summaryrefslogtreecommitdiffstats
path: root/upstream/opensuse-leap-15-6/man6
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-15 19:43:11 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-15 19:43:11 +0000
commitfc22b3d6507c6745911b9dfcc68f1e665ae13dbc (patch)
treece1e3bce06471410239a6f41282e328770aa404a /upstream/opensuse-leap-15-6/man6
parentInitial commit. (diff)
downloadmanpages-l10n-fc22b3d6507c6745911b9dfcc68f1e665ae13dbc.tar.xz
manpages-l10n-fc22b3d6507c6745911b9dfcc68f1e665ae13dbc.zip
Adding upstream version 4.22.0.upstream/4.22.0
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'upstream/opensuse-leap-15-6/man6')
-rw-r--r--upstream/opensuse-leap-15-6/man6/adventure.655
-rw-r--r--upstream/opensuse-leap-15-6/man6/arithmetic.6106
-rw-r--r--upstream/opensuse-leap-15-6/man6/atc.6502
-rw-r--r--upstream/opensuse-leap-15-6/man6/backgammon.6182
-rw-r--r--upstream/opensuse-leap-15-6/man6/banner.666
-rw-r--r--upstream/opensuse-leap-15-6/man6/battlestar.6174
-rw-r--r--upstream/opensuse-leap-15-6/man6/bcd.685
-rw-r--r--upstream/opensuse-leap-15-6/man6/boggle.6122
-rw-r--r--upstream/opensuse-leap-15-6/man6/caesar.672
-rw-r--r--upstream/opensuse-leap-15-6/man6/canfield.6123
-rw-r--r--upstream/opensuse-leap-15-6/man6/countmail.661
-rw-r--r--upstream/opensuse-leap-15-6/man6/dab.6110
-rw-r--r--upstream/opensuse-leap-15-6/man6/fish.687
-rw-r--r--upstream/opensuse-leap-15-6/man6/fortune.6306
-rw-r--r--upstream/opensuse-leap-15-6/man6/gomoku.695
-rw-r--r--upstream/opensuse-leap-15-6/man6/hack.6210
-rw-r--r--upstream/opensuse-leap-15-6/man6/hangman.666
-rw-r--r--upstream/opensuse-leap-15-6/man6/hunt.6414
-rw-r--r--upstream/opensuse-leap-15-6/man6/huntd.6125
-rw-r--r--upstream/opensuse-leap-15-6/man6/intro.617
-rw-r--r--upstream/opensuse-leap-15-6/man6/monopoly.6184
-rw-r--r--upstream/opensuse-leap-15-6/man6/number.659
-rw-r--r--upstream/opensuse-leap-15-6/man6/phantasia.61197
-rw-r--r--upstream/opensuse-leap-15-6/man6/pig.646
-rw-r--r--upstream/opensuse-leap-15-6/man6/pom.671
-rw-r--r--upstream/opensuse-leap-15-6/man6/primes.689
-rw-r--r--upstream/opensuse-leap-15-6/man6/quiz.6120
-rw-r--r--upstream/opensuse-leap-15-6/man6/rain.654
-rw-r--r--upstream/opensuse-leap-15-6/man6/random.667
-rw-r--r--upstream/opensuse-leap-15-6/man6/sail.6975
-rw-r--r--upstream/opensuse-leap-15-6/man6/snake.6128
-rw-r--r--upstream/opensuse-leap-15-6/man6/tetris-bsd.6158
-rw-r--r--upstream/opensuse-leap-15-6/man6/trek.6140
-rw-r--r--upstream/opensuse-leap-15-6/man6/wargames.649
-rw-r--r--upstream/opensuse-leap-15-6/man6/worm.662
-rw-r--r--upstream/opensuse-leap-15-6/man6/worms.666
-rw-r--r--upstream/opensuse-leap-15-6/man6/wtf.670
-rw-r--r--upstream/opensuse-leap-15-6/man6/wump.6110
38 files changed, 6623 insertions, 0 deletions
diff --git a/upstream/opensuse-leap-15-6/man6/adventure.6 b/upstream/opensuse-leap-15-6/man6/adventure.6
new file mode 100644
index 00000000..cc8c7a85
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/adventure.6
@@ -0,0 +1,55 @@
+.\" $NetBSD: adventure.6,v 1.4 2003/08/07 09:36:50 agc Exp $
+.\"
+.\" Copyright (c) 1991, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" The game adventure was originally written in Fortran by Will Crowther
+.\" and Don Woods. It was later translated to C and enhanced by Jim
+.\" Gillogly. This code is derived from software contributed to Berkeley
+.\" by Jim Gillogly at The Rand Corporation.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)adventure.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt ADVENTURE 6
+.Os
+.Sh NAME
+.Nm adventure
+.Nd an exploration game
+.Sh SYNOPSIS
+.Nm
+.Op saved-file
+.Sh DESCRIPTION
+The object of the game is to locate and explore Colossal Cave, find the
+treasures hidden there, and bring them back to the building with you.
+The program is self-descriptive to a point, but part of the game is to
+discover its rules.
+.Pp
+To terminate a game, enter
+.Dq quit ;
+to save a game for later resumption, enter
+.Dq suspend .
diff --git a/upstream/opensuse-leap-15-6/man6/arithmetic.6 b/upstream/opensuse-leap-15-6/man6/arithmetic.6
new file mode 100644
index 00000000..b8d4d8f9
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/arithmetic.6
@@ -0,0 +1,106 @@
+.\" $NetBSD: arithmetic.6,v 1.11 2003/08/07 09:36:52 agc Exp $
+.\"
+.\" Copyright (c) 1989, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Eamonn McManus of Trinity College Dublin.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)arithmetic.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt ARITHMETIC 6
+.Os
+.Sh NAME
+.Nm arithmetic
+.Nd quiz on simple arithmetic
+.Sh SYNOPSIS
+.Nm
+.Op Fl o Ar +\-x/
+.Op Fl r Ar range
+.Sh DESCRIPTION
+.Nm
+asks you to solve problems in simple arithmetic.
+Each question must be answered correctly before going on to the next.
+After every 20 problems, it prints the score so far and the time taken.
+You can quit at any time by typing the interrupt or end-of-file character.
+.Pp
+The options are as follows:
+.Bl -tag -width indent
+.It Fl o
+By default,
+.Nm
+asks questions on addition of numbers from 0 to 10, and corresponding
+subtraction.
+By supplying one or more of the characters
+.Ar +\-x/ ,
+you can ask for problems in addition, subtraction, multiplication, and
+division, respectively.
+If you give one of these characters more than once, that kind of problem
+will be asked correspondingly more often.
+.It Fl r
+If a
+.Ar range
+is supplied,
+.Nm
+selects the numbers in its problems in the following way.
+For addition and multiplication, the numbers to be added or multiplied
+are between 0 and
+.Ar range ,
+inclusive.
+For subtraction and division, both the required result and the number to
+divide by or subtract will be between 0 and
+.Ar range .
+(Of course,
+.Nm
+will not ask you to divide by 0.)
+The default
+.I range
+is 10.
+.El
+.Pp
+When you get a problem wrong,
+.Nm
+will remember the numbers involved, and will tend to select those numbers
+more often than others, in problems of the same sort.
+Eventually it will forgive and forget.
+.Pp
+.Nm
+cannot be persuaded to tell you the right answer.
+You must work it out for yourself.
+.Sh DIAGNOSTICS
+.Dq What?
+if you get a question wrong.
+.Dq Right!
+if you get it right.
+.Dq Please type a number.
+if
+.Nm
+doesn't understand what you typed.
+.Sh SEE ALSO
+.Xr bc 1 ,
+.Xr dc 1
diff --git a/upstream/opensuse-leap-15-6/man6/atc.6 b/upstream/opensuse-leap-15-6/man6/atc.6
new file mode 100644
index 00000000..df1b9b53
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/atc.6
@@ -0,0 +1,502 @@
+.\" Automatically generated from atc/atc.6.in. Do not edit.
+.\" $NetBSD: atc.6,v 1.21 2004/01/01 16:31:37 wiz Exp $
+.\"
+.\" Copyright (c) 1990, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Ed James.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)atc.6 8.1 (Berkeley) 5/31/93
+.\"
+.\" Copyright (c) 1986 Ed James. All rights reserved.
+.\"
+.Dd January 1, 2004
+.Dt ATC 6
+.Os
+.Sh NAME
+.Nm atc
+.Nd air traffic controller game
+.Sh SYNOPSIS
+.Nm atc
+.Op Fl u?lstp
+.Op Fl gf Ar "game name"
+.Op Fl r Ar "random seed"
+.Sh DESCRIPTION
+.Nm
+lets you try your hand at the nerve wracking duties of the air traffic
+controller without endangering the lives of millions of travelers each year.
+Your responsibilities require you to direct the flight of jets
+and prop planes into and out of the flight arena and airports.
+The speed (update time) and frequency of the planes depend on the
+difficulty of the chosen arena.
+.Sh OPTIONS
+.Bl -tag -width flag
+.It Fl u
+Print the usage line and exit.
+.It Fl \&?
+Same as
+.Fl u .
+.It Fl l
+Print a list of available games and exit.
+The first game name printed is the default game.
+.It Fl s
+Print the score list (formerly the Top Ten list).
+.It Fl t
+Same as
+.Fl s .
+.It Fl p
+Print the path to the special directory where
+.Nm
+expects to find its private files.
+This is used during the installation of the program.
+.It Fl g Ar game
+Play the named game.
+If the game listed is not one of the ones printed from the
+.Fl l
+option, the default game is played.
+.It Fl f Ar game
+Same as
+.Fl g .
+.It Fl r Ar seed
+Set the random seed.
+The purpose of this flag is questionable.
+.El
+.Sh GOALS
+Your goal in
+.Nm
+is to keep the game going as long as possible.
+There is no winning state, except to beat the times of other players.
+You will need to: launch planes at airports (by instructing them to
+increase their altitude); land planes at airports (by instructing them to
+go to altitude zero when exactly over the airport); and maneuver planes
+out of exit points.
+.Pp
+Several things will cause the end of the game.
+Each plane has a destination (see information area), and
+sending a plane to the wrong destination is an error.
+Planes can run out of fuel, or can collide.
+Collision is defined as adjacency in all three dimensions.
+A plane leaving the arena
+in any other way than through its destination exit is an error as well.
+.Pp
+Scores are sorted in order of the number of planes safe.
+The other statistics are provided merely for fun.
+There is no penalty for
+taking longer than another player (except in the case of ties).
+.Pp
+Suspending a game is not permitted.
+If you get a talk message, tough.
+When was the last time an Air Traffic Controller got called away to the phone?
+.Sh THE DISPLAY
+Depending on the terminal you run
+.Nm
+on, the screen will be divided into 4 areas.
+It should be stressed that the terminal driver portion of the
+game was designed to be reconfigurable, so the display format can vary
+depending on the version you are playing.
+The descriptions here are based on the ascii version of the game.
+The game rules and input format, however, should remain consistent.
+Control-L redraws the screen, should it become muddled.
+.Ss RADAR
+The first screen area is the radar display, showing the relative locations
+of the planes, airports, standard entry/exit points, radar
+beacons, and ``lines'' which simply serve to aid you in guiding
+the planes.
+.Pp
+Planes are shown as a single letter with an altitude.
+If the numerical altitude is a single digit, then it represents
+thousands of feet.
+Some distinction is made between the prop planes and the jets.
+On ascii terminals, prop planes are
+represented by a upper case letter, jets by a lower case letter.
+.Pp
+Airports are shown as a number and some indication of the direction
+planes must be going to land at the airport.
+On ascii terminals, this is one of `^', `\*[Gt]', `\*[Lt]', and `v', to indicate
+north (0 degrees), east (90), west (270) and south (180), respectively.
+The planes will also take off in this direction.
+.Pp
+Beacons are represented as circles or asterisks and a number.
+Their purpose is to offer a place of easy reference to the plane pilots.
+See
+.Sx THE DELAY COMMAND
+section below.
+.Pp
+Entry/exit points are displayed as numbers along the border of the
+radar screen.
+Planes will enter the arena from these points without warning.
+These points have a direction associated with them, and
+planes will always enter the arena from this direction.
+On the ascii version of
+.Nm ,
+this direction is not displayed.
+It will become apparent what this direction is as the game progresses.
+.Pp
+Incoming planes will always enter at the same altitude: 7000 feet.
+For a plane to successfully depart through an entry/exit point,
+it must be flying at 9000 feet.
+It is not necessary for the planes to be flying in any particular
+direction when they leave the arena (yet).
+.Ss INFORMATION AREA
+The second area of the display is the information area, which lists
+the time (number of updates since start), and the number of planes you
+have directed safely out of the arena.
+Below this is a list of planes currently in the air, followed by a
+blank line, and then a list of planes on the ground (at airports).
+Each line lists the plane name and its current altitude,
+an optional asterisk indicating low fuel, the plane's destination,
+and the plane's current command.
+Changing altitude is not considered
+to be a command and is therefore not displayed.
+The following are some possible information lines:
+.Pp
+.Bd -literal -offset indent
+B4*A0: Circle @ b1
+g7 E4: 225
+.Ed
+.Pp
+The first example shows a prop plane named `B' that is flying at 4000 feet.
+It is low on fuel (note the `*').
+Its destination is Airport #0.
+The next command it expects to do is circle when it reaches Beacon #1.
+The second example shows a jet named `g' at 7000 feet, destined for
+Exit #4.
+It is just now executing a turn to 225 degrees (South-West).
+.Ss INPUT AREA
+The third area of the display is the input area.
+It is here that your input is reflected.
+See the
+.Sx INPUT
+heading of this manual for more details.
+.Ss AUTHOR AREA
+This area is used simply to give credit where credit is due. :-)
+.Sh INPUT
+A command completion interface is built into the game.
+At any time, typing `?' will list possible input characters.
+Typing a backspace (your erase character) backs up, erasing the last part
+of the command.
+When a command is complete, a return enters it, and
+any semantic checking is done at that time.
+If no errors are detected, the command is sent to the appropriate plane.
+If an error is discovered
+during the check, the offending statement will be underscored and a
+(hopefully) descriptive message will be printed under it.
+.Pp
+The command syntax is broken into two parts:
+.Em Immediate Only
+and
+.Em Delayable
+commands.
+.Em Immediate Only
+commands happen on the next update.
+.Em Delayable
+commands also happen on the next update unless they
+are followed by an optional predicate called the
+.Em Delay
+command.
+.Pp
+In the following tables, the syntax
+.Em [0\-9]
+means any single digit, and
+.Aq Em dir
+refers to a direction, given by the keys around the `s' key: ``wedcxzaq''.
+In absolute references, `q' refers to North-West or 315 degrees, and `w'
+refers to North, or 0 degrees.
+In relative references, `q' refers to \-45 degrees or 45 degrees left, and `w'
+refers to 0 degrees, or no change in direction.
+.Pp
+All commands start with a plane letter.
+This indicates the recipient of the command.
+Case is ignored.
+.Ss IMMEDIATE ONLY COMMANDS
+.Bl -tag -width "aaaa"
+.It "a [ cd+- ]" Em number
+Altitude: Change a plane's altitude, possibly requesting takeoff.
+`+' and `-' are the same as `c' and `d'.
+.Bl -tag -width "aaaaaaaaaa" -compact
+.It a Em number
+Climb or descend to the given altitude (in thousands of feet).
+.It ac Em number
+Climb: relative altitude change.
+.It ad Em number
+Descend: relative altitude change.
+.El
+.It m
+Mark: Display in highlighted mode.
+Plane and command information is displayed normally.
+.It i
+Ignore: Do not display highlighted.
+Command is displayed as a line of dashes if there is no command.
+.It u
+Unmark: Same as ignore, but if a delayed command is processed,
+the plane will become marked.
+This is useful if you want to forget about a plane during part,
+but not all, of its journey.
+.El
+.Ss DELAYABLE COMMANDS
+.Bl -tag -width "aaaa"
+.It "c [ lr ]"
+Circle: Have the plane circle.
+.Bl -tag -width "aaaaaaaaaa" -compact
+.It cl
+Left: Circle counterclockwise.
+.It cr
+Right: Circle clockwise (default).
+.El
+.It "t [ l-r+LR ] [ dir ] or tt [ abe* ]" Em number
+Turn: Change direction.
+.Bl -tag -width "aaaaaaaaaa" -compact
+.It "t\*[Lt]dir\*[Gt]"
+Turn to direction: Turn to the absolute compass heading given.
+The shortest turn will be taken.
+.It "tl [ dir ]"
+Left: Turn counterclockwise: 45 degrees by default, or the amount
+specified in
+.Aq dir
+(not
+.Em to
+.Aq dir . )
+`w' (0 degrees) is no turn.
+`e' is 45 degrees; `q' gives \-45 degrees counterclockwise, that is,
+45 degrees clockwise.
+.It "t- [ dir ]"
+Same as left.
+.It "tr [ dir ]"
+Right: Turn clockwise, 45 degrees by default, or the amount specified in
+.Aq dir .
+.It "t+ [ dir ]"
+Same as right.
+.It tL
+Hard left: Turn counterclockwise 90 degrees.
+.It tR
+Hard right: Turn clockwise 90 degrees.
+.It "tt [abe*]"
+Towards: Turn towards a beacon, airport or exit.
+The turn is just an estimate.
+.It "tta" Em number
+Turn towards the given airport.
+.It "ttb" Em number
+Turn towards the specified beacon.
+.It "tte" Em number
+Turn towards an exit.
+.It "tt*" Em number
+Same as ttb.
+.El
+.El
+.Ss THE DELAY COMMAND
+The
+.Em Delay
+(a/@) command may be appended to any
+.Em Delayable
+command.
+It allows the controller to instruct a plane to do an action when the
+plane reaches a particular beacon (or other objects in future versions).
+.Bl -tag -width "aaaa"
+.It ab Em number
+Do the delayable command when the plane reaches the specified beacon.
+The `b' for ``beacon'' is redundant to allow for expansion.
+`@' can be used instead of `a'.
+.El
+.Ss MARKING, UNMARKING AND IGNORING
+Planes are
+.Em marked
+by default when they enter the arena.
+This means they are displayed in highlighted mode on the radar display.
+A plane may also be either
+.Em unmarked
+or
+.Em ignored .
+An
+.Em ignored
+plane is drawn in unhighlighted mode, and a line of dashes is displayed in
+the command field of the information area.
+The plane will remain this way until a mark command has been issued.
+Any other command will be issued, but the command line will return to a
+line of dashes when the command is completed.
+.Pp
+An
+.Em unmarked
+plane is treated the same as an
+.Em ignored
+plane, except that it will automatically switch to
+.Em marked
+status when a delayed command has been processed.
+This is useful if you want to forget about a plane for a while, but its
+flight path has not yet been completely set.
+.Pp
+As with all of the commands, marking, unmarking and ignoring will take effect
+at the beginning of the next update.
+Do not be surprised if the plane does
+not immediately switch to unhighlighted mode.
+.Ss EXAMPLES
+.Bl -tag -width gtte4ab2 -offset indent
+.It atlab1
+Plane A: turn left at beacon #1
+.It cc
+Plane C: circle
+.It gtte4ab2
+Plane G: turn towards exit #4 at beacon #2
+.It ma+2
+Plane M: altitude: climb 2000 feet
+.It stq
+Plane S: turn to 315
+.It xi
+Plane X: ignore
+.El
+.Sh OTHER INFORMATION
+.Bl -bullet
+.It
+Jets move every update; prop planes move every other update.
+.It
+All planes turn at most 90 degrees per movement.
+.It
+Planes enter at 7000 feet and leave at 9000 feet.
+.It
+Planes flying at an altitude of 0 crash if they are not over an airport.
+.It
+Planes waiting at airports can only be told to take off (climb in altitude).
+.It
+Pressing return (that is, entering an empty command) will perform the
+next update immediately.
+This allows you to ``fast forward''
+the game clock if nothing interesting is happening.
+.El
+.Sh NEW GAMES
+The
+.Pa Game_List
+file lists the currently available play fields.
+New field description file names must be placed in this file to be playable.
+If a player specifies a game not in this file, his score will not be logged.
+.Pp
+The game field description files are broken into two parts.
+The first part is the definition section.
+Here, the four tunable game parameters must be set.
+These variables are set with the syntax:
+.Pp
+.Dl "variable = number;"
+.Pp
+Variable may be one of:
+.Li update ,
+indicating the number of seconds between forced updates;
+.Li newplane ,
+indicating (about) the number of updates between new plane entries;
+.Li width ,
+indicating the width of the play field; or
+.Li height ,
+indicating the height of the play field.
+.Pp
+The second part of the field description files describes the locations
+of the exits, the beacons, the airports and the lines.
+The syntax is as follows:
+.Pp
+.Bd -literal -offset indent
+.Bl -tag -width airport: -compact
+.It beacon :
+(x y) ... ;
+.It airport :
+(x y direction) ... ;
+.It exit :
+(x y direction) ... ;
+.It line :
+[ (x1 y1) (x2 y2) ] ... ;
+.El
+.Ed
+.Pp
+For beacons, a simple x, y coordinate pair is used (enclosed in parenthesis).
+Airports and exits require a third value, which is one of the directions
+.Em wedcxzaq .
+For airports, this is the direction that planes must be going to take
+off and land, and for exits, this is the direction that planes will be
+going when they
+.Em enter
+the arena.
+This may not seem intuitive, but as there is no restriction on
+direction of exit, this is appropriate.
+Lines are slightly different, since they need two coordinate pairs to
+specify the line endpoints.
+These endpoints must be enclosed in square brackets.
+.Pp
+All statements are semi-colon (;) terminated.
+Multiple item statements accumulate.
+Each definition must occur exactly once, before any item statements.
+Comments begin with a hash (#) symbol and terminate with a newline.
+The coordinates are between zero and width-1 and height-1 inclusive.
+All of the exit coordinates must lie on the borders, and
+all of the beacons and airports must lie inside of the borders.
+Line endpoints may be anywhere within the field, so long as
+the lines are horizontal, vertical or
+.Em exactly
+diagonal.
+.Ss FIELD FILE EXAMPLE
+.Bd -literal
+# This is the default game.
+
+update = 5;
+newplane = 5;
+width = 30;
+height = 21;
+
+exit: ( 12 0 x ) ( 29 0 z ) ( 29 7 a ) ( 29 17 a )
+ ( 9 20 e ) ( 0 13 d ) ( 0 7 d ) ( 0 0 c ) ;
+
+beacon: ( 12 7 ) ( 12 17 ) ;
+
+airport: ( 20 15 w ) ( 20 18 d ) ;
+
+line: [ ( 1 1 ) ( 6 6 ) ]
+ [ ( 12 1 ) ( 12 6 ) ]
+ [ ( 13 7 ) ( 28 7 ) ]
+ [ ( 28 1 ) ( 13 16 ) ]
+ [ ( 1 13 ) ( 11 13 ) ]
+ [ ( 12 8 ) ( 12 16 ) ]
+ [ ( 11 18 ) ( 10 19 ) ]
+ [ ( 13 17 ) ( 28 17 ) ]
+ [ ( 1 7 ) ( 11 7 ) ] ;
+
+.Ed
+.Sh FILES
+Files are kept in a special directory.
+See the
+.Sx OPTIONS
+section for a way to print this path out.
+It is normally
+.Pa /usr/share/games/atc .
+.Pp
+This directory contains the file
+.Pa Game_List ,
+which holds the list of playable games, as well as the games themselves.
+.Pp
+The scores are kept in
+.Pa /var/games/atc_score .
+.Sh AUTHOR
+Ed James, UC Berkeley: edjames@ucbvax.berkeley.edu, ucbvax!edjames
+.Pp
+This game is based on someone's description of the overall flavor
+of a game written for some unknown PC many years ago, maybe.
