type a \*[Lt]RETURN\*[Gt] without a name, +the save will be terminated and the game resumed. +.IP R +Redraw the screen from scratch. +The command ^L (control `L') will also work. +.IP W +Toggle window type. +This switches the score window between the startup window +(with all the command names) and the end-of-game window. +Using the end-of-game window +saves time by eliminating the switch at the end of the game +to show the final score. +Recommended for hackers and other miscreants. +.PP +If you make a mistake, an error message will be printed +on the last line of the score window, and a bell will beep. +.PP +At the end of each hand or game, +you will be asked if you wish to play another. +If not, it will ask you if you want to save the game. +If you do, and the save is unsuccessful, +play will be resumed as if you had said you wanted to play another hand/game. +This allows you to use the +.RB \*(lq S \*(rq +command to reattempt the save. +.SH AUTHOR +Ken Arnold +.br +(The game itself is a product of Parker Brothers, Inc.) +.SH "SEE ALSO" +curses(3X), +.I "Screen Updating and Cursor Movement Optimization:" +.IR "A Library Package" , +Ken Arnold +.SH CARDS +.PP +Here is some useful information. +The number in parentheses after the card name +is the number of that card in the deck: +.sp +.nf +.ne 10 +.ta \w'Speed Limit (3)'u+3n \w'Speed Limit (3)'u+\w'End of Limit (6)'u+6n +Hazard Repair Safety +.sp +Out of Gas (2) Gasoline (6) Extra Tank (1) +Flat Tire (2) Spare Tire (6) Puncture Proof (1) +Accident (2) Repairs (6) Driving Ace (1) +Stop (4) Go (14) Right of Way (1) +Speed Limit (3) End of Limit (6) +.sp +.ce +25 \- (10), 50 \- (10), 75 \- (10), 100 \- (12), 200 \- (4) +.sp +.fi +.DT +.SH RULES +.PP +.BR Object : +The point of this game is to get a total of 5000 points in several hands. +Each hand is a race to put down exactly 700 miles before your opponent does. +Beyond the points gained by putting down milestones, +there are several other ways of making points. +.PP +.BR Overview : +The game is played with a deck of 101 cards. +.I Distance +cards represent a number of miles traveled. +They come in denominations of 25, 50, 75, 100, and 200. +When one is played, +it adds that many miles to the player's trip so far this hand. +.I Hazard +cards are used to prevent your opponent from putting down Distance cards. +They can only be played if your opponent has a +.I Go +card on top of the Battle pile. +The cards are +.IR "Out of Gas" , +.IR "Accident" , +.IR "Flat Tire" , +.IR "Speed Limit" , +and +.IR "Stop" . +.I Remedy +cards fix problems caused by Hazard cards played on you by your opponent. +The cards are +.IR "Gasoline" , +.IR "Repairs" , +.IR "Spare Tire" , +.IR "End of Limit" , +and +.IR "Go" . +.I Safety +cards prevent your opponent from putting specific Hazard cards on you +in the first place. +They are +.IR "Extra Tank" , +.IR "Driving Ace" , +.IR "Puncture Proof" , +and +.IR "Right of Way" , +and there are only one of each in the deck. +.PP +.BR "Board Layout" : +The board is split into several areas. +From top to bottom, they are: +.B "SAFETY AREA" +(unlabeled): This is where the safeties will be placed as they are played. +.BR HAND : +These are the cards in your hand. +.BR BATTLE : +This is the Battle pile. +All the Hazard and Remedy Cards are played here, except the +.I "Speed Limit" +and +.I "End of Limit" +cards. +Only the top card is displayed, as it is the only effective one. +.BR SPEED : +The Speed pile. +The +.I "Speed Limit" +and +.I "End of Limit" +cards are played here +to control the speed at which the player is allowed to put down miles. +.BR MILEAGE : +Miles are placed here. +The total of the numbers shown here is the distance traveled so far. +.PP +.BR Play : +The first pick alternates between the two players. +Each turn usually starts with a pick from the deck. +The player then plays a card, or if this is not possible or desirable, +discards one. +Normally, a play or discard of a single card constitutes a turn. +If the card played is a safety, however, +the same player takes another turn immediately. +.PP +This repeats until one of the players reaches 700 points or the deck runs out. +If someone reaches 700, they have the option of going for an +.IR Extension , +which means that the play continues until someone reaches 1000 miles. +.PP +.BR "Hazard and Remedy Cards" : +Hazard Cards are played on your opponent's Battle and Speed piles. +Remedy Cards are used for undoing the effects of your opponent's nastiness. +.PP +.RB "\ \ \ \ " Go +(Green Light) +must be the top card on your Battle pile for you to play any mileage, +unless you have played the +.I "Right of Way" +card (see below). +.br +.RB "\ \ \ \ " Stop +is played on your opponent's +.I Go +card to prevent them from playing mileage until they play a +.I Go +card. +.br +.RB "\ \ \ \ " "Speed Limit" +is played on your opponent's Speed pile. +Until they play an +.I "End of Limit" +they can only play 25 or 50 mile cards, presuming their +.I Go +card allows them to do even that. +.br +.RB "\ \ \ \ " "End of Limit" +is played on your Speed pile to nullify a +.I "Speed Limit" +played by your opponent. +.br +.RB "\ \ \ \ " "Out of Gas" +is played on your opponent's +.I Go +card. +They must then play a +.I Gasoline +card, and then a +.I Go +card before they can play any more mileage. +.br +.RB "\ \ \ \ " "Flat Tire" +is played on your opponent's +.I Go +card. +They must then play a +.I "Spare Tire" +card, and then a +.I Go +card before they can play any more mileage. +.br +.ne 1i +.RB "\ \ \ \ " "Accident" +is played on your opponent's +.I Go +card. +They must then play a +.I Repairs +card, and then a +.I Go +card before they can play any more mileage. +.br +.PP +.BR "Safety Cards" : +Safety cards prevent your opponent +from playing the corresponding Hazard cards on you for the rest of the hand. +It cancels an attack in progress, and +.IR "always entitles the player to an extra turn" . +.br +.RB "\ \ \ \ " "Right of Way" +prevents your opponent from playing both +.I Stop +and +.I "Speed Limit" +cards on you. +It also acts as a permanent +.I Go +card for the rest of the hand, so you can play mileage +as long as there is not a Hazard card on top of your Battle pile. +In this case only, your opponent can play Hazard cards directly on a Remedy card +other than a Go card. +.br +.RB "\ \ \ \ " "Extra Tank" +When played, your opponent cannot play an +.I "Out of Gas" +on your Battle Pile. +.br +.RB "\ \ \ \ " "Puncture Proof" +When played, your opponent cannot play a +.I "Flat Tire" +on your Battle Pile. +.br +.RB "\ \ \ \ " "Driving Ace" +When played, your opponent cannot play an +.I Accident +on your Battle Pile. +.PP +.BR "Distance Cards" : +Distance cards are played when you have a +.I Go +card on your Battle pile, +or a Right of Way in your Safety area and are not stopped by a Hazard Card. +They can be played in any combination that totals exactly 700 miles, +except that +.IR "you cannot play more than two 200 mile cards in one hand" . +A hand ends whenever one player gets exactly 700 miles or the deck runs out. +In that case, play continues until neither someone reaches 700, +or neither player can use any cards in their hand. +If the trip is completed after the deck runs out, this is called +.IR "Delayed Action" . +.PP +.BR "Coup Fourr\o'\(aae'" : +This is a French fencing term for a counter-thrust move as part of a parry +to an opponent's attack. +In current French colloquial language it means a sneaky, underhanded blow. +In Mille Bornes, it is used as follows: +If an opponent plays a Hazard card, +and you have the corresponding Safety in your hand, +you play it immediately, even +.I before +you draw. +This immediately removes the Hazard card from your Battle pile, +and protects you from that card for the rest of the game. +This gives you more points (see \*(lqScoring\*(rq below). +.PP +.BR Scoring : +Scores are totaled at the end of each hand, +whether or not anyone completed the trip. +The terms used in the Score window have the following meanings: +.br +.RB "\ \ \ \ " "Milestones Played" : +Each player scores as many miles as they played before the trip ended. +.br +.RB "\ \ \ \ " "Each Safety" : +100 points for each safety in the Safety area. +.br +.RB "\ \ \ \ " "All 4 Safeties" : +300 points if all four safeties are played. +.br +.RB "\ \ \ \ " "Each Coup Fourr\o'\(aae'" : +300 points for each Coup Fourr\o'\(aae' accomplished. +.PP +The following bonus scores can apply only to the winning player. +.br +.RB "\ \ \ \ " "Trip Completed" : +400 points bonus for completing the trip to 700 or 1000. +.br +.RB "\ \ \ \ " "Safe Trip" : +300 points bonus for completing the trip without using any 200 mile cards. +.br +.RB "\ \ \ \ " "Delayed Action" : +300 points bonus for finishing after the deck was exhausted. +.br +.RB "\ \ \ \ " "Extension" : +200 points bonus for completing a 1000 mile trip. +.br +.RB "\ \ \ \ " "Shut-Out" : +500 points bonus for completing the trip +before your opponent played any mileage cards. +.PP +Running totals are also kept for the current score for each player +for the hand +.RB ( "Hand Total" ), +the game +.RB ( "Overall Total" ), +and number of games won +.RB ( Games ). diff --git a/upstream/fedora-40/man6/mpoly.6 b/upstream/fedora-40/man6/mpoly.6 new file mode 100644 index 00000000..c89397cf --- /dev/null +++ b/upstream/fedora-40/man6/mpoly.6 @@ -0,0 +1,184 @@ +.\" Automatically generated from monop/monop.6.in. Do not edit. +.\" $NetBSD: monop.6,v 1.16 2003/08/07 09:37:28 agc Exp $ +.\" +.\" Copyright (c) 1980 The Regents of the University of California. +.\" All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)monop.6 6.5 (Berkeley) 3/25/93 +.\" +.Dd March 25, 1993 +.Dt MPOLY 6 +.Os +.Sh NAME +.Nm mpoly +.Nd Monopoly game +.Sh SYNOPSIS +.Nm +.Op Ar file +.Sh DESCRIPTION +.Nm +is reminiscent of the Parker Brother's game Monopoly, and +monitors a game between 1 to 9 users. +It is assumed that the rules of Monopoly are known. +The game follows the standard rules, with the exception that, +if a property goes up for auction and there are only two solvent players, +no auction is held and the property remains unowned. +.Nm +The game, in effect, lends the player money, +so it is possible to buy something which you cannot afford. +However, as soon as a person goes into debt, he must +.Dq fix the problem , +i.e., make himself solvent, before play can continue. +If this is not possible, the player's property reverts to his debtee, +either a player or the bank. +A player can resign at any time to any person or the bank, +which puts the property back on the board, unowned. +.Pp +Any time that the response to a question is a +.Em string , +e.g., a name, place or person, you can type +.Sq Ic \&? +to get a list of valid answers. +It is not possible to input a negative number, nor is it ever necessary. +.Pp +.Em A Summary of Commands : +.Bl -tag -width item +.It Ic quit +quit game: This allows you to quit the game. +It asks you if you're sure. +.It Ic print +print board: This prints out the current board. +The columns have the following meanings (column headings are the same for the +.Ic where , +.Ic own holdings , +and +.Ic holdings +commands): +.Pp +.Bl -tag -width indent -compact +.It Name +The first ten characters of the name of the square. +.It Own +The +.Em number +of the owner of the property. +.It Price +The cost of the property (if any). +.It Mg +This field has a +.Sq * +in it if the property is mortgaged. +.It \&# +If the property is a Utility or Railroad, this is the number +of such owned by the owner. +If the property is land, this is the number of houses on it. +.It Rent +Current rent on the property. +If it is not owned, there is no rent. +.El +.It Ic where +where players are: Tells you where all the players are. +A +.Sq * +indicates the current player. +.It Ic own holdings +List your own holdings, +i.e., money, get-out-of-jail-free cards, and property. +.It Ic holdings +holdings list: Look at anyone's holdings. +It will ask you whose holdings you wish to look at. +When you are finished, type +.Sq Ic done . +.It Ic mortgage +mortgage property: +Sets up a list of mortgageable property, and asks which you wish to mortgage. +.It Ic unmortgage +unmortgage property: +Unmortgage mortgaged property. +.It Ic buy +buy houses: +Sets up a list of monopolies on which you can buy houses. +If there is more than one, it asks you which you want to buy for. +It then asks you how many for each piece of property, +giving the current amount in parentheses after the property name. +If you build in an unbalanced manner +(a disparity of more than one house within the same monopoly), +it asks you to re-input things. +.It Ic sell +sell houses: +Sets up a list of monopolies from which you can sell houses. +It operates in an analogous manner to +.Ic buy . +.It Ic card +card for jail: +Use a get-out-of-jail-free card to get out of jail. +If you're not in jail, or you don't have one, it tells you so. +.It Ic pay +pay for jail: +Pay $50 to get out of jail, from whence you are put on Just Visiting. +Difficult to do if you're not there. +.It Ic trade +This allows you to trade with another player. +It asks you whom you wish to trade with, +and then asks you what each wishes to give up. +You can get a summary at the end, and, in all cases, +it asks for confirmation of the trade before doing it. +.It Ic resign +Resign to another player or the bank. +If you resign to the bank, all property reverts to its virgin state, +and get-out-of-jail-free cards revert to the deck. +.It Ic save +save game: +Save the current game in a file for later play. +You can continue play after saving, +either by adding the file in which you saved the game after the +.Nm +command, or by using the +.Ic restore +command (see below). +It will ask you which file you wish to save it in, +and, if the file exists, confirm that you wish to overwrite it. +.It Ic restore +restore game: +Read in a previously saved game from a file. +It leaves the file intact. +.It Ic roll +Roll the dice and move forward to your new location. +If you simply hit the +.Aq RETURN +key instead of a command, it is the same as typing +.Ic roll . +.El +.Sh AUTHOR +.An Ken Arnold +.Sh FILES +.Bl -tag -width /usr/share/bsd-games//monop-cards.pck -compact +.It Pa /usr/share/bsd-games//monop-cards.pck +Chance and Community Chest cards +.El +.Sh BUGS +No command can be given an argument instead of a response to a query. diff --git a/upstream/fedora-40/man6/number.6 b/upstream/fedora-40/man6/number.6 new file mode 100644 index 00000000..72266379 --- /dev/null +++ b/upstream/fedora-40/man6/number.6 @@ -0,0 +1,59 @@ +.