summaryrefslogtreecommitdiff
path: root/static/netbsd/man6
diff options
context:
space:
mode:
authorJacob McDonnell <jacob@jacobmcdonnell.com>2026-04-25 19:55:15 -0400
committerJacob McDonnell <jacob@jacobmcdonnell.com>2026-04-25 19:55:15 -0400
commit253e67c8b3a72b3a4757fdbc5845297628db0a4a (patch)
treeadf53b66087aa30dfbf8bf391a1dadb044c3bf4d /static/netbsd/man6
parenta9157ce950dfe2fc30795d43b9d79b9d1bffc48b (diff)
docs: Added All NetBSD Manuals
Diffstat (limited to 'static/netbsd/man6')
-rw-r--r--static/netbsd/man6/RELEASE_NOTES-2.6300
-rw-r--r--static/netbsd/man6/RELEASE_NOTES-3.6277
-rw-r--r--static/netbsd/man6/adventure.655
-rw-r--r--static/netbsd/man6/arithmetic.6106
-rw-r--r--static/netbsd/man6/atc.6504
-rw-r--r--static/netbsd/man6/backgammon.6176
-rw-r--r--static/netbsd/man6/bad.include-toplevel.610
-rw-r--r--static/netbsd/man6/banner.680
-rw-r--r--static/netbsd/man6/battlestar.6174
-rw-r--r--static/netbsd/man6/bcd.692
-rw-r--r--static/netbsd/man6/boggle.6127
-rw-r--r--static/netbsd/man6/caesar.672
-rw-r--r--static/netbsd/man6/canfield.6127
-rw-r--r--static/netbsd/man6/cgram.668
-rw-r--r--static/netbsd/man6/ching.6152
-rw-r--r--static/netbsd/man6/colorbars.647
-rw-r--r--static/netbsd/man6/countmail.662
-rw-r--r--static/netbsd/man6/cribbage.6188
-rw-r--r--static/netbsd/man6/dab.6112
-rw-r--r--static/netbsd/man6/example.66
-rw-r--r--static/netbsd/man6/factor.6118
-rw-r--r--static/netbsd/man6/fish.687
-rw-r--r--static/netbsd/man6/fortune.6175
-rw-r--r--static/netbsd/man6/gomoku.6122
-rw-r--r--static/netbsd/man6/hack.6209
-rw-r--r--static/netbsd/man6/hals_end.666
-rw-r--r--static/netbsd/man6/hangman.665
-rw-r--r--static/netbsd/man6/hunt.6446
-rw-r--r--static/netbsd/man6/huntd.6115
-rw-r--r--static/netbsd/man6/ipv6.631
-rw-r--r--static/netbsd/man6/larn.6157
-rw-r--r--static/netbsd/man6/mille.6387
-rw-r--r--static/netbsd/man6/monop.6178
-rw-r--r--static/netbsd/man6/number.659
-rw-r--r--static/netbsd/man6/p.61
-rw-r--r--static/netbsd/man6/phantasia.61213
-rw-r--r--static/netbsd/man6/pig.646
-rw-r--r--static/netbsd/man6/pom.671
-rw-r--r--static/netbsd/man6/primes.6106
-rw-r--r--static/netbsd/man6/quiz.6119
-rw-r--r--static/netbsd/man6/rain.655
-rw-r--r--static/netbsd/man6/random.668
-rw-r--r--static/netbsd/man6/robots.6169
-rw-r--r--static/netbsd/man6/rogue.6107
-rw-r--r--static/netbsd/man6/sail.61136
-rw-r--r--static/netbsd/man6/smp.623
-rw-r--r--static/netbsd/man6/snake.6126
-rw-r--r--static/netbsd/man6/t.68
-rw-r--r--static/netbsd/man6/test_packets.622
-rw-r--r--static/netbsd/man6/test_signatures.648
-rw-r--r--static/netbsd/man6/testpat.649
-rw-r--r--static/netbsd/man6/tetris.6175
-rw-r--r--static/netbsd/man6/traffic.expect.610
-rw-r--r--static/netbsd/man6/trek.6141
-rw-r--r--static/netbsd/man6/wargames.650
-rw-r--r--static/netbsd/man6/worm.662
-rw-r--r--static/netbsd/man6/worms.6126
-rw-r--r--static/netbsd/man6/wtf.690
-rw-r--r--static/netbsd/man6/wump.6110
59 files changed, 9081 insertions, 0 deletions
diff --git a/static/netbsd/man6/RELEASE_NOTES-2.6 b/static/netbsd/man6/RELEASE_NOTES-2.6
new file mode 100644
index 00000000..ff074315
--- /dev/null
+++ b/static/netbsd/man6/RELEASE_NOTES-2.6
@@ -0,0 +1,300 @@
+The stable Postfix release is called postfix-2.6.x where 2=major
+release number, 6=minor release number, x=patchlevel. The stable
+release never changes except for patches that address bugs or
+emergencies. Patches change the patchlevel and the release date.
+
+New features are developed in snapshot releases. These are called
+postfix-2.7-yyyymmdd where yyyymmdd is the release date (yyyy=year,
+mm=month, dd=day). Patches are never issued for snapshot releases;
+instead, a new snapshot is released.
+
+The mail_release_date configuration parameter (format: yyyymmdd)
+specifies the release date of a stable release or snapshot release.
+
+If you upgrade from Postfix 2.4 or earlier, read RELEASE_NOTES-2.5
+before proceeding.