+.Sh BUGS
+The screen sometimes refreshes after you have quit.
diff --git a/upstream/opensuse-leap-15-6/man6/backgammon.6 b/upstream/opensuse-leap-15-6/man6/backgammon.6
new file mode 100644
index 00000000..617758c1
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/backgammon.6
@@ -0,0 +1,182 @@
+.\" Automatically generated from backgammon/backgammon/backgammon.6.in. Do not edit.
+.\" $NetBSD: backgammon.6,v 1.11 2003/08/07 09:36:55 agc Exp $
+.\"
+.\" Copyright (c) 1980, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)backgammon.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt BACKGAMMON 6
+.Os
+.Sh NAME
+.Nm backgammon
+.Nd the game of backgammon
+.br
+.Nm teachgammon
+.Nd learn to play backgammon
+.Sh SYNOPSIS
+.Nm
+.Op Fl
+.Op Fl nrwb
+.Op Fl pr
+.Op Fl pw
+.Op Fl pb
+.Op Fl t Ar term
+.Op Fl s Ar file
+.br
+.Nm teachgammon
+.Sh DESCRIPTION
+This program lets you play backgammon against the computer
+or against a "friend".
+All commands are only one letter, so you don't need to type a carriage return,
+except at the end of a move.
+The program is mostly self-explanatory,
+so that a question mark (?) will usually get some help.
+If you answer `y' when the program asks if you want the rules,
+you will get text explaining the rules of the game, some hints on strategy,
+instructions on how to use the program,
+and a tutorial consisting of a practice game against the computer.
+A description of how to use the program can be
+obtained by answering `y' when it asks if you want instructions.
+.Pp
+The possible arguments for backgammon
+(most are unnecessary but some are very convenient)
+consist of:
+.Bl -tag -width indent
+.It Fl n
+don't ask for rules or instructions
+.It Fl r
+player is red (implies n)
+.It Fl w
+player is white (implies n)
+.It Fl b
+two players, red and white (implies n)
+.It Fl pr
+print the board before red's turn
+.It Fl pw
+print the board before white's turn
+.It Fl pb
+print the board before both player's turn
+.It Fl t Ar term
+terminal is type
+.Ar term ,
+uses
+.Pa /usr/share/misc/termcap
+.It Fl s Ar file
+recover previously saved game from
+.Ar file
+.El
+.Pp
+.\"
+.\" Arguments may be optionally preceded by a `-'.
+.\" Several arguments may be concatenated together,
+.\" but not after `s' or `t' arguments,
+.\" since they can be followed by an arbitrary string.
+Any unrecognized arguments are ignored.
+An argument of a lone `-' gets a description of possible arguments.
+.Pp
+If
+.Ar term
+has capabilities for direct cursor movement (see
+.Xr termcap 5 )
+.Nm
+``fixes'' the board after each move,
+so the board does not need to be reprinted,
+unless the screen suffers some horrendous malady.
+Also, any `p' option will be ignored.
+(The `t' option is not necessary unless the terminal type does not match
+the entry in the
+.Pa /usr/share/misc/termcap
+data base.)
+.Sh QUICK REFERENCE
+When the program prompts by typing only your color,
+type a space or carriage return to roll, or
+.Bl -tag -width indent
+.It Ic d
+to double
+.It Ic p
+to print the board
+.It Ic q
+to quit
+.It Ic s
+to save the game for later
+.El
+.Pp
+When the program prompts with 'Move:', type
+.Bl -tag -width indent
+.It Ic p
+to print the board
+.It Ic q
+to quit
+.It Ic s
+to save the game
+.El
+.Pp
+or a
+.Em move ,
+which is a sequence of
+.Bl -tag -width indent
+.It Ic s-f
+move from
+.Ic s
+to
+.Ic f
+.It Ic s/r
+move one man on
+.Ic s
+the roll
+.Ic r
+separated by commas or spaces and ending with a newline.
+Available abbreviations are
+.Bl -tag -width indent
+.It Ic s-f1-f2
+means
+.Ic s-f1,f1-f2
+.It Ic s/r1r2
+means
+.Ic s/r1,s/r2
+.El
+.El
+.Pp
+Use
+.Ic b
+for bar and
+.Ic h
+for home,
+or 0 or 25 as appropriate.
+.Sh AUTHOR
+.An Alan Char
+.Sh FILES
+.Bl -tag -width /usr/share/misc/termcap -compact
+.It Pa /usr/bin/teachgammon
+rules and tutorial
+.It Pa /usr/share/misc/termcap
+terminal capabilities
+.El
+.Sh BUGS
+The program's strategy needs much work.
diff --git a/upstream/opensuse-leap-15-6/man6/banner.6 b/upstream/opensuse-leap-15-6/man6/banner.6
new file mode 100644
index 00000000..acf4c3a5
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/banner.6
@@ -0,0 +1,66 @@
+.\" $NetBSD: banner.6,v 1.13 2003/08/07 09:36:59 agc Exp $
+.\"
+.\" Copyright (c) 1980, 1993, 1995
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)banner.6 8.2 (Berkeley) 4/29/95
+.\"
+.Dd April 29, 1995
+.Dt BANNER 6
+.Os
+.Sh NAME
+.Nm banner
+.Nd print large banner on printer
+.Sh SYNOPSIS
+.Nm
+.Op Fl w Ar width
+.Ar message ...
+.Sh DESCRIPTION
+.Nm
+prints a large, high quality banner on the standard output.
+If the message is omitted, it prompts for and
+reads one line of its standard input.
+If
+.Fl w
+is given, the output is scrunched down from a width of 132 to
+.Ar width ,
+suitable for a narrow terminal.
+.Pp
+The output should be printed on paper of the appropriate width,
+with no breaks between the pages.
+.Sh BUGS
+Several ASCII characters are not defined, notably \*[Lt], \*[Gt], [, ], \\,
+^, _, {, }, |, and ~. Also, the characters ", ', and \*[Am] are funny
+looking (but in a useful way.)
+.Pp
+The
+.Fl w
+option is implemented by skipping some rows and columns.
+The smaller it gets, the grainier the output.
+Sometimes it runs letters together.
+.Sh AUTHOR
+.An Mark Horton
diff --git a/upstream/opensuse-leap-15-6/man6/battlestar.6 b/upstream/opensuse-leap-15-6/man6/battlestar.6
new file mode 100644
index 00000000..0d1602ba
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/battlestar.6
@@ -0,0 +1,174 @@
+.\" $NetBSD: battlestar.6,v 1.14 2003/08/07 09:37:00 agc Exp $
+.\"
+.\" Copyright (c) 1983, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)battlestar.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd September 7, 2000
+.Dt BATTLESTAR 6
+.Os
+.Sh NAME
+.Nm battlestar
+.Nd a tropical adventure game
+.Sh SYNOPSIS
+.Nm
+.Op Fl r
+.Op Ar saved-file
+.Sh DESCRIPTION
+.Nm
+is an adventure game in the classic style.
+However, it's slightly less of a puzzle and more a game of exploration.
+There are a few magical words in the game, but on the whole, simple English
+should suffice to make one's desires understandable to the parser.
+.Sh THE SETTING
+In the days before the darkness came, when battlestars ruled the heavens...
+.Bd -literal -offset indent
+Three He made and gave them to His daughters,
+Beautiful nymphs, the goddesses of the waters.
+One to bring good luck and simple feats of wonder,
+Two to wash the lands and churn the waves asunder,
+Three to rule the world and purge the skies with thunder.
+.Ed
+.Pp
+In those times great wizards were known and their powers were beyond belief.
+They could take any object from thin air, and, uttering the word
+.Sq su
+could disappear.
+.Pp
+In those times men were known for their lust for gold and desire to
+wear fine weapons.
+Swords and coats of mail were fashioned that could withstand a laser blast.
+.Pp
+But when the darkness fell, the rightful reigns were toppled.
+Swords and helms and heads of state went rolling across the grass.
+The entire fleet of battlestars was reduced to a single ship.
+.Sh SAMPLE COMMANDS
+.Bd -literal -offset indent
+take --- take an object
+drop --- drop an object
+
+wear --- wear an object you are holding
+draw --- carry an object you are wearing
+
+put on --- take an object and wear it
+take off -- draw an object and drop it
+
+throw \*[Lt]object\*[Gt] \*[Lt]direction\*[Gt]
+
+! \*[Lt]shell esc\*[Gt]
+.Ed
+.Sh IMPLIED OBJECTS
+.Bd -literal -offset indent
+\*[Gt]-: take watermelon
+watermelon:
+Taken.
+\*[Gt]-: eat
+watermelon:
+Eaten.
+\*[Gt]-: take knife and sword and apple, drop all
+knife:
+Taken.
+broadsword:
+Taken.
+apple:
+Taken.
+knife:
+Dropped.
+broadsword:
+Dropped.
+apple:
+Dropped.
+\*[Gt]-: get
+knife:
+Taken.
+.Ed
+.Pp
+Notice that the "shadow" of the next word stays around if you
+want to take advantage of it.
+That is, saying "take knife" and then "drop"
+will drop the knife you just took.
+.Sh SCORE \*[Am] INVEN
+The two commands
+.Dq score
+and
+.Dq inven
+will print out your current status in the game.
+.Sh SAVING A GAME
+The command
+.Dq save
+will save your game in a file called
+.Pa .Bstar
+in your home directory by default.
+You can recover a saved game by using the
+.Fl r
+option when you start up the
+game, or by giving the name of the saved file as an argument.
+Save files will be saved to and restored from your home directory unless a
+path is specified - i.e.,
+.Dq Li battlestar -r savedgame
+will look for
+.Pa savedgame
+in your home directory, but
+.Dq Li battlestar -r ./savedgame
+will look in the current directory.
+.Dq Li battlestar -r
+will look for the default file,
+.Pa .Bstar
+in your home directory.
+.Sh DIRECTIONS
+The compass directions N, S, E, and W can be used if you have a compass.
+If you don't have a compass, you'll have to say R, L, A, or B, which
+stand for Right, Left, Ahead, and Back.
+Directions printed in room descriptions are
+always printed in R, L, A, and B relative directions.
+.Sh HISTORY
+I wrote Battlestar in 1979 in order to experiment with the niceties of
+the C Language.
+Most interesting things that happen in the game are hardwired into the
+code, so don't send me any hate mail about it!
+Instead, enjoy art for art's sake!
+.Sh AUTHOR
+.An David Riggle
+.Sh INSPIRATION \*[Am] ASSISTANCE
+.Bl -item -compact
+.It
+Chris Guthrie
+.It
+Peter Da Silva
+.It
+Kevin Brown
+.It
+Edward Wang
+.It
+Ken Arnold \*[Am] Company
+.El
+.Sh BUGS
+Countless.
+.Sh FAN MAIL
+Send to edward%ucbarpa@berkeley.arpa, chris%ucbcory@berkeley.arpa,
+riggle.pa@xerox.arpa.
diff --git a/upstream/opensuse-leap-15-6/man6/bcd.6 b/upstream/opensuse-leap-15-6/man6/bcd.6
new file mode 100644
index 00000000..f07acb5c
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/bcd.6
@@ -0,0 +1,85 @@
+.\" $NetBSD: bcd.6,v 1.16 2003/08/07 09:37:04 agc Exp $
+.\"
+.\" Copyright (c) 1988, 1991, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)bcd.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd November 26, 2002
+.Dt BCD 6
+.Os
+.Sh NAME
+.Nm bcd ,
+.Nm ppt ,
+.Nm morse
+.Nd "reformat input as punch cards, paper tape or morse code"
+.Sh SYNOPSIS
+.Nm
+.Op Ar string ...
+.Nm ppt
+.Op Fl d Ns \&| Ns Ar string ...
+.Nm morse
+.Op Fl ds Ar string ...
+.Sh DESCRIPTION
+The
+.Nm ,
+.Nm ppt
+and
+.Nm morse
+commands read the given input and reformat it in the form of
+punched cards, paper tape or morse code respectively.
+Acceptable input are command line arguments or the standard input.
+.Pp
+Available option:
+.Bl -tag -width flag
+.It Fl s
+The
+.Fl s
+option for morse produces dots and dashes rather than words.
+.It Fl d
+Decode
+.Nm ppt
+output, or
+.Nm morse
+output consisting of dots and slashes (as generated by using the
+.Fl s
+option).
+.El
+.Sh SEE ALSO
+.Rs
+.%B "ISO 1681:1973: Information processing--Unpunched paper cards--Specification"
+.Re
+.Rs
+.%B "ISO 1682:1973: Information processing--80 columns punched paper cards--Dimensions and location of rectangular punched holes"
+.Re
+.Rs
+.%B "ECMA-10: ECMA Standard for Data Interchange on Punched Tape"
+.Re
+.Rs
+.%B "ITU-T Recommendation F.1: Operational provisions for the international public telegram service"
+.%O "Division B, I. Morse code"
+.Re
diff --git a/upstream/opensuse-leap-15-6/man6/boggle.6 b/upstream/opensuse-leap-15-6/man6/boggle.6
new file mode 100644
index 00000000..6befc4f6
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/boggle.6
@@ -0,0 +1,122 @@
+.\" $NetBSD: boggle.6,v 1.7 2003/08/07 09:37:05 agc Exp $
+.\"
+.\" Copyright (c) 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Barry Brachman.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)boggle.6 8.1 (Berkeley) 6/11/93
+.\"
+.Dd April 1, 2001
+.Dt BOGGLE 6
+.Os
+.Sh NAME
+.Nm boggle
+.Nd word search game
+.Sh SYNOPSIS
+.Nm
+.Op Fl bd
+.Op Fl s Ar seed
+.Op Fl t Ar time
+.Op Fl w Ar length
+.Op + Op +
+.Op boardspec
+.Sh DESCRIPTION
+The object of
+.Nm
+is to find as many words as possible on the Boggle board within the three
+minute time limit.
+A Boggle board is a four by four arrangement of Boggle cubes, each side of
+each cube displaying a letter of the alphabet or `qu'.
+Words are formed by finding a sequence of cubes (letters) that are in the
+game's dictionary.
+The (N+1)th cube in the word must be horizontally,
+vertically, or diagonally adjacent to the Nth cube.
+Cubes cannot be reused.
+Words consist solely of lower case letters and must be at least 3 letters long.
+.Pp
+Command line flags can be given to change the rules of the game.
+.Bl -tag -width boardspec
+.It Fl b
+Run
+.Nm
+in batch mode.
+A
+.Ar boardspec
+must also be given.
+The dictionary is read from stdin and a list of words appearing in
+.Ar boardspec
+is printed to stdout.
+.It Fl d
+Enable debugging output.
+.It Fl s Ar seed
+Specify a seed
+.Ar seed
+other than the time of day.
+.It Fl t Ar time
+Set the time limit for each game from the default 3 minutes to
+.Ar time
+seconds.
+.It Fl w Ar length
+Change the minimum word length from 3 letters to
+.Ar length .
+.It Ar +
+This flag allows a cube to be used multiple times, but not in succession.
+.It Ar ++
+This flag allows the same cubes to be considered adjacent to itself.
+.It Ar boardspec
+A starting board position can be specified on the command line by
+listing the board left to right and top to bottom.
+.El
+.Pp
+Help is available during play by typing
+.Sq Ic \&? .
+More detailed information on the game is given there.
+.Sh BUGS
+If there are a great many words in the cube the final display of the words
+may scroll off of the screen.
+(On a 25 line screen about 130 words can be displayed.)
+.Pp
+No word can contain a
+.Sq q
+that is not immediately followed by a
+.Sq u .
+.Pp
+When using the
+.Ar +
+or
+.Ar ++
+options the display of words found in the board doesn't indicate reused cubes.
+.Sh AUTHOR
+Boggle is a trademark of Parker Brothers.
+.Pp
+Barry Brachman
+.br
+Dept. of Computer Science
+.br
+University of British Columbia
diff --git a/upstream/opensuse-leap-15-6/man6/caesar.6 b/upstream/opensuse-leap-15-6/man6/caesar.6
new file mode 100644
index 00000000..b959e3b9
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/caesar.6
@@ -0,0 +1,72 @@
+.\" $NetBSD: caesar.6,v 1.9 2003/08/07 09:37:07 agc Exp $
+.\"
+.\" Copyright (c) 1989, 1991, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)caesar.6 8.2 (Berkeley) 11/16/93
+.\"
+.Dd November 16, 1993
+.Dt CAESAR 6
+.Os
+.Sh NAME
+.Nm caesar ,
+.Nm rot13
+.Nd decrypt caesar ciphers
+.Sh SYNOPSIS
+.Nm
+.Op Ar rotation
+.Sh DESCRIPTION
+The
+.Nm
+utility attempts to decrypt caesar ciphers using English letter frequency
+statistics.
+.Nm
+reads from the standard input and writes to the standard output.
+.Pp
+The optional numerical argument
+.Ar rotation
+may be used to specify a specific rotation value.
+.Pp
+The frequency (from most common to least) of English letters is as follows:
+.Pp
+.Bd -filled -offset indent
+ETAONRISHDLFCMUGPYWBVKXJQZ
+.Ed
+.Pp
+Their frequencies as a percentage are as follows:
+.Pp
+.Bd -filled -offset indent
+E(13), T(10.5), A(8.1), O(7.9), N(7.1), R(6.8), I(6.3), S(6.1), H(5.2),
+D(3.8), L(3.4), F(2.9), C(2.7), M(2.5), U(2.4), G(2),
+P(1.9), Y(1.9), W(1.5), B(1.4), V(.9), K(.4), X(.15), J(.13), Q(.11), Z(.07).
+.Ed
+.Pp
+Rotated postings to
+.Tn USENET
+and some of the databases used by the
+.Xr fortune 6
+program are rotated by 13 characters.
diff --git a/upstream/opensuse-leap-15-6/man6/canfield.6 b/upstream/opensuse-leap-15-6/man6/canfield.6
new file mode 100644
index 00000000..739203c0
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/canfield.6
@@ -0,0 +1,123 @@
+.\" Automatically generated from canfield/canfield/canfield.6.in. Do not edit.
+.\" $NetBSD: canfield.6,v 1.9 2003/08/07 09:37:07 agc Exp $
+.\"
+.\" Copyright (c) 1983, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)canfield.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt CANFIELD 6
+.Os
+.Sh NAME
+.Nm canfield ,
+.Nm cfscores
+.Nd the solitaire card game canfield
+.Sh SYNOPSIS
+.Nm
+.Nm cfscores
+.Op Fl a
+.Op Ar user
+.Sh DESCRIPTION
+If you have never played solitaire before, it is recommended
+that you consult a solitaire instruction book. In
+Canfield, tableau cards may be built on each other downward
+in alternate colors. An entire pile must be moved as a unit
+in building. Top cards of the piles are available
+to be played on foundations, but never into empty spaces.
+.Pp
+Spaces must be filled from the stock. The top card of
+the stock also is available to be played on foundations or
+built on tableau piles. After the stock is exhausted,
+tableau spaces may be filled from the talon and the player may
+keep them open until he wishes to use them.
+.Pp
+Cards are dealt from the hand to the talon by threes
+and this repeats until there are no more cards in the hand
+or the player quits.
+To have cards dealt onto the talon the player types
+.Sq Ic ht
+for his move.
+Foundation base cards are also automatically moved to the foundation
+when they become available.
+.Pp
+The command
+.Sq Ic c
+causes
+.Nm
+to maintain card counting statistics on the bottom of the screen.
+When properly used this can greatly increase one's chances of winning.
+.Pp
+The rules for betting are somewhat less strict than
+those used in the official version of the game.
+The initial deal costs $13.
+You may quit at this point or inspect the game.
+Inspection costs $13 and allows you to make as many
+moves as possible without moving any cards from your hand to the talon.
+(The initial deal places three cards on the talon;
+if all these cards are used, three more are made available.)
+Finally, if the game seems interesting,
+you must pay the final installment of $26.
+At this point you are
+credited at the rate of $5 for each card on the foundation;
+as the game progresses you are credited with $5 for each
+card that is moved to the foundation.
+Each run through the hand after the first costs $5.
+The card counting feature
+costs $1 for each unknown card that is identified.
+If the information is toggled on, you are only charged for cards
+that became visible since it was last turned on.
+Thus the maximum cost of information is $34.
+Playing time is charged at a rate of $1 per minute.
+.Pp
+With no arguments, the program
+.Nm cfscores
+prints out the current status of your canfield account.
+If a
+.Ar user
+name is specified, it prints out the status of their canfield account.
+If the
+.Fl a
+flag is specified,
+it prints out the canfield accounts for all users that have
+played the game since the database was set up.
+.Sh FILES
+.Bl -tag -width /usr/bin/canfield -compact
+.It Pa /usr/bin/canfield
+the game itself
+.It Pa /usr/bin/cfscores
+the database printer
+.It Pa /var/games/cfscores
+the database of scores
+.El
+.Sh BUGS
+It is impossible to cheat.
+.Sh AUTHORS
+Originally written: Steve Levine.
+.Pp
+Further random hacking by: Steve Feldman, Kirk McKusick,
+Mikey Olson, and Eric Allman.
diff --git a/upstream/opensuse-leap-15-6/man6/countmail.6 b/upstream/opensuse-leap-15-6/man6/countmail.6
new file mode 100644
index 00000000..015ada09
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/countmail.6
@@ -0,0 +1,61 @@
+.\" $NetBSD: countmail.6,v 1.10 2004/02/08 00:31:16 jsm Exp $
+.\"
+.\" Copyright (c) 1997 Matthew R. Green
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. The name of the author may not be used to endorse or promote products
+.\" derived from this software without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
+.\" BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
+.\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
+.\" AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
+.\" OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.Dd October 3, 1997
+.Dt COUNTMAIL 6
+.Os
+.Sh NAME
+.Nm countmail
+.Nd be obnoxious about how much mail you have
+.Sh SYNOPSIS
+.Nm
+.Sh DESCRIPTION
+The
+.Nm
+program counts your mail and tells you about it rather obnoxiously.
+.Sh HISTORY
+The
+.Nm
+program first appeared in
+.Nx 1.3 .
+.Nm
+was first written by
+.An Noah Friedman Aq friedman@splode.com
+in 1993.
+This version was written by Charles M. Hannum
+.Aq mycroft@NetBSD.org .
+.Sh CAVEATS
+The read loop is horrendously slow on every shell implementation tried.
+.Nm
+uses
+.Xr from 1
+and
+.Xr wc 1
+instead, though these are not shell builtins.
+.Sh SEE ALSO
+.Xr from 1
diff --git a/upstream/opensuse-leap-15-6/man6/dab.6 b/upstream/opensuse-leap-15-6/man6/dab.6
new file mode 100644
index 00000000..a5feab51
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/dab.6
@@ -0,0 +1,110 @@
+.\" $NetBSD: dab.6,v 1.1.1.1 2003/12/26 17:57:04 christos Exp $
+.\"
+.\" Copyright (c) 2003 Thomas Klausner.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. The name of the author may not be used to endorse or promote products
+.\" derived from this software without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
+.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+.\"
+.Dd December 24, 2003
+.Dt DAB 6
+.Os
+.Sh NAME
+.Nm dab
+.Nd Dots and Boxes game
+.Sh SYNOPSIS
+.Nm
+.Op Fl aw
+.Op Fl n Ar ngames
+.Op Fl p Ao Ar c|h Ac Ns Ao Ar c|h Ac
+.Op Ar xdim Oo Ar ydim Oc
+.Sh DESCRIPTION
+.Nm
+is a game where each player tries to complete the most
+boxes.
+A turn consists of putting one border of a box; the player
+setting the fourth and final border of a box gets the
+point for the box and has another turn.
+.Pp
+The keys used are the vi keys:
+.Ic k
+for up,
+.Ic j
+for down,
+.Ic h
+for left, and
+.Ic l
+for right.