\" $NetBSD: number.6,v 1.7 2003/08/07 09:37:30 agc Exp $ +.\" +.\" Copyright (c) 1989, 1993, 1994 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)number.6 8.2 (Berkeley) 3/31/94 +.\" +.Dd March 31, 1994 +.Dt NUMBER 6 +.Os +.Sh NAME +.Nm number +.Nd convert Arabic numerals to English +.Sh SYNOPSIS +.Nm +.Op Fl l +.Op Ar number ... +.Sh DESCRIPTION +The +.Nm +utility prints the English equivalent of the number to the standard +output, with each 10^3 magnitude displayed on a separate line. +If no argument is specified, +.Nm +reads lines from the standard input. +.Pp +The options are as follows: +.Bl -tag -width Ds +.It Fl l +Display the number on a single line. +.El +.Sh BUGS +Although +.Nm +understand fractions, it doesn't understand exponents. diff --git a/upstream/fedora-40/man6/phantasia.6 b/upstream/fedora-40/man6/phantasia.6 new file mode 100644 index 00000000..94ff3e02 --- /dev/null +++ b/upstream/fedora-40/man6/phantasia.6 @@ -0,0 +1,1197 @@ +.\" $NetBSD: phantasia.6,v 1.11 2004/01/03 13:32:23 wiz Exp $ +.\" +.Dd April 1, 2001 +.Dt PHANTASIA 6 +.Os +.Sh NAME +.Nm phantasia +.Nd an interterminal fantasy game +.Sh SYNOPSIS +.Nm +.Op Fl abHmpSsx +.Sh DESCRIPTION +.Nm +is a role playing game which allows players to roll up characters of +various types to fight monsters and other players. +Progression of characters is based upon gaining experience from fighting +monsters (and other players). +.Pp +Most of the game is menu driven and self-explanatory (more or less). +The screen is cursor updated, so be sure to set up the +.Ev TERM +variable in your environment. +.Pp +The options provide for a variety of functions to support the game. +They are: +.Pp +.Bl -tag -width aaa -offset indent +.It Fl a +Get a listing of all character names on file. +.It Fl b +Show scoreboard of top characters per login. +.It Fl H +Print header only. +.It Fl m +Get a monster listing. +.It Fl p +Purge old characters. +.It Fl S +Turn on wizard options, if allowed, if running as +.Dq root . +.It Fl s +Invokes +.Nm +without header information. +.It Fl x +Examine/change a particular character on file. +.El +.Pp +The characters are saved on a common file, in order to make the game +interactive between players. +The characters are given a password in order to retrieve them later. +Only characters above +.Em level +zero are saved. +Characters unused for awhile will be purged. +Characters are only placed on the scoreboard when they die. +.Sh PARTICULARS +.Ss Normal Play +A number of the player's more important statistics are almost always +displayed on the screen, with maximums (where applicable) in +parentheses. +.Pp +The character is placed randomly near the center of a Cartesian +system. +Most commands are selected with a single letter or digit. +For example, one may move by hitting 'W', 'S', 'N', or 'E', +(lower case may also be used, at no time is the game case dependent). +One may also use 'H', 'J', 'K', 'L', +for movement, similar to +.Xr vi 1 . +To move to a specific (x, y) coordinate, use the +.Ic move +('1') command. +The distance a character can move is calculated by +1 plus 1.5 per +.Em level . +Moving in a compass direction will move the player the maximum +allowed distance in that direction. +.Pp +A player may see who else is playing by using the +.Ic players +('2') option. +One may see the coordinates of those who are the same +distance or closer to the origin as he/she. +.Em Kings , +and +.Em council of the wise +can see and can be seen by everyone. +A +.Em palantir +removes these restrictions. +.Pp +One can talk to other players with the +.Ic talk +('3') option. +In general, this is a line or so of text. +To remove a current +message, just type +.Aq return +when prompted for a message. +.Pp +The +.Ic stats +('4') option shows additional characteristics of a player. +.Pp +One may leave the game either with the +.Ic quit +('5') option. +.Pp +One may rest by default. +Resting lets one regain maximum +.Em energy level , +and also lets one find +.Em mana +(more is found for larger levels and further distances from the origin). +.Pp +One may call a monster by hitting '9' or 'C'. +.Pp +Use 'X' to examine other players. +.Pp +One may quit or execute a sub-shell by hitting interrupt. +Quitting during battle results in death for obvious reasons. +.Pp +Several other options become available as the player progresses in +.Em level +and +.Em magic , +or to other stations in the game +.Em ( valar , +.Em council of the wise , +.Em king ) . +These are described elsewhere. +In general, a control-L will force the redrawing of the screen. +.Pp +Other things which may happen are more or less self-explanatory. +.Ss Fighting Monsters +A player has several options while fighting monsters. +They are as follows: +.Bl -tag -width skirmish -offset indent +.It Ic melee +Inflicts damage on the monster, based upon +.Em strength . +Also decreases the monster's +.Em strength +some. +.It Ic skirmish +Inflicts a little less damage than +.Ic melee , +but decreases the monster's +.Em quickness +instead. +.It Ic evade +Attempt to run away. +Success is based upon both the player's and the monster's +.Em brains +and +.Em quickness . +.It Ic spell +Several options for throwing spells (described elsewhere). +.It Ic nick +Hits the monster one plus the player's +.Em sword , +and gives the player 10% of the monster's +.Em experience . +Decreases the monster's +.Em experience +an amount proportional to the amount granted. +This also increases the monster's quickness. +Paralyzed monsters wake up very fast when nicked. +.It Ic luckout +This is essentially a battle of wits with the monster. +Success is based upon the player's and the monster's +.Em brains . +The player gets credit for slaying the monster if he/she succeeds. +Otherwise, nothing happens, and the chance to +.Ic luckout +is lost. +.El +.Ss Character Statistics +.Bl -tag -width quickness -offset indent +.It Em strength +determines how much damage a character can inflict. +.It Em quickness +determines how many chances a character gets to make decisions while fighting. +.It Em energy level +specifies how much damage a character may endure before dying. +.It Em magic level +determines which spells a character may throw, and how effective those +spells will be. +.It Em brains +basically, the character's intelligence; used for various fighting options +and spells. +.It Em mana +used as a power source for throwing spells. +.It Em experience +gained by fighting monsters and other characters. +.It Em level +indicative of how much experience a character has accumulated; progresses +geometrically as +.Em experience +increases. +.It Em poison +sickness which degrades a character's performance (affects +.Em energy level +and +.Em strength ) . +.It Em sin +accumulated as a character does certain nasty things; used only rarely +in normal play of the game. +.It Em age +of player; roughly equivalent to number of turns. +As +.Em age +increases, many personal statistics degenerate. +.El +.Ss Character Types +Character statistics are rolled randomly from the above list, according +to character type. +The types are as follows: +.Bl -tag -width "experimento" -offset indent +.It Em magic user +strong in +.Em magic level +and +.Em brains , +weak in other areas. +Must rely on wits and magic to survive. +.It Em fighter +good in +.Em strength +and +.Em energy level , +fairly good in other areas. +This adds up to a well-equipped fighter. +.It Em elf +very high +.Em quickness +and above average +.Em magic level +are +.Em elves +selling points. +.It Em dwarf +very high +.Em strength +and +.Em energy level , +but with a tendency to be rather slow and not too bright. +.It Em halfling +rather quick and smart, with high +.Em energy level , +but poor in +.Em magic +and +.Em strength . +Born with some +.Em experience . +.It Em experimento +very mediocre in all areas. +However, the +.Em experimento +may be placed almost anywhere within the playing grid. +.El +.Pp +The possible ranges for starting statistics are summarized in +the following table. +.TS +l c c c c c c +l c c c c c c. +Type Strength Quick Mana Energy Brains Magic +_ +Mag. User 10-15 30-35 50-100 30-45 60-85 5-9 +Fighter 40-55 30-35 30-50 45-70 25-45 3-6 +Elf 35-45 32-38 45-90 30-50 40-65 4-7 +Dwarf 50-70 25-30 25-45 60-100 20-40 2-5 +Halfling 20-25 34 25-45 55-90 40-75 1-4 +Experimento 25 27 100 35 25 2 +.TE +.\" .Bl -column "Experimento" "Strength" "Quick" "xxxxxx" "Energy" "Brains" "Magic" +.\" .It Sy Charactertype Strength Quick Mana Energy Brains Magic +.\" .It "Magic User" 10-15 30-35 50-100 30-45 60-85 5-9 +.\" .It Fighter 40-55 30-35 30-50 45-70 25-45 3-6 +.\" .It Elf 35-45 32-38 45-90 30-50 40-65 4-7 +.\" .It Dwarf 50-70 25-30 25-45 60-100 20-40 2-5 +.\" .It Halfling 20-25 34 25-45 55-90 40-75 1-4 +.\" .It Experimento 25 27 100 35 25 2 +.\" .El +.Pp +Not only are the starting characteristics different for the different +character types, the characteristics progress at different rates for the +different types as the character goes up in +.Em level . +.Em Experimentoes Ns ' +characteristics progress randomly as one of the other types. +The progression as characters increase in +.Em level +is summarized in the following table. +.Pp +.TS +nokeep ; +l c c c c c +l n n n n n. +Type Strength Mana Energy Brains Magic +_ +Mag. User 2.0 75 20 6 2.75 +Fighter 3.0 40 30 3.0 1.5 +Elf 2.5 65 25 4.0 2.0 +Dwarf 5 30 35 2.5 1 +Halfling 2.0 30 30 4.5 1 +.TE +.Pp +The character type also determines how much gold a player may +carry, how long until +.Em rings +can overcome the player, and how much +.Em poison +the player can withstand. +.Ss Spells +During the course of the game, the player may exercise his/her +magic powers. +These cases are described below. +.Bl -tag -width "all or nothing" -offset indent +.It Ic cloak +.Em magic level necessary : +20 (plus level 7) +.br +.Em mana used : +35 plus 3 per rest period +.br +Used during normal play. +Prevents monsters from finding the character, +as well as hiding the player from other players. +His/her coordinates show up as '?' in the +.Ic players +option. +Players cannot collect +.Em mana , +find trading posts, or discover the +.Em grail +while cloaked. +Calling a monster uncloaks, as well as choosing this option while cloaked. +.It Ic teleport +.Em magic level necessary : +40 (plus level 12) +.br +.Em mana used : +30 per 75 moved +.br +Used during normal play. +Allows the player to move with much more freedom than with the +.Ic move +option, at the price of expending mana. +The maximum distance possible to move is based upon +.Em level +and +.Em magic level . +.It Ic power blast +.Em magic level necessary : +none +.br +.Em mana used : +5 times +.Em level +.br +Used during inter-terminal battle. +Damage is based upon +.Em magic level +and +.Em strength . +Hits much harder than a normal hit. +.It Ic all or nothing +.Em magic level necessary : +none +.br +.Em mana used : +1 +.br +Used while combating monsters. +Has a 25% chance of working. +If it works it hits the monster just enough to kill it. +If it fails, it doesn't hit the monster, and doubles the monster's +.Em quickness +and +.Em strength . +Paralyzed monsters wake up much quicker as a result of this spell. +.It Ic magic bolt +.Em magic level necessary : +5 +.br +.Em mana used : +variable +.br +Used while combating monsters. +Hits the monster based upon the amount +of +.Em mana +expended and +.Em magic level . +Guaranteed to hit at least 10 per +.Em mana . +.It Ic force field +.Em magic level necessary : +15 +.br +.Em mana used : +30 +.br +Used during monster combat. +Throws up a shield to protect from damage. +The shield is added to actual energy level, and is a fixed number, based +upon maximum energy. +Normally, damage