xref: /openbsd-src/games/hack/hack.6 (revision 25a24f0b585e636f61cc2cd27ae0cd074d620825)
1*25a24f0bSjsg.\"	$OpenBSD: hack.6,v 1.23 2022/02/18 23:17:14 jsg Exp $
29498368bSjmc.\"	$NetBSD: hack.6,v 1.5 1995/07/03 19:44:30 jtc Exp $
3d25013f2Scamield.\"
4d25013f2Scamield.\" Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
5d25013f2Scamield.\" Amsterdam
6d25013f2Scamield.\" All rights reserved.
7d25013f2Scamield.\"
8d25013f2Scamield.\" Redistribution and use in source and binary forms, with or without
9d25013f2Scamield.\" modification, are permitted provided that the following conditions are
10d25013f2Scamield.\" met:
11d25013f2Scamield.\"
12d25013f2Scamield.\" - Redistributions of source code must retain the above copyright notice,
13d25013f2Scamield.\" this list of conditions and the following disclaimer.
14d25013f2Scamield.\"
15d25013f2Scamield.\" - Redistributions in binary form must reproduce the above copyright
16d25013f2Scamield.\" notice, this list of conditions and the following disclaimer in the
17d25013f2Scamield.\" documentation and/or other materials provided with the distribution.
18d25013f2Scamield.\"
19d25013f2Scamield.\" - Neither the name of the Stichting Centrum voor Wiskunde en
20d25013f2Scamield.\" Informatica, nor the names of its contributors may be used to endorse or
21d25013f2Scamield.\" promote products derived from this software without specific prior
22d25013f2Scamield.\" written permission.
23d25013f2Scamield.\"
24d25013f2Scamield.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
25d25013f2Scamield.\" IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
26d25013f2Scamield.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
27d25013f2Scamield.\" PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
28d25013f2Scamield.\" OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
29d25013f2Scamield.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
30d25013f2Scamield.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
31d25013f2Scamield.\" PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
32d25013f2Scamield.\" LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
33d25013f2Scamield.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
34d25013f2Scamield.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35d25013f2Scamield.\"
36d25013f2Scamield.\"
37d25013f2Scamield.\" Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
38d25013f2Scamield.\" All rights reserved.
39d25013f2Scamield.\"
40d25013f2Scamield.\" Redistribution and use in source and binary forms, with or without
41d25013f2Scamield.\" modification, are permitted provided that the following conditions
42d25013f2Scamield.\" are met:
43d25013f2Scamield.\" 1. Redistributions of source code must retain the above copyright
44d25013f2Scamield.\"    notice, this list of conditions and the following disclaimer.
45d25013f2Scamield.\" 2. Redistributions in binary form must reproduce the above copyright
46d25013f2Scamield.\"    notice, this list of conditions and the following disclaimer in the
47d25013f2Scamield.\"    documentation and/or other materials provided with the distribution.
48d25013f2Scamield.\" 3. The name of the author may not be used to endorse or promote products
49d25013f2Scamield.\"    derived from this software without specific prior written permission.
50d25013f2Scamield.\"
51d25013f2Scamield.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
52d25013f2Scamield.\" INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
53d25013f2Scamield.\" AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL
54d25013f2Scamield.\" THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
55d25013f2Scamield.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
56d25013f2Scamield.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
57d25013f2Scamield.\" OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
58d25013f2Scamield.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
59d25013f2Scamield.\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
60d25013f2Scamield.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
61d25013f2Scamield.\"
62*25a24f0bSjsg.Dd $Mdocdate: February 18 2022 $
63df930be7Sderaadt.Dt HACK 6
64df930be7Sderaadt.Os
65df930be7Sderaadt.Sh NAME
66df930be7Sderaadt.Nm hack
67df930be7Sderaadt.Nd Exploring The Dungeons of Doom
68df930be7Sderaadt.Sh SYNOPSIS
69a702fa09Spjanzen.Nm hack
70df930be7Sderaadt.Op Fl n
7106c83a8dSjmc.Op Fl d Ar directory
72df930be7Sderaadt.Op Fl u Ar playername
73a702fa09Spjanzen.Nm hack
7406c83a8dSjmc.Op Fl sX
75df930be7Sderaadt.Op Fl d Ar directory
76df930be7Sderaadt.Op Ar playername ...