+To switch between even and odd rows, use one of the following
+keys:
+.Ic u
+.Pq diagonal right up ,
+.Ic y
+.Pq diagonal left up ,
+.Ic b
+.Pq diagonal left down ,
+.Ic n
+.Pq diagonal right down ;
+.Aq Ic space
+sets a new border,
+.Ic CTRL-L
+and
+.Ic CTRL-R
+redraw the screen, and
+.Ic q
+quits the game.
+.Pp
+Support options are:
+.Bl -tag -width XXnXngamesXXXXX
+.It Fl a
+Don't use the alternate character set.
+.It Fl n Ar ngames
+.Ar ngames
+games will be played.
+.Pq Especially useful in Fl p Ar cc No mode.
+.It Fl p Ao Ar c|h Ac Ns Ao Ar c|h Ac
+Select which of the two players is a human
+or a computer.
+The first argument is the first player;
+.Ic c
+stands for computer and
+.Ic h
+for human.
+.It Fl w
+Wait for a character press between games.
+.El
+.Pp
+.Ar xdim
+and
+.Ar ydim
+define the size of the board in the x and y
+dimensions.
+.Sh AUTHORS
+.An Christos Zoulas
+.Aq christos@NetBSD.org
+.Sh SEE ALSO
+.Rs
+.%A Elwyn R. Berlekamp
+.%T The Dots and Boxes Game: Sophisticated Child's Play
+.%D 2000
+.%I A K Peters
+.%O http://www.akpeters.com/book.asp?bID=111
+.Re
diff --git a/upstream/opensuse-leap-15-6/man6/fish.6 b/upstream/opensuse-leap-15-6/man6/fish.6
new file mode 100644
index 00000000..398c55f7
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/fish.6
@@ -0,0 +1,87 @@
+.\" $NetBSD: fish.6,v 1.8 2003/08/07 09:37:13 agc Exp $
+.\"
+.\" Copyright (c) 1990, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)fish.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt FISH 6
+.Os
+.Sh NAME
+.Nm fish
+.Nd play
+.Dq Go Fish
+.Sh SYNOPSIS
+.Nm
+.Op Fl p
+.Sh DESCRIPTION
+.Nm
+is the game
+.Dq Go Fish ,
+a traditional children's card game.
+.Pp
+The computer deals the player and itself seven cards, and places
+the rest of the deck face-down (figuratively).
+The object of the game is to collect
+.Dq books ,
+or all of the members of a single rank.
+For example, collecting four 2's would give the player a
+.Dq book of 2's .
+.Pp
+The options are as follows:
+.Bl -tag -width indent
+.It Fl p
+Professional mode.
+.El
+.Pp
+The computer makes a random decision as to who gets to start the
+game, and then the computer and player take turns asking each other
+for cards of a specified rank.
+If the asked player has any cards of the requested rank, they give
+them up to the asking player.
+A player must have at least one of the cards of the rank they request
+in their hand.
+When a player asks for a rank of which the other player has no
+cards, the asker is told to
+.Dq Go Fish! .
+Then, the asker draws a card from the non-dealt cards.
+If they draw the card they asked for, they continue their turn, asking
+for more ranks from the other player.
+Otherwise, the other player gets a turn.
+.Pp
+When a player completes a book, either by getting cards from the
+other player or drawing from the deck, they set those cards aside and
+the rank is no longer in play.
+.Pp
+The game ends when either player no longer has any cards in their hand.
+The player with the most books wins.
+.Pp
+.Nm
+provides instructions as to what input it accepts.
+.Sh BUGS
+The computer cheats only rarely.
diff --git a/upstream/opensuse-leap-15-6/man6/fortune.6 b/upstream/opensuse-leap-15-6/man6/fortune.6
new file mode 100644
index 00000000..ef87f710
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/fortune.6
@@ -0,0 +1,306 @@
+.\" $NetBSD: fortune.6,v 1.4 1995/03/23 08:28:37 cgd Exp $
+.\"
+.\" Copyright (c) 1985, 1991, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Ken Arnold.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. All advertising materials mentioning features or use of this software
+.\" must display the following acknowledgement:
+.\" This product includes software developed by the University of
+.\" California, Berkeley and its contributors.
+.\" 4. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)fortune.6 8.3 (Berkeley) 4/19/94
+.\"
+.\" This version of the man page has been modified heavily, like the
+.\" program it documents. Some of the changes may be exclusive to
+.\" Linux. Amy A. Lewis, September, 1995.
+.\"
+.\" Changes Copyright (c) 1997 Dennis L. Clark. All rights reserved.
+.\"
+.\" The changes in this file may be freely redistributed, modified or
+.\" included in other software, as long as both the above copyright
+.\" notice and these conditions appear intact.
+.\"
+.TH FORTUNE 6 "19 April 94 [May. 97]" "BSD Experimental" "UNIX Reference Manual"
+.SH NAME
+fortune \- print a random, hopefully interesting, adage
+.SH SYNOPSIS
+.BR fortune " [" -acefilosw "] [" -n
+.IR length "] ["
+.B -m
+.IR pattern "] [[" n% "] " file/dir/all ]
+.SH DESCRIPTION
+When
+.B fortune
+is run with no arguments it prints out a random epigram. Epigrams are
+divided into several categories, where each category is sub\-divided
+into those which are potentially offensive and those which are not..SS Options
+The options are as follows:
+.TP
+.B -a
+Choose from all lists of maxims, both offensive and not. (See the
+.B -o
+option for more information on offensive fortunes.)
+.TP
+.B -c
+Show the cookie file from which the fortune came.
+.TP
+.B -e
+Consider all fortune files to be of equal size (see discussion below
+on multiple files).
+.TP
+.B -f
+Print out the list of files which would be searched, but don't
+print a fortune.
+.TP
+.B -l
+Long dictums only. See
+.B -n
+on how ``long'' is defined in this sense.
+.TP
+.BI "-m " pattern
+Print out all fortunes which match the basic regular expression
+.IR pattern .
+The syntax of these expressions depends on how your system defines
+.BR re_comp "(3) or " regcomp (3),
+but it should nevertheless be similar to the syntax used in
+.BR grep (1).
+.sp
+.RS
+The fortunes are output to standard output, while the names of the file
+from which each fortune comes are printed to standard error. Either or
+both can be redirected; if standard output is redirected to a file, the
+result is a valid fortunes database file. If standard error is
+.I also
+redirected to this file, the result is
+.IR "still valid" ,
+.B but there will be ``bogus''
+.BR fortunes ,
+i.e. the filenames themselves, in parentheses. This can be useful if you
+wish to remove the gathered matches from their original files, since each
+filename\-record will precede the records from the file it names.
+.RE
+.TP
+.BI "-n " length
+Set the longest fortune length (in characters) considered to be
+``short'' (the default is 160). All fortunes longer than this are
+considered ``long''. Be careful! If you set the length too short and
+ask for short fortunes, or too long and ask for long ones, fortune goes
+into a never\-ending thrash loop.
+.TP
+.B -o
+Choose only from potentially offensive aphorisms. The -o option is
+ignored if a fortune directory is specified.
+.sp
+.B Please, please, please request a potentially
+.B offensive fortune if and only if
+.B you believe, deep in your heart,
+.B that you are willing to be
+.B offended. (And that you'll just quit
+.BR using " -o " rather
+.B than give us grief about it,
+.B okay?)
+.sp
+.RS
+\&... let us keep in mind the basic governing philosophy of The
+Brotherhood, as handsomely summarized in these words: we believe in
+healthy, hearty laughter \-\- at the expense of the whole human race, if
+needs be. Needs be.
+.RS
+\-\-H. Allen Smith, "Rude Jokes"
+.RE
+.RE
+.TP
+.B -s
+Short apothegms only. See
+.B -n
+on which fortunes are considered ``short''.
+.TP
+.B -i
+Ignore case for
+.IR -m
+patterns.
+.TP
+.B -w
+Wait before termination for an amount of time calculated from the
+number of characters in the message. This is useful if it is executed
+as part of the logout procedure to guarantee that the message can be
+read before the screen is cleared.
+.PP
+The user may specify alternate sayings. You can specify a specific
+file, a directory which contains one or more files, or the special word
+.I all
+which says to use all the standard databases. Any of these may be
+preceded by a percentage, which is a number
+.I n
+between 0 and 100 inclusive, followed by a
+.IR % .
+If it is, there will be a
+.I n
+percent probability that an adage will be picked from that file or
+directory. If the percentages do not sum to 100, and there are
+specifications without percentages, the remaining percent will apply
+to those files and/or directories, in which case the probability of
+selecting from one of them will be based on their relative sizes.
+.PP
+As an example, given two databases
+.IR funny " and " not\-funny ", with " funny
+twice as big (in number of fortunes, not raw file size), saying
+.RS
+.sp
+.B fortune
+.I funny not\-funny
+.sp
+.RE
+will get you fortunes out of
+.I funny
+two\-thirds of the time. The command
+.RS
+.sp
+.B fortune
+.RI "90% " funny " 10% " not\-funny
+.sp
+.RE
+will pick out 90% of its fortunes from
+.I funny
+(the ``10% not\-funny'' is unnecessary, since 10% is all that's left).
+.PP
+The
+.B -e
+option says to consider all files equal; thus
+.RS
+.sp
+.B fortune -e
+.I funny not\-funny
+.sp
+.RE
+is equivalent to
+.RS
+.sp
+.B fortune
+.RI "50% " funny " 50% " not\-funny
+.sp
+.RE
+This fortune also supports the BSD method of appending ``-o'' to
+database names to specify offensive fortunes. However this is
+.B not
+how fortune stores them: offensive fortunes are stored in a separate
+directory without the ``-o'' infix. A plain name (i.e., not a path to a
+file or directory) that ends in ``-o'' will be assumed to be an
+offensive database, and will have its suffix stripped off and be
+searched in the offensive directory (even if the neither of the
+.IR -a " or " -o
+options were specified). This feature is not only for
+backwards\-compatibility, but also to allow users to distinguish between
+inoffensive and offensive databases of the same name.
+.PP
+For example, assuming there is a database named
+.I definitions
+in both the inoffensive and potentially offensive collections, then the
+following command will select an inoffensive definition 90% of the time,
+and a potentially offensive definition for the remaining 10%:
+.RS
+.sp
+.B fortune
+90%
+.I definitions definitions\-o
+.RE
+.SH FILES
+Note: these are the defaults as defined at compile time.
+.PP
+.PD 0
+.TP
+.I /usr/share/fortune/cookies
+Directory for innoffensive fortunes.
+.TP
+.I /usr/share/fortune/cookies/off
+Directory for offensive fortunes.
+.PD
+.PP
+If a particular set of fortunes is particularly unwanted, there is an
+easy solution: delete the associated
+.I .dat
+file. This leaves the data intact, should the file later be wanted, but
+since
+.B fortune
+no longer finds the pointers file, it ignores the text file.
+.SH BUGS
+The division of fortunes into offensive and non\-offensive by directory,
+rather than via the `-o' file infix, is not 100% compatible with
+original BSD fortune. Although the `-o' infix is recognised as referring
+to an offensive database, the offensive database files still need to be
+in a separate directory. The workaround, of course, is to move the `-o'
+files into the offensive directory (with or without renaming), and to
+use the
+.B -a
+option.
+.PP
+The supplied fortune databases have been attacked, in order to correct
+orthographical and grammatical errors, and particularly to reduce
+redundancy and repetition and redundancy. But especially to avoid
+repetitiousness. This has not been a complete success. In the process,
+some fortunes may also have been lost.
+.PP
+The fortune databases are now divided into a larger number of smaller
+files, some organized by format (poetry, definitions), and some by
+content (religion, politics). There are parallel files in the main
+directory and in the offensive files directory (e.g., fortunes/definitions and
+fortunes/off/definitions). Not all the potentially offensive fortunes are in
+the offensive fortunes files, nor are all the fortunes in the offensive
+files potentially offensive, probably, though a strong attempt has been
+made to achieve greater consistency. Also, a better division might be
+made.
+.SH HISTORY
+This version of fortune is based on the NetBSD fortune 1.4, but with a
+number of bug fixes and enhancements.
+.PP
+The original fortune/strfile format used a single file; strfile read the
+text file and converted it to null\-delimited strings, which were stored
+after the table of pointers in the .dat file. By NetBSD fortune 1.4,
+this had changed to two separate files: the .dat file was only the header
+(the table of pointers, plus flags; see
+.IR strfile.h ),
+and the text strings were left in their own file. The potential problem
+with this is that text file and header file may get out of synch, but the
+advantage is that the text files can be easily edited without resorting
+to unstr, and there is a potential savings in disk space (on the
+assumption that the sysadmin kept both .dat file with strings and the
+text file).
+.PP
+Many of the enhancements made over the NetBSD version assumed a Linux
+system, and thus caused it to fail under other platforms, including BSD.
+The source code has since been made more generic, and currently works on
+SunOS 4.x as well as Linux, with support for more platforms expected in
+the future. Note that some bugs were inadvertently discovered and fixed
+during this process.
+.PP
+At a guess, a great many people have worked on this program, many without
+leaving attributions.
+.SH SEE ALSO
+.BR re_comp "(3), " regcomp "(3), " strfile "(1), "
+.BR unstr (1)
diff --git a/upstream/opensuse-leap-15-6/man6/gomoku.6 b/upstream/opensuse-leap-15-6/man6/gomoku.6
new file mode 100644
index 00000000..f78eb0e1
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/gomoku.6
@@ -0,0 +1,95 @@
+.\" $NetBSD: gomoku.6,v 1.10 2003/08/07 09:37:17 agc Exp $
+.\"
+.\" Copyright (c) 1994
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Ralph Campbell.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)gomoku.6 8.2 (Berkeley) 8/4/94
+.\"
+.Dd August 4, 1994
+.Dt GOMOKU 6
+.Os
+.Sh NAME
+.Nm gomoku
+.Nd game of 5 in a row
+.Sh SYNOPSIS
+.Nm
+.Op Fl bcdu
+.Op Fl D Ar debugfile
+.Op Ar inputfile
+.Sh DESCRIPTION
+.Nm
+is a two player game were the object is to get 5 in a row horizontally,
+vertically or diagonally on a 19 by 19 grid.
+By convention, black always moves first.
+With no arguments,
+.Nm
+will display a playing board and prompt for moves from the user.
+Valid moves are a letter for the column and a number for the row of an empty
+board location.
+Entering ``quit" or ``resign" will end the game.
+You can save the current state of the game by entering ``save" and
+supplying a file name when prompted.
+The optional file
+.Ar inputfile
+can be used to restore a saved game.
+.Pp
+The options are:
+.Bl -tag -width Ds
+.It Fl b
+This option sets background mode.
+Input moves are read from standard input,
+the computer picks a move, and prints it to standard output.
+The first input line should be either ``black" or ``white" to specify whether
+.Nm
+has the first move or not respectively.
+This option was intended for game tournaments where a referee program handles
+the board display and pits one program against another.
+.It Fl c
+Computer versus computer.
+.Nm
+will play a game against itself.
+This is mostly used for testing.
+.It Fl d
+Print debugging information.
+Repeating this option more than once yields more detailed information.
+.It Fl D Ar debugfile
+Print the debug information to
+.Ar debugfile
+instead of to the standard output.
+.It Fl u
+User versus user.
+This is mostly used for testing.
+.El
+.Sh AUTHOR
+.An Ralph Campbell
+.Sh ACKNOWLEDGEMENTS
+The board display routines were based on the
+.Nm goref
+program written by Peter Langston.
diff --git a/upstream/opensuse-leap-15-6/man6/hack.6 b/upstream/opensuse-leap-15-6/man6/hack.6
new file mode 100644
index 00000000..68eaf9f7
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/hack.6
@@ -0,0 +1,210 @@
+.\" Automatically generated from hack/hack.6.in. Do not edit.
+.\" $NetBSD: hack.6,v 1.14 2004/06/01 10:10:06 wiz Exp $ -*- nroff -*-
+.\"
+.\" Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
+.\" Amsterdam
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions are
+.\" met:
+.\"
+.\" - Redistributions of source code must retain the above copyright notice,
+.\" this list of conditions and the following disclaimer.
+.\"
+.\" - Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\"
+.\" - Neither the name of the Stichting Centrum voor Wiskunde en
+.\" Informatica, nor the names of its contributors may be used to endorse or
+.\" promote products derived from this software without specific prior
+.\" written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
+.\" IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
+.\" PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
+.\" OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
+.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
+.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
+.\" PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+.\" LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+.\"
+.\"
+.\" Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. The name of the author may not be used to endorse or promote products
+.\" derived from this software without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
+.\" INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
+.\" AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
+.\" THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
+.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
+.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
+.\" OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
+.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
+.\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
+.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+.\"
+.Dd March 31, 1985
+.Dt HACK 6
+.Os
+.Sh NAME
+.Nm hack
+.Nd exploring The Dungeons of Doom
+.Sh SYNOPSIS
+.Nm
+.Op Fl d Ar directory
+.Op Fl n
+.Op Fl u Ar playername
+.Nm
+.Op Fl d Ar directory
+.Op Fl s
+.Op Fl X
+.Op Ar playername ...
+.Sh DESCRIPTION
+.Nm
+is a display oriented dungeons \*[Am] dragons-like game.
+Both display and command structure resemble rogue.
+(For a game with the same structure but entirely different display -
+a real cave instead of dull rectangles - try Quest.)
+.Pp
+To get started you really only need to know two commands.
+The command
+.Ic \&?
+will give you a list of the available commands and the command
+.Ic /
+will identify the things you see on the screen.
+.Pp
+To win the game (as opposed to merely playing to beat other people's high
+scores) you must locate the Amulet of Yendor which is somewhere below
+the 20th level of the dungeon and get it out.
+Nobody has achieved this yet and if somebody does, he will probably go
+down in history as a hero among heroes.
+.Pp
+When the game ends, either by your death, when you quit, or if you escape
+from the caves,
+.Nm
+will give you (a fragment of) the list of top scorers.
+The scoring is based on many aspects of your behavior but a rough estimate
+is obtained by taking the amount of gold you've found in the cave plus four
+times your (real) experience.
+Precious stones may be worth a lot of gold when brought to the exit.
+There is a 10% penalty for getting yourself killed.
+.Pp
+The administration of the game is kept in the directory specified with the
+.Fl d
+option, or, if no such option is given, in the directory specified by
+the environment variable
+.Ev HACKDIR ,
+or, if no such variable exists, in the current directory.
+This same directory contains several auxiliary files such as lockfiles and
+the list of topscorers and a subdirectory
+.Pa save
+where games are saved.
+The game administrator may however choose to install hack with a fixed
+playing ground, usually
+.Pa /var/games/hack .
+.Pp
+The
+.Fl n
+option suppresses printing of the news.
+.Pp
+The
+.Fl u
+.Ar playername
+option supplies the answer to the question "Who are you?".
+When
+.Ar playername
+has as suffix one of
+.Em -T ,
+.Em -S ,
+.Em -K ,
+.Em -F ,
+.Em -C ,
+or
+.Em -W ,
+then this supplies the answer to the question "What kind of character ... ?".
+.Pp
+The
+.Fl s
+option will print out the list of your scores.
+It may be followed by arguments
+.Fl X
+where X is one of the letters C, F, K, S, T, W to print the scores of
+Cavemen, Fighters, Knights, Speleologists, Tourists or Wizards.
+It may also be followed by one or more player names to print the scores of the
+players mentioned.
+.Sh AUTHORS
+Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) wrote the
+original hack, very much like rogue (but full of bugs).
+.br
+Andries Brouwer continuously deformed their sources into the current
+version - in fact an entirely different game.
+.Sh FILES
+.Bl -tag -width 24n -compact
+.It Pa hack
+The hack program.
+.It Pa data, rumors
+Data files used by hack.
+.It Pa help, hh
+Help data files.
+.It Pa record
+The list of topscorers.
+.It Pa save
+A subdirectory containing the saved games.
+.It Pa bones_dd
+Descriptions of the ghost and belongings of a deceased adventurer.
+.It Pa xlock.dd
+Description of a dungeon level.
+.It Pa safelock
+Lock file for xlock.
+.It Pa record_lock
+Lock file for record.
+.El
+.Sh ENVIRONMENT
+.Bl -tag -width 24n -compact
+.It Ev USER No or Ev LOGNAME
+Your login name.
+.It Ev HOME
+Your home directory.
+.It Ev SHELL
+Your shell.
+.It Ev TERM
+The type of your terminal.
+.It Ev HACKPAGER, PAGER
+Pager used instead of default pager.
+.It Ev MAIL
+Mailbox file.
+.It Ev MAILREADER
+Reader used instead of default (probably
+.Pa /usr/bin/mail ) .
+.It Ev HACKDIR
+Playground.
+.It Ev HACKOPTIONS
+String predefining several hack options (see help file).
+.El
+.Pp
+Several other environment variables are used in debugging (wizard) mode,
+like
+.Ev GENOCIDED ,
+.Ev INVENT ,
+.Ev MAGIC
+and
+.Ev SHOPTYPE .
+.Sh BUGS
+Probably infinite.
+Mail complaints to mcvax!aeb .
diff --git a/upstream/opensuse-leap-15-6/man6/hangman.6 b/upstream/opensuse-leap-15-6/man6/hangman.6
new file mode 100644
index 00000000..8d87620e
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/hangman.6
@@ -0,0 +1,66 @@
+.\" Automatically generated from hangman/hangman.6.in. Do not edit.
+.\" $NetBSD: hangman.6,v 1.12 2003/08/07 09:37:21 agc Exp $
+.\"
+.\" Copyright (c) 1983, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)hangman.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt HANGMAN 6
+.Os
+.Sh NAME
+.Nm hangman
+.Nd computer version of the game hangman
+.Sh SYNOPSIS
+.Nm
+.Op Fl d Ar wordlist
+.Op Fl m Ar minlen
+.Sh DESCRIPTION
+In
+.Nm ,
+the computer picks a word from the on-line word list
+and you must try to guess it.
+The computer keeps track of which letters have been guessed
+and how many wrong guesses you have made on the screen in a graphic fashion.
+.Sh OPTIONS
+.Bl -tag -width flag
+.It Fl d
+Use the specified
+.Ar wordlist
+instead of the default one named below.
+.It Fl m
+Set the minimum word length to use.
+The default is 6 letters.
+.El
+.Sh FILES
+.Bl -tag -width /var/lib/dict/words -compact
+.It Pa /var/lib/dict/words
+On-line word list
+.El
+.Sh AUTHORS
+.An Ken Arnold
diff --git a/upstream/opensuse-leap-15-6/man6/hunt.6 b/upstream/opensuse-leap-15-6/man6/hunt.6
new file mode 100644
index 00000000..f80e2454
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/hunt.6
@@ -0,0 +1,414 @@
+.\" Automatically generated from hunt/hunt/hunt.6.in. Do not edit.
+.\" $NetBSD: hunt.6,v 1.11 2003/06/11 12:00:21 wiz Exp $
+.\"
+.\" hunt
+.\"
+.\" Copyright (c) 1983-2003, Regents of the University of California.
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions are
+.\" met:
+.\"
+.\" + Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" + Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" + Neither the name of the University of California, San Francisco nor
+.\" the names of its contributors may be used to endorse or promote
+.\" products derived from this software without specific prior written
+.\" permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
+.\" IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
+.\" PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+.\" OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+.\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+.\" LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+.\" OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+.\"
+.Dd April 4, 2001
+.Dt HUNT 6
+.Sh NAME
+.Nm hunt
+.Nd a multi-player multi-terminal game
+.Sh SYNOPSIS
+.Nm
+.Op Fl bcfmqSs
+.Op Fl n Ar name
+.Op Fl t Ar team
+.Op Fl p Ar port
+.Op Fl w Ar message
+.Op Ar host
+.Sh DESCRIPTION
+The object of the game
+.Nm
+is to kill off the other players.