occurs first to the shield, and then to the players actual +.Em energy level . +.It Ic transform +.Em magic level necessary : +25 +.br +.Em mana used : +50 +.br +Used during monster combat. +Transforms the monster randomly into one of the 100 monsters from +the monster file. +.It Ic increase might +.Em magic level necessary : +35 +.br +.Em mana used : +75 +.br +Used during combat with monsters. +Increases strength up to a maximum. +.It Ic invisibility +.Em magic level necessary : +45 +.br +.Em mana used : +90 +.br +Used while fighting monsters. +Makes it harder for the monster to hit, by temporarily increasing the player's +.Em quickness . +This spell may be thrown several times, but a maximum level will be reached. +.It Ic transport +.Em magic level necessary : +60 +.br +.Em mana used : +125 +.br +Used during monster combat. +Transports the monster away from the player. +Success is based upon player's +.Em magic +and +.Em brains , +and the monster's +.Em experience . +If it fails the player is transported instead. +60% of the time, the monster will drop any treasure it was carrying. +.It Ic paralyze +.Em magic level necessary : +75 +.br +.Em mana used : +150 +.br +Used during monster combat. +.Dq Freezes +the monster by putting its +.Em quickness +slightly negative. +The monster will slowly wake up. +Success is based upon player's +.Em magic +and the monster's +.Em experience . +If it fails, nothing happens. +.It Ic specify +.Em magic level necessary : +none +.br +.Em mana used : +1000 +.br +Used during monster combat only by +.Em valar +or +.Em council of the wise . +Allows the player to pick which monster to fight. +.El +.Ss Monsters +Monsters get bigger as one moves farther from the origin (0,0). +Rings of distance 125 from the origin determine the size. +A monster's +.Em experience , +.Em energy level , +and +.Em brains +are multiplied by the size. +.Em Strength +is increased 50% per size over one, and +.Em quickness +remains the same, regardless of size. +.Pp +Also, nastier monsters are found as one progress farther out from the origin. +Monsters also may flock. +The percent chance of that happening is designated as +.Em flock% +in the monster listing. +Monsters outside the first ring +may carry treasure, as determined by their treasure type. +Flocking monsters, and bigger monsters increase the chances of treasure. +.Pp +Certain monsters have special abilities; they are as follows: +.Bl -tag -width "Assorted Faeries" +.It Em Unicorn +can only be subdued if the player is in possession of a +.Em virgin . +.It Em Modnar +has random characteristics, including treasure type. +.It Em Mimic +will pick another name from the list of monsters in order to confuse. +.It Em Dark Lord +very nasty person. +Does not like to be hit (especially nicked), +and many spells do not work well (or at all) against him. +One can always +.Em evade +from the +.Em Dark Lord . +.It Em Leanan-Sidhe +also a very nasty person. +She will permanently sap +.Em strength +from someone. +.It Em Saruman +wanders around with +.Em Wormtongue , +who can steal a +.Em palantir . +Also, +.Em Saruman +may turn a player's gems into gold pieces, or scramble her/his stats. +.It Em Thaumaturgist +can transport a player. +.It Em Balrog +inflicts damage by taking away +.Em experience , +not +.Em energy . +.It Em Vortex +may take some +.Em mana . +.It Em Nazgul +may try to steal a +.Em ring +or neutralize part of one's +.Em brains . +.It Em Tiamat +may take half a player's +.Em gold +and +.Em gems +and escape. +.It Em Kobold +may get nasty and steal one gold piece and run away. +.It Em Shelob +may bite, inflicting the equivalent of one +.Em poison . +.It Em Assorted Faeries +These are killed if attacking someone carrying +.Em holy water . +These are +.Em Cluricaun , Fir Darrig , Fachan , +.Em Ghille Dhu , Bogle , Killmoulis , +and +.Em Bwca . +.It Em Lamprey +may bite, inflicting 1/2 of a +.Em poison . +.It Em Shrieker +will call one of its (much bigger) buddies if picked upon. +.It Em Bonnacon +will become bored with battle, fart, and run off. +.It Em Smeagol +will try to steal a +.Em ring +from a player, if given the chance. +.It Em Succubus +may inflict damage through a +.Ic force field . +This subtracts from +.Em energy level +instead of any shield the player may have thrown up. +This is a very easy way to die. +.It Em Cerberus +loves metal and will steal all the metal treasures from a player if able. +.It Em Ungoliant +can bite and poison. +This inflicts five +.Em poisons , +and also takes one from the player's +.Em quickness . +.It Em Jabberwock +may tire of battle, and leave after calling one of his friends +.Em ( Jubjub Bird +or +.Em Bandersnatch ) . +.It Em Morgoth +actually +.Em Modnar , +but reserved for +.Em council of the wise , valar , +and +.Em ex-valar . +Fights with +.Em Morgoth +end when either he or the player dies. +His characteristics are calculated based upon the player's. +The player is given the chance to ally with him. +No magic, except +.Ic force field +works when battling +.Em Morgoth . +.It Em Troll +may regenerate its +.Em energy +and +.Em strength +while in battle. +.It Em Wraith +may make a player blind. +.El +.Ss Treasures +The various treasure types are as follows: +.Bl -tag -width "type twelve/thirteen" +.It Type zero +none +.It Type one +.Em power booster +\- adds mana. +.br +.Em druid +\- adds experience. +.br +.Em holy orb +\- subtracts 0.25 sin. +.TP 1.5i +.It Type two +.Em amulet +\- protects from cursed treasure. +.br +.Em holy water +\- kills +.Em assorted faeries . +.br +.Em hermit +\- reduces sin by 25% and adds some mana. +.It Type three +.Em shield +\- adds to maximum +.Em energy level . +.br +.Em virgin +\- used to subdue a +.Em unicorn , +or to give much +.Em experience +(and some +.Em sin ) . +.br +.Em athelas +\- subtracts one +.Em poison . +.It Type four (scrolls) +.Em shield +\- throws a bigger than normal +.Ic force field . +.br +.Em invisible +\- temporarily puts the finder's +.Em quickness +to one million. +.br +.Em ten fold strength +\- multiplies finder's strength by ten. +.br +.Em pick monster +\- allows finder to pick next monster to battle. +.br +.Em general knowledge +\- adds to finder's +.Em brains +and +.Em magic level . +.Pp +All the scrolls except +.Em general knowledge +automatically call a monster. +These preserve any spells that were already in effect, but are only in +effect while in battle. +.It Type five +.Em dagger +\- adds to +.Em strength . +.br +.Em armour +\- same as a +.Em shield , +but bigger. +.br +.Em tablet +\- adds +.Em brains . +.It Type six +.Em priest +\- rests to maximum; adds +.Em mana , brains ; +and halves +.Em sin . +.br +.Em Robin Hood +\- increases +.Em shield +and adds permanently to +.Em strength . +.br +.Em axe +\- like +.Em dagger , +but bigger. +.It Type seven +.Em charm +\- protects from cursed treasure (used before +.Em amulet ) ; +used in conjunction with +.Em blessing +to battle +.Em Dark Lord . +.br +.Em Merlyn +\- adds +.Em brains , magic , +and +.Em mana . +.br +.Em war hammer +\- like an +.Em axe , +but bigger. +.It Type eight +.Em healing potion +\- sets +.Em poison +to -2, or subtracts two from +.Em poison , +whichever is better. +.br +.Em transporter +\- allows finder to move anywhere. +.br +.Em sword +\- like a +.Em war hammer , +but bigger. +.It Type nine +.Em golden crown +\- allows the player to become +.Em king , +by going to (0,0). +.br +.Em blessing +\- cuts +.Em sin +to 1/3, adds +.Em mana , +rests to maximum, kills +.Em Dark Lord +with a +.Em charm , +and gives bearer first hit on all monsters. +.br +.Em quicksilver +\- adds to +.Em quickness . +.It Type ten +.Em elven boots +\- adds permanently to +.Em quickness . +.It Type eleven +.Em palantir +\- allows one to see all the other players; used by +.Em council of the wise +to seek the +.Em grail . +.It Type twelve/thirteen +.Em ring +\- allows one to hit much harder in battle, etc. +.El +.Pp +Any treasure type 10-13 monsters may instead carry a type nine treasure. +.Pp +A monster may also be carrying +.Em gold +or +.Em gems . +These are used at +.Em trading posts +to buy things. +A +.Em gem +is worth 1000 gold pieces. +Too much +.Em gold +will slow a player down. +One may carry 1000 plus 200 per +.Em level +of +.Em gold . +A +.Em gem +weighs one half a gold piece. +Monsters of treasure type 7 or higher may carry +.Em gems . +.Pp +The chance of a cursed treasure is based upon treasure type. +The more valuable treasures have a greater chance of being cursed. +A cursed treasure knocks +.Em energy level +very low, and adds 0.25 +.Em poison . +.Ss Rings +.Em Rings +are only carried by +.Em nazguls +and +.Em Dark Lords . +They come in four different flavors. +All +.Em rings +rest the player to maximum and cause him/her to hit much harder +in battle with monsters (assuming one has chosen to use the +.Em ring +for battle.) +.Pp +Two types of +.Em rings +are cursed and come either from +.Em nazguls +or +.Em Dark Lord . +After a few times of using these types, the player falls +under the control of the +.Em ring , +and strange, random things will occur. +Eventually, the player dies, and gives his/her name to a monster +on the file. +Dying before the +.Em ring +is used up also renames the monster. +.Pp +The two remaining types of +.Em rings +are much more benign. +The one from a +.Em nazgul +is good for a limited number of battle rounds, and will save +the player from death if it was being used when he/she died. +The one from +.Em Dark Lord +is the same, except that it never is used up. +.Em rings +disappear after saving someone from death. +In general, cursed +.Em rings +occur much more often than normal ones. +It is usually not a good idea to pick one up. +The only way to get rid of a +.Em ring +is to have a monster steal it. +.Ss King +A player may become +.Em king +by finding a +.Em crown +and going to (0,0). +Players must have a +.Em level +in the range of 10 to 1000 to be able to find a +.Em crown . +When a player with one or more +.Em crowns +reaches +.Em level +1000, the +.Em crowns +are converted to +.Em gold . +.Pp +Once a player is king, he/she may do certain things while in +the Lord's Chamber (0,0). +These are exercised with the +.Ic decree +('0') option. +.Bl -tag -width "collect taxes" +.It Ic transport +This is done to another player. +It randomly moves the affected player about. +A +.Em charm +protects from transports. +.It Ic curse +This is done to another player. +It is analogous to cursed treasure, but worse. +It inflicts two +.Em poison , +knocks +.Em energy level +very low, and degrades the maximum energy. +It also removes a +.Em cloak . +A +.Em blessing +protects from king's curses. +.It Ic energy void +The king may put a number of these scattered about +his/her kingdom as he/she pleases. +If a player hits one, he/she loses +.Em mana , energy , +and +.Em gold . +The energy void disappears after being hit. +.It Ic bestow +This is also done to another player. +The king may wish to reward one or more loyal subjects by sharing his/her +riches +.Em ( gold ) . +Or it is a convenient way to dispose of some unwanted deadweight. +.It Ic collect taxes +Everyone pays 7% tax on all +.Em gold +and +.Em gems +acquired, regardless of the existence of a +.Em king . +The king collects the accrued taxes with this option. +.El +.Pp +The +.Em king +may also +.Ic teleport +anywhere for free by using the origin as a starting place. +.Ss Council of the Wise, Valar +A player automatically becomes a member of the +.Em council of the wise +upon reaching level 3000. +Members of the council cannot have +.Em rings . +Members of the council have a few extra options which they can exercise. +These are exercised with the +.Ic intervene +('8') option. +All +.Ic intervene +options cost 1000 mana. +One +.Ic intervene +option is to +.Ic heal +another player. +This is just a quick way for that player to be rested +to maximum and lose a little +.Em poison . +The main purpose in life for members of the council is to seek the +.Em Holy Grail . +This is done with a +.Em palantir +under the +.Ic seek grail +option. +The distance cited by the seek is accurate within 10%, in order +not to make it too easy to find the grail. +A player must have infinitesimally small +.Em sin , +or else it's all over upon finding the grail. +In order to help members of the council on their quest, they +may +.Ic teleport +with greater ease. +.Pp +Upon finding the grail, the player advances to position of +.Em valar . +He/she may then exercise more and niftier options under +.Ic intervention . +These include all of the council members' options plus the +ability to move other players about, bless them, and throw monsters at +them. +A +.Em valar Ns 's +blessing has the same effect as the treasure +.Em blessing , +except that the affected player does not get his/her +.Em blessing +flag set. +All +.Ic intervention +options which affect other players age the player who uses them. +.Em Valars +are essentially immortal, but are actually given five lives. +If these are used up, the player is left to die, and becomes an +.Em ex-valar . +A +.Em valar +cannot +.Ic move , teleport , +or call monsters. +(An exception to this