77df930be7Sderaadt.Sh DESCRIPTION
783897dfeeSpjanzen.Nm
79df930be7Sderaadtis a display oriented dungeons & dragons - like game.
80df930be7SderaadtBoth display and command structure resemble rogue.
81df930be7Sderaadt(For a game with the same structure but entirely different display -
82df930be7Sderaadta real cave instead of dull rectangles - try Quest.)
83df930be7Sderaadt.Pp
84643075cfSpjanzenTo get started you really only need to know two commands.
85643075cfSpjanzenThe command
86e0ba81e6Sjmc.Ic ?\&
87df930be7Sderaadtwill give you a list of the available commands and the command
88df930be7Sderaadt.Ic /
89df930be7Sderaadtwill identify the things you see on the screen.
90df930be7Sderaadt.Pp
914bae03b6SjmcTo win the game (as opposed to merely playing to beat other people's high
92df930be7Sderaadtscores) you must locate the Amulet of Yendor which is somewhere below
9315facedeSjmcthe 20th level of the dungeon and get it out.
94*25a24f0bSjsgNobody has achieved this yet and whoever does
95*25a24f0bSjsgwill probably go down in history as a hero among heroes.
96df930be7Sderaadt.Pp
97df930be7SderaadtWhen the game ends, either by your death, when you quit, or if you escape
98df930be7Sderaadtfrom the caves,
993897dfeeSpjanzen.Nm
100643075cfSpjanzenwill give you (a fragment of) the list of top scorers.
101643075cfSpjanzenThe scoring is based on many aspects of your behavior but a rough estimate is
102df930be7Sderaadtobtained by taking the amount of gold you've found in the cave plus four
103643075cfSpjanzentimes your (real) experience.
104643075cfSpjanzenPrecious stones may be worth a lot of gold when brought to the exit.
105df930be7SderaadtThere is a 10% penalty for getting yourself killed.
106df930be7Sderaadt.Pp
107df930be7SderaadtThe administration of the game is kept in the directory specified with the
108df930be7Sderaadt.Fl d
1090870f47dSjmcoption or, if no such option is given, in the directory specified by
110df930be7Sderaadtthe environment variable
111df930be7Sderaadt.Ev HACKDIR ,
112df930be7Sderaadtor, if no such variable exists, in the current directory.
113df930be7SderaadtThis same directory contains several auxiliary files such as lockfiles and
114df930be7Sderaadtthe list of topscorers and a subdirectory
115df930be7Sderaadt.Pa save
116df930be7Sderaadtwhere games are saved.
117df930be7Sderaadt.Pp
118df930be7SderaadtThe
119df930be7Sderaadt.Fl n
120df930be7Sderaadtoption suppresses printing of the news.
121df930be7Sderaadt.Pp
122df930be7SderaadtThe
123df930be7Sderaadt.Fl u
124df930be7Sderaadt.Ar playername
125df930be7Sderaadtoption supplies the answer to the question "Who are you?".
126df930be7SderaadtWhen
127df930be7Sderaadt.Ar playername
128df930be7Sderaadthas as suffix one of
129df930be7Sderaadt.Em -T ,
130df930be7Sderaadt.Em -S ,
131df930be7Sderaadt.Em -K ,
132df930be7Sderaadt.Em -F ,
133df930be7Sderaadt.Em -C ,
134df930be7Sderaadtor
135df930be7Sderaadt.Em -W ,
136df930be7Sderaadtthen this supplies the answer to the question "What kind of character ... ?".