+There are no rooms, no treasures, and no monsters.
+Instead, you wander around a maze, find grenades, trip mines, and shoot down
+walls and players.
+The more players you kill before you die, the better your score is.
+If the
+.Fl m
+flag is given, you enter the game as a monitor
+(you can see the action but you cannot play).
+.Pp
+.Nm
+normally looks for an active game on the local network;
+if none is found, it starts one up on the local host.
+The location of the game may be specified by giving the
+.Ar host
+argument.
+This presupposes that a hunt game is already running on that host, see
+.Xr huntd 6
+for details on how to set up a game on a specific host.
+If more than one game if found, you may pick which game to play in.
+.Pp
+If the
+.Fl q
+flag is given,
+.Nm
+queries the local network (or specific host)
+and reports on all active games found.
+This is useful for shell startup scripts, e.g.,
+.Xr csh 1 Ns 's
+.Pa .login .
+.Pp
+The player name may be specified on the command line by using the
+.Fl n
+option.
+.Pp
+The
+.Fl c ,
+.Fl s ,
+and
+.Fl f
+options are for entering the game cloaked, scanning, or flying respectively.
+.Pp
+The
+.Fl b
+option turns off beeping when you reach the typeahead limit.
+.Pp
+The
+.Fl t
+option aids team playing by making everyone else on one's team
+appear as the team name.
+A team name is a single digit to avoid conflicting with other characters
+used in the game.
+.Pp
+The
+.Fl p Ar port
+option allows the rendezvous port number to be set.
+This is a useful way for people playing on dialup lines to avoid playing
+with people on 9600 baud terminals.
+.Pp
+The
+.Fl w Ar message
+option is the only way to send a message to everyone else's screen when
+you start up.
+It is most often used to say
+.Dq eat slime death - NickD's coming in .
+.Pp
+When you die and are asked if you wish to re-enter the game,
+there are other answers than just yes or no.
+You can also reply with a
+.Ic w
+for write a message before continuing or
+.Ic o
+to change how you enter the game (cloaked, scanning, or flying).
+.Pp
+To be notified automatically when a
+.Nm
+starts up, add your login to the
+.Em hunt-players
+mailing list (see
+.Xr huntd 6 ) .
+.Sh PLAYING HINTS
+.Nm
+only works on CRT (vdt) terminals with at least 24 lines, 80 columns, and
+cursor addressing.
+The screen is divided in to 3 areas.
+On the right hand side is the status area.
+It shows damage sustained, charges remaining, who's in the game,
+who's scanning (the
+.Dq *
+in front of the name), who's cloaked (the
+.Dq +
+in front of the name), and other players' scores.
+The rest of the screen is taken up by your map of the maze.
+The 24th line is used for longer messages that don't fit in the status area.
+.Pp
+.Nm
+uses the same keys to move as
+.Xr vi 1
+does, i.e.,
+.Ic h ,
+.Ic j ,
+.Ic k ,
+and
+.Ic l
+for left, down, up, right respectively.
+To change which direction you're facing in the maze,
+use the upper case version of the movement key (i.e.,
+.Ic HJKL ) .
+You can only fire or throw things in the direction you're facing.
+.Bl -tag -width xxxxxxx
+Other commands are:
+.It Ic f No or Ic 1
+Fire a bullet (Takes 1 charge)
+.It Ic g No or Ic 2
+Throw grenade (Takes 9 charges)
+.It Ic F No or Ic 3
+Throw satchel charge (Takes 25 charges)
+.It Ic G No or Ic 4
+Throw bomb (Takes 49 charges)
+.It Ic 5
+Throw big bomb (Takes 81 charges)
+.It Ic 6
+Throw even bigger bomb (Takes 121 charges)
+.It Ic 7
+Throw even more big bomb (Takes 169 charges)
+.It Ic 8
+Throw even more bigger bomb (Takes 225 charges)
+.It Ic 9
+Throw very big bomb (Takes 289 charges)
+.It Ic 0
+Throw very, very big bomb (Takes 361 charges)
+.It Ic @
+Throw biggest bomb (Takes 441 charges)
+.It Ic o
+Throw small slime (Takes 5 charges)
+.It Ic O
+Throw big slime (Takes 10 charges)
+.It Ic p
+Throw bigger slime (Takes 15 charges)
+.It Ic P
+Throw biggest slime (Takes 20 charges)
+.It Ic s
+Scan (show where other players are) (Takes 1 charge)
+.It Ic c
+Cloak (hide from scanners) (Takes 1 charge)
+.It Ic ^L
+Redraw screen
+.It Ic q
+Quit
+.El
+.Pp
+The symbols on the screen are:
+.Bl -tag -width xxxxx -compact -offset indent
+.It -|+
+walls
+.It /\e
+diagonal (deflecting) walls
+.It #
+doors (dispersion walls)
+.It ;
+small mine
+.It g
+large mine
+.It :
+bullet
+.It o
+grenade
+.It O
+satchel charge
+.It @
+bomb
+.It s
+small slime
+.It $
+big slime
+.It \*[Gt]\*[Lt]^v
+you facing right, left, up, or down
+.It }{i!
+other players facing right, left, up, or down
+.It *
+explosion
+.It \e|/
+.It -*-
+grenade and large mine explosion
+.It /|\e
+.El
+.Pp
+Other helpful hints:
+.Bl -bullet
+.It
+You can only fire in the direction you are facing.
+.It
+You can only fire three shots in a row, then the gun must cool off.
+.It
+Shots move 5 times faster than you do.
+.It
+To stab someone, you face that player and move at them.
+.It
+Stabbing does 2 points worth of damage and shooting does 5 points.
+.It
+Slime does 5 points of damage each time it hits.
+.It
+You start with 15 charges and get 5 more every time a player enters
+or re-enters.
+.It
+Grenade explosions cover a 3 by 3 area, each larger bomb cover a
+correspondingly larger area (ranging from 5 by 5 to 21 by 21).
+All explosions are centered around the square the shot hits and
+do the most damage in the center.
+.It
+Slime affects all squares it oozes over.
+The number of squares is equal to the number of charges used.
+.It
+One small mine and one large mine is placed in the maze for every new player.
+A mine has a 2% probability of tripping when you walk forward on to it;
+50% when going sideways; 95% when backing up.
+Tripping a mine costs you 5 points or 10 points respectively.
+Defusing a mine is worth 1 charge or 9 charges respectively.
+.It
+You cannot see behind you.
+.It
+Cloaking consumes 1 ammo charge per 20 of your moves.
+.It
+Scanning consumes 1 ammo charge per (20 \(mu the number of players)
+of other player moves.
+.It
+Turning on cloaking turns off scanning \(em turning on scanning turns off
+cloaking.
+.It
+When you kill someone,
+you get 2 more damage capacity points and 2 damage points get taken away.
+.It
+Maximum typeahead is 5 characters.
+.It
+A shot destroys normal (i.e., non-diagonal, non-door) walls.
+.It
+Diagonal walls deflect shots and change orientation.
+.It
+Doors disperse shots in random directions (up, down, left, right).
+.It
+Diagonal walls and doors cannot be destroyed by direct shots but may
+be destroyed by an adjacent grenade explosion.
+.It
+Slime goes around walls, not through them.
+.It
+Walls regenerate, reappearing in the order they were destroyed.
+One percent of the regenerated walls will be diagonal walls or doors.
+When a wall is generated directly beneath a player, he is thrown in
+a random direction for a random period of time.
+When he lands, he sustains damage (up to 20 percent of the amount of
+damage already sustained); i.e., the less damage he had, the more nimble
+he is and therefore less likely to hurt himself on landing.
+.\"MP
+.\"There is a volcano close to the center of the maze which goes off
+.\"close to every 30 deaths.
+.It
+Every 30 deaths or so, a
+.Dq \&?
+will appear.
+It is a wandering bomb which will explode when it hits someone, or
+when it is slimed.
+.It
+If no one moves, everything stands still.
+.It
+The environment variable
+.Ev HUNT
+is checked to get the player name.
+If you don't have this variable set,
+.Nm
+will ask you what name you want to play under.
+If you wish to set other options than just your name,
+you can enumerate the options as follows:
+.Dl setenv HUNT "name=Sneaky,team=1,cloak,mapkey=zoFfGg1f2g3F4G"
+sets the player name to Sneaky, sets the team to one,
+sets the enter game attribute to cloaked, and the maps
+.Ic z
+to
+.Ic o , F
+to
+.Ic f , G
+to
+.Ic g , 1
+to
+.Ic f , 2
+to
+.Ic g , 3
+to
+.Ic F ,
+and
+.Ic 4
+to
+.Ic G .
+The
+.Ar mapkey
+option must be last.
+Other options are:
+.Ar scan , fly , nobeep , port=string , host=string ,
+and
+.Ar message=string ,
+which correspond to the command line options.
+String options cannot contain commas since commas
+are used to separate options.
+.It
+It's a boring game if you're the only one playing.
+.El
+.Pp
+Your score is the decayed average of the ratio of number of kills to number
+of times you entered the game and is only kept for the duration
+of a single session of
+.Nm .
+.Pp
+.Nm
+normally drives up the load average to be approximately
+(number_of_players + 0.5) greater than it would be without a
+.Nm
+game executing.
+.Sh STATISTICS
+The
+.Fl S
+option fetches the current game statistics.
+The meaning of the column headings are as follows:
+.Bl -tag -width ducked
+.It score
+the player's last score
+.It ducked
+how many shots a player ducked
+.It absorb
+how many shots a player absorbed
+.It faced
+how many shots were fired at player's face
+.It shot
+how many shots were fired at player
+.It robbed
+how many of player's shots were absorbed
+.It missed
+how many of player's shots were ducked
+.It slimeK
+how many slime kills player had
+.It enemy
+how many enemies were killed
+.tI friend
+how many friends were killed (self and same team)
+.It deaths
+how many times player died
+.It still
+how many times player died without typing in any commands
+.It saved
+how many times a shot/bomb would have killed player if he hadn't
+ducked or absorbed it.
+.El
+.Sh SEE ALSO
+.Xr huntd 6
+.Sh AUTHORS
+Conrad Huang, Ken Arnold, and Greg Couch;
+.br
+University of California, San Francisco, Computer Graphics Lab
+.Sh ACKNOWLEDGEMENTS
+We thank Don Kneller,
+John Thomason, Eric Pettersen, Mark Day,
+and Scott Weiner for providing
+endless hours of play-testing to improve the character of the game.
+We hope their significant others will forgive them; we certainly don't.
+.Sh BUGS
+To keep up the pace, not everything is as realistic as possible.
diff --git a/upstream/opensuse-leap-15-6/man6/huntd.6 b/upstream/opensuse-leap-15-6/man6/huntd.6
new file mode 100644
index 00000000..cef428d0
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/huntd.6
@@ -0,0 +1,125 @@
+.\" Automatically generated from hunt/huntd/huntd.6.in. Do not edit.
+.\" $NetBSD: huntd.6,v 1.7 2003/06/11 12:00:22 wiz Exp $
+.\"
+.\" huntd
+.\"
+.\" Copyright (c) 1983-2003, Regents of the University of California.
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions are
+.\" met:
+.\"
+.\" + Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" + Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" + Neither the name of the University of California, San Francisco nor
+.\" the names of its contributors may be used to endorse or promote
+.\" products derived from this software without specific prior written
+.\" permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
+.\" IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
+.\" PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+.\" OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+.\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+.\" LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+.\" OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+.\"
+.Dd April 4, 2001
+.Dt HUNTD 6
+.Sh NAME
+.Nm huntd
+.Nd hunt daemon, back-end for hunt game
+.Sh SYNOPSIS
+.Nm
+.Op Fl s
+.Op Fl p Ar port
+.Sh DESCRIPTION
+.Nm
+controls the multi-player
+.Xr hunt 6
+game.
+When it starts up, it tries to notify all members of the
+.Em hunt-players
+mailing list (see
+.Xr sendmail 8 )
+by faking a
+.Xr talk 1
+request from user
+.Dq Hunt Game .
+.Pp
+The
+.Fl s
+option is for running
+.Nm
+forever (server mode).
+This is similar to running it under the control of
+.Xr inetd 8
+(see below), but it consumes a process table entry when no one is playing.
+.Pp
+The
+.Fl p
+option changes the UDP port number used to rendezvous with the player
+process and thus allows for private games of hunt.
+This option turns off the notification of players on the
+.Em hunt-players
+mailing list.
+.Ss INETD
+To run
+.Nm
+from
+.Xr inetd 8 ,
+you'll need to
+put the
+.Nm hunt
+service in
+.Pa /etc/services :
+.Bd -literal
+hunt 26740/udp # multi-player/multi-host mazewars
+.Ed
+and
+add the following line to
+.Pa /etc/inetd.conf :
+.Bd -literal -offset indent -compact
+hunt dgram udp wait nobody /usr/games/huntd huntd
+.Ed
+Do not use any of the command line options; if you want
+.Xr inetd 8
+to start up
+.Nm
+on a private port, change the port listed for
+.Nm hunt
+in
+.Pa /etc/services .
+.Sh NETWORK RENDEZVOUS
+When
+.Xr hunt 6
+starts up, it broadcasts on the local area net
+(using the broadcast address for each interface) to find a
+.Nm hunt
+game in progress.
+If a
+.Nm
+hears the request, it sends back the port number for the
+.Nm hunt
+process to connect to.
+Otherwise, the
+.Nm hunt
+process starts up a
+.Nm
+on the local machine and tries to rendezvous with it.
+.Sh SEE ALSO
+.Xr talk 1 ,
+.Xr hunt 6 ,
+.Xr sendmail 8
+.Sh AUTHORS
+Conrad Huang, Ken Arnold, and Greg Couch;
+.br
+University of California, San Francisco, Computer Graphics Lab
diff --git a/upstream/opensuse-leap-15-6/man6/intro.6 b/upstream/opensuse-leap-15-6/man6/intro.6
new file mode 100644
index 00000000..71626d68
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/intro.6
@@ -0,0 +1,17 @@
+.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
+.\" Fri Apr 2 11:32:09 MET DST 1993
+.\"
+.\" SPDX-License-Identifier: GPL-2.0-or-later
+.\"
+.\" Modified Sat Jul 24 17:19:57 1993 by Rik Faith (faith@cs.unc.edu)
+.TH intro 6 2022-10-30 "Linux man-pages 6.04"
+.SH NAME
+intro \- introduction to games
+.SH DESCRIPTION
+Section 6 of the manual describes the games and funny little programs
+available on the system.
+.SH NOTES
+.SS Authors and copyright conditions
+Look at the header of the manual page source for the author(s) and copyright
+conditions.
+Note that these can be different from page to page!
diff --git a/upstream/opensuse-leap-15-6/man6/monopoly.6 b/upstream/opensuse-leap-15-6/man6/monopoly.6
new file mode 100644
index 00000000..6782afe3
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/monopoly.6
@@ -0,0 +1,184 @@
+.\" Automatically generated from monop/monop.6.in. Do not edit.
+.\" $NetBSD: monop.6,v 1.16 2003/08/07 09:37:28 agc Exp $
+.\"
+.\" Copyright (c) 1980 The Regents of the University of California.
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)monop.6 6.5 (Berkeley) 3/25/93
+.\"
+.Dd March 25, 1993
+.Dt MONOP 6
+.Os
+.Sh NAME
+.Nm monop
+.Nd Monopoly game
+.Sh SYNOPSIS
+.Nm
+.Op Ar file
+.Sh DESCRIPTION
+.Nm
+is reminiscent of the Parker Brother's game Monopoly, and
+monitors a game between 1 to 9 users.
+It is assumed that the rules of Monopoly are known.
+The game follows the standard rules, with the exception that,
+if a property goes up for auction and there are only two solvent players,
+no auction is held and the property remains unowned.
+.Nm
+The game, in effect, lends the player money,
+so it is possible to buy something which you cannot afford.
+However, as soon as a person goes into debt, he must
+.Dq fix the problem ,
+i.e., make himself solvent, before play can continue.
+If this is not possible, the player's property reverts to his debtee,
+either a player or the bank.
+A player can resign at any time to any person or the bank,
+which puts the property back on the board, unowned.
+.Pp
+Any time that the response to a question is a
+.Em string ,
+e.g., a name, place or person, you can type
+.Sq Ic \&?
+to get a list of valid answers.
+It is not possible to input a negative number, nor is it ever necessary.
+.Pp
+.Em A Summary of Commands :
+.Bl -tag -width item
+.It Ic quit
+quit game: This allows you to quit the game.
+It asks you if you're sure.
+.It Ic print
+print board: This prints out the current board.
+The columns have the following meanings (column headings are the same for the
+.Ic where ,
+.Ic own holdings ,
+and
+.Ic holdings
+commands):
+.Pp
+.Bl -tag -width indent -compact
+.It Name
+The first ten characters of the name of the square.
+.It Own
+The
+.Em number
+of the owner of the property.
+.It Price
+The cost of the property (if any).
+.It Mg
+This field has a
+.Sq *
+in it if the property is mortgaged.
+.It \&#
+If the property is a Utility or Railroad, this is the number
+of such owned by the owner.
+If the property is land, this is the number of houses on it.
+.It Rent
+Current rent on the property.
+If it is not owned, there is no rent.
+.El
+.It Ic where
+where players are: Tells you where all the players are.
+A
+.Sq *
+indicates the current player.
+.It Ic own holdings
+List your own holdings,
+i.e., money, get-out-of-jail-free cards, and property.
+.It Ic holdings
+holdings list: Look at anyone's holdings.
+It will ask you whose holdings you wish to look at.
+When you are finished, type
+.Sq Ic done .
+.It Ic mortgage
+mortgage property:
+Sets up a list of mortgageable property, and asks which you wish to mortgage.
+.It Ic unmortgage
+unmortgage property:
+Unmortgage mortgaged property.
+.It Ic buy
+buy houses:
+Sets up a list of monopolies on which you can buy houses.
+If there is more than one, it asks you which you want to buy for.
+It then asks you how many for each piece of property,
+giving the current amount in parentheses after the property name.
+If you build in an unbalanced manner
+(a disparity of more than one house within the same monopoly),
+it asks you to re-input things.
+.It Ic sell
+sell houses:
+Sets up a list of monopolies from which you can sell houses.
+It operates in an analogous manner to
+.Ic buy .
+.It Ic card
+card for jail:
+Use a get-out-of-jail-free card to get out of jail.
+If you're not in jail, or you don't have one, it tells you so.
+.It Ic pay
+pay for jail:
+Pay $50 to get out of jail, from whence you are put on Just Visiting.
+Difficult to do if you're not there.
+.It Ic trade
+This allows you to trade with another player.
+It asks you whom you wish to trade with,
+and then asks you what each wishes to give up.
+You can get a summary at the end, and, in all cases,
+it asks for confirmation of the trade before doing it.
+.It Ic resign
+Resign to another player or the bank.
+If you resign to the bank, all property reverts to its virgin state,
+and get-out-of-jail-free cards revert to the deck.
+.It Ic save
+save game:
+Save the current game in a file for later play.
+You can continue play after saving,
+either by adding the file in which you saved the game after the
+.Nm
+command, or by using the
+.Ic restore
+command (see below).
+It will ask you which file you wish to save it in,
+and, if the file exists, confirm that you wish to overwrite it.
+.It Ic restore
+restore game:
+Read in a previously saved game from a file.
+It leaves the file intact.
+.It Ic roll
+Roll the dice and move forward to your new location.
+If you simply hit the
+.Aq RETURN
+key instead of a command, it is the same as typing
+.Ic roll .
+.El
+.Sh AUTHOR
+.An Ken Arnold
+.Sh FILES
+.Bl -tag -width /usr/share/games/monop-cards.pck -compact
+.It Pa /usr/share/games/monop-cards.pck
+Chance and Community Chest cards
+.El
+.Sh BUGS
+No command can be given an argument instead of a response to a query.
diff --git a/upstream/opensuse-leap-15-6/man6/number.6 b/upstream/opensuse-leap-15-6/man6/number.6
new file mode 100644
index 00000000..72266379
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/number.6
@@ -0,0 +1,59 @@
+.\" $NetBSD: number.6,v 1.7 2003/08/07 09:37:30 agc Exp $
+.\"
+.\" Copyright (c) 1989, 1993, 1994
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)number.6 8.2 (Berkeley) 3/31/94
+.\"
+.Dd March 31, 1994
+.Dt NUMBER 6
+.Os
+.Sh NAME
+.Nm number
+.Nd convert Arabic numerals to English
+.Sh SYNOPSIS
+.Nm
+.Op Fl l
+.Op Ar number ...
+.Sh DESCRIPTION
+The
+.Nm
+utility prints the English equivalent of the number to the standard
+output, with each 10^3 magnitude displayed on a separate line.
+If no argument is specified,
+.Nm
+reads lines from the standard input.
+.Pp
+The options are as follows:
+.Bl -tag -width Ds
+.It Fl l
+Display the number on a single line.
+.El
+.Sh BUGS
+Although
+.Nm
+understand fractions, it doesn't understand exponents.
diff --git a/upstream/opensuse-leap-15-6/man6/phantasia.6 b/upstream/opensuse-leap-15-6/man6/phantasia.6
new file mode 100644
index 00000000..94ff3e02
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/phantasia.6
@@ -0,0 +1,1197 @@
+.\" $NetBSD: phantasia.6,v 1.11 2004/01/03 13:32:23 wiz Exp $
+.\"
+.Dd April 1, 2001
+.Dt PHANTASIA 6
+.Os
+.Sh NAME
+.Nm phantasia
+.Nd an interterminal fantasy game
+.Sh SYNOPSIS
+.Nm
+.Op Fl abHmpSsx
+.Sh DESCRIPTION
+.Nm
+is a role playing game which allows players to roll up characters of
+various types to fight monsters and other players.
+Progression of characters is based upon gaining experience from fighting
+monsters (and other players).
+.Pp
+Most of the game is menu driven and self-explanatory (more or less).
+The screen is cursor updated, so be sure to set up the
+.Ev TERM
+variable in your environment.
+.Pp
+The options provide for a variety of functions to support the game.
+They are:
+.Pp
+.Bl -tag -width aaa -offset indent
+.It Fl a
+Get a listing of all character names on file.
+.It Fl b
+Show scoreboard of top characters per login.
+.It Fl H
+Print header only.
+.It Fl m
+Get a monster listing.
+.It Fl p
+Purge old characters.
+.It Fl S
+Turn on wizard options, if allowed, if running as
+.Dq root .
+.It Fl s
+Invokes
+.Nm
+without header information.
+.It Fl x
+Examine/change a particular character on file.
+.El
+.Pp
+The characters are saved on a common file, in order to make the game
+interactive between players.
+The characters are given a password in order to retrieve them later.
+Only characters above
+.Em level
+zero are saved.
+Characters unused for awhile will be purged.
+Characters are only placed on the scoreboard when they die.
+.Sh PARTICULARS
+.Ss Normal Play
+A number of the player's more important statistics are almost always
+displayed on the screen, with maximums (where applicable) in
+parentheses.
+.Pp
+The character is placed randomly near the center of a Cartesian
+system.
+Most commands are selected with a single letter or digit.
+For example, one may move by hitting 'W', 'S', 'N', or 'E',
+(lower case may also be used, at no time is the game case dependent).
+One may also use 'H', 'J', 'K', 'L',
+for movement, similar to
+.Xr vi 1 .
+To move to a specific (x, y) coordinate, use the
+.Ic move
+('1') command.
+The distance a character can move is calculated by
+1 plus 1.5 per
+.Em level .
+Moving in a compass direction will move the player the maximum
+allowed distance in that direction.
+.Pp
+A player may see who else is playing by using the
+.Ic players
+('2') option.