is if the +.Em valar +finds a +.Em transporter . ) +This is to allow him/her to dispose of excess +.Em gold . +Any monsters which a +.Em valar +encounters are based upon his/her size. +Only one valar may exist at a time. +The current valar is replaced when another player finds the grail. +The valar is then bumped back to the council of the wise. +.Ss Wizard +The +.Em wizard +is usually the owner of the game, and the one who maintains +the associated files. +The +.Em wizard +is granted special powers within the game, if it is invoked +with the +.Fl S +option. +Otherwise, the +.Em wizard +plays no different from other players. +The +.Em wizard +abilities are outlined below. +.Bl -tag -width "super character type" +.It Ic change players +When examining a player, (game invoked with +.Fl x , +or use 'X' from within game), the +.Em wizard +may also change the player. +.It Ic intervention +The +.Em wizard +may do all the +.Ic intervention +options. +One extra option, +.Ic vaporize , +is added to kill any offensive players. +.It Ic super character type +An extra character type is added. +This character starts with the +maximum possible in all statistics, selected from the other character types. +A +.Em super +character's statistics also progress at the maximum possible rate, selected +from the other character types. +.El +.Ss Special Places +Certain regions of the playing grid have different names. +In general, this is only to give the player some idea of +his/her present location. +Some special places do exist. +.Bl -tag -width "Trading Posts" +.It Em Trading Posts +These are located at |x| == |y| == n*n*100 for n = 1, 2, ..., 1000. +Trading posts farther out have more things for sale. +Be careful about cheating the merchants there, as they have short tempers. +Merchants are dishonest about 5% of the time. +.It Em Lord's Chamber +This is located at (0,0). +Only players with +.Em crowns +may enter. +.It Em Point of \&No Return +This is located beyond 1.2e+6 in any direction. +The only way to return from here is a +.Em transporter +or to have a +.Em valar +relocate the player. +.It Em Dead Marshes +This is a band located fairly distant from the origin. +The first fourteen monsters (water monsters) can normally only be found here. +.It Em Valhala +This place is where the +.Em valar +resides. +It is associated with no particular coordinate on the playing grid. +.El +.Ss Miscellaneous +Once a player reaches +.Em level +5, the game will start to time out waiting for input. +This is to try to keep the game a bit faster paced. +.Pp +A +.Em guru +will never be disgusted with your +.Em sins +if they are less than one. +.Pp +A +.Em medic +wants half of a player's +.Em gold +to be happy. +Offering more than one has, or a negative amount will anger the +.Em medic , +who will make the player worse (add one +.Em poison ) . +.Pp +The +.Em Holy Grail +does little for those who are not ready to behold it. +Whenever anyone finds it, it moves. +It is always located within 1e+6 in any compass direction of the origin. +.Pp +There is a maximum amount of +.Em mana +and +.Em charms +a player may posses, based upon +.Em level . +.Em Quicksilver +is always limited to to a maximum of 99. +.Pp +.Em Books +bought at a +.Em trading post +increase +.Em brains , +based upon the number bought. +It is unwise, however to buy more than 1/10 of one's +.Em level +in books at a time. +.Pp +Players over level 10000 are automatically retired. +.Pp +A +.Em blindness +goes away in random time. +.Pp +Players with +.Em crowns +are identified with a '*' before their character type. +.Ss Inter-terminal Battle +When two player's coordinates correspond, they may engage in battle. +In general, the player with the highest +.Em quickness +gets the first hit. +If the two players are severely mismatched, the stronger player +is drastically handicapped for the battle. +In order to protect from being stuck in an infinite loop, +the player waiting for response may time out. +Options for battle are: +.Bl -tag -width "power blast" +.It Ic fight +Inflicts damage upon other person. +.It Ic run away +Escape from battle. +Has a 75% chance of working. +.It Ic power blast +Battle spell. +.It Ic luckout +One-time chance to try to win against the foe. +Has a 10% chance of working. +.El +.Pp +Sometimes waits for the other player may be excessive, because +he/she may be battling a monster. +Upon slaying a player in battle the winner gets the other's +.Em experience +and treasures. +.Em Rings +do not work for inter-terminal battle. +.Sh AUTHORS +.An Edward Estes , +AT\*[Am]T Information Systems, Skokie, IL +.Sh BUGS +All screen formats assume at least 24 lines by at least 80 columns. +No provisions are made for when any of the data items get too big +for the allotted space on the screen. diff --git a/upstream/fedora-40/man6/pig.6 b/upstream/fedora-40/man6/pig.6 new file mode 100644 index 00000000..19693ae9 --- /dev/null +++ b/upstream/fedora-40/man6/pig.6 @@ -0,0 +1,46 @@ +.\" $NetBSD: pig.6,v 1.5 2003/08/07 09:37:31 agc Exp $ +.\" +.\" Copyright (c) 1992 The Regents of the University of California. +.\" All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)pig.6 8.1 (Berkeley) 6/10/93 +.\" +.Dd June 10, 1993 +.Dt PIG 6 +.Os +.Sh NAME +.Nm pig +.Nd eformatray inputway asway Igpay Atinlay +.Sh SYNOPSIS +.Nm +.Sh DESCRIPTION +Ethay +.Nm igpay +utilityway eadsray ethay andardstay inputway andway iteswray itway +outway otay andardstay outputway inway Igpay Atinlay. +.Pp +Usefulway orfay eneratinggay onthlymay eportsray. diff --git a/upstream/fedora-40/man6/pom.6 b/upstream/fedora-40/man6/pom.6 new file mode 100644 index 00000000..0aa449d5 --- /dev/null +++ b/upstream/fedora-40/man6/pom.6 @@ -0,0 +1,71 @@ +.\" $NetBSD: pom.6,v 1.12 2003/08/07 09:37:32 agc Exp $ +.\" +.\" Copyright (c) 1989, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)pom.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd January 9, 1999 +.Dt POM 6 +.Os +.Sh NAME +.Nm pom +.Nd display the phase of the moon +.Sh SYNOPSIS +.Nm +.Op [[[[[cc]yy]mm]dd]HH] +.Sh DESCRIPTION +The +.Nm +utility displays the current phase of the moon. +Useful for selecting software completion target dates and predicting +managerial behavior. +.Pp +.Bl -tag -width [[[[[cc]yy]mm]dd]HH] +.It Ar [[[[[cc]yy]mm]dd]HH] +Display the phase of the moon for a given time. +The format is similar to the canonical representation used by +.Xr date 1 . +.El +.Sh SEE ALSO +.Xr date 1 +.Sh AUTHOR +.Nm +was written by +.An Keith E. Brandt . +.Sh BUGS +Times must be within range of the +.Ux +epoch. +.Pp +This program does not allow for the difference between the TDT and +UTC timescales (about one minute at the time of writing). +.Sh ACKNOWLEDGEMENTS +This program is based on algorithms from +.%B Practical Astronomy with Your Calculator, Third Edition +by Peter Duffett-Smith +.Aq pjds@mrao.cam.ac.uk . diff --git a/upstream/fedora-40/man6/primes.6 b/upstream/fedora-40/man6/primes.6 new file mode 100644 index 00000000..14d51016 --- /dev/null +++ b/upstream/fedora-40/man6/primes.6 @@ -0,0 +1,89 @@ +.\" $NetBSD: primes.6,v 1.2 2004/02/09 23:25:47 wiz Exp $ +.\" +.\" Copyright (c) 1989, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" This code is derived from software contributed to Berkeley by +.\" Landon Curt Noll. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)factor.6 8.1 (Berkeley) 5/31/93 +.\" +.\" +.\" By: Landon Curt Noll chongo@toad.com, ...!{sun,tolsoft}!hoptoad!chongo +.\" +.\" chongo <for a good prime call: 391581 * 2^216193 - 1> /\oo/\ +.\" +.Dd February 8, 2004 +.Dt PRIMES 6 +.Os +.Sh NAME +.Nm primes +.Nd generate primes +.Sh SYNOPSIS +.Nm primes +.Op Ar start Op Ar stop +.Sh DESCRIPTION +The +.Nm +utility prints primes in ascending order, one per line, starting +at or above +.Ar start +and continuing until, but not including +.Ar stop . +The +.Ar start +value must be at least 0 and not greater than +.Ar stop . +The +.Ar stop +value must not be greater than 4294967295. +The default value of +.Ar stop +is 4294967295. +.Pp +When the +.Nm +utility is invoked with no arguments, +.Ar start +is read from standard input. +.Ar stop +is taken to be 4294967295. +The +.Ar start +value may be preceded by a single +.Sq \&+ . +The +.Ar start +value is terminated by a non-digit character (such as a newline). +The input line must not be longer than 255 characters. +.Sh DIAGNOSTICS +Out of range or invalid input results in +an appropriate error message +being written to standard error. +.Sh BUGS +.Nm +won't get you a world record. diff --git a/upstream/fedora-40/man6/quiz.6 b/upstream/fedora-40/man6/quiz.6 new file mode 100644 index 00000000..0a673879 --- /dev/null +++ b/upstream/fedora-40/man6/quiz.6 @@ -0,0 +1,120 @@ +.\" Automatically generated from quiz/quiz.6.in. Do not edit. +.\" $NetBSD: quiz.6,v 1.10 2003/08/07 09:37:34 agc Exp $ +.\" +.\" Copyright (c) 1991, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" This code is derived from software contributed to Berkeley by +.\" Jim R. Oldroyd at The Instruction Set. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)quiz.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd May 31, 1993 +.Dt QUIZ 6 +.Os +.Sh NAME +.Nm quiz +.Nd random knowledge tests +.Sh SYNOPSIS +.Nm +.Op Fl t +.Op Fl i Ar file +.Op Ar question answer +.Sh DESCRIPTION +The +.Nm +utility tests your knowledge of random facts. +It has a database of subjects from which you can choose. +With no arguments, +.Nm +displays the list of available subjects. +.Pp +The options are as follows: +.Bl -tag -width indent +.It Fl t +Use tutorial mode, in which questions are repeated later if you didn't get +them right the first time, and new questions are presented less frequently +to help you learn the older ones. +.It Fl i +Specify an alternative index file. +.El +.Pp +Subjects are divided into categories. +You can pick any two categories from the same subject. +.Nm +will ask questions from the first category and it expects answers from +the second category. +For example, the command +.Dq quiz victim killer +asks questions which are the names of victims, and expects you to answer +with the cause of their untimely demise, whereas the command +.Dq quiz killer victim +works the other way around. +.Pp +If you get the answer wrong, +.Nm +lets you try again. +To see the right answer, enter a blank line. +.Ss Index and Data File Syntax +The index and data files have a similar syntax. +Lines in them consist of several categories separated by colons. +The categories are regular expressions formed using the following +meta-characters: +.sp +.Bl -tag -width "pat|pat" -compact -offset indent +.It pat|pat +alternative patterns +.It {pat} +optional pattern +.It [pat] +delimiters, as in pat[pat|pat]pat +.El +.Pp +In an index file, each line represents a subject. +The first category in each subject is the pathname of the data file for +the subject. +The remaining categories are regular expressions for the titles of each +category in the subject. +.Pp +In data files, each line represents a question/answer set. +Each category is the information for the question/answer for that category. +.Pp +The backslash character (``\e'') is used to quote syntactically significant +characters, or at the end of a line to signify that a continuation line +follows. +.Pp +If either a question or its answer is empty, +.Nm +will refrain from asking it. +.Sh FILES +.Bl -tag -width /usr/share/bsd-games//quiz -compact +.It Pa /usr/share/bsd-games//quiz +The default index and data files. +.El +.Sh BUGS +.Nm +is pretty cynical about certain subjects. diff --git a/upstream/fedora-40/man6/rain.6 b/upstream/fedora-40/man6/rain.6 new file mode 100644 index 00000000..9fb0f0ee --- /dev/null +++ b/upstream/fedora-40/man6/rain.6 @@ -0,0 +1,54 @@ +.\" $NetBSD: rain.6,v 1.11 2003/08/07 09:37:35 agc Exp $ +.\" +.\" Copyright (c) 1989, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)rain.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd May 31, 1993 +.Dt RAIN 6 +.Os +.Sh NAME +.Nm rain +.Nd animated raindrops display +.Sh SYNOPSIS +.Nm +.Op Fl d Ar delay +.Sh DESCRIPTION +The output of +.Nm +is modeled after the +.Tn VAX/VMS +program of the same name. +To obtain the proper effect, either the terminal must be set for 9600 +baud or the +.Fl d +option must be used to specify a delay, in milliseconds, between each +update. +A reasonable delay is 120; the default is 0. +.Sh AUTHOR +.An Eric P. Scott diff --git a/upstream/fedora-40/man6/random.6 b/upstream/fedora-40/man6/random.6 new file mode 100644 index 00000000..2af930b3 --- /dev/null +++ b/upstream/fedora-40/man6/random.6 @@ -0,0 +1,67 @@ +.\" $NetBSD: random.6,v 1.6 2003/08/07 09:37:35 agc Exp $ +.\" +.\" Copyright (c) 1994 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)random.6 8.2 (Berkeley) 3/31/94 +.