137df930be7Sderaadt.Pp
138df930be7SderaadtThe
139df930be7Sderaadt.Fl s
140643075cfSpjanzenoption will print out the list of your scores.
141643075cfSpjanzenIt may be followed by arguments
142df930be7Sderaadt.Fl X
143df930be7Sderaadtwhere X is one of the letters C, F, K, S, T, W to print the scores of
144df930be7SderaadtCavemen, Fighters, Knights, Speleologists, Tourists or Wizards.
145df930be7SderaadtIt may also be followed by one or more player names to print the scores of the
146df930be7Sderaadtplayers mentioned.
147df930be7Sderaadt.Sh ENVIRONMENT
148df930be7Sderaadt.Bl -tag -width 24n -compact
149df930be7Sderaadt.It Ev USER No or Ev LOGNAME
150df930be7SderaadtYour login name.
151df930be7Sderaadt.It Ev HOME
152df930be7SderaadtYour home directory.
153df930be7Sderaadt.It Ev SHELL
154df930be7SderaadtYour shell.
155df930be7Sderaadt.It Ev TERM
156df930be7SderaadtThe type of your terminal.
157df930be7Sderaadt.It Ev HACKPAGER , PAGER
158df930be7SderaadtPager used instead of default pager.
159df930be7Sderaadt.It Ev MAIL
160df930be7SderaadtMailbox file.
161df930be7Sderaadt.It Ev MAILREADER
162df930be7SderaadtReader used instead of default (probably /usr/bin/mail).
163df930be7Sderaadt.It Ev HACKDIR
164df930be7SderaadtPlayground.
165df930be7Sderaadt.It Ev HACKOPTIONS
166df930be7SderaadtString predefining several hack options (see help file).
167df930be7Sderaadt.El
168df930be7Sderaadt.Pp
169df930be7SderaadtSeveral other environment variables are used in debugging (wizard) mode,
170df930be7Sderaadtlike
171df930be7Sderaadt.Ev GENOCIDED ,
172df930be7Sderaadt.Ev INVENT ,
173df930be7Sderaadt.Ev MAGIC
174df930be7Sderaadtand
175df930be7Sderaadt.Ev SHOPTYPE .
176df756572Spjanzen.Sh FILES
177df756572Spjanzen.Bl -tag -width 24n -compact
178df756572Spjanzen.It Pa hack
179df756572SpjanzenThe hack program.
180df756572Spjanzen.It Pa data , rumors
181df756572SpjanzenData files used by hack.
182df756572Spjanzen.It Pa help , hh
183df756572SpjanzenHelp data files.
184df756572Spjanzen.It Pa record
185df756572SpjanzenThe list of topscorers.
186df756572Spjanzen.It Pa save
187df756572SpjanzenA subdirectory containing the saved games.
188df756572Spjanzen.It Pa bones_dd
189df756572SpjanzenDescriptions of the ghost and belongings of a deceased adventurer.
190df756572Spjanzen.It Pa xlock.dd
191df756572SpjanzenDescription of a dungeon level.
192df756572Spjanzen.It Pa safelock
193df756572SpjanzenLock file for xlock.
194df756572Spjanzen.It Pa record_lock
195df756572SpjanzenLock file for record.
196df756572Spjanzen.El
197df756572Spjanzen.Sh AUTHORS
19827e95970Sschwarze.An -nosplit
19927e95970Sschwarze.An Jay Fenlason
20027e95970Sschwarze.Po +
20127e95970Sschwarze.An Kenny Woodland ,
20227e95970Sschwarze.An Mike Thome
20327e95970Sschwarzeand
20427e95970Sschwarze.An Jon Payne
20527e95970Sschwarze.Pc
20627e95970Sschwarzewrote the original hack, very much like rogue (but full of bugs).
20706c83a8dSjmc.Pp
20827e95970Sschwarze.An Andries Brouwer
20927e95970Sschwarzecontinuously deformed their sources into the current
21006c83a8dSjmcversion \(en in fact an entirely different game.
211