+One may see the coordinates of those who are the same
+distance or closer to the origin as he/she.
+.Em Kings ,
+and
+.Em council of the wise
+can see and can be seen by everyone.
+A
+.Em palantir
+removes these restrictions.
+.Pp
+One can talk to other players with the
+.Ic talk
+('3') option.
+In general, this is a line or so of text.
+To remove a current
+message, just type
+.Aq return
+when prompted for a message.
+.Pp
+The
+.Ic stats
+('4') option shows additional characteristics of a player.
+.Pp
+One may leave the game either with the
+.Ic quit
+('5') option.
+.Pp
+One may rest by default.
+Resting lets one regain maximum
+.Em energy level ,
+and also lets one find
+.Em mana
+(more is found for larger levels and further distances from the origin).
+.Pp
+One may call a monster by hitting '9' or 'C'.
+.Pp
+Use 'X' to examine other players.
+.Pp
+One may quit or execute a sub-shell by hitting interrupt.
+Quitting during battle results in death for obvious reasons.
+.Pp
+Several other options become available as the player progresses in
+.Em level
+and
+.Em magic ,
+or to other stations in the game
+.Em ( valar ,
+.Em council of the wise ,
+.Em king ) .
+These are described elsewhere.
+In general, a control-L will force the redrawing of the screen.
+.Pp
+Other things which may happen are more or less self-explanatory.
+.Ss Fighting Monsters
+A player has several options while fighting monsters.
+They are as follows:
+.Bl -tag -width skirmish -offset indent
+.It Ic melee
+Inflicts damage on the monster, based upon
+.Em strength .
+Also decreases the monster's
+.Em strength
+some.
+.It Ic skirmish
+Inflicts a little less damage than
+.Ic melee ,
+but decreases the monster's
+.Em quickness
+instead.
+.It Ic evade
+Attempt to run away.
+Success is based upon both the player's and the monster's
+.Em brains
+and
+.Em quickness .
+.It Ic spell
+Several options for throwing spells (described elsewhere).
+.It Ic nick
+Hits the monster one plus the player's
+.Em sword ,
+and gives the player 10% of the monster's
+.Em experience .
+Decreases the monster's
+.Em experience
+an amount proportional to the amount granted.
+This also increases the monster's quickness.
+Paralyzed monsters wake up very fast when nicked.
+.It Ic luckout
+This is essentially a battle of wits with the monster.
+Success is based upon the player's and the monster's
+.Em brains .
+The player gets credit for slaying the monster if he/she succeeds.
+Otherwise, nothing happens, and the chance to
+.Ic luckout
+is lost.
+.El
+.Ss Character Statistics
+.Bl -tag -width quickness -offset indent
+.It Em strength
+determines how much damage a character can inflict.
+.It Em quickness
+determines how many chances a character gets to make decisions while fighting.
+.It Em energy level
+specifies how much damage a character may endure before dying.
+.It Em magic level
+determines which spells a character may throw, and how effective those
+spells will be.
+.It Em brains
+basically, the character's intelligence; used for various fighting options
+and spells.
+.It Em mana
+used as a power source for throwing spells.
+.It Em experience
+gained by fighting monsters and other characters.
+.It Em level
+indicative of how much experience a character has accumulated; progresses
+geometrically as
+.Em experience
+increases.
+.It Em poison
+sickness which degrades a character's performance (affects
+.Em energy level
+and
+.Em strength ) .
+.It Em sin
+accumulated as a character does certain nasty things; used only rarely
+in normal play of the game.
+.It Em age
+of player; roughly equivalent to number of turns.
+As
+.Em age
+increases, many personal statistics degenerate.
+.El
+.Ss Character Types
+Character statistics are rolled randomly from the above list, according
+to character type.
+The types are as follows:
+.Bl -tag -width "experimento" -offset indent
+.It Em magic user
+strong in
+.Em magic level
+and
+.Em brains ,
+weak in other areas.
+Must rely on wits and magic to survive.
+.It Em fighter
+good in
+.Em strength
+and
+.Em energy level ,
+fairly good in other areas.
+This adds up to a well-equipped fighter.
+.It Em elf
+very high
+.Em quickness
+and above average
+.Em magic level
+are
+.Em elves
+selling points.
+.It Em dwarf
+very high
+.Em strength
+and
+.Em energy level ,
+but with a tendency to be rather slow and not too bright.
+.It Em halfling
+rather quick and smart, with high
+.Em energy level ,
+but poor in
+.Em magic
+and
+.Em strength .
+Born with some
+.Em experience .
+.It Em experimento
+very mediocre in all areas.
+However, the
+.Em experimento
+may be placed almost anywhere within the playing grid.
+.El
+.Pp
+The possible ranges for starting statistics are summarized in
+the following table.
+.TS
+l c c c c c c
+l c c c c c c.
+Type Strength Quick Mana Energy Brains Magic
+_
+Mag. User 10-15 30-35 50-100 30-45 60-85 5-9
+Fighter 40-55 30-35 30-50 45-70 25-45 3-6
+Elf 35-45 32-38 45-90 30-50 40-65 4-7
+Dwarf 50-70 25-30 25-45 60-100 20-40 2-5
+Halfling 20-25 34 25-45 55-90 40-75 1-4
+Experimento 25 27 100 35 25 2
+.TE
+.\" .Bl -column "Experimento" "Strength" "Quick" "xxxxxx" "Energy" "Brains" "Magic"
+.\" .It Sy Charactertype Strength Quick Mana Energy Brains Magic
+.\" .It "Magic User" 10-15 30-35 50-100 30-45 60-85 5-9
+.\" .It Fighter 40-55 30-35 30-50 45-70 25-45 3-6
+.\" .It Elf 35-45 32-38 45-90 30-50 40-65 4-7
+.\" .It Dwarf 50-70 25-30 25-45 60-100 20-40 2-5
+.\" .It Halfling 20-25 34 25-45 55-90 40-75 1-4
+.\" .It Experimento 25 27 100 35 25 2
+.\" .El
+.Pp
+Not only are the starting characteristics different for the different
+character types, the characteristics progress at different rates for the
+different types as the character goes up in
+.Em level .
+.Em Experimentoes Ns '
+characteristics progress randomly as one of the other types.
+The progression as characters increase in
+.Em level
+is summarized in the following table.
+.Pp
+.TS
+nokeep ;
+l c c c c c
+l n n n n n.
+Type Strength Mana Energy Brains Magic
+_
+Mag. User 2.0 75 20 6 2.75
+Fighter 3.0 40 30 3.0 1.5
+Elf 2.5 65 25 4.0 2.0
+Dwarf 5 30 35 2.5 1
+Halfling 2.0 30 30 4.5 1
+.TE
+.Pp
+The character type also determines how much gold a player may
+carry, how long until
+.Em rings
+can overcome the player, and how much
+.Em poison
+the player can withstand.
+.Ss Spells
+During the course of the game, the player may exercise his/her
+magic powers.
+These cases are described below.
+.Bl -tag -width "all or nothing" -offset indent
+.It Ic cloak
+.Em magic level necessary :
+20 (plus level 7)
+.br
+.Em mana used :
+35 plus 3 per rest period
+.br
+Used during normal play.
+Prevents monsters from finding the character,
+as well as hiding the player from other players.
+His/her coordinates show up as '?' in the
+.Ic players
+option.
+Players cannot collect
+.Em mana ,
+find trading posts, or discover the
+.Em grail
+while cloaked.
+Calling a monster uncloaks, as well as choosing this option while cloaked.
+.It Ic teleport
+.Em magic level necessary :
+40 (plus level 12)
+.br
+.Em mana used :
+30 per 75 moved
+.br
+Used during normal play.
+Allows the player to move with much more freedom than with the
+.Ic move
+option, at the price of expending mana.
+The maximum distance possible to move is based upon
+.Em level
+and
+.Em magic level .
+.It Ic power blast
+.Em magic level necessary :
+none
+.br
+.Em mana used :
+5 times
+.Em level
+.br
+Used during inter-terminal battle.
+Damage is based upon
+.Em magic level
+and
+.Em strength .
+Hits much harder than a normal hit.
+.It Ic all or nothing
+.Em magic level necessary :
+none
+.br
+.Em mana used :
+1
+.br
+Used while combating monsters.
+Has a 25% chance of working.
+If it works it hits the monster just enough to kill it.
+If it fails, it doesn't hit the monster, and doubles the monster's
+.Em quickness
+and
+.Em strength .
+Paralyzed monsters wake up much quicker as a result of this spell.
+.It Ic magic bolt
+.Em magic level necessary :
+5
+.br
+.Em mana used :
+variable
+.br
+Used while combating monsters.
+Hits the monster based upon the amount
+of
+.Em mana
+expended and
+.Em magic level .
+Guaranteed to hit at least 10 per
+.Em mana .
+.It Ic force field
+.Em magic level necessary :
+15
+.br
+.Em mana used :
+30
+.br
+Used during monster combat.
+Throws up a shield to protect from damage.
+The shield is added to actual energy level, and is a fixed number, based
+upon maximum energy.
+Normally, damage occurs first to the shield, and then to the players actual
+.Em energy level .
+.It Ic transform
+.Em magic level necessary :
+25
+.br
+.Em mana used :
+50
+.br
+Used during monster combat.
+Transforms the monster randomly into one of the 100 monsters from
+the monster file.
+.It Ic increase might
+.Em magic level necessary :
+35
+.br
+.Em mana used :
+75
+.br
+Used during combat with monsters.
+Increases strength up to a maximum.
+.It Ic invisibility
+.Em magic level necessary :
+45
+.br
+.Em mana used :
+90
+.br
+Used while fighting monsters.
+Makes it harder for the monster to hit, by temporarily increasing the player's
+.Em quickness .
+This spell may be thrown several times, but a maximum level will be reached.
+.It Ic transport
+.Em magic level necessary :
+60
+.br
+.Em mana used :
+125
+.br
+Used during monster combat.
+Transports the monster away from the player.
+Success is based upon player's
+.Em magic
+and
+.Em brains ,
+and the monster's
+.Em experience .
+If it fails the player is transported instead.
+60% of the time, the monster will drop any treasure it was carrying.
+.It Ic paralyze
+.Em magic level necessary :
+75
+.br
+.Em mana used :
+150
+.br
+Used during monster combat.
+.Dq Freezes
+the monster by putting its
+.Em quickness
+slightly negative.
+The monster will slowly wake up.
+Success is based upon player's
+.Em magic
+and the monster's
+.Em experience .
+If it fails, nothing happens.
+.It Ic specify
+.Em magic level necessary :
+none
+.br
+.Em mana used :
+1000
+.br
+Used during monster combat only by
+.Em valar
+or
+.Em council of the wise .
+Allows the player to pick which monster to fight.
+.El
+.Ss Monsters
+Monsters get bigger as one moves farther from the origin (0,0).
+Rings of distance 125 from the origin determine the size.
+A monster's
+.Em experience ,
+.Em energy level ,
+and
+.Em brains
+are multiplied by the size.
+.Em Strength
+is increased 50% per size over one, and
+.Em quickness
+remains the same, regardless of size.
+.Pp
+Also, nastier monsters are found as one progress farther out from the origin.
+Monsters also may flock.
+The percent chance of that happening is designated as
+.Em flock%
+in the monster listing.
+Monsters outside the first ring
+may carry treasure, as determined by their treasure type.
+Flocking monsters, and bigger monsters increase the chances of treasure.
+.Pp
+Certain monsters have special abilities; they are as follows:
+.Bl -tag -width "Assorted Faeries"
+.It Em Unicorn
+can only be subdued if the player is in possession of a
+.Em virgin .
+.It Em Modnar
+has random characteristics, including treasure type.
+.It Em Mimic
+will pick another name from the list of monsters in order to confuse.
+.It Em Dark Lord
+very nasty person.
+Does not like to be hit (especially nicked),
+and many spells do not work well (or at all) against him.
+One can always
+.Em evade
+from the
+.Em Dark Lord .
+.It Em Leanan-Sidhe
+also a very nasty person.
+She will permanently sap
+.Em strength
+from someone.
+.It Em Saruman
+wanders around with
+.Em Wormtongue ,
+who can steal a
+.Em palantir .
+Also,
+.Em Saruman
+may turn a player's gems into gold pieces, or scramble her/his stats.
+.It Em Thaumaturgist
+can transport a player.
+.It Em Balrog
+inflicts damage by taking away
+.Em experience ,
+not
+.Em energy .
+.It Em Vortex
+may take some
+.Em mana .
+.It Em Nazgul
+may try to steal a
+.Em ring
+or neutralize part of one's
+.Em brains .
+.It Em Tiamat
+may take half a player's
+.Em gold
+and
+.Em gems
+and escape.
+.It Em Kobold
+may get nasty and steal one gold piece and run away.
+.It Em Shelob
+may bite, inflicting the equivalent of one
+.Em poison .
+.It Em Assorted Faeries
+These are killed if attacking someone carrying
+.Em holy water .
+These are
+.Em Cluricaun , Fir Darrig , Fachan ,
+.Em Ghille Dhu , Bogle , Killmoulis ,
+and
+.Em Bwca .
+.It Em Lamprey
+may bite, inflicting 1/2 of a
+.Em poison .
+.It Em Shrieker
+will call one of its (much bigger) buddies if picked upon.
+.It Em Bonnacon
+will become bored with battle, fart, and run off.
+.It Em Smeagol
+will try to steal a
+.Em ring
+from a player, if given the chance.
+.It Em Succubus
+may inflict damage through a
+.Ic force field .
+This subtracts from
+.Em energy level
+instead of any shield the player may have thrown up.
+This is a very easy way to die.
+.It Em Cerberus
+loves metal and will steal all the metal treasures from a player if able.
+.It Em Ungoliant
+can bite and poison.
+This inflicts five
+.Em poisons ,
+and also takes one from the player's
+.Em quickness .
+.It Em Jabberwock
+may tire of battle, and leave after calling one of his friends
+.Em ( Jubjub Bird
+or
+.Em Bandersnatch ) .
+.It Em Morgoth
+actually
+.Em Modnar ,
+but reserved for
+.Em council of the wise , valar ,
+and
+.Em ex-valar .
+Fights with
+.Em Morgoth
+end when either he or the player dies.
+His characteristics are calculated based upon the player's.
+The player is given the chance to ally with him.
+No magic, except
+.Ic force field
+works when battling
+.Em Morgoth .
+.It Em Troll
+may regenerate its
+.Em energy
+and
+.Em strength
+while in battle.
+.It Em Wraith
+may make a player blind.
+.El
+.Ss Treasures
+The various treasure types are as follows:
+.Bl -tag -width "type twelve/thirteen"
+.It Type zero
+none
+.It Type one
+.Em power booster
+\- adds mana.
+.br
+.Em druid
+\- adds experience.
+.br
+.Em holy orb
+\- subtracts 0.25 sin.
+.TP 1.5i
+.It Type two
+.Em amulet
+\- protects from cursed treasure.
+.br
+.Em holy water
+\- kills
+.Em assorted faeries .
+.br
+.Em hermit
+\- reduces sin by 25% and adds some mana.
+.It Type three
+.Em shield
+\- adds to maximum
+.Em energy level .
+.br
+.Em virgin
+\- used to subdue a
+.Em unicorn ,
+or to give much
+.Em experience
+(and some
+.Em sin ) .
+.br
+.Em athelas
+\- subtracts one
+.Em poison .
+.It Type four (scrolls)
+.Em shield
+\- throws a bigger than normal
+.Ic force field .
+.br
+.Em invisible
+\- temporarily puts the finder's
+.Em quickness
+to one million.
+.br
+.Em ten fold strength
+\- multiplies finder's strength by ten.
+.br
+.Em pick monster
+\- allows finder to pick next monster to battle.
+.br
+.Em general knowledge
+\- adds to finder's
+.Em brains
+and
+.Em magic level .
+.Pp
+All the scrolls except
+.Em general knowledge
+automatically call a monster.
+These preserve any spells that were already in effect, but are only in
+effect while in battle.
+.It Type five
+.Em dagger
+\- adds to
+.Em strength .
+.br
+.Em armour
+\- same as a
+.Em shield ,
+but bigger.
+.br
+.Em tablet
+\- adds
+.Em brains .
+.It Type six
+.Em priest
+\- rests to maximum; adds
+.Em mana , brains ;
+and halves
+.Em sin .
+.br
+.Em Robin Hood
+\- increases
+.Em shield
+and adds permanently to
+.Em strength .
+.br
+.Em axe
+\- like
+.Em dagger ,
+but bigger.
+.It Type seven
+.Em charm
+\- protects from cursed treasure (used before
+.Em amulet ) ;
+used in conjunction with
+.Em blessing
+to battle
+.Em Dark Lord .
+.br
+.Em Merlyn
+\- adds
+.Em brains , magic ,
+and
+.Em mana .
+.br
+.Em war hammer
+\- like an
+.Em axe ,
+but bigger.
+.It Type eight
+.Em healing potion
+\- sets
+.Em poison
+to -2, or subtracts two from
+.Em poison ,
+whichever is better.
+.br
+.Em transporter
+\- allows finder to move anywhere.
+.br
+.Em sword
+\- like a
+.Em war hammer ,
+but bigger.
+.It Type nine
+.Em golden crown
+\- allows the player to become
+.Em king ,
+by going to (0,0).
+.br
+.Em blessing
+\- cuts
+.Em sin
+to 1/3, adds
+.Em mana ,
+rests to maximum, kills
+.Em Dark Lord
+with a
+.Em charm ,
+and gives bearer first hit on all monsters.
+.br
+.Em quicksilver
+\- adds to
+.Em quickness .
+.It Type ten
+.Em elven boots
+\- adds permanently to
+.Em quickness .
+.It Type eleven
+.Em palantir
+\- allows one to see all the other players; used by
+.Em council of the wise
+to seek the
+.Em grail .
+.It Type twelve/thirteen
+.Em ring
+\- allows one to hit much harder in battle, etc.
+.El
+.Pp
+Any treasure type 10-13 monsters may instead carry a type nine treasure.
+.Pp
+A monster may also be carrying
+.Em gold
+or
+.Em gems .
+These are used at
+.Em trading posts
+to buy things.
+A
+.Em gem
+is worth 1000 gold pieces.
+Too much
+.Em gold
+will slow a player down.
+One may carry 1000 plus 200 per
+.Em level
+of
+.Em gold .
+A
+.Em gem
+weighs one half a gold piece.
+Monsters of treasure type 7 or higher may carry
+.Em gems .
+.Pp
+The chance of a cursed treasure is based upon treasure type.
+The more valuable treasures have a greater chance of being cursed.
+A cursed treasure knocks
+.Em energy level
+very low, and adds 0.25
+.Em poison .
+.Ss Rings
+.Em Rings
+are only carried by
+.Em nazguls
+and
+.Em Dark Lords .
+They come in four different flavors.
+All
+.Em rings
+rest the player to maximum and cause him/her to hit much harder
+in battle with monsters (assuming one has chosen to use the
+.Em ring
+for battle.)
+.Pp
+Two types of
+.Em rings
+are cursed and come either from
+.Em nazguls
+or
+.Em Dark Lord .
+After a few times of using these types, the player falls
+under the control of the
+.Em ring ,
+and strange, random things will occur.
+Eventually, the player dies, and gives his/her name to a monster
+on the file.
+Dying before the
+.Em ring
+is used up also renames the monster.
+.Pp
+The two remaining types of
+.Em rings
+are much more benign.
+The one from a
+.Em nazgul
+is good for a limited number of battle rounds, and will save
+the player from death if it was being used when he/she died.
+The one from
+.Em Dark Lord
+is the same, except that it never is used up.
+.Em rings
+disappear after saving someone from death.
+In general, cursed
+.Em rings
+occur much more often than normal ones.
+It is usually not a good idea to pick one up.
+The only way to get rid of a
+.Em ring
+is to have a monster steal it.
+.Ss King
+A player may become
+.Em king
+by finding a
+.Em crown
+and going to (0,0).
+Players must have a
+.Em level
+in the range of 10 to 1000 to be able to find a
+.Em crown .
+When a player with one or more
+.Em crowns
+reaches
+.Em level
+1000, the
+.Em crowns
+are converted to
+.Em gold .
+.Pp
+Once a player is king, he/she may do certain things while in
+the Lord's Chamber (0,0).
+These are exercised with the
+.Ic decree
+('0') option.
+.Bl -tag -width "collect taxes"
+.It Ic transport
+This is done to another player.
+It randomly moves the affected player about.
+A
+.Em charm
+protects from transports.
+.It Ic curse
+This is done to another player.
+It is analogous to cursed treasure, but worse.
+It inflicts two
+.Em poison ,
+knocks
+.Em energy level
+very low, and degrades the maximum energy.
+It also removes a
+.Em cloak .
+A
+.Em blessing
+protects from king's curses.
+.It Ic energy void
+The king may put a number of these scattered about
+his/her kingdom as he/she pleases.
+If a player hits one, he/she loses
+.Em mana , energy ,
+and
+.Em gold .
+The energy void disappears after being hit.
+.It Ic bestow
+This is also done to another player.
+The king may wish to reward one or more loyal subjects by sharing his/her
+riches
+.Em ( gold ) .
+Or it is a convenient way to dispose of some unwanted deadweight.
+.It Ic collect taxes
+Everyone pays 7% tax on all
+.Em gold
+and
+.Em gems
+acquired, regardless of the existence of a
+.Em king .
+The king collects the accrued taxes with this option.
+.El
+.Pp
+The
+.Em king
+may also
+.Ic teleport
+anywhere for free by using the origin as a starting place.
+.Ss Council of the Wise, Valar
+A player automatically becomes a member of the
+.Em council of the wise
+upon reaching level 3000.
+Members of the council cannot have
+.Em rings .
+Members of the council have a few extra options which they can exercise.
+These are exercised with the
+.Ic intervene
+('8') option.
+All
+.Ic intervene
+options cost 1000 mana.
+One
+.Ic intervene
+option is to
+.Ic heal
+another player.
+This is just a quick way for that player to be rested
+to maximum and lose a little
+.Em poison .
+The main purpose in life for members of the council is to seek the
+.Em Holy Grail .
+This is done with a
+.Em palantir
+under the
+.Ic seek grail
+option.
+The distance cited by the seek is accurate within 10%, in order
+not to make it too easy to find the grail.
+A player must have infinitesimally small
+.Em sin ,
+or else it's all over upon finding the grail.
+In order to help members of the council on their quest, they
+may
+.Ic teleport
+with greater ease.
+.Pp
+Upon finding the grail, the player advances to position of
+.Em valar .
+He/she may then exercise more and niftier options under
+.Ic intervention .
+These include all of the council members' options plus the
+ability to move other players about, bless them, and throw monsters at
+them.
+A
+.Em valar Ns 's
+blessing has the same effect as the treasure
+.Em blessing ,
+except that the affected player does not get his/her
+.Em blessing
+flag set.
+All
+.Ic intervention
+options which affect other players age the player who uses them.
+.Em Valars
+are essentially immortal, but are actually given five lives.
+If these are used up, the player is left to die, and becomes an
+.Em ex-valar .
+A
+.Em valar
+cannot
+.Ic move , teleport ,
+or call monsters.
+(An exception to this is if the
+.Em valar
+finds a
+.Em transporter . )
+This is to allow him/her to dispose of excess
+.Em gold .
+Any monsters which a
+.Em valar
+encounters are based upon his/her size.
+Only one valar may exist at a time.
+The current valar is replaced when another player finds the grail.
+The valar is then bumped back to the council of the wise.
+.Ss Wizard
+The
+.Em wizard
+is usually the owner of the game, and the one who maintains
+the associated files.
+The
+.Em wizard
+is granted special powers within the game, if it is invoked
+with the
+.Fl S
+option.
+Otherwise, the
+.Em wizard
+plays no different from other players.