\" +.Dd March 31, 1994 +.Dt RANDOM 6 +.Os +.Sh NAME +.Nm random +.Nd random lines from a file or random numbers +.Sh SYNOPSIS +.Nm +.Op Fl er +.Op Ar denominator +.Sh DESCRIPTION +.Nm +reads lines from the standard input and copies them to the standard +output with a probability of 1/denominator. +The default value for +.Ar denominator +is 2. +.Pp +The options are as follows: +.Bl -tag -width Ds +.It Fl e +If the +.Fl e +option is specified, +.Nm +does not read or write anything, and simply exits with a random +exit value of 0 to +.Ar denominator Ns -1 , +inclusive. +.It Fl r +The +.Fl r +option guarantees that the output is unbuffered. +.El +.Sh SEE ALSO +.Xr fortune 6 diff --git a/upstream/fedora-40/man6/robots.6 b/upstream/fedora-40/man6/robots.6 new file mode 100644 index 00000000..bf776e8e --- /dev/null +++ b/upstream/fedora-40/man6/robots.6 @@ -0,0 +1,156 @@ +.\" Automatically generated from robots/robots.6.in. Do not edit. +.\" $NetBSD: robots.6,v 1.12 2003/08/07 09:37:37 agc Exp $ +.\" +.\" Copyright (c) 1991, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)robots.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd May 31, 1993 +.Dt ROBOTS 6 +.Os +.Sh NAME +.Nm robots +.Nd fight off villainous robots +.Sh SYNOPSIS +.Nm +.Op Fl Asjtan +.Op Ar scorefile +.Sh DESCRIPTION +.Nm +pits you against evil robots, who are trying to kill you (which is why +they are evil). +Fortunately for you, even though they are evil, they are not very bright +and have a habit of bumping into each other, thus destroying themselves. +In order to survive, you must get them to kill each other off, since you +have no offensive weaponry. +.Pp +Since you are stuck without offensive weaponry, you are endowed with one +piece of defensive weaponry: a teleportation device. +When two robots run into each other or a junk pile, they die. +If a robot runs into you, you die. +When a robot dies, you get 10 points, and when all the robots die, +you start on the next field. +This keeps up until they finally get you. +.Pp +Robots are represented on the screen by a +.Sq \&+ , +the junk heaps from their collisions by a +.Sq \(** , +and you +(the good guy) +by a +.Sq \@ . +.Pp +The commands are: +.Bl -tag -width indent -compact +.It Ic h +move one square left +.It Ic l +move one square right +.It Ic k +move one square up +.It Ic j +move one square down +.It Ic y +move one square up and left +.It Ic u +move one square up and right +.It Ic b +move one square down and left +.It Ic n +move one square down and right +.It Ic \&. +(also space) do nothing for one turn +.It Ic HJKLBNYU +run as far as possible in the given direction +.It Ic \*[Gt] +do nothing for as long as possible +.It Ic t +teleport to a random location +.It Ic w +wait until you die or they all do +.It Ic q +quit +.It Ic ^L +redraw the screen +.El +.Pp +All commands can be preceded by a count. +.Pp +If you use the +.Sq Ic w +command and survive to the next level, you will get a bonus of 10% +for each robot which died after you decided to wait. +If you die, however, you get nothing. +For all other commands, the program will save you from typos +by stopping short of being eaten. +However, with +.Sq Ic w +you take the risk of dying by miscalculation. +.Pp +Only five scores are allowed per user on the score file. +If you make it into the score file, you will be shown the list at the end +of the game. +If an alternative score file is specified, that will be used instead of the +standard file for scores. +.Pp +The options are +.Bl -tag -width indent +.It Fl s +Don't play, just show the score file. +.It Fl j +Jump, +.Em i.e. , +when you run, don't show any intermediate positions; only show things at +the end. +This is useful on slow terminals. +.It Fl t +Teleport automatically when you have no other option. +This is a little disconcerting until you get used to it, and then it is +very nice. +.It Fl a +Advance into the higher levels directly, skipping the lower, easier levels. +.It Fl A +Auto-bot mode. +Lets the game play itself. +.It Fl n +Increase the number of games played by one. +.El +.Sh AUTHOR +Ken Arnold +Christos Zoulas (autobot mode) +.Sh FILES +.Bl -tag -width /var/games//robots_roll -compact +.It Pa /var/games//robots_roll +the score file +.El +.Sh BUGS +Bugs? +You +.Em crazy , +man?!? diff --git a/upstream/fedora-40/man6/sail.6 b/upstream/fedora-40/man6/sail.6 new file mode 100644 index 00000000..b40c022e --- /dev/null +++ b/upstream/fedora-40/man6/sail.6 @@ -0,0 +1,975 @@ +.\" $NetBSD: sail.6,v 1.13 2003/08/07 09:37:44 agc Exp $ +.\" +.\" Copyright (c) 1988, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)sail.6 8.3 (Berkeley) 6/1/94 +.\" +.TH SAIL 6 "June 1, 1994" +.UC 4 +.SH NAME +sail \- multi-user wooden ships and iron men +.SH SYNOPSIS +.B sail +[ +.B \-s +[ +.B \-l +] ] [ +.B \-x +] [ +.B \-b +] [ +.B num +] +.br +.fi +.SH DESCRIPTION +.I Sail +is a computer version of Avalon Hill's game of fighting sail +originally developed by S. Craig Taylor. +.PP +Players of +.I Sail +take command of an old fashioned Man of War and fight other +players or the computer. +They may re-enact one of the many +historical sea battles recorded in the game, or they can choose +a fictional battle. +.PP +As a sea captain in the +.I Sail +Navy, the player has complete control over the workings of his ship. +He must order every maneuver, change the set of his sails, and judge the +right moment to let loose the terrible destruction of his broadsides. +In addition to fighting the enemy, he must harness the powers of the wind +and sea to make them work for him. +The outcome of many battles during the +age of sail was decided by the ability of one captain to hold the `weather +gage.' +.PP +The flags are: +.TP +.B \-s +Print the names and ships of the top ten sailors. +.TP +.B \-l +Show the login name. +Only effective with \fB-s\fP. +.TP +.B \-x +Play the first available ship instead of prompting for a choice. +.TP +.B \-b +No bells. +.SH IMPLEMENTATION +.I Sail +is really two programs in one. +Each player starts up a process which runs his own ship. +In addition, a +.I driver +process is forked (by the first player) to run the computer ships +and take care of global bookkeeping. +.PP +Because the +.I driver +must calculate moves for each ship it controls, the +more ships the computer is playing, the slower the game will appear. +.PP +If a player joins a game in progress, he will synchronize +with the other players (a rather slow process for everyone), and +then he may play along with the rest. +.PP +To implement a multi-user game in Version 7 UNIX, which was the operating +system +.I Sail +was first written under, the communicating processes must use a common +temporary file as a place to read and write messages. +In addition, a locking mechanism must be provided to ensure exclusive +access to the shared file. +For example, +.I Sail +uses a temporary file named /tmp/#sailsink.21 for scenario 21, and +corresponding file names for the other scenarios. +To provide exclusive +access to the temporary file, +.I Sail +uses a technique stolen from an old game called "pubcaves" by Jeff Cohen. +Processes do a busy wait in the loop +.br +.sp +.ce 2 + for (n = 0; link(sync_file, sync_lock) \*[Lt] 0 \*[Am]\*[Am] n \*[Lt] 30; n++) + sleep(2); +.br +.sp +until they are able to create a link to a file named "/tmp/#saillock.??". +The "??" correspond to the scenario number of the game. +Since UNIX +guarantees that a link will point to only one file, the process that succeeds +in linking will have exclusive access to the temporary file. +.PP +Whether or not this really works is open to speculation. +When ucbmiro was rebooted after a crash, the file system check program +found 3 links between the +.I Sail +temporary file and its link file. +.SH CONSEQUENCES OF SEPARATE PLAYER AND DRIVER PROCESSES +When players do something of global interest, such as moving or firing, +the driver must coordinate the action with the other ships in the game. +For example, if a player wants to move in a certain direction, he writes a +message into the temporary file requesting the driver to move his ship. +Each ``turn,'' the driver reads all the messages sent from the players and +decides what happened. +It then writes back into the temporary file new values of variables, etc. +.PP +The most noticeable effect this communication has on the game is the +delay in moving. +Suppose a player types a move for his ship and hits return. +What happens then? +The player process saves up messages to +be written to the temporary file in a buffer. +Every 7 seconds or so, the player process gets exclusive access to +the temporary file and writes out its buffer to the file. +The driver, running asynchronously, must +read in the movement command, process it, and write out the results. +This takes two exclusive accesses to the temporary file. +Finally, when the player process gets around to doing another 7 second +update, the results of the move are displayed on the screen. +Hence, every movement requires four +exclusive accesses to the temporary file (anywhere from 7 to 21 seconds +depending upon asynchrony) before the player sees the results of his moves. +.PP +In practice, the delays are not as annoying as they would appear. +There is room for "pipelining" in the movement. +After the player writes out +a first movement message, a second movement command can then be issued. +The first message will be in the temporary file waiting for the driver, and +the second will be in the file buffer waiting to be written to the file. +Thus, by always typing moves a turn ahead of the time, the player can +sail around quite quickly. +.PP +If the player types several movement commands between two 7 second updates, +only the last movement command typed will be seen by the driver. +Movement commands within the same update "overwrite" each other, in a sense. +.SH THE HISTORY OF SAIL +I wrote the first version of +.I Sail +on a PDP\-11/70 in the fall of 1980. +Needless to say, the code was horrendous, +not portable in any sense of the word, and didn't work. +The program was not +very modular and had fseeks() and fwrites() every few lines. +After a tremendous rewrite from the top down, +I got the first working version up by 1981. +There were several annoying bugs concerning firing broadsides and +finding angles. +.I Sail +uses no floating point, by the way, so the direction routines are rather +tricky. +Ed Wang rewrote my angle() routine in 1981 to be more correct (although +it still doesn't work perfectly), and he added code to let a player select +which ship he wanted at the start of the game (instead of the first one +available). +.PP +Captain Happy (Craig Leres) is responsible for making +.I Sail +portable for the first time. +This was no easy task, by the way. +Constants like 2 and 10 were very frequent in the code. +I also became famous for using "Riggle Memorial Structures" in +.I Sail. +Many of my structure references are so long that they run off the line +printer page. +Here is an example, if you promise not to laugh. +.br +.sp +.ce +specs[scene[flog.fgamenum].ship[flog.fshipnum].shipnum].pts +.br +.sp +.PP +.I Sail +received its fourth and most thorough rewrite in the summer and fall +of 1983. +Ed Wang rewrote and modularized the code (a monumental feat) +almost from scratch. +Although he introduced many new bugs, the final result was very much +cleaner and (?) faster. +He added window movement commands and find ship commands. +.SH HISTORICAL INFO +Old Square Riggers were very maneuverable ships capable of intricate +sailing. +Their only disadvantage was an inability to sail very close to the wind. +The design of a wooden ship allowed only for the +guns to bear to the left and right sides. +A few guns of small +aspect (usually 6 or 9 pounders) could point forward, but their +effect was small compared to a 68 gun broadside of 24 or 32 pounders. +The guns bear approximately like so: +.ne 1i +.nf + + \\ + b---------------- + ---0 + \\ + \\ + \\ up to a range of ten (for round shot) + \\ + \\ + \\ + +.fi +An interesting phenomenon occurred when a broadside was fired +down the length of an enemy ship. +The shot tended to bounce along the deck and did several times more damage. +This phenomenon was called a rake. +Because the bows of a ship are very strong and present a smaller +target than the stern, a stern rake (firing from the stern to the bow) causes +more damage than a bow rake. +.nf + + b + 00 ---- Stern rake! + a + +.fi +Most ships were equipped with carronades, which were very large, close +range cannons. +American ships from the revolution until the War of 1812 +were almost entirely armed with carronades. +.PP +The period of history covered in +.I Sail +is approximately from the 1770's until the end of Napoleonic France in 1815. +There are many excellent books about the age of sail. +My favorite author is Captain Frederick Marryat. +More contemporary authors include C.S. Forester and Alexander Kent. +.PP +Fighting ships came in several sizes classed by armament. +The mainstays of +any fleet were its "Ships of the Line", or "Line of Battle Ships". +They were so named because these ships fought together in great lines. +They were +close enough for mutual support, yet every ship could fire both its broadsides. +We get the modern words "ocean liner," or "liner," and "battleship" from +"ship of the line." +The most common size was the 74 gun two decked ship of the line. +The two gun decks usually mounted 18 and 24 pounder guns. +.PP +The pride of the fleet were the first rates. +These were huge three decked ships of the line mounting 80 to 136 guns. +The guns in the three tiers +were usually 18, 24, and 32 pounders in that order from top to bottom. +.PP +Various other ships came next. +They were almost all "razees," or ships of the line with one deck sawed off. +They mounted 40-64 guns and were +a poor cross between a frigate and a line of battle ship. +They neither had the speed of the former nor the firepower of the latter. +.PP +Next came the "eyes of the fleet." +Frigates came in many sizes mounting anywhere from 32 to 44 guns. +They were very handy vessels. +They could outsail anything bigger and outshoot anything smaller. +Frigates didn't fight in lines of battle as the much bigger 74's did. +Instead, they harassed the enemy's rear or captured crippled ships. +They were much more useful in missions away from the fleet, +such as cutting out expeditions or boat actions. +They could hit hard and get away fast. +.PP +Lastly, there were the corvettes, sloops, and brigs. +These were smaller ships mounting typically fewer than 20 guns. +A corvette was only slightly +smaller than a frigate, so one might have up to 30 guns. +Sloops were used for carrying dispatches or passengers. +Brigs were something you built for land-locked lakes. +.SH SAIL PARTICULARS +Ships in +.I Sail +are represented by two characters. +One character represents the bow of +the ship, and the other represents the stern. +Ships have nationalities and numbers. +The first ship of a nationality is number 0, the second +number 1, etc. +Therefore, the first British ship in a game would be printed as "b0". +The second Brit would be "b1", and the fifth Don would be "s4". +.PP +Ships can set normal sails, called Battle Sails, or bend on extra canvas +called Full Sails. +A ship under full sail is a beautiful sight indeed, +and it can move much faster than a ship under Battle Sails. +The only trouble is, with full sails set, there is so much tension on sail and +rigging that a well aimed round shot can burst a sail into ribbons where +it would only cause a little hole in a loose sail. +For this reason, rigging damage is doubled on a ship with full sails set. +Don't let that discourage you from using full sails. +I like to keep them up right into the heat of battle. +A ship with full sails set has a capital letter for its nationality. +E.g., a Frog, "f0", with full sails set would be printed as "F0". +.PP +When a ship is battered into a listing hulk, the last man aboard "strikes +the colors." +This ceremony is the ship's formal surrender. +The nationality character of a surrendered ship is printed as "!". +E.g., the Frog of our last example would soon be "!0". +.PP +A ship has a random chance of catching fire or sinking when it reaches the +stage of listing hulk. +A sinking ship has a "~" printed for its nationality, +and a ship on fire and about to explode has a "#" printed. +.PP +Captured ships become the nationality of the prize crew. +Therefore, if +an American ship captures a British ship, the British ship will have an +"a" printed for its nationality. +In addition, the ship number is changed +to "\*[Am]","'", "(", ,")", "*", or "+" depending upon the original number, +be it 0,1,2,3,4, or 5. +E.g., the "b0" captured by an American becomes the +"a\*[Am]". +The "s4" captured by a Frog becomes the "f*". +.PP +The ultimate example is, of course, an exploding Brit captured by an +American: "#\*[Am]". +.SH MOVEMENT +Movement is the most confusing part of +.I Sail +to many. +Ships can head in 8 directions: +.nf + + 0 0 0 + b b b0 b b b 0b b + 0 0 0 + +.fi +The stern of a ship moves when it turns. +The bow remains stationary. +Ships can always turn, regardless of the wind (unless they are becalmed). +All ships drift when they lose headway. +If a ship doesn't move forward at all for two turns, it will begin to drift. +If a ship has begun to +drift, then it must move forward before it turns, if it plans to do +more than make a right or left turn, which is always possible. +.PP +Movement commands to +.I Sail +are a string of forward moves and turns. +An example is "l3". +It will turn a ship left and then move it ahead 3 spaces. +In the drawing above, the "b0" made 7 successive left turns. +When +.I Sail +prompts you for a move, it prints three characters of import. +E.g., +.nf + move (7, 4): +.fi +The first number is the maximum number of moves you can make, including turns. +The second number is the maximum number of turns you can make. +Between the numbers is sometimes printed a quote "'". +If the quote is present, it means that your ship has been drifting, and +you must move ahead to regain headway before you turn (see note above). +Some of the possible moves for the example above are as follows: +.nf + + move (7, 4): 7 + move (7, 4): 1 + move (7, 4): d /* drift, or do nothing */ + move (7, 4): 6r + move (7, 4): 5r1 + move (7, 4): 4r1r + move (7, 4): l1r1r2 + move (7, 4): 1r1r1r1 + +.fi +Because square riggers performed so poorly sailing into the wind, if at +any point in a movement command you turn into the wind, the movement stops +there. +E.g., +.ne 1i +.nf + + move (7, 4): l1l4 + Movement Error; + Helm: l1l + +.fi +Moreover, whenever you make a turn, your movement allowance drops to +min(what's left, what you would have at the new attitude). +In short, if you turn closer to the wind, you most likely won't be able +to sail the full allowance printed in the "move" prompt. +.PP +Old sailing captains had to keep an eye constantly on the wind. +Captains in +.I Sail +are no different. +A ship's ability to move depends on its attitude to the wind. +The best angle possible is to have the wind off your quarter, that is, +just off the stern. +The direction rose on the side of the screen gives the +possible movements for your ship at all positions to the wind. +Battle +sail speeds are given first, and full sail speeds are given in parenthesis. +.nf + + 0 1(2) + \\|/ + -^-3(6) + /|\\ + | 4(7) + 3(6) + +.fi +Pretend the bow of your ship (the "^") is pointing upward and the wind is +blowing from the bottom to the top of the page. +The numbers at the bottom "3(6)" will be your speed under battle or full +sails in such a situation. +If the wind is off your quarter, then you can move "4(7)". +If the wind is off your beam, "3(6)". +If the wind is off your bow, then you can only move "1(2)". +Facing into the wind, you can't move at all. +Ships facing into the wind were said to be "in irons". +.SH WINDSPEED AND DIRECTION +The windspeed and direction is displayed as a little weather vane on the +side of the screen. +The number in the middle of the vane indicates the wind +speed, and the + to - indicates the wind direction. +The wind blows from the + sign (high pressure) to the - sign (low pressure). +E.g., +.nf + + | + 3 + + +.fi +.PP +The wind speeds are 0 = becalmed, 1 = light breeze, 2 = moderate breeze, +3 = fresh breeze, 4 = strong breeze, 5 = gale, 6 = full gale, 7 = hurricane. +If a hurricane shows up, all ships are destroyed. +.SH GRAPPLING AND FOULING +If two ships collide, they run the risk of becoming tangled together. +This is called "fouling." +Fouled ships are stuck together, and neither can move. +They can unfoul each other if they want to. +Boarding parties can only be +sent across to ships when the antagonists are either fouled or grappled. +.PP +Ships can grapple each other by throwing grapnels into the rigging of +the other. +.PP +The number of fouls and grapples you have are displayed on the upper +right of the screen. +.SH BOARDING +Boarding was a very costly venture in terms of human life. +Boarding parties may be formed in +.I Sail +to either board an enemy ship or to defend your own ship against attack. +Men organized as Defensive Boarding Parties fight twice as hard to save +their ship as men left unorganized. +.PP +The boarding strength of a crew depends upon its quality and upon the +number of men sent. +.SH CREW QUALITY +The British seaman was world renowned for his sailing abilities. +American sailors, however, were actually the best seamen in the world. +Because the +American Navy offered twice the wages of the Royal Navy, British seamen +who liked the sea defected to America by the thousands. +.PP +In +.I Sail, +crew quality is quantized into 5 energy levels. +"Elite" crews can outshoot and outfight all other sailors. +"Crack" crews are next. +"Mundane" crews +are average, and "Green" and "Mutinous" crews are below average. +A good rule of thumb is that "Crack" or "Elite" crews get one extra hit +per broadside compared to "Mundane" crews. +Don't expect too much from +"Green" crews. +.pl -1 +.SH BROADSIDES +Your two broadsides may be loaded with four kinds of shot: grape, chain, +round, and double. +You have guns and carronades in both the port and starboard batteries. +Carronades only have a range of two, so you have to get in +close to be able to fire them. +You have the choice of firing at the hull or rigging of another ship. +If the range of the ship is greater than 6, +then you may only shoot at the rigging. +.PP +The types of shot and their advantages are: +.SH ROUND +Range of 10. +Good for hull or rigging hits. +.SH DOUBLE +Range of 1. +Extra good for hull or rigging hits. +Double takes two turns to load. +.SH CHAIN +Range of 3. +Excellent for tearing down rigging. +Cannot damage hull or guns, though. +.SH GRAPE +Range of 1. +Sometimes devastating against enemy crews. +.PP +On the side of the screen is displayed some vital information about your +ship: +.nf + + Load D! R! + Hull 9 + Crew 4 4 2 + Guns 4 4 + Carr 2 2 + Rigg 5 5 5 5 + +.fi +"Load" shows what your port (left) and starboard (right) broadsides are +loaded with. +A "!" after the type of shot indicates that it is an initial broadside. +Initial broadside were loaded with care before battle and before +the decks ran red with blood. +As a consequence, initial broadsides are a +little more effective than broadsides loaded later. +A "*" after the type of shot indicates that the gun +crews are still loading it, and you cannot fire yet. +"Hull" shows how much hull you have left. +"Crew" shows your three sections of crew. +As your crew dies off, your ability to fire decreases. +"Guns" and "Carr" show your port and starboard guns. +As you lose guns, your ability to fire decreases. +"Rigg" shows how much rigging you have on your 3 or 4 masts. +As rigging is shot away, you lose mobility. +.SH EFFECTIVENESS OF FIRE +It is very dramatic when a ship fires its thunderous broadsides, but the +mere opportunity to fire them does not guarantee any hits. +Many factors influence the destructive force of a broadside. +First of all, and the chief factor, is distance. +It is harder to hit a ship at range ten than it is +to hit one sloshing alongside. +Next is raking. +Raking fire, as mentioned before, can sometimes dismast a ship at range ten. +Next, crew size and quality affects the damage done by a broadside. +The number of guns firing also bears on the point, so to speak. +Lastly, weather affects the accuracy of a broadside. +If the seas are high (5 or 6), then the lower gunports +of ships of the line can't even be opened to run out the guns. +This gives frigates and other flush decked vessels an advantage in a storm. +The scenario +.I Pellew vs. The Droits de L'Homme +takes advantage of this peculiar circumstance. +.SH REPAIRS +Repairs may be made to your Hull, Guns, and Rigging at the slow rate of +two points per three turns. +The message "Repairs Completed" will be printed if no more repairs can be made. +.SH PECULIARITIES OF COMPUTER SHIPS +Computer ships in +.I Sail +follow all the rules above with a few exceptions. +Computer ships never repair damage. +If they did, the players could never beat them. +They play well enough as it is. +As a consolation, the computer ships can fire double shot every turn. +That fluke is a good reason to keep your distance. +The +.I Driver +figures out the moves of the computer ships. +It computes them with a typical A.I. distance +function and a depth first search to find the maximum "score." +It seems to work fairly well, although I'll be the first to admit it isn't +perfect. +.SH HOW TO PLAY +Commands are given to +.I Sail +by typing a single character. +You will then be prompted for further input. +A brief summary of the commands follows. +.br +.SH COMMAND SUMMARY +.nf + + 'f' Fire broadsides if they bear + 'l' Reload + 'L' Unload broadsides (to change ammo) + 'm' Move + 'i' Print the closest ship + 'I' Print all ships + 'F' Find a particular ship or ships (e.g. "a?" for all Americans) + 's' Send a message around the fleet + 'b' Attempt to board an enemy ship + 'B' Recall boarding parties + 'c' Change set of sail + 'r' Repair + 'u' Attempt to unfoul + 'g' Grapple/ungrapple + 'v' Print version number of game + '^L' Redraw screen + 'Q' Quit + + 'C' Center your ship in the window + 'U' Move window up + 'D','N' Move window down + 'H' Move window left + 'J' Move window right + 'S' Toggle window to follow your ship or stay where it is + +.fi +.bg +.SH SCENARIOS +Here is a summary of the scenarios in +.I Sail: + +.br +.SH Ranger vs. Drake: +.nf +Wind from the N, blowing a fresh breeze. + +(a) Ranger 19 gun Sloop (crack crew) (7 pts) +(b) Drake 17 gun