+The
+.Em wizard
+abilities are outlined below.
+.Bl -tag -width "super character type"
+.It Ic change players
+When examining a player, (game invoked with
+.Fl x ,
+or use 'X' from within game), the
+.Em wizard
+may also change the player.
+.It Ic intervention
+The
+.Em wizard
+may do all the
+.Ic intervention
+options.
+One extra option,
+.Ic vaporize ,
+is added to kill any offensive players.
+.It Ic super character type
+An extra character type is added.
+This character starts with the
+maximum possible in all statistics, selected from the other character types.
+A
+.Em super
+character's statistics also progress at the maximum possible rate, selected
+from the other character types.
+.El
+.Ss Special Places
+Certain regions of the playing grid have different names.
+In general, this is only to give the player some idea of
+his/her present location.
+Some special places do exist.
+.Bl -tag -width "Trading Posts"
+.It Em Trading Posts
+These are located at |x| == |y| == n*n*100 for n = 1, 2, ..., 1000.
+Trading posts farther out have more things for sale.
+Be careful about cheating the merchants there, as they have short tempers.
+Merchants are dishonest about 5% of the time.
+.It Em Lord's Chamber
+This is located at (0,0).
+Only players with
+.Em crowns
+may enter.
+.It Em Point of \&No Return
+This is located beyond 1.2e+6 in any direction.
+The only way to return from here is a
+.Em transporter
+or to have a
+.Em valar
+relocate the player.
+.It Em Dead Marshes
+This is a band located fairly distant from the origin.
+The first fourteen monsters (water monsters) can normally only be found here.
+.It Em Valhala
+This place is where the
+.Em valar
+resides.
+It is associated with no particular coordinate on the playing grid.
+.El
+.Ss Miscellaneous
+Once a player reaches
+.Em level
+5, the game will start to time out waiting for input.
+This is to try to keep the game a bit faster paced.
+.Pp
+A
+.Em guru
+will never be disgusted with your
+.Em sins
+if they are less than one.
+.Pp
+A
+.Em medic
+wants half of a player's
+.Em gold
+to be happy.
+Offering more than one has, or a negative amount will anger the
+.Em medic ,
+who will make the player worse (add one
+.Em poison ) .
+.Pp
+The
+.Em Holy Grail
+does little for those who are not ready to behold it.
+Whenever anyone finds it, it moves.
+It is always located within 1e+6 in any compass direction of the origin.
+.Pp
+There is a maximum amount of
+.Em mana
+and
+.Em charms
+a player may posses, based upon
+.Em level .
+.Em Quicksilver
+is always limited to to a maximum of 99.
+.Pp
+.Em Books
+bought at a
+.Em trading post
+increase
+.Em brains ,
+based upon the number bought.
+It is unwise, however to buy more than 1/10 of one's
+.Em level
+in books at a time.
+.Pp
+Players over level 10000 are automatically retired.
+.Pp
+A
+.Em blindness
+goes away in random time.
+.Pp
+Players with
+.Em crowns
+are identified with a '*' before their character type.
+.Ss Inter-terminal Battle
+When two player's coordinates correspond, they may engage in battle.
+In general, the player with the highest
+.Em quickness
+gets the first hit.
+If the two players are severely mismatched, the stronger player
+is drastically handicapped for the battle.
+In order to protect from being stuck in an infinite loop,
+the player waiting for response may time out.
+Options for battle are:
+.Bl -tag -width "power blast"
+.It Ic fight
+Inflicts damage upon other person.
+.It Ic run away
+Escape from battle.
+Has a 75% chance of working.
+.It Ic power blast
+Battle spell.
+.It Ic luckout
+One-time chance to try to win against the foe.
+Has a 10% chance of working.
+.El
+.Pp
+Sometimes waits for the other player may be excessive, because
+he/she may be battling a monster.
+Upon slaying a player in battle the winner gets the other's
+.Em experience
+and treasures.
+.Em Rings
+do not work for inter-terminal battle.
+.Sh AUTHORS
+.An Edward Estes ,
+AT\*[Am]T Information Systems, Skokie, IL
+.Sh BUGS
+All screen formats assume at least 24 lines by at least 80 columns.
+No provisions are made for when any of the data items get too big
+for the allotted space on the screen.
diff --git a/upstream/opensuse-leap-15-6/man6/pig.6 b/upstream/opensuse-leap-15-6/man6/pig.6
new file mode 100644
index 00000000..19693ae9
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/pig.6
@@ -0,0 +1,46 @@
+.\" $NetBSD: pig.6,v 1.5 2003/08/07 09:37:31 agc Exp $
+.\"
+.\" Copyright (c) 1992 The Regents of the University of California.
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)pig.6 8.1 (Berkeley) 6/10/93
+.\"
+.Dd June 10, 1993
+.Dt PIG 6
+.Os
+.Sh NAME
+.Nm pig
+.Nd eformatray inputway asway Igpay Atinlay
+.Sh SYNOPSIS
+.Nm
+.Sh DESCRIPTION
+Ethay
+.Nm igpay
+utilityway eadsray ethay andardstay inputway andway iteswray itway
+outway otay andardstay outputway inway Igpay Atinlay.
+.Pp
+Usefulway orfay eneratinggay onthlymay eportsray.
diff --git a/upstream/opensuse-leap-15-6/man6/pom.6 b/upstream/opensuse-leap-15-6/man6/pom.6
new file mode 100644
index 00000000..0aa449d5
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/pom.6
@@ -0,0 +1,71 @@
+.\" $NetBSD: pom.6,v 1.12 2003/08/07 09:37:32 agc Exp $
+.\"
+.\" Copyright (c) 1989, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)pom.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd January 9, 1999
+.Dt POM 6
+.Os
+.Sh NAME
+.Nm pom
+.Nd display the phase of the moon
+.Sh SYNOPSIS
+.Nm
+.Op [[[[[cc]yy]mm]dd]HH]
+.Sh DESCRIPTION
+The
+.Nm
+utility displays the current phase of the moon.
+Useful for selecting software completion target dates and predicting
+managerial behavior.
+.Pp
+.Bl -tag -width [[[[[cc]yy]mm]dd]HH]
+.It Ar [[[[[cc]yy]mm]dd]HH]
+Display the phase of the moon for a given time.
+The format is similar to the canonical representation used by
+.Xr date 1 .
+.El
+.Sh SEE ALSO
+.Xr date 1
+.Sh AUTHOR
+.Nm
+was written by
+.An Keith E. Brandt .
+.Sh BUGS
+Times must be within range of the
+.Ux
+epoch.
+.Pp
+This program does not allow for the difference between the TDT and
+UTC timescales (about one minute at the time of writing).
+.Sh ACKNOWLEDGEMENTS
+This program is based on algorithms from
+.%B Practical Astronomy with Your Calculator, Third Edition
+by Peter Duffett-Smith
+.Aq pjds@mrao.cam.ac.uk .
diff --git a/upstream/opensuse-leap-15-6/man6/primes.6 b/upstream/opensuse-leap-15-6/man6/primes.6
new file mode 100644
index 00000000..14d51016
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/primes.6
@@ -0,0 +1,89 @@
+.\" $NetBSD: primes.6,v 1.2 2004/02/09 23:25:47 wiz Exp $
+.\"
+.\" Copyright (c) 1989, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Landon Curt Noll.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)factor.6 8.1 (Berkeley) 5/31/93
+.\"
+.\"
+.\" By: Landon Curt Noll chongo@toad.com, ...!{sun,tolsoft}!hoptoad!chongo
+.\"
+.\" chongo <for a good prime call: 391581 * 2^216193 - 1> /\oo/\
+.\"
+.Dd February 8, 2004
+.Dt PRIMES 6
+.Os
+.Sh NAME
+.Nm primes
+.Nd generate primes
+.Sh SYNOPSIS
+.Nm primes
+.Op Ar start Op Ar stop
+.Sh DESCRIPTION
+The
+.Nm
+utility prints primes in ascending order, one per line, starting
+at or above
+.Ar start
+and continuing until, but not including
+.Ar stop .
+The
+.Ar start
+value must be at least 0 and not greater than
+.Ar stop .
+The
+.Ar stop
+value must not be greater than 4294967295.
+The default value of
+.Ar stop
+is 4294967295.
+.Pp
+When the
+.Nm
+utility is invoked with no arguments,
+.Ar start
+is read from standard input.
+.Ar stop
+is taken to be 4294967295.
+The
+.Ar start
+value may be preceded by a single
+.Sq \&+ .
+The
+.Ar start
+value is terminated by a non-digit character (such as a newline).
+The input line must not be longer than 255 characters.
+.Sh DIAGNOSTICS
+Out of range or invalid input results in
+an appropriate error message
+being written to standard error.
+.Sh BUGS
+.Nm
+won't get you a world record.
diff --git a/upstream/opensuse-leap-15-6/man6/quiz.6 b/upstream/opensuse-leap-15-6/man6/quiz.6
new file mode 100644
index 00000000..45698402
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/quiz.6
@@ -0,0 +1,120 @@
+.\" Automatically generated from quiz/quiz.6.in. Do not edit.
+.\" $NetBSD: quiz.6,v 1.10 2003/08/07 09:37:34 agc Exp $
+.\"
+.\" Copyright (c) 1991, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Jim R. Oldroyd at The Instruction Set.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)quiz.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt QUIZ 6
+.Os
+.Sh NAME
+.Nm quiz
+.Nd random knowledge tests
+.Sh SYNOPSIS
+.Nm
+.Op Fl t
+.Op Fl i Ar file
+.Op Ar question answer
+.Sh DESCRIPTION
+The
+.Nm
+utility tests your knowledge of random facts.
+It has a database of subjects from which you can choose.
+With no arguments,
+.Nm
+displays the list of available subjects.
+.Pp
+The options are as follows:
+.Bl -tag -width indent
+.It Fl t
+Use tutorial mode, in which questions are repeated later if you didn't get
+them right the first time, and new questions are presented less frequently
+to help you learn the older ones.
+.It Fl i
+Specify an alternative index file.
+.El
+.Pp
+Subjects are divided into categories.
+You can pick any two categories from the same subject.
+.Nm
+will ask questions from the first category and it expects answers from
+the second category.
+For example, the command
+.Dq quiz victim killer
+asks questions which are the names of victims, and expects you to answer
+with the cause of their untimely demise, whereas the command
+.Dq quiz killer victim
+works the other way around.
+.Pp
+If you get the answer wrong,
+.Nm
+lets you try again.
+To see the right answer, enter a blank line.
+.Ss Index and Data File Syntax
+The index and data files have a similar syntax.
+Lines in them consist of several categories separated by colons.
+The categories are regular expressions formed using the following
+meta-characters:
+.sp
+.Bl -tag -width "pat|pat" -compact -offset indent
+.It pat|pat
+alternative patterns
+.It {pat}
+optional pattern
+.It [pat]
+delimiters, as in pat[pat|pat]pat
+.El
+.Pp
+In an index file, each line represents a subject.
+The first category in each subject is the pathname of the data file for
+the subject.
+The remaining categories are regular expressions for the titles of each
+category in the subject.
+.Pp
+In data files, each line represents a question/answer set.
+Each category is the information for the question/answer for that category.
+.Pp
+The backslash character (``\e'') is used to quote syntactically significant
+characters, or at the end of a line to signify that a continuation line
+follows.
+.Pp
+If either a question or its answer is empty,
+.Nm
+will refrain from asking it.
+.Sh FILES
+.Bl -tag -width /usr/share/games/quiz -compact
+.It Pa /usr/share/games/quiz
+The default index and data files.
+.El
+.Sh BUGS
+.Nm
+is pretty cynical about certain subjects.
diff --git a/upstream/opensuse-leap-15-6/man6/rain.6 b/upstream/opensuse-leap-15-6/man6/rain.6
new file mode 100644
index 00000000..9fb0f0ee
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/rain.6
@@ -0,0 +1,54 @@
+.\" $NetBSD: rain.6,v 1.11 2003/08/07 09:37:35 agc Exp $
+.\"
+.\" Copyright (c) 1989, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)rain.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt RAIN 6
+.Os
+.Sh NAME
+.Nm rain
+.Nd animated raindrops display
+.Sh SYNOPSIS
+.Nm
+.Op Fl d Ar delay
+.Sh DESCRIPTION
+The output of
+.Nm
+is modeled after the
+.Tn VAX/VMS
+program of the same name.
+To obtain the proper effect, either the terminal must be set for 9600
+baud or the
+.Fl d
+option must be used to specify a delay, in milliseconds, between each
+update.
+A reasonable delay is 120; the default is 0.
+.Sh AUTHOR
+.An Eric P. Scott
diff --git a/upstream/opensuse-leap-15-6/man6/random.6 b/upstream/opensuse-leap-15-6/man6/random.6
new file mode 100644
index 00000000..2af930b3
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/random.6
@@ -0,0 +1,67 @@
+.\" $NetBSD: random.6,v 1.6 2003/08/07 09:37:35 agc Exp $
+.\"
+.\" Copyright (c) 1994
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)random.6 8.2 (Berkeley) 3/31/94
+.\"
+.Dd March 31, 1994
+.Dt RANDOM 6
+.Os
+.Sh NAME
+.Nm random
+.Nd random lines from a file or random numbers
+.Sh SYNOPSIS
+.Nm
+.Op Fl er
+.Op Ar denominator
+.Sh DESCRIPTION
+.Nm
+reads lines from the standard input and copies them to the standard
+output with a probability of 1/denominator.
+The default value for
+.Ar denominator
+is 2.
+.Pp
+The options are as follows:
+.Bl -tag -width Ds
+.It Fl e
+If the
+.Fl e
+option is specified,
+.Nm
+does not read or write anything, and simply exits with a random
+exit value of 0 to
+.Ar denominator Ns -1 ,
+inclusive.
+.It Fl r
+The
+.Fl r
+option guarantees that the output is unbuffered.
+.El
+.Sh SEE ALSO
+.Xr fortune 6
diff --git a/upstream/opensuse-leap-15-6/man6/sail.6 b/upstream/opensuse-leap-15-6/man6/sail.6
new file mode 100644
index 00000000..b40c022e
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/sail.6
@@ -0,0 +1,975 @@
+.\" $NetBSD: sail.6,v 1.13 2003/08/07 09:37:44 agc Exp $
+.\"
+.\" Copyright (c) 1988, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)sail.6 8.3 (Berkeley) 6/1/94
+.\"
+.TH SAIL 6 "June 1, 1994"
+.UC 4
+.SH NAME
+sail \- multi-user wooden ships and iron men
+.SH SYNOPSIS
+.B sail
+[
+.B \-s
+[
+.B \-l
+] ] [
+.B \-x
+] [
+.B \-b
+] [
+.B num
+]
+.br
+.fi
+.SH DESCRIPTION
+.I Sail
+is a computer version of Avalon Hill's game of fighting sail
+originally developed by S. Craig Taylor.
+.PP
+Players of
+.I Sail
+take command of an old fashioned Man of War and fight other
+players or the computer.
+They may re-enact one of the many
+historical sea battles recorded in the game, or they can choose
+a fictional battle.
+.PP
+As a sea captain in the
+.I Sail
+Navy, the player has complete control over the workings of his ship.
+He must order every maneuver, change the set of his sails, and judge the
+right moment to let loose the terrible destruction of his broadsides.
+In addition to fighting the enemy, he must harness the powers of the wind
+and sea to make them work for him.
+The outcome of many battles during the
+age of sail was decided by the ability of one captain to hold the `weather
+gage.'
+.PP
+The flags are:
+.TP
+.B \-s
+Print the names and ships of the top ten sailors.
+.TP
+.B \-l
+Show the login name.
+Only effective with \fB-s\fP.
+.TP
+.B \-x
+Play the first available ship instead of prompting for a choice.
+.TP
+.B \-b
+No bells.
+.SH IMPLEMENTATION
+.I Sail
+is really two programs in one.
+Each player starts up a process which runs his own ship.
+In addition, a
+.I driver
+process is forked (by the first player) to run the computer ships
+and take care of global bookkeeping.
+.PP
+Because the
+.I driver
+must calculate moves for each ship it controls, the
+more ships the computer is playing, the slower the game will appear.
+.PP
+If a player joins a game in progress, he will synchronize
+with the other players (a rather slow process for everyone), and
+then he may play along with the rest.
+.PP
+To implement a multi-user game in Version 7 UNIX, which was the operating
+system
+.I Sail
+was first written under, the communicating processes must use a common
+temporary file as a place to read and write messages.
+In addition, a locking mechanism must be provided to ensure exclusive
+access to the shared file.
+For example,
+.I Sail
+uses a temporary file named /tmp/#sailsink.21 for scenario 21, and
+corresponding file names for the other scenarios.
+To provide exclusive
+access to the temporary file,
+.I Sail
+uses a technique stolen from an old game called "pubcaves" by Jeff Cohen.
+Processes do a busy wait in the loop
+.br
+.sp
+.ce 2
+ for (n = 0; link(sync_file, sync_lock) \*[Lt] 0 \*[Am]\*[Am] n \*[Lt] 30; n++)
+ sleep(2);
+.br
+.sp
+until they are able to create a link to a file named "/tmp/#saillock.??".
+The "??" correspond to the scenario number of the game.
+Since UNIX
+guarantees that a link will point to only one file, the process that succeeds
+in linking will have exclusive access to the temporary file.
+.PP
+Whether or not this really works is open to speculation.
+When ucbmiro was rebooted after a crash, the file system check program
+found 3 links between the
+.I Sail
+temporary file and its link file.
+.SH CONSEQUENCES OF SEPARATE PLAYER AND DRIVER PROCESSES
+When players do something of global interest, such as moving or firing,
+the driver must coordinate the action with the other ships in the game.
+For example, if a player wants to move in a certain direction, he writes a
+message into the temporary file requesting the driver to move his ship.
+Each ``turn,'' the driver reads all the messages sent from the players and
+decides what happened.
+It then writes back into the temporary file new values of variables, etc.
+.PP
+The most noticeable effect this communication has on the game is the
+delay in moving.
+Suppose a player types a move for his ship and hits return.
+What happens then?
+The player process saves up messages to
+be written to the temporary file in a buffer.
+Every 7 seconds or so, the player process gets exclusive access to
+the temporary file and writes out its buffer to the file.
+The driver, running asynchronously, must
+read in the movement command, process it, and write out the results.
+This takes two exclusive accesses to the temporary file.
+Finally, when the player process gets around to doing another 7 second
+update, the results of the move are displayed on the screen.
+Hence, every movement requires four
+exclusive accesses to the temporary file (anywhere from 7 to 21 seconds
+depending upon asynchrony) before the player sees the results of his moves.
+.PP
+In practice, the delays are not as annoying as they would appear.
+There is room for "pipelining" in the movement.
+After the player writes out
+a first movement message, a second movement command can then be issued.
+The first message will be in the temporary file waiting for the driver, and
+the second will be in the file buffer waiting to be written to the file.
+Thus, by always typing moves a turn ahead of the time, the player can
+sail around quite quickly.
+.PP
+If the player types several movement commands between two 7 second updates,
+only the last movement command typed will be seen by the driver.
+Movement commands within the same update "overwrite" each other, in a sense.
+.SH THE HISTORY OF SAIL
+I wrote the first version of
+.I Sail
+on a PDP\-11/70 in the fall of 1980.
+Needless to say, the code was horrendous,
+not portable in any sense of the word, and didn't work.
+The program was not
+very modular and had fseeks() and fwrites() every few lines.
+After a tremendous rewrite from the top down,
+I got the first working version up by 1981.
+There were several annoying bugs concerning firing broadsides and
+finding angles.
+.I Sail
+uses no floating point, by the way, so the direction routines are rather
+tricky.
+Ed Wang rewrote my angle() routine in 1981 to be more correct (although
+it still doesn't work perfectly), and he added code to let a player select
+which ship he wanted at the start of the game (instead of the first one
+available).
+.PP
+Captain Happy (Craig Leres) is responsible for making
+.I Sail
+portable for the first time.
+This was no easy task, by the way.
+Constants like 2 and 10 were very frequent in the code.
+I also became famous for using "Riggle Memorial Structures" in
+.I Sail.
+Many of my structure references are so long that they run off the line
+printer page.
+Here is an example, if you promise not to laugh.
+.br
+.sp
+.ce
+specs[scene[flog.fgamenum].ship[flog.fshipnum].shipnum].pts
+.br
+.sp
+.PP
+.I Sail
+received its fourth and most thorough rewrite in the summer and fall
+of 1983.
+Ed Wang rewrote and modularized the code (a monumental feat)
+almost from scratch.
+Although he introduced many new bugs, the final result was very much
+cleaner and (?) faster.
+He added window movement commands and find ship commands.
+.SH HISTORICAL INFO
+Old Square Riggers were very maneuverable ships capable of intricate
+sailing.
+Their only disadvantage was an inability to sail very close to the wind.
+The design of a wooden ship allowed only for the
+guns to bear to the left and right sides.
+A few guns of small
+aspect (usually 6 or 9 pounders) could point forward, but their
+effect was small compared to a 68 gun broadside of 24 or 32 pounders.
+The guns bear approximately like so:
+.ne 1i
+.nf
+
+ \\
+ b----------------
+ ---0
+ \\
+ \\
+ \\ up to a range of ten (for round shot)
+ \\
+ \\
+ \\
+
+.fi
+An interesting phenomenon occurred when a broadside was fired
+down the length of an enemy ship.
+The shot tended to bounce along the deck and did several times more damage.
+This phenomenon was called a rake.
+Because the bows of a ship are very strong and present a smaller
+target than the stern, a stern rake (firing from the stern to the bow) causes
+more damage than a bow rake.
+.nf
+
+ b
+ 00 ---- Stern rake!
+ a
+
+.fi
+Most ships were equipped with carronades, which were very large, close
+range cannons.
+American ships from the revolution until the War of 1812
+were almost entirely armed with carronades.
+.PP
+The period of history covered in
+.I Sail
+is approximately from the 1770's until the end of Napoleonic France in 1815.
+There are many excellent books about the age of sail.
+My favorite author is Captain Frederick Marryat.
+More contemporary authors include C.S. Forester and Alexander Kent.
+.PP
+Fighting ships came in several sizes classed by armament.
+The mainstays of
+any fleet were its "Ships of the Line", or "Line of Battle Ships".
+They were so named because these ships fought together in great lines.
+They were
+close enough for mutual support, yet every ship could fire both its broadsides.
+We get the modern words "ocean liner," or "liner," and "battleship" from
+"ship of the line."
+The most common size was the 74 gun two decked ship of the line.
+The two gun decks usually mounted 18 and 24 pounder guns.
+.PP
+The pride of the fleet were the first rates.
+These were huge three decked ships of the line mounting 80 to 136 guns.
+The guns in the three tiers
+were usually 18, 24, and 32 pounders in that order from top to bottom.
+.PP
+Various other ships came next.
+They were almost all "razees," or ships of the line with one deck sawed off.
+They mounted 40-64 guns and were
+a poor cross between a frigate and a line of battle ship.
+They neither had the speed of the former nor the firepower of the latter.
+.PP
+Next came the "eyes of the fleet."
+Frigates came in many sizes mounting anywhere from 32 to 44 guns.
+They were very handy vessels.
+They could outsail anything bigger and outshoot anything smaller.
+Frigates didn't fight in lines of battle as the much bigger 74's did.
+Instead, they harassed the enemy's rear or captured crippled ships.
+They were much more useful in missions away from the fleet,
+such as cutting out expeditions or boat actions.
+They could hit hard and get away fast.
+.PP
+Lastly, there were the corvettes, sloops, and brigs.
+These were smaller ships mounting typically fewer than 20 guns.
+A corvette was only slightly
+smaller than a frigate, so one might have up to 30 guns.
+Sloops were used for carrying dispatches or passengers.