Sloop (crack crew) (6 pts) +.SH The Battle of Flamborough Head: +.nf +Wind from the S, blowing a fresh breeze. + +.fi +This is John Paul Jones' first famous battle. +Aboard the Bonhomme +Richard, he was able to overcome the Serapis's greater firepower +by quickly boarding her. +.nf + +(a) Bonhomme Rich 42 gun Corvette (crack crew) (11 pts) +(b) Serapis 44 gun Frigate (crack crew) (12 pts) +.SH Arbuthnot and Des Touches: +.nf +Wind from the N, blowing a gale. + +(b) America 64 gun Ship of the Line (crack crew) (20 pts) +(b) Befford 74 gun Ship of the Line (crack crew) (26 pts) +(b) Adamant 50 gun Ship of the Line (crack crew) (17 pts) +(b) London 98 gun 3 Decker SOL (crack crew) (28 pts) +(b) Royal Oak 74 gun Ship of the Line (crack crew) (26 pts) +(f) Neptune 74 gun Ship of the Line (average crew) (24 pts) +(f) Duc de Bourgogne 80 gun 3 Decker SOL (average crew) (27 pts) +(f) Conquerant 74 gun Ship of the Line (average crew) (24 pts) +(f) Provence 64 gun Ship of the Line (average crew) (18 pts) +(f) Romulus 44 gun Ship of the Line (average crew) (10 pts) +.SH Suffren and Hughes: +.nf + +Wind from the S, blowing a fresh breeze. + +(b) Monmouth 74 gun Ship of the Line (average crew) (24 pts) +(b) Hero 74 gun Ship of the Line (crack crew) (26 pts) +(b) Isis 50 gun Ship of the Line (crack crew) (17 pts) +(b) Superb 74 gun Ship of the Line (crack crew) (27 pts) +(b) Burford 74 gun Ship of the Line (average crew) (24 pts) +(f) Flamband 50 gun Ship of the Line (average crew) (14 pts) +(f) Annibal 74 gun Ship of the Line (average crew) (24 pts) +(f) Severe 64 gun Ship of the Line (average crew) (18 pts) +(f) Brilliant 80 gun Ship of the Line (crack crew) (31 pts) +(f) Sphinx 80 gun Ship of the Line (average crew) (27 pts) +.SH Nymphe vs. Cleopatre: +.nf +Wind from the S, blowing a fresh breeze. + +(b) Nymphe 36 gun Frigate (crack crew) (11 pts) +(f) Cleopatre 36 gun Frigate (average crew) (10 pts) +.SH Mars vs. Hercule: +Wind from the S, blowing a fresh breeze. +.nf +(b) Mars 74 gun Ship of the Line (crack crew) (26 pts) +(f) Hercule 74 gun Ship of the Line (average crew) (23 pts) +.SH Ambuscade vs. Baionnaise: +.nf +Wind from the N, blowing a fresh breeze. + +(b) Ambuscade 32 gun Frigate (average crew) (9 pts) +(f) Baionnaise 24 gun Corvette (average crew) (9 pts) +.SH Constellation vs. Insurgent: +.nf +Wind from the S, blowing a gale. + +(a) Constellation 38 gun Corvette (elite crew) (17 pts) +(f) Insurgent 36 gun Corvette (average crew) (11 pts) +.SH Constellation vs. Vengeance: +.nf +Wind from the S, blowing a fresh breeze. + +(a) Constellation 38 gun Corvette (elite crew) (17 pts) +(f) Vengeance 40 gun Frigate (average crew) (15 pts) +.SH The Battle of Lissa: +.nf +Wind from the S, blowing a fresh breeze. + +(b) Amphion 32 gun Frigate (elite crew) (13 pts) +(b) Active 38 gun Frigate (elite crew) (18 pts) +(b) Volage 22 gun Frigate (elite crew) (11 pts) +(b) Cerberus 32 gun Frigate (elite crew) (13 pts) +(f) Favorite 40 gun Frigate (average crew) (15 pts) +(f) Flore 40 gun Frigate (average crew) (15 pts) +(f) Danae 40 gun Frigate (crack crew) (17 pts) +(f) Bellona 32 gun Frigate (green crew) (9 pts) +(f) Corona 40 gun Frigate (green crew) (12 pts) +(f) Carolina 32 gun Frigate (green crew) (7 pts) +.SH Constitution vs. Guerriere: +.nf +Wind from the SW, blowing a gale. + +(a) Constitution 44 gun Corvette (elite crew) (24 pts) +(b) Guerriere 38 gun Frigate (crack crew) (15 pts) +.SH United States vs. Macedonian: +.nf +Wind from the S, blowing a fresh breeze. + +(a) United States 44 gun Frigate (elite crew) (24 pts) +(b) Macedonian 38 gun Frigate (crack crew) (16 pts) +.SH Constitution vs. Java: +.nf +Wind from the S, blowing a fresh breeze. + +(a) Constitution 44 gun Corvette (elite crew) (24 pts) +(b) Java 38 gun Corvette (crack crew) (19 pts) +.SH Chesapeake vs. Shannon: +.nf +Wind from the S, blowing a fresh breeze. + +(a) Chesapeake 38 gun Frigate (average crew) (14 pts) +(b) Shannon 38 gun Frigate (elite crew) (17 pts) +.SH The Battle of Lake Erie: +.nf +Wind from the S, blowing a light breeze. + +(a) Lawrence 20 gun Sloop (crack crew) (9 pts) +(a) Niagara 20 gun Sloop (elite crew) (12 pts) +(b) Lady Prevost 13 gun Brig (crack crew) (5 pts) +(b) Detroit 19 gun Sloop (crack crew) (7 pts) +(b) Q. Charlotte 17 gun Sloop (crack crew) (6 pts) +.SH Wasp vs. Reindeer: +.nf +Wind from the S, blowing a light breeze. + +(a) Wasp 20 gun Sloop (elite crew) (12 pts) +(b) Reindeer 18 gun Sloop (elite crew) (9 pts) +.SH Constitution vs. Cyane and Levant: +.br +Wind from the S, blowing a moderate breeze. + +(a) Constitution 44 gun Corvette (elite crew) (24 pts) +(b) Cyane 24 gun Sloop (crack crew) (11 pts) +(b) Levant 20 gun Sloop (crack crew) (10 pts) +.br +.SH Pellew vs. Droits de L'Homme: +.nf +Wind from the N, blowing a gale. + +(b) Indefatigable 44 gun Frigate (elite crew) (14 pts) +(b) Amazon 36 gun Frigate (crack crew) (14 pts) +(f) Droits L'Hom 74 gun Ship of the Line (average crew) (24 pts) +.SH Algeciras: +.nf +Wind from the SW, blowing a moderate breeze. + +(b) Caesar 80 gun Ship of the Line (crack crew) (31 pts) +(b) Pompee 74 gun Ship of the Line (crack crew) (27 pts) +(b) Spencer 74 gun Ship of the Line (crack crew) (26 pts) +(b) Hannibal 98 gun 3 Decker SOL (crack crew) (28 pts) +(s) Real-Carlos 112 gun 3 Decker SOL (green crew) (27 pts) +(s) San Fernando 96 gun 3 Decker SOL (green crew) (24 pts) +(s) Argonauta 80 gun Ship of the Line (green crew) (23 pts) +(s) San Augustine 74 gun Ship of the Line (green crew) (20 pts) +(f) Indomptable 80 gun Ship of the Line (average crew) (27 pts) +(f) Desaix 74 gun Ship of the Line (average crew) (24 pts) +.SH Lake Champlain: +.nf +Wind from the N, blowing a fresh breeze. + +(a) Saratoga 26 gun Sloop (crack crew) (12 pts) +(a) Eagle 20 gun Sloop (crack crew) (11 pts) +(a) Ticonderoga 17 gun Sloop (crack crew) (9 pts) +(a) Preble 7 gun Brig (crack crew) (4 pts) +(b) Confiance 37 gun Frigate (crack crew) (14 pts) +(b) Linnet 16 gun Sloop (elite crew) (10 pts) +(b) Chubb 11 gun Brig (crack crew) (5 pts) +.SH Last Voyage of the USS President: +.nf +Wind from the N, blowing a fresh breeze. + +(a) President 44 gun Frigate (elite crew) (24 pts) +(b) Endymion 40 gun Frigate (crack crew) (17 pts) +(b) Pomone 44 gun Frigate (crack crew) (20 pts) +(b) Tenedos 38 gun Frigate (crack crew) (15 pts) +.SH Hornblower and the Natividad: +.nf +Wind from the E, blowing a gale. + +.fi +A scenario for you Horny fans. +Remember, he sank the Natividad against heavy odds and winds. +Hint: don't try to board the Natividad, +her crew is much bigger, albeit green. +.nf + +(b) Lydia 36 gun Frigate (elite crew) (13 pts) +(s) Natividad 50 gun Ship of the Line (green crew) (14 pts) +.SH Curse of the Flying Dutchman: +.nf +Wind from the S, blowing a fresh breeze. + +Just for fun, take the Piece of cake. + +(s) Piece of Cake 24 gun Corvette (average crew) (9 pts) +(f) Flying Dutchy 120 gun 3 Decker SOL (elite crew) (43 pts) +.SH The South Pacific: +.nf +Wind from the S, blowing a strong breeze. + +(a) USS Scurvy 136 gun 3 Decker SOL (mutinous crew) (27 pts) +(b) HMS Tahiti 120 gun 3 Decker SOL (elite crew) (43 pts) +(s) Australian 32 gun Frigate (average crew) (9 pts) +(f) Bikini Atoll 7 gun Brig (crack crew) (4 pts) +.SH Hornblower and the battle of Rosas bay: +.nf +Wind from the E, blowing a fresh breeze. + +.fi +The only battle Hornblower ever lost. +He was able to dismast one ship and stern rake the others though. +See if you can do as well. +.nf + +(b) Sutherland 74 gun Ship of the Line (crack crew) (26 pts) +(f) Turenne 80 gun 3 Decker SOL (average crew) (27 pts) +(f) Nightmare 74 gun Ship of the Line (average crew) (24 pts) +(f) Paris 112 gun 3 Decker SOL (green crew) (27 pts) +(f) Napoleon 74 gun Ship of the Line (green crew) (20 pts) +.SH Cape Horn: +.nf +Wind from the NE, blowing a strong breeze. + +(a) Concord 80 gun Ship of the Line (average crew) (27 pts) +(a) Berkeley 98 gun 3 Decker SOL (crack crew) (28 pts) +(b) Thames 120 gun 3 Decker SOL (elite crew) (43 pts) +(s) Madrid 112 gun 3 Decker SOL (green crew) (27 pts) +(f) Musket 80 gun 3 Decker SOL (average crew) (27 pts) +.SH New Orleans: +.nf +Wind from the SE, blowing a fresh breeze. + +Watch that little Cypress go! + +(a) Alligator 120 gun 3 Decker SOL (elite crew) (43 pts) +(b) Firefly 74 gun Ship of the Line (crack crew) (27 pts) +(b) Cypress 44 gun Frigate (elite crew) (14 pts) +.SH Botany Bay: +.nf +Wind from the N, blowing a fresh breeze. + +(b) Shark 64 gun Ship of the Line (average crew) (18 pts) +(f) Coral Snake 44 gun Corvette (elite crew) (24 pts) +(f) Sea Lion 44 gun Frigate (elite crew) (24 pts) +.SH Voyage to the Bottom of the Sea: +.nf +Wind from the NW, blowing a fresh breeze. + +This one is dedicated to Richard Basehart and David Hedison. + +(a) Seaview 120 gun 3 Decker SOL (elite crew) (43 pts) +(a) Flying Sub 40 gun Frigate (crack crew) (17 pts) +(b) Mermaid 136 gun 3 Decker SOL (mutinous crew) (27 pts) +(s) Giant Squid 112 gun 3 Decker SOL (green crew) (27 pts) +.SH Frigate Action: +.nf +Wind from the E, blowing a fresh breeze. + +(a) Killdeer 40 gun Frigate (average crew) (15 pts) +(b) Sandpiper 40 gun Frigate (average crew) (15 pts) +(s) Curlew 38 gun Frigate (crack crew) (16 pts) +.SH The Battle of Midway: +.nf +Wind from the E, blowing a moderate breeze. + +(a) Enterprise 80 gun Ship of the Line (crack crew) (31 pts) +(a) Yorktown 80 gun Ship of the Line (average crew) (27 pts) +(a) Hornet 74 gun Ship of the Line (average crew) (24 pts) +(j) Akagi 112 gun 3 Decker SOL (green crew) (27 pts) +(j) Kaga 96 gun 3 Decker SOL (green crew) (24 pts) +(j) Soryu 80 gun Ship of the Line (green crew) (23 pts) + +.SH Star Trek: +.nf +Wind from the S, blowing a fresh breeze. + +(a) Enterprise 450 gun Ship of the Line (elite crew) (75 pts) +(a) Yorktown 450 gun Ship of the Line (elite crew) (75 pts) +(a) Reliant 450 gun Ship of the Line (elite crew) (75 pts) +(a) Galileo 450 gun Ship of the Line (elite crew) (75 pts) +(k) Kobayashi Maru 450 gun Ship of the Line (elite crew) (75 pts) +(k) Klingon II 450 gun Ship of the Line (elite crew) (75 pts) +(o) Red Orion 450 gun Ship of the Line (elite crew) (75 pts) +(o) Blue Orion 450 gun Ship of the Line (elite crew) (75 pts) + +.SH CONCLUSION + +.I Sail +has been a group effort. + +.SH AUTHOR +Dave Riggle +.SH CO-AUTHOR +Ed Wang +.SH REFITTING +Craig Leres +.SH CONSULTANTS +.nf +Chris Guthrie +Captain Happy +Horatio Nelson + and many valiant others... +.fi +.SH REFERENCES +.nf +Wooden Ships \*[Am] Iron Men, by Avalon Hill +Captain Horatio Hornblower Novels, (13 of them) by C.S. Forester +Captain Richard Bolitho Novels, (12 of them) by Alexander Kent +The Complete Works of Captain Frederick Marryat, (about 20) especially +.in +6n +Mr. Midshipman Easy +Peter Simple +Jacob Faithful +Japhet in Search of a Father +Snarleyyow, or The Dog Fiend +Frank Mildmay, or The Naval Officer +.in -6n +.SH BUGS +Probably a few, and please report them to "riggle@ernie.berkeley.edu" and +"edward@ucbarpa.berkeley.edu" diff --git a/upstream/fedora-40/man6/snake.6 b/upstream/fedora-40/man6/snake.6 new file mode 100644 index 00000000..a85e1995 --- /dev/null +++ b/upstream/fedora-40/man6/snake.6 @@ -0,0 +1,128 @@ +.\" Automatically generated from snake/snake/snake.6.in. Do not edit. +.\" $NetBSD: snake.6,v 1.11 2003/08/07 09:37:45 agc Exp $ +.\" +.\" Copyright (c) 1980, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)snake.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd May 31, 1993 +.Dt SNAKE 6 +.Os +.Sh NAME +.Nm snake , +.Nm snscore +.Nd display chase game +.Sh SYNOPSIS +.Nm +.Op Fl w Ar width +.Op Fl l Ar length +.Op Fl t +.br +.Nm snscore +.Sh DESCRIPTION +.Nm +is a display-based game which must be played on a CRT terminal. +The object of the game is to make as much money as possible without +getting eaten by the snake. +The +.Fl l +and +.Fl w +options allow you to specify the length and width of the field. +By default the entire screen is used. +The +.Fl t +option makes the game assume you are on a slow terminal. +.Pp +You are represented on the screen by an I. +The snake is 6 squares long and is represented by s's with an S at its head. +The money is $, and an exit is #. +Your score is posted in the upper left hand corner. +.Pp +You can move around using the same conventions as +.Xr vi 1 , +the +.Ic h , +.Ic j , +.Ic k , +and +.Ic l +keys work, as do the arrow keys. +Other possibilities include: +.Bl -tag -width indent +.It Ic sefc +These keys are like hjkl but form a directed pad around the d key. +.It Ic HJKL +These keys move you all the way in the indicated direction to the +same row or column as the money. +This does +.Em not +let you jump away from the snake, but rather saves you from having +to type a key repeatedly. +The snake still gets all his turns. +.It Ic SEFC +Likewise for the upper case versions on the left. +.It Ic ATPB +These keys move you to the four edges of the screen. +Their position on the keyboard is the mnemonic, e.g. +P is at the far right of the keyboard. +.It Ic x +This lets you quit the game at any time. +.It Ic p +Points in a direction you might want to go. +.It Ic w +Space warp to get out of tight squeezes, at a price. +.El +.Pp +To earn money, move to the same square the money is on. +A new $ will appear when you earn the current one. +As you get richer, the snake gets hungrier. +To leave the game, move to the exit (#). +.Pp +A record is kept of the personal best score of each player. +Scores are only counted if you leave at the exit, +getting eaten by the snake is worth nothing. +.Pp +As in pinball, matching the last digit of your score to the number +which appears after the game is worth a bonus. +.Pp +To see who wastes time playing snake, run +.Nm snscore . +.Sh FILES +.Bl -tag -width /var/games//snakerawscores -compact +.It Pa /var/games//snakerawscores +database of personal bests +.It Pa /var/games//snake.log +log of games played +.El +.Sh BUGS +When playing on a small screen, +it's hard to tell when you hit the edge of the screen. +.Pp +The scoring function takes into account the size of the screen. +A perfect function to do this equitably has not been devised. diff --git a/upstream/fedora-40/man6/trek.6 b/upstream/fedora-40/man6/trek.6 new file mode 100644 index 00000000..fc78ffff --- /dev/null +++ b/upstream/fedora-40/man6/trek.6 @@ -0,0 +1,140 @@ +.