+Brigs were something you built for land-locked lakes.
+.SH SAIL PARTICULARS
+Ships in
+.I Sail
+are represented by two characters.
+One character represents the bow of
+the ship, and the other represents the stern.
+Ships have nationalities and numbers.
+The first ship of a nationality is number 0, the second
+number 1, etc.
+Therefore, the first British ship in a game would be printed as "b0".
+The second Brit would be "b1", and the fifth Don would be "s4".
+.PP
+Ships can set normal sails, called Battle Sails, or bend on extra canvas
+called Full Sails.
+A ship under full sail is a beautiful sight indeed,
+and it can move much faster than a ship under Battle Sails.
+The only trouble is, with full sails set, there is so much tension on sail and
+rigging that a well aimed round shot can burst a sail into ribbons where
+it would only cause a little hole in a loose sail.
+For this reason, rigging damage is doubled on a ship with full sails set.
+Don't let that discourage you from using full sails.
+I like to keep them up right into the heat of battle.
+A ship with full sails set has a capital letter for its nationality.
+E.g., a Frog, "f0", with full sails set would be printed as "F0".
+.PP
+When a ship is battered into a listing hulk, the last man aboard "strikes
+the colors."
+This ceremony is the ship's formal surrender.
+The nationality character of a surrendered ship is printed as "!".
+E.g., the Frog of our last example would soon be "!0".
+.PP
+A ship has a random chance of catching fire or sinking when it reaches the
+stage of listing hulk.
+A sinking ship has a "~" printed for its nationality,
+and a ship on fire and about to explode has a "#" printed.
+.PP
+Captured ships become the nationality of the prize crew.
+Therefore, if
+an American ship captures a British ship, the British ship will have an
+"a" printed for its nationality.
+In addition, the ship number is changed
+to "\*[Am]","'", "(", ,")", "*", or "+" depending upon the original number,
+be it 0,1,2,3,4, or 5.
+E.g., the "b0" captured by an American becomes the
+"a\*[Am]".
+The "s4" captured by a Frog becomes the "f*".
+.PP
+The ultimate example is, of course, an exploding Brit captured by an
+American: "#\*[Am]".
+.SH MOVEMENT
+Movement is the most confusing part of
+.I Sail
+to many.
+Ships can head in 8 directions:
+.nf
+
+ 0 0 0
+ b b b0 b b b 0b b
+ 0 0 0
+
+.fi
+The stern of a ship moves when it turns.
+The bow remains stationary.
+Ships can always turn, regardless of the wind (unless they are becalmed).
+All ships drift when they lose headway.
+If a ship doesn't move forward at all for two turns, it will begin to drift.
+If a ship has begun to
+drift, then it must move forward before it turns, if it plans to do
+more than make a right or left turn, which is always possible.
+.PP
+Movement commands to
+.I Sail
+are a string of forward moves and turns.
+An example is "l3".
+It will turn a ship left and then move it ahead 3 spaces.
+In the drawing above, the "b0" made 7 successive left turns.
+When
+.I Sail
+prompts you for a move, it prints three characters of import.
+E.g.,
+.nf
+ move (7, 4):
+.fi
+The first number is the maximum number of moves you can make, including turns.
+The second number is the maximum number of turns you can make.
+Between the numbers is sometimes printed a quote "'".
+If the quote is present, it means that your ship has been drifting, and
+you must move ahead to regain headway before you turn (see note above).
+Some of the possible moves for the example above are as follows:
+.nf
+
+ move (7, 4): 7
+ move (7, 4): 1
+ move (7, 4): d /* drift, or do nothing */
+ move (7, 4): 6r
+ move (7, 4): 5r1
+ move (7, 4): 4r1r
+ move (7, 4): l1r1r2
+ move (7, 4): 1r1r1r1
+
+.fi
+Because square riggers performed so poorly sailing into the wind, if at
+any point in a movement command you turn into the wind, the movement stops
+there.
+E.g.,
+.ne 1i
+.nf
+
+ move (7, 4): l1l4
+ Movement Error;
+ Helm: l1l
+
+.fi
+Moreover, whenever you make a turn, your movement allowance drops to
+min(what's left, what you would have at the new attitude).
+In short, if you turn closer to the wind, you most likely won't be able
+to sail the full allowance printed in the "move" prompt.
+.PP
+Old sailing captains had to keep an eye constantly on the wind.
+Captains in
+.I Sail
+are no different.
+A ship's ability to move depends on its attitude to the wind.
+The best angle possible is to have the wind off your quarter, that is,
+just off the stern.
+The direction rose on the side of the screen gives the
+possible movements for your ship at all positions to the wind.
+Battle
+sail speeds are given first, and full sail speeds are given in parenthesis.
+.nf
+
+ 0 1(2)
+ \\|/
+ -^-3(6)
+ /|\\
+ | 4(7)
+ 3(6)
+
+.fi
+Pretend the bow of your ship (the "^") is pointing upward and the wind is
+blowing from the bottom to the top of the page.
+The numbers at the bottom "3(6)" will be your speed under battle or full
+sails in such a situation.
+If the wind is off your quarter, then you can move "4(7)".
+If the wind is off your beam, "3(6)".
+If the wind is off your bow, then you can only move "1(2)".
+Facing into the wind, you can't move at all.
+Ships facing into the wind were said to be "in irons".
+.SH WINDSPEED AND DIRECTION
+The windspeed and direction is displayed as a little weather vane on the
+side of the screen.
+The number in the middle of the vane indicates the wind
+speed, and the + to - indicates the wind direction.
+The wind blows from the + sign (high pressure) to the - sign (low pressure).
+E.g.,
+.nf
+
+ |
+ 3
+ +
+.fi
+.PP
+The wind speeds are 0 = becalmed, 1 = light breeze, 2 = moderate breeze,
+3 = fresh breeze, 4 = strong breeze, 5 = gale, 6 = full gale, 7 = hurricane.
+If a hurricane shows up, all ships are destroyed.
+.SH GRAPPLING AND FOULING
+If two ships collide, they run the risk of becoming tangled together.
+This is called "fouling."
+Fouled ships are stuck together, and neither can move.
+They can unfoul each other if they want to.
+Boarding parties can only be
+sent across to ships when the antagonists are either fouled or grappled.
+.PP
+Ships can grapple each other by throwing grapnels into the rigging of
+the other.
+.PP
+The number of fouls and grapples you have are displayed on the upper
+right of the screen.
+.SH BOARDING
+Boarding was a very costly venture in terms of human life.
+Boarding parties may be formed in
+.I Sail
+to either board an enemy ship or to defend your own ship against attack.
+Men organized as Defensive Boarding Parties fight twice as hard to save
+their ship as men left unorganized.
+.PP
+The boarding strength of a crew depends upon its quality and upon the
+number of men sent.
+.SH CREW QUALITY
+The British seaman was world renowned for his sailing abilities.
+American sailors, however, were actually the best seamen in the world.
+Because the
+American Navy offered twice the wages of the Royal Navy, British seamen
+who liked the sea defected to America by the thousands.
+.PP
+In
+.I Sail,
+crew quality is quantized into 5 energy levels.
+"Elite" crews can outshoot and outfight all other sailors.
+"Crack" crews are next.
+"Mundane" crews
+are average, and "Green" and "Mutinous" crews are below average.
+A good rule of thumb is that "Crack" or "Elite" crews get one extra hit
+per broadside compared to "Mundane" crews.
+Don't expect too much from
+"Green" crews.
+.pl -1
+.SH BROADSIDES
+Your two broadsides may be loaded with four kinds of shot: grape, chain,
+round, and double.
+You have guns and carronades in both the port and starboard batteries.
+Carronades only have a range of two, so you have to get in
+close to be able to fire them.
+You have the choice of firing at the hull or rigging of another ship.
+If the range of the ship is greater than 6,
+then you may only shoot at the rigging.
+.PP
+The types of shot and their advantages are:
+.SH ROUND
+Range of 10.
+Good for hull or rigging hits.
+.SH DOUBLE
+Range of 1.
+Extra good for hull or rigging hits.
+Double takes two turns to load.
+.SH CHAIN
+Range of 3.
+Excellent for tearing down rigging.
+Cannot damage hull or guns, though.
+.SH GRAPE
+Range of 1.
+Sometimes devastating against enemy crews.
+.PP
+On the side of the screen is displayed some vital information about your
+ship:
+.nf
+
+ Load D! R!
+ Hull 9
+ Crew 4 4 2
+ Guns 4 4
+ Carr 2 2
+ Rigg 5 5 5 5
+
+.fi
+"Load" shows what your port (left) and starboard (right) broadsides are
+loaded with.
+A "!" after the type of shot indicates that it is an initial broadside.
+Initial broadside were loaded with care before battle and before
+the decks ran red with blood.
+As a consequence, initial broadsides are a
+little more effective than broadsides loaded later.
+A "*" after the type of shot indicates that the gun
+crews are still loading it, and you cannot fire yet.
+"Hull" shows how much hull you have left.
+"Crew" shows your three sections of crew.
+As your crew dies off, your ability to fire decreases.
+"Guns" and "Carr" show your port and starboard guns.
+As you lose guns, your ability to fire decreases.
+"Rigg" shows how much rigging you have on your 3 or 4 masts.
+As rigging is shot away, you lose mobility.
+.SH EFFECTIVENESS OF FIRE
+It is very dramatic when a ship fires its thunderous broadsides, but the
+mere opportunity to fire them does not guarantee any hits.
+Many factors influence the destructive force of a broadside.
+First of all, and the chief factor, is distance.
+It is harder to hit a ship at range ten than it is
+to hit one sloshing alongside.
+Next is raking.
+Raking fire, as mentioned before, can sometimes dismast a ship at range ten.
+Next, crew size and quality affects the damage done by a broadside.
+The number of guns firing also bears on the point, so to speak.
+Lastly, weather affects the accuracy of a broadside.
+If the seas are high (5 or 6), then the lower gunports
+of ships of the line can't even be opened to run out the guns.
+This gives frigates and other flush decked vessels an advantage in a storm.
+The scenario
+.I Pellew vs. The Droits de L'Homme
+takes advantage of this peculiar circumstance.
+.SH REPAIRS
+Repairs may be made to your Hull, Guns, and Rigging at the slow rate of
+two points per three turns.
+The message "Repairs Completed" will be printed if no more repairs can be made.
+.SH PECULIARITIES OF COMPUTER SHIPS
+Computer ships in
+.I Sail
+follow all the rules above with a few exceptions.
+Computer ships never repair damage.
+If they did, the players could never beat them.
+They play well enough as it is.
+As a consolation, the computer ships can fire double shot every turn.
+That fluke is a good reason to keep your distance.
+The
+.I Driver
+figures out the moves of the computer ships.
+It computes them with a typical A.I. distance
+function and a depth first search to find the maximum "score."
+It seems to work fairly well, although I'll be the first to admit it isn't
+perfect.
+.SH HOW TO PLAY
+Commands are given to
+.I Sail
+by typing a single character.
+You will then be prompted for further input.
+A brief summary of the commands follows.
+.br
+.SH COMMAND SUMMARY
+.nf
+
+ 'f' Fire broadsides if they bear
+ 'l' Reload
+ 'L' Unload broadsides (to change ammo)
+ 'm' Move
+ 'i' Print the closest ship
+ 'I' Print all ships
+ 'F' Find a particular ship or ships (e.g. "a?" for all Americans)
+ 's' Send a message around the fleet
+ 'b' Attempt to board an enemy ship
+ 'B' Recall boarding parties
+ 'c' Change set of sail
+ 'r' Repair
+ 'u' Attempt to unfoul
+ 'g' Grapple/ungrapple
+ 'v' Print version number of game
+ '^L' Redraw screen
+ 'Q' Quit
+
+ 'C' Center your ship in the window
+ 'U' Move window up
+ 'D','N' Move window down
+ 'H' Move window left
+ 'J' Move window right
+ 'S' Toggle window to follow your ship or stay where it is
+
+.fi
+.bg
+.SH SCENARIOS
+Here is a summary of the scenarios in
+.I Sail:
+
+.br
+.SH Ranger vs. Drake:
+.nf
+Wind from the N, blowing a fresh breeze.
+
+(a) Ranger 19 gun Sloop (crack crew) (7 pts)
+(b) Drake 17 gun Sloop (crack crew) (6 pts)
+.SH The Battle of Flamborough Head:
+.nf
+Wind from the S, blowing a fresh breeze.
+
+.fi
+This is John Paul Jones' first famous battle.
+Aboard the Bonhomme
+Richard, he was able to overcome the Serapis's greater firepower
+by quickly boarding her.
+.nf
+
+(a) Bonhomme Rich 42 gun Corvette (crack crew) (11 pts)
+(b) Serapis 44 gun Frigate (crack crew) (12 pts)
+.SH Arbuthnot and Des Touches:
+.nf
+Wind from the N, blowing a gale.
+
+(b) America 64 gun Ship of the Line (crack crew) (20 pts)
+(b) Befford 74 gun Ship of the Line (crack crew) (26 pts)
+(b) Adamant 50 gun Ship of the Line (crack crew) (17 pts)
+(b) London 98 gun 3 Decker SOL (crack crew) (28 pts)
+(b) Royal Oak 74 gun Ship of the Line (crack crew) (26 pts)
+(f) Neptune 74 gun Ship of the Line (average crew) (24 pts)
+(f) Duc de Bourgogne 80 gun 3 Decker SOL (average crew) (27 pts)
+(f) Conquerant 74 gun Ship of the Line (average crew) (24 pts)
+(f) Provence 64 gun Ship of the Line (average crew) (18 pts)
+(f) Romulus 44 gun Ship of the Line (average crew) (10 pts)
+.SH Suffren and Hughes:
+.nf
+
+Wind from the S, blowing a fresh breeze.
+
+(b) Monmouth 74 gun Ship of the Line (average crew) (24 pts)
+(b) Hero 74 gun Ship of the Line (crack crew) (26 pts)
+(b) Isis 50 gun Ship of the Line (crack crew) (17 pts)
+(b) Superb 74 gun Ship of the Line (crack crew) (27 pts)
+(b) Burford 74 gun Ship of the Line (average crew) (24 pts)
+(f) Flamband 50 gun Ship of the Line (average crew) (14 pts)
+(f) Annibal 74 gun Ship of the Line (average crew) (24 pts)
+(f) Severe 64 gun Ship of the Line (average crew) (18 pts)
+(f) Brilliant 80 gun Ship of the Line (crack crew) (31 pts)
+(f) Sphinx 80 gun Ship of the Line (average crew) (27 pts)
+.SH Nymphe vs. Cleopatre:
+.nf
+Wind from the S, blowing a fresh breeze.
+
+(b) Nymphe 36 gun Frigate (crack crew) (11 pts)
+(f) Cleopatre 36 gun Frigate (average crew) (10 pts)
+.SH Mars vs. Hercule:
+Wind from the S, blowing a fresh breeze.
+.nf
+(b) Mars 74 gun Ship of the Line (crack crew) (26 pts)
+(f) Hercule 74 gun Ship of the Line (average crew) (23 pts)
+.SH Ambuscade vs. Baionnaise:
+.nf
+Wind from the N, blowing a fresh breeze.
+
+(b) Ambuscade 32 gun Frigate (average crew) (9 pts)
+(f) Baionnaise 24 gun Corvette (average crew) (9 pts)
+.SH Constellation vs. Insurgent:
+.nf
+Wind from the S, blowing a gale.
+
+(a) Constellation 38 gun Corvette (elite crew) (17 pts)
+(f) Insurgent 36 gun Corvette (average crew) (11 pts)
+.SH Constellation vs. Vengeance:
+.nf
+Wind from the S, blowing a fresh breeze.
+
+(a) Constellation 38 gun Corvette (elite crew) (17 pts)
+(f) Vengeance 40 gun Frigate (average crew) (15 pts)
+.SH The Battle of Lissa:
+.nf
+Wind from the S, blowing a fresh breeze.
+
+(b) Amphion 32 gun Frigate (elite crew) (13 pts)
+(b) Active 38 gun Frigate (elite crew) (18 pts)
+(b) Volage 22 gun Frigate (elite crew) (11 pts)
+(b) Cerberus 32 gun Frigate (elite crew) (13 pts)
+(f) Favorite 40 gun Frigate (average crew) (15 pts)
+(f) Flore 40 gun Frigate (average crew) (15 pts)
+(f) Danae 40 gun Frigate (crack crew) (17 pts)
+(f) Bellona 32 gun Frigate (green crew) (9 pts)
+(f) Corona 40 gun Frigate (green crew) (12 pts)
+(f) Carolina 32 gun Frigate (green crew) (7 pts)
+.SH Constitution vs. Guerriere:
+.nf
+Wind from the SW, blowing a gale.
+
+(a) Constitution 44 gun Corvette (elite crew) (24 pts)
+(b) Guerriere 38 gun Frigate (crack crew) (15 pts)
+.SH United States vs. Macedonian:
+.nf
+Wind from the S, blowing a fresh breeze.
+
+(a) United States 44 gun Frigate (elite crew) (24 pts)
+(b) Macedonian 38 gun Frigate (crack crew) (16 pts)
+.SH Constitution vs. Java:
+.nf
+Wind from the S, blowing a fresh breeze.
+
+(a) Constitution 44 gun Corvette (elite crew) (24 pts)
+(b) Java 38 gun Corvette (crack crew) (19 pts)
+.SH Chesapeake vs. Shannon:
+.nf
+Wind from the S, blowing a fresh breeze.
+
+(a) Chesapeake 38 gun Frigate (average crew) (14 pts)
+(b) Shannon 38 gun Frigate (elite crew) (17 pts)
+.SH The Battle of Lake Erie:
+.nf
+Wind from the S, blowing a light breeze.
+
+(a) Lawrence 20 gun Sloop (crack crew) (9 pts)
+(a) Niagara 20 gun Sloop (elite crew) (12 pts)
+(b) Lady Prevost 13 gun Brig (crack crew) (5 pts)
+(b) Detroit 19 gun Sloop (crack crew) (7 pts)
+(b) Q. Charlotte 17 gun Sloop (crack crew) (6 pts)
+.SH Wasp vs. Reindeer:
+.nf
+Wind from the S, blowing a light breeze.
+
+(a) Wasp 20 gun Sloop (elite crew) (12 pts)
+(b) Reindeer 18 gun Sloop (elite crew) (9 pts)
+.SH Constitution vs. Cyane and Levant:
+.br
+Wind from the S, blowing a moderate breeze.
+
+(a) Constitution 44 gun Corvette (elite crew) (24 pts)
+(b) Cyane 24 gun Sloop (crack crew) (11 pts)
+(b) Levant 20 gun Sloop (crack crew) (10 pts)
+.br
+.SH Pellew vs. Droits de L'Homme:
+.nf
+Wind from the N, blowing a gale.
+
+(b) Indefatigable 44 gun Frigate (elite crew) (14 pts)
+(b) Amazon 36 gun Frigate (crack crew) (14 pts)
+(f) Droits L'Hom 74 gun Ship of the Line (average crew) (24 pts)
+.SH Algeciras:
+.nf
+Wind from the SW, blowing a moderate breeze.
+
+(b) Caesar 80 gun Ship of the Line (crack crew) (31 pts)
+(b) Pompee 74 gun Ship of the Line (crack crew) (27 pts)
+(b) Spencer 74 gun Ship of the Line (crack crew) (26 pts)
+(b) Hannibal 98 gun 3 Decker SOL (crack crew) (28 pts)
+(s) Real-Carlos 112 gun 3 Decker SOL (green crew) (27 pts)
+(s) San Fernando 96 gun 3 Decker SOL (green crew) (24 pts)
+(s) Argonauta 80 gun Ship of the Line (green crew) (23 pts)
+(s) San Augustine 74 gun Ship of the Line (green crew) (20 pts)
+(f) Indomptable 80 gun Ship of the Line (average crew) (27 pts)
+(f) Desaix 74 gun Ship of the Line (average crew) (24 pts)
+.SH Lake Champlain:
+.nf
+Wind from the N, blowing a fresh breeze.
+
+(a) Saratoga 26 gun Sloop (crack crew) (12 pts)
+(a) Eagle 20 gun Sloop (crack crew) (11 pts)
+(a) Ticonderoga 17 gun Sloop (crack crew) (9 pts)
+(a) Preble 7 gun Brig (crack crew) (4 pts)
+(b) Confiance 37 gun Frigate (crack crew) (14 pts)
+(b) Linnet 16 gun Sloop (elite crew) (10 pts)
+(b) Chubb 11 gun Brig (crack crew) (5 pts)
+.SH Last Voyage of the USS President:
+.nf
+Wind from the N, blowing a fresh breeze.
+
+(a) President 44 gun Frigate (elite crew) (24 pts)
+(b) Endymion 40 gun Frigate (crack crew) (17 pts)
+(b) Pomone 44 gun Frigate (crack crew) (20 pts)
+(b) Tenedos 38 gun Frigate (crack crew) (15 pts)
+.SH Hornblower and the Natividad:
+.nf
+Wind from the E, blowing a gale.
+
+.fi
+A scenario for you Horny fans.
+Remember, he sank the Natividad against heavy odds and winds.
+Hint: don't try to board the Natividad,
+her crew is much bigger, albeit green.
+.nf
+
+(b) Lydia 36 gun Frigate (elite crew) (13 pts)
+(s) Natividad 50 gun Ship of the Line (green crew) (14 pts)
+.SH Curse of the Flying Dutchman:
+.nf
+Wind from the S, blowing a fresh breeze.
+
+Just for fun, take the Piece of cake.
+
+(s) Piece of Cake 24 gun Corvette (average crew) (9 pts)
+(f) Flying Dutchy 120 gun 3 Decker SOL (elite crew) (43 pts)
+.SH The South Pacific:
+.nf
+Wind from the S, blowing a strong breeze.
+
+(a) USS Scurvy 136 gun 3 Decker SOL (mutinous crew) (27 pts)
+(b) HMS Tahiti 120 gun 3 Decker SOL (elite crew) (43 pts)
+(s) Australian 32 gun Frigate (average crew) (9 pts)
+(f) Bikini Atoll 7 gun Brig (crack crew) (4 pts)
+.SH Hornblower and the battle of Rosas bay:
+.nf
+Wind from the E, blowing a fresh breeze.
+
+.fi
+The only battle Hornblower ever lost.
+He was able to dismast one ship and stern rake the others though.
+See if you can do as well.
+.nf
+
+(b) Sutherland 74 gun Ship of the Line (crack crew) (26 pts)
+(f) Turenne 80 gun 3 Decker SOL (average crew) (27 pts)
+(f) Nightmare 74 gun Ship of the Line (average crew) (24 pts)
+(f) Paris 112 gun 3 Decker SOL (green crew) (27 pts)
+(f) Napoleon 74 gun Ship of the Line (green crew) (20 pts)
+.SH Cape Horn:
+.nf
+Wind from the NE, blowing a strong breeze.
+
+(a) Concord 80 gun Ship of the Line (average crew) (27 pts)
+(a) Berkeley 98 gun 3 Decker SOL (crack crew) (28 pts)
+(b) Thames 120 gun 3 Decker SOL (elite crew) (43 pts)
+(s) Madrid 112 gun 3 Decker SOL (green crew) (27 pts)
+(f) Musket 80 gun 3 Decker SOL (average crew) (27 pts)
+.SH New Orleans:
+.nf
+Wind from the SE, blowing a fresh breeze.
+
+Watch that little Cypress go!
+
+(a) Alligator 120 gun 3 Decker SOL (elite crew) (43 pts)
+(b) Firefly 74 gun Ship of the Line (crack crew) (27 pts)
+(b) Cypress 44 gun Frigate (elite crew) (14 pts)
+.SH Botany Bay:
+.nf
+Wind from the N, blowing a fresh breeze.
+
+(b) Shark 64 gun Ship of the Line (average crew) (18 pts)
+(f) Coral Snake 44 gun Corvette (elite crew) (24 pts)
+(f) Sea Lion 44 gun Frigate (elite crew) (24 pts)
+.SH Voyage to the Bottom of the Sea:
+.nf
+Wind from the NW, blowing a fresh breeze.
+
+This one is dedicated to Richard Basehart and David Hedison.
+
+(a) Seaview 120 gun 3 Decker SOL (elite crew) (43 pts)
+(a) Flying Sub 40 gun Frigate (crack crew) (17 pts)
+(b) Mermaid 136 gun 3 Decker SOL (mutinous crew) (27 pts)
+(s) Giant Squid 112 gun 3 Decker SOL (green crew) (27 pts)
+.SH Frigate Action:
+.nf
+Wind from the E, blowing a fresh breeze.
+
+(a) Killdeer 40 gun Frigate (average crew) (15 pts)
+(b) Sandpiper 40 gun Frigate (average crew) (15 pts)
+(s) Curlew 38 gun Frigate (crack crew) (16 pts)
+.SH The Battle of Midway:
+.nf
+Wind from the E, blowing a moderate breeze.
+
+(a) Enterprise 80 gun Ship of the Line (crack crew) (31 pts)
+(a) Yorktown 80 gun Ship of the Line (average crew) (27 pts)
+(a) Hornet 74 gun Ship of the Line (average crew) (24 pts)
+(j) Akagi 112 gun 3 Decker SOL (green crew) (27 pts)
+(j) Kaga 96 gun 3 Decker SOL (green crew) (24 pts)
+(j) Soryu 80 gun Ship of the Line (green crew) (23 pts)
+
+.SH Star Trek:
+.nf
+Wind from the S, blowing a fresh breeze.
+
+(a) Enterprise 450 gun Ship of the Line (elite crew) (75 pts)
+(a) Yorktown 450 gun Ship of the Line (elite crew) (75 pts)
+(a) Reliant 450 gun Ship of the Line (elite crew) (75 pts)
+(a) Galileo 450 gun Ship of the Line (elite crew) (75 pts)
+(k) Kobayashi Maru 450 gun Ship of the Line (elite crew) (75 pts)
+(k) Klingon II 450 gun Ship of the Line (elite crew) (75 pts)
+(o) Red Orion 450 gun Ship of the Line (elite crew) (75 pts)
+(o) Blue Orion 450 gun Ship of the Line (elite crew) (75 pts)
+
+.SH CONCLUSION
+
+.I Sail
+has been a group effort.
+
+.SH AUTHOR
+Dave Riggle
+.SH CO-AUTHOR
+Ed Wang
+.SH REFITTING
+Craig Leres
+.SH CONSULTANTS
+.nf
+Chris Guthrie
+Captain Happy
+Horatio Nelson
+ and many valiant others...
+.fi
+.SH REFERENCES
+.nf
+Wooden Ships \*[Am] Iron Men, by Avalon Hill
+Captain Horatio Hornblower Novels, (13 of them) by C.S. Forester
+Captain Richard Bolitho Novels, (12 of them) by Alexander Kent
+The Complete Works of Captain Frederick Marryat, (about 20) especially
+.in +6n
+Mr. Midshipman Easy
+Peter Simple
+Jacob Faithful
+Japhet in Search of a Father
+Snarleyyow, or The Dog Fiend
+Frank Mildmay, or The Naval Officer
+.in -6n
+.SH BUGS
+Probably a few, and please report them to "riggle@ernie.berkeley.edu" and
+"edward@ucbarpa.berkeley.edu"
diff --git a/upstream/opensuse-leap-15-6/man6/snake.6 b/upstream/opensuse-leap-15-6/man6/snake.6
new file mode 100644
index 00000000..54c5a67e
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/snake.6
@@ -0,0 +1,128 @@
+.\" Automatically generated from snake/snake/snake.6.in. Do not edit.
+.\" $NetBSD: snake.6,v 1.11 2003/08/07 09:37:45 agc Exp $
+.\"
+.\" Copyright (c) 1980, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)snake.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt SNAKE 6
+.Os
+.Sh NAME
+.Nm snake ,
+.Nm snscore
+.Nd display chase game
+.Sh SYNOPSIS
+.Nm
+.Op Fl w Ar width
+.Op Fl l Ar length
+.Op Fl t
+.br
+.Nm snscore
+.Sh DESCRIPTION
+.Nm
+is a display-based game which must be played on a CRT terminal.
+The object of the game is to make as much money as possible without
+getting eaten by the snake.
+The
+.Fl l
+and
+.Fl w
+options allow you to specify the length and width of the field.
+By default the entire screen is used.
+The
+.Fl t
+option makes the game assume you are on a slow terminal.
+.Pp
+You are represented on the screen by an I.
+The snake is 6 squares long and is represented by s's with an S at its head.
+The money is $, and an exit is #.
+Your score is posted in the upper left hand corner.
+.Pp
+You can move around using the same conventions as
+.Xr vi 1 ,
+the
+.Ic h ,
+.Ic j ,
+.Ic k ,
+and
+.Ic l
+keys work, as do the arrow keys.
+Other possibilities include:
+.Bl -tag -width indent
+.It Ic sefc
+These keys are like hjkl but form a directed pad around the d key.
+.It Ic HJKL
+These keys move you all the way in the indicated direction to the
+same row or column as the money.
+This does
+.Em not
+let you jump away from the snake, but rather saves you from having
+to type a key repeatedly.
+The snake still gets all his turns.
+.It Ic SEFC
+Likewise for the upper case versions on the left.
+.It Ic ATPB
+These keys move you to the four edges of the screen.
+Their position on the keyboard is the mnemonic, e.g.
+P is at the far right of the keyboard.
+.It Ic x
+This lets you quit the game at any time.
+.It Ic p
+Points in a direction you might want to go.
+.It Ic w
+Space warp to get out of tight squeezes, at a price.
+.El
+.Pp
+To earn money, move to the same square the money is on.
+A new $ will appear when you earn the current one.
+As you get richer, the snake gets hungrier.
+To leave the game, move to the exit (#).
+.Pp
+A record is kept of the personal best score of each player.
+Scores are only counted if you leave at the exit,
+getting eaten by the snake is worth nothing.
+.Pp
+As in pinball, matching the last digit of your score to the number
+which appears after the game is worth a bonus.
+.Pp
+To see who wastes time playing snake, run
+.Nm snscore .
+.Sh FILES
+.Bl -tag -width /var/games/snakerawscores -compact
+.It Pa /var/games/snakerawscores
+database of personal bests
+.It Pa /var/games/snake.log
+log of games played
+.El
+.Sh BUGS
+When playing on a small screen,
+it's hard to tell when you hit the edge of the screen.
+.Pp
+The scoring function takes into account the size of the screen.
+A perfect function to do this equitably has not been devised.
diff --git a/upstream/opensuse-leap-15-6/man6/tetris-bsd.6 b/upstream/opensuse-leap-15-6/man6/tetris-bsd.6
new file mode 100644
index 00000000..ae10a98c
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/tetris-bsd.6
@@ -0,0 +1,158 @@
+.\" Automatically generated from tetris/tetris.6.in. Do not edit.
+.\" $NetBSD: tetris.6,v 1.10 2003/08/07 09:37:48 agc Exp $
+.\"
+.\" Copyright (c) 1992, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Nancy L. Tinkham and Darren F. Provine.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)tetris.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt TETRIS 6
+.Os
+.Sh NAME
+.Nm tetris
+.Nd the game of tetris
+.Sh SYNOPSIS
+.Nm
+.Op Fl ps
+.Op Fl k Ar keys
+.Op Fl l Ar level
+.Sh DESCRIPTION
+The
+.Nm
+command runs display-based game which must be played on a CRT terminal.
+The object is to fit the shapes together forming complete rows,
+which then vanish.
+When the shapes fill up to the top, the game ends.
+You can optionally select a level of play, or custom-select control keys.
+.Pp
+The default level of play is 2.
+.Pp
+The default control keys are as follows:
+.Pp
+.Bl -tag -width "xxspacexx" -compact -offset indent
+.It j
+move left
+.It k
+rotate 1/4 turn counterclockwise
+.It l
+move right
+.It Aq space
+drop
+.It p
+pause
+.It q
+quit
+.El
+.Pp
+The options are as follows:
+.Bl -tag -width indent
+.It Fl k
+The default control keys can be changed using the
+.Fl k
+option.
+The
+.Ar keys
+argument must have the six keys in order, and, remember to quote any
+space or tab characters from the shell.
+For example:
+.sp
+.Dl "tetris -l 2 -k 'jkl pq'"
+.sp
+will play the default games, i.e. level 2 and with the default
+control keys.
+The current key settings are displayed at the bottom of the screen
+during play.
+.It Fl l
+Select a level of play.
+.It Fl s
+Display the top scores.
+.It Fl p
+Switch on previewing of the shape that will appear next.
+.El
+.Pp
+.Sh PLAY
+At the start of the game, a shape will appear at the top of the screen,
+falling one square at a time.
+The speed at which it falls is determined directly by the level:
+if you select level 2, the blocks will fall twice per second;
+at level 9, they fall 9 times per second.
+(As the game goes on, things speed up,
+no matter what your initial selection.)
+When this shape
+.Dq touches down
+on the bottom of the field, another will appear at the top.
+.Pp
+You can move shapes to the left or right, rotate them counterclockwise,
+or drop them to the bottom by pressing the appropriate keys.
+As you fit them together, completed horizontal rows vanish,
+and any blocks above fall down to fill in.
+When the blocks stack up to the top of the screen, the game is over.
+.Sh SCORING
+You get one point for every block you fit into the stack,
+and one point for every space a block falls when you hit the drop key.
+(Dropping the blocks is therefore a good way to increase your score.)
+Your total score is the product of the level of play
+and your accumulated
+.ie t points\(em200
+.el points -- 200
+points on level 3 gives you a score of 600.
+Each player gets at most one entry on any level,
+for a total of nine scores in the high scores file.
+Players who no longer have accounts are limited to one score.
+Also, scores over 5 years old are expired.
+The exception to these conditions is that the highest score on a given
+level is
+.Em always
+kept,
+so that following generations can pay homage to those who have
+wasted serious amounts of time.
+.Pp
+The score list is produced at the end of the game.
+The printout includes each player's overall ranking,
+name, score, and how many points were scored on what level.
+Scores which are the highest on a given level
+are marked with asterisks
+.Dq * .
+.Sh FILES
+.Bl -tag -width /var/games/tetris-bsd.scoresxx
+.It /var/games/tetris-bsd.scores
+high score file
+.El
+.Sh BUGS
+The higher levels are unplayable without a fast terminal connection.
+.Sh AUTHORS
+Adapted from a 1989 International Obfuscated C Code Contest winner by
+Chris Torek and Darren F. Provine.
+.Pp
+Manual adapted from the original entry written by Nancy L. Tinkham and
+Darren F. Provine.
+.Pp
+Code for previewing next shape added by Hubert Feyrer in 1999.
diff --git a/upstream/opensuse-leap-15-6/man6/trek.6 b/upstream/opensuse-leap-15-6/man6/trek.6
new file mode 100644
index 00000000..76b090e1
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/trek.6
@@ -0,0 +1,140 @@
+.\" Automatically generated from trek/trek.6.in. Do not edit.
+.\" $NetBSD: trek.6,v 1.11 2003/08/07 09:37:55 agc Exp $
+.\"
+.\" Copyright (c) 1980, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)trek.6 8.2 (Berkeley) 12/30/93
+.\"
+.Dd December 30, 1993
+.Dt TREK 6
+.Os
+.Sh NAME
+.Nm trek
+.Nd trekkie game
+.Sh SYNOPSIS
+.Nm
+.Oo
+.Op Fl a
+.Ar file
+.Oc
+.Sh DESCRIPTION
+.Nm
+is a game of space glory and war.
+Below is a summary of commands.
+For complete documentation, see
+.Em Trek
+by Eric Allman.
+.Pp
+If a filename is given, a log of the game is written onto that file.
+If the
+.Fl a
+flag is given before the filename, that file is appended to, not truncated.
+.Pp
+The game will ask you what length game you would like.
+Valid responses are
+.Dq short ,
+.Dq medium ,
+and
+.Dq long .
+You may also type
+.Dq restart ,
+which restarts a previously saved game.
+You will then be prompted for the skill, to which you must respond
+.Dq novice ,
+.Dq fair ,
+.Dq good ,
+.Dq expert ,
+.Dq commodore ,
+or
+.Dq impossible .
+You should normally start out with a novice and work up.
+.Pp
+In general, throughout the game, if you forget what is appropriate
+the game will tell you what it expects if you just type in a question mark.
+.Sh AUTHOR
+.An Eric Allman
+.Sh SEE ALSO
+.Pa /usr/share/doc/bsd-games/trek.me
+.Sh COMMAND SUMMARY
+.Bl -item -compact
+.It
+.Ic abandon
+.It
+.Ic ca Ns pture
+.It
+.Ic cl Ns oak
+.Ic u Ns p/ Ns Ic d Ns own
+.It
+.Ic c Ns omputer request; ...
+.It
+.Ic da Ns mages
+.It
+.Ic destruct
+.It
+.Ic do Ns ck
+.It
+.Ic help
+.It
+.Ic i Ns mpulse course distance
+.It
+.Ic l Ns rscan
+.It
+.Ic m Ns ove course distance
+.It
+.Ic p Ns hasers Ic a Ns utomatic
+amount
+.It
+.Ic p Ns hasers Ic m Ns anual
+amt1 course1 spread1 ...
+.It
+.Ic t Ns orpedo course
+.Op Ic y Ns es
+.No angle/ Ns Ic n Ns o
+.It
+.Ic ram No course distance
+.It
+.Ic r Ns est time
+.It
+.Ic shell
+.It
+.Ic sh Ns ields
+.Ic u Ns p/ Ns Ic d Ns own
+.It
+.Ic s Ns rscan
+.Op Ic y Ns es/ Ic n Ns o
+.It
+.Ic st Ns atus
+.It
+.Ic terminate y Ns es/ Ns Ic n Ns o
+.It
+.Ic u Ns ndock
+.It
+.Ic v Ns isual course
+.It
+.Ic w Ns arp warp_factor
+.El
diff --git a/upstream/opensuse-leap-15-6/man6/wargames.6 b/upstream/opensuse-leap-15-6/man6/wargames.6
new file mode 100644
index 00000000..1913fcbe
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/wargames.6
@@ -0,0 +1,49 @@
+.\" $NetBSD: wargames.6,v 1.5 2004/01/01 16:06:21 jsm Exp $
+.\"
+.\" Copyright (c) 1998 Joey Hess
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. The name of the author may not be used to endorse or promote products
+.\" derived from this software without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
+.\" BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
+.\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
+.\" AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
+.\" OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.Dd February 22, 1998
+.Dt WARGAMES 6
+.Os
+.Sh NAME
+.Nm wargames
+.Nd shall we play a game?
+.Sh SYNOPSIS
+.Nm wargames
+.Sh DESCRIPTION
+.Dq Shall we play a game?
+-- computer,
+.Nm wargames
+.Pp
+Just like in the movie, the computer will happily play a game with you.
+The likelihood of Global Thermonuclear Warfare resulting is much smaller....
+.Sh SEE ALSO
+.Sy Wargames ,
+the movie (an MGM production, PG 13, directed by John Badham, 1983).
+.Sh AUTHOR
+This manual page was written by Joey Hess
+.Aq joeyh@kitenet.net .
diff --git a/upstream/opensuse-leap-15-6/man6/worm.6 b/upstream/opensuse-leap-15-6/man6/worm.6
new file mode 100644
index 00000000..5bd501c9
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/worm.6
@@ -0,0 +1,62 @@
+.\" $NetBSD: worm.6,v 1.11 2004/01/01 16:06:57 jsm Exp $
+.\"
+.\" Copyright (c) 1989, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)worm.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt WORM 6
+.Os
+.Sh NAME
+.Nm worm
+.Nd Play the growing worm game
+.Sh SYNOPSIS
+.Nm
+.Op Ar size
+.Sh DESCRIPTION
+In
+.Nm ,
+you are a little worm, your body is the "o"'s on the screen
+and your head is the "@".
+You move with the hjkl keys and the arrow keys (as in the game snake).
+If you don't press any keys, you continue in the direction you last moved.
+The upper case HJKL keys move you as if you had pressed
+several (9 for HL and 5 for JK) of the corresponding lower case key
+(unless you run into a digit, then it stops).
+.Pp
+On the screen you will see a digit, if your worm eats the digit is will
+grow longer, the actual amount longer depends on which digit it was
+that you ate.
+The object of the game is to see how long you can make the worm grow.
+.Pp
+The game ends when the worm runs into either the sides of the screen,
+or itself.
+The current score (how much the worm has grown) is kept in
+the upper right corner of the screen.
+.Pp
+The optional argument, if present, is the initial length of the worm.
diff --git a/upstream/opensuse-leap-15-6/man6/worms.6 b/upstream/opensuse-leap-15-6/man6/worms.6
new file mode 100644
index 00000000..f4cc8197
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/worms.6
@@ -0,0 +1,66 @@
+.\" $NetBSD: worms.6,v 1.13 2003/08/07 09:37:57 agc Exp $
+.\"
+.\" Copyright (c) 1989, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)worms.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt WORMS 6
+.Sh NAME
+.Nm worms
+.Nd animate worms on a display terminal
+.Sh SYNOPSIS
+.Nm
+.Op Fl ft
+.Op Fl d Ar delay
+.Op Fl l Ar length
+.Op Fl n Ar number
+.Sh DESCRIPTION
+A
+.Ux
+version of the DEC-2136 program
+.Dq worms .
+.Pp
+The options are as follows:
+.Bl -tag -width indent
+.It Fl f
+Makes a
+.Dq field
+for the worm(s) to eat.
+.It Fl t
+Makes each worm leave a trail behind it.
+.It Fl d
+Specifies a delay, in milliseconds, between each update.
+This is useful for fast terminals.
+Reasonable values are around 20-200.
+The default is 0.
+.It Fl l
+Specifies a length for each worm; the default is 16.
+.It Fl n
+Specifies the number of worms; the default is 3.
+.El
diff --git a/upstream/opensuse-leap-15-6/man6/wtf.6 b/upstream/opensuse-leap-15-6/man6/wtf.6
new file mode 100644
index 00000000..a0321137
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/wtf.6
@@ -0,0 +1,70 @@
+.\" Automatically generated from wtf/wtf.6.in. Do not edit.
+.\" $NetBSD: wtf.6,v 1.8 2003/04/25 19:08:31 jmmv Exp $
+.\"
+.\" Public Domain
+.\"
+.Dd April 25, 2003
+.Dt WTF 6
+.Os
+.Sh NAME
+.Nm wtf
+.Nd translates acronyms for you
+.Sh SYNOPSIS
+.Nm
+.Op Fl f Ar dbfile
+.Op Fl t Ar type
+.Op Ar is
+.Ar acronym Ar ...
+.Sh DESCRIPTION
+The
+.Nm
+utility displays the expansion of the acronyms
+specified on the command line.
+If the acronym is unknown,
+.Nm
+will check to see if the acronym is known by the
+.Xr whatis 1
+command.
+.Pp
+If
+.Dq is
+is specified on the command line, it will be ignored, allowing the
+fairly natural
+.Dq wtf is WTF
+usage.
+.Pp
+The following options are available:
+.Bl -tag -width flag
+.It Fl f Ar dbfile
+Overrides the default acronym database, bypassing the value of the
+.Ev ACRONYMDB
+variable.
+.It Fl t Ar type
+Specifies the acronym's type.
+Simply put, it makes the program use the acronyms database named
+.Pa /usr/share/misc/acronyms.type ,
+where
+.Ar type
+is given by the argument.
+.El
+.Sh ENVIRONMENT
+.Bl -tag -width ACRONYMDB
+.It Ev ACRONYMDB
+The default acronym database may be overridden by setting the
+environment variable
+.Ev ACRONYMDB
+to the name of a file in the proper format (acronym[tab]meaning).
+.El
+.Sh FILES
+.Bl -tag -width /usr/share/misc/acronyms.XXXX -compact
+.It Pa /usr/share/misc/acronyms
+default acronym database.
+.It Pa /usr/share/misc/acronyms.comp
+computer-related acronym database.
+.El
+.Sh SEE ALSO
+.Xr whatis 1
+.Sh HISTORY
+.Nm
+first appeared in
+.Nx 1.5 .
diff --git a/upstream/opensuse-leap-15-6/man6/wump.6 b/upstream/opensuse-leap-15-6/man6/wump.6
new file mode 100644
index 00000000..67ae2c30
--- /dev/null
+++ b/upstream/opensuse-leap-15-6/man6/wump.6
@@ -0,0 +1,110 @@
+.\" $NetBSD: wump.6,v 1.6 2003/08/07 09:37:57 agc Exp $
+.\"
+.\" Copyright (c) 1989, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Dave Taylor, of Intuitive Systems.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)wump.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt WUMP 6
+.Os
+.Sh NAME
+.Nm wump
+.Nd hunt the wumpus in an underground cave
+.Sh SYNOPSIS
+.Nm
+.Op Fl h
+.Op Fl a Ar arrows
+.Op Fl b Ar bats
+.Op Fl p Ar pits
+.Op Fl r Ar rooms
+.Op Fl t Ar tunnels
+.Sh DESCRIPTION
+The game
+.Nm
+is based on a fantasy game first presented in the pages of
+.Em People's Computer Company
+in 1973.
+In Hunt the Wumpus you are placed in a cave built of many different rooms,
+all interconnected by tunnels.
+Your quest is to find and shoot the evil Wumpus that resides elsewhere in
+the cave without running into any pits or using up your limited supply of
+arrows.
+.Pp
+The options are as follows:
+.Bl -tag -width indent
+.It Fl a
+Specifies the number of magic arrows the adventurer gets.
+The default is five.
+.It Fl b
+Specifies the number of rooms in the cave which contain bats.
+The default is three.
+.It Fl h
+Play the hard version -- more pits, more bats, and a generally more
+dangerous cave.
+.It Fl p
+Specifies the number of rooms in the cave which contain bottomless pits.
+The default is three.
+.It Fl r
+Specifies the number of rooms in the cave.
+The default cave size is twenty-five rooms.
+.It Fl t
+Specifies the number of tunnels connecting each room in the cave to
+another room.
+Beware, too many tunnels in a small cave can easily cause it to collapse!
+The default cave room has three tunnels to other rooms.
+.El
+.Pp
+While wandering through the cave you'll notice that, while there are tunnels
+everywhere, there are some mysterious quirks to the cave topology, including
+some tunnels that go from one room to another, but not necessarily back!
+Also, most pesky of all are the rooms that are home to large numbers of bats,
+which, upon being disturbed, will en masse grab you and move you to another
+portion of the cave (including those housing bottomless pits, sure
+death for unwary explorers).
+.Pp
+Fortunately, you're not going into the cave without any weapons or tools,
+and in fact your biggest aids are your senses; you can often smell the
+rather odiferous Wumpus up to
+.Em two
+rooms away, and you can always feel the drafts created by the occasional
+bottomless pit and hear the rustle of the bats in caves they might be
+sleeping within.
+.Pp
+To kill the wumpus, you'll need to shoot it with one of your magic arrows.
+Fortunately, you don't have to be in the same room as the creature, and can
+instead shoot the arrow from as far as three or four rooms away!
+.Pp
+When you shoot an arrow, you do so by typing in a list of rooms that you'd
+like it to travel to.
+If at any point in its travels it cannot find a tunnel to the room you
+specify from the room it's in, it will instead randomly fly down one of the
+tunnels, possibly, if you're real unlucky, even flying back into the room
+you're in and hitting you!