\" Automatically generated from trek/trek.6.in. Do not edit. +.\" $NetBSD: trek.6,v 1.11 2003/08/07 09:37:55 agc Exp $ +.\" +.\" Copyright (c) 1980, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)trek.6 8.2 (Berkeley) 12/30/93 +.\" +.Dd December 30, 1993 +.Dt TREK 6 +.Os +.Sh NAME +.Nm trek +.Nd trekkie game +.Sh SYNOPSIS +.Nm +.Oo +.Op Fl a +.Ar file +.Oc +.Sh DESCRIPTION +.Nm +is a game of space glory and war. +Below is a summary of commands. +For complete documentation, see +.Em Trek +by Eric Allman. +.Pp +If a filename is given, a log of the game is written onto that file. +If the +.Fl a +flag is given before the filename, that file is appended to, not truncated. +.Pp +The game will ask you what length game you would like. +Valid responses are +.Dq short , +.Dq medium , +and +.Dq long . +You may also type +.Dq restart , +which restarts a previously saved game. +You will then be prompted for the skill, to which you must respond +.Dq novice , +.Dq fair , +.Dq good , +.Dq expert , +.Dq commodore , +or +.Dq impossible . +You should normally start out with a novice and work up. +.Pp +In general, throughout the game, if you forget what is appropriate +the game will tell you what it expects if you just type in a question mark. +.Sh AUTHOR +.An Eric Allman +.Sh SEE ALSO +.Pa /usr/share/doc/trek.me +.Sh COMMAND SUMMARY +.Bl -item -compact +.It +.Ic abandon +.It +.Ic ca Ns pture +.It +.Ic cl Ns oak +.Ic u Ns p/ Ns Ic d Ns own +.It +.Ic c Ns omputer request; ... +.It +.Ic da Ns mages +.It +.Ic destruct +.It +.Ic do Ns ck +.It +.Ic help +.It +.Ic i Ns mpulse course distance +.It +.Ic l Ns rscan +.It +.Ic m Ns ove course distance +.It +.Ic p Ns hasers Ic a Ns utomatic +amount +.It +.Ic p Ns hasers Ic m Ns anual +amt1 course1 spread1 ... +.It +.Ic t Ns orpedo course +.Op Ic y Ns es +.No angle/ Ns Ic n Ns o +.It +.Ic ram No course distance +.It +.Ic r Ns est time +.It +.Ic shell +.It +.Ic sh Ns ields +.Ic u Ns p/ Ns Ic d Ns own +.It +.Ic s Ns rscan +.Op Ic y Ns es/ Ic n Ns o +.It +.Ic st Ns atus +.It +.Ic terminate y Ns es/ Ns Ic n Ns o +.It +.Ic u Ns ndock +.It +.Ic v Ns isual course +.It +.Ic w Ns arp warp_factor +.El diff --git a/upstream/fedora-40/man6/vert-banner.6 b/upstream/fedora-40/man6/vert-banner.6 new file mode 100644 index 00000000..4a943de3 --- /dev/null +++ b/upstream/fedora-40/man6/vert-banner.6 @@ -0,0 +1,66 @@ +.\" $NetBSD: banner.6,v 1.13 2003/08/07 09:36:59 agc Exp $ +.\" +.\" Copyright (c) 1980, 1993, 1995 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)banner.6 8.2 (Berkeley) 4/29/95 +.\" +.Dd April 29, 1995 +.Dt VERT-BANNER 6 +.Os +.Sh NAME +.Nm vert-banner +.Nd print large banner on printer +.Sh SYNOPSIS +.Nm +.Op Fl w Ar width +.Ar message ... +.Sh DESCRIPTION +.Nm +prints a large, high quality banner on the standard output. +If the message is omitted, it prompts for and +reads one line of its standard input. +If +.Fl w +is given, the output is scrunched down from a width of 132 to +.Ar width , +suitable for a narrow terminal. +.Pp +The output should be printed on paper of the appropriate width, +with no breaks between the pages. +.Sh BUGS +Several ASCII characters are not defined, notably \*[Lt], \*[Gt], [, ], \\, +^, _, {, }, |, and ~. Also, the characters ", ', and \*[Am] are funny +looking (but in a useful way.) +.Pp +The +.Fl w +option is implemented by skipping some rows and columns. +The smaller it gets, the grainier the output. +Sometimes it runs letters together. +.Sh AUTHOR +.An Mark Horton diff --git a/upstream/fedora-40/man6/worm.6 b/upstream/fedora-40/man6/worm.6 new file mode 100644 index 00000000..5bd501c9 --- /dev/null +++ b/upstream/fedora-40/man6/worm.6 @@ -0,0 +1,62 @@ +.\" $NetBSD: worm.6,v 1.11 2004/01/01 16:06:57 jsm Exp $ +.\" +.\" Copyright (c) 1989, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)worm.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd May 31, 1993 +.Dt WORM 6 +.Os +.Sh NAME +.Nm worm +.Nd Play the growing worm game +.Sh SYNOPSIS +.Nm +.Op Ar size +.Sh DESCRIPTION +In +.Nm , +you are a little worm, your body is the "o"'s on the screen +and your head is the "@". +You move with the hjkl keys and the arrow keys (as in the game snake). +If you don't press any keys, you continue in the direction you last moved. +The upper case HJKL keys move you as if you had pressed +several (9 for HL and 5 for JK) of the corresponding lower case key +(unless you run into a digit, then it stops). +.Pp +On the screen you will see a digit, if your worm eats the digit is will +grow longer, the actual amount longer depends on which digit it was +that you ate. +The object of the game is to see how long you can make the worm grow. +.Pp +The game ends when the worm runs into either the sides of the screen, +or itself. +The current score (how much the worm has grown) is kept in +the upper right corner of the screen. +.Pp +The optional argument, if present, is the initial length of the worm. diff --git a/upstream/fedora-40/man6/worms.6 b/upstream/fedora-40/man6/worms.6 new file mode 100644 index 00000000..f4cc8197 --- /dev/null +++ b/upstream/fedora-40/man6/worms.6 @@ -0,0 +1,66 @@ +.\" $NetBSD: worms.6,v 1.13 2003/08/07 09:37:57 agc Exp $ +.\" +.\" Copyright (c) 1989, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)worms.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd May 31, 1993 +.Dt WORMS 6 +.Sh NAME +.Nm worms +.Nd animate worms on a display terminal +.Sh SYNOPSIS +.Nm +.Op Fl ft +.Op Fl d Ar delay +.Op Fl l Ar length +.Op Fl n Ar number +.Sh DESCRIPTION +A +.Ux +version of the DEC-2136 program +.Dq worms . +.Pp +The options are as follows: +.Bl -tag -width indent +.It Fl f +Makes a +.Dq field +for the worm(s) to eat. +.It Fl t +Makes each worm leave a trail behind it. +.It Fl d +Specifies a delay, in milliseconds, between each update. +This is useful for fast terminals. +Reasonable values are around 20-200. +The default is 0. +.It Fl l +Specifies a length for each worm; the default is 16. +.It Fl n +Specifies the number of worms; the default is 3. +.El diff --git a/upstream/fedora-40/man6/wtf.6 b/upstream/fedora-40/man6/wtf.6 new file mode 100644 index 00000000..c2764e7f --- /dev/null +++ b/upstream/fedora-40/man6/wtf.6 @@ -0,0 +1,90 @@ +.\" $NetBSD: wtf.6,v 1.19 2015/04/22 15:04:57 christos Exp $ +.\" +.\" Public Domain +.\" +.Dd April 22, 2015 +.Dt WTF 6 +.Os +.Sh NAME +.Nm wtf +.Nd look up terms +.Sh SYNOPSIS +.Nm +.Op Fl f Ar dbfile +.Op Fl o +.Op Ar is +.Ar term ... +.Sh DESCRIPTION +The +.Nm +utility looks up the meaning of one or more +.Ar term +operands specified on the command line. +.Pp +.Ar term +will first be searched for as an acronym in the acronym databases, +which are expected to be in the format +.Dq acronym[tab]meaning . +If no match has been found, +.Nm +will check to see if the term is known by +.Xr whatis 1 , +.Xr pkg_info 1 , +or, when called from within a pkgsrc package directory, +pkgsrc's internal help facility, +.Dq make help topic=XXX . +.Pp +The optional +.Ar is +operand will be ignored, allowing the +fairly natural +.Dq wtf is WTF +usage. +.Pp +The following option is available: +.Bl -tag -width flag +.It Fl f Ar dbfile +Overrides the default list of acronym databases, bypassing the value of the +.Ev ACRONYMDB +variable. +Unlike this variable the +.Fl f +option only accepts one file name as an argument, +but it may be given multiple times to specify more than one file to use. +.It Fl o +Include acronyms that could be considered offensive to some. +Please consult +.Xr fortune 6 +for more information about the +.Fl o +flag. +.El +.Sh ENVIRONMENT +.Bl -tag -width ACRONYMDB +.It Ev ACRONYMDB +The default list of acronym databases may be overridden by setting the +environment variable +.Ev ACRONYMDB +to the name of one or more space-separated file names of +acronym databases. +.El +.Sh FILES +.Bl -tag -width /usr/share/misc/acronyms.XXXX -compact +.It Pa /usr/share/misc/acronyms +default acronym database. +.It Pa /usr/share/misc/acronyms-o +default offensive acronym database. +.It Pa /usr/share/misc/acronyms.comp +default computer-related acronym database. +.El +.Sh SEE ALSO +.Xr make 1 , +.Xr pkg_info 1 , +.Xr whatis 1 , +.Xr fortune 6 +.Sh HISTORY +.Nm +first appeared in +.Nx 1.5 . +Initially it only translated acronyms; +functionality to look up the meaning of terms in other sources was added later. diff --git a/upstream/fedora-40/man6/wump.6 b/upstream/fedora-40/man6/wump.6 new file mode 100644 index 00000000..67ae2c30 --- /dev/null +++ b/upstream/fedora-40/man6/wump.6 @@ -0,0 +1,110 @@ +.\" $NetBSD: wump.6,v 1.6 2003/08/07 09:37:57 agc Exp $ +.\" +.\" Copyright (c) 1989, 1993 +.\" The Regents of the University of California. All rights reserved. +.\" +.\" This code is derived from software contributed to Berkeley by +.\" Dave Taylor, of Intuitive Systems. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. Neither the name of the University nor the names of its contributors +.\" may be used to endorse or promote products derived from this software +.\" without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND +.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE +.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +.\" SUCH DAMAGE. +.\" +.\" @(#)wump.6 8.1 (Berkeley) 5/31/93 +.\" +.Dd May 31, 1993 +.Dt WUMP 6 +.Os +.Sh NAME +.Nm wump +.Nd hunt the wumpus in an underground cave +.Sh SYNOPSIS +.Nm +.Op Fl h +.Op Fl a Ar arrows +.Op Fl b Ar bats +.Op Fl p Ar pits +.Op Fl r Ar rooms +.Op Fl t Ar tunnels +.Sh DESCRIPTION +The game +.Nm +is based on a fantasy game first presented in the pages of +.Em People's Computer Company +in 1973. +In Hunt the Wumpus you are placed in a cave built of many different rooms, +all interconnected by tunnels. +Your quest is to find and shoot the evil Wumpus that resides elsewhere in +the cave without running into any pits or using up your limited supply of +arrows. +.Pp +The options are as follows: +.Bl -tag -width indent +.It Fl a +Specifies the number of magic arrows the adventurer gets. +The default is five. +.It Fl b +Specifies the number of rooms in the cave which contain bats. +The default is three. +.It Fl h +Play the hard version -- more pits, more bats, and a generally more +dangerous cave. +.It Fl p +Specifies the number of rooms in the cave which contain bottomless pits. +The default is three. +.It Fl r +Specifies the number of rooms in the cave. +The default cave size is twenty-five rooms. +.It Fl t +Specifies the number of tunnels connecting each room in the cave to +another room. +Beware, too many tunnels in a small cave can easily cause it to collapse! +The default cave room has three tunnels to other rooms. +.El +.Pp +While wandering through the cave you'll notice that, while there are tunnels +everywhere, there are some mysterious quirks to the cave topology, including +some tunnels that go from one room to another, but not necessarily back! +Also, most pesky of all are the rooms that are home to large numbers of bats, +which, upon being disturbed, will en masse grab you and move you to another +portion of the cave (including those housing bottomless pits, sure +death for unwary explorers). +.Pp +Fortunately, you're not going into the cave without any weapons or tools, +and in fact your biggest aids are your senses; you can often smell the +rather odiferous Wumpus up to +.Em two +rooms away, and you can always feel the drafts created by the occasional +bottomless pit and hear the rustle of the bats in caves they might be +sleeping within. +.Pp +To kill the wumpus, you'll need to shoot it with one of your magic arrows. +Fortunately, you don't have to be in the same room as the creature, and can +instead shoot the arrow from as far as three or four rooms away! +.Pp +When you shoot an arrow, you do so by typing in a list of rooms that you'd +like it to travel to. +If at any point in its travels it cannot find a tunnel to the room you +specify from the room it's in, it will instead randomly fly down one of the +tunnels, possibly, if you're real unlucky, even flying back into the room +you're in and hitting you! |