+
+Major changes - multi-instance support
+--------------------------------------
+
+[Feature 20090121] Support for managing multiple Postfix instances.
+This can automatically apply your "postfix start" etc. command to
+multiple Postfix instances, including upgrades to new Postfix
+versions. Multi-instance support allows you to do the following
+and more:
+
+- Simplify post-queue content filter configuration by using separate
+ Postfix instances before and after the filter. This simplifies
+ trouble shooting and performance tuning.
+
+- Implement per-user content filters (or no filter) via transport
+ map lookups instead of content_filter settings. Mail for some
+ users can be sent directly from the before-filter instance to the
+ after-filter instance.
+
+- Test new configuration settings (on a different server IP address
+ or TCP port) without disturbing production instances.
+
+- Each additional Postfix instance uses a few files and directories,
+ plus memory for an extra master daemon and queue manager. The
+ pickup daemon is needed only if you use local submission or
+ "postsuper -r".
+
+Best of all, nothing changes when you use only one Postfix instance.
+
+The MULTI_INSTANCE_README file presents an introduction to
+multi-instance management. Multi-instance support is based on an
+API that is described in the postfix-wrapper(5) manual page.
+
+Major changes - milter support
+------------------------------
+
+[Feature 20090428] The following improvements have been made to the
+Milter implementation:
+
+- Improved compatibility of the {mail_addr} and {rcpt_addr} macros.
+
+- Support for the {mail_host}, {mail_mailer}, {rcpt_host} and
+{rcpt_mailer} macros.
+
+- Milter applications can now request rejected recipients with the
+SMFIP_RCPT_REJ feature. Rejected recipients are reported with
+{rcpt_mailer} = "error", {rcpt_host} = enhanced status code, and
+{rcpt_addr} = descriptive text. This feature requires "milter_protocol
+= 6" or higher (default as of Postfix 2.6).
+
+- Milters can now replace the envelope sender address with the
+SMFIR_CHGFROM request, and can add recipients with SMFIR_ADDRCPT_PAR.
+These implementations ignore ESMTP command parameters and log a
+warning message as follows:
+
+ warning: 100B22B3293: cleanup_chg_from: ignoring ESMTP arguments "whatever"
+ warning: 100B22B3293: cleanup_add_rcpt: ignoring ESMTP arguments "whatever"
+
+[Incompat 20090428] The default milter_protocol setting is increased
+from 2 to 6; this enables all available features up to and including
+Sendmail 8.14.0. The new milter_protocol setting may break
+compatibility with older Milter libraries or applications, and may
+cause Postfix to log warning messages such as:
+
+ warning: milter inet:host:port: can't read packet header: Unknown error : 0
+
+ warning: milter inet:host:port: can't read packet header: Success
+
+ warning: milter inet:host:port: can't read SMFIC_DATA reply
+ packet header: No such file or directory
+
+To restore compatibility, specify "milter_protocol = 2" in main.cf.
+
+Major changes - security
+------------------------
+
+[Incompat 20080726] When a mailbox file is not owned by its recipient,
+the local and virtual delivery agents now log a warning and defer
+delivery. Specify "strict_mailbox_ownership = no" to ignore such
+ownership discrepancies.
+
+Major changes - smtp server
+---------------------------
+
+[Feature 20080212] check_reverse_client_hostname_access, to make
+access decisions based on the unverified client hostname. For
+safety reasons an OK result is not allowed.
+
+[Feature 20090210] With "reject_tempfail_action = defer", the Postfix
+SMTP server immediately replies with a 4xx status after some temporary
+error, instead of executing an implicit "defer_if_permit" action.
+
+[Feature 20090215] The Postfix SMTP server automatically hangs up
+after replying with "521". This makes overload handling more
+effective. See also RFC 1846 for prior art on this topic.
+
+[Feature 20090228] The Postfix SMTP server maintains a per-session
+"improper command pipelining detected" flag. This flag can be tested
+at any time with reject_unauth_pipelining, and is raised whenever
+a client command is followed by unexpected commands or message
+content. The Postfix SMTP server logs the first command pipelining
+transgression as "improper command pipelining after <command> from
+<hostname>[<hostaddress>]".
+
+[Feature 20090212] Stress-dependent behavior is enabled by default.
+Under conditions of overload, smtpd_timeout is reduced from 300s
+to 10s, smtpd_hard_error_limit is reduced from 20 to 1, and
+smtpd_junk_command_limit is reduced from 100 to 1. This will reduce
+the impact of overload for most legitimate mail.
+
+[Feature 20080629] The Postfix SMTP server's SASL authentication
+was re-structured. With "smtpd_tls_auth_only = yes", SASL support
+is now activated only after a successful TLS handshake. Earlier
+Postfix SMTP server versions could complain about unavailable SASL
+mechanisms during the plaintext phase of the SMTP protocol.
+
+[Incompat 20080510] In the policy delegation protocol, certificate
+common name attributes are now xtext encoded UTF-8. The xtext decoded
+attributes may contain any UTF-8 value except non-printable ASCII
+characters.
+
+Major changes - performance
+---------------------------
+
+[Feature 20090215] The Postfix SMTP server automatically hangs up
+after replying with "521". This makes overload handling more
+effective. See also RFC 1846 for prior art on this topic.
+
+[Feature 20090212] Stress-dependent behavior is enabled by default.
+Under conditions of overload, smtpd_timeout is reduced from 300s
+to 10s, smtpd_hard_error_limit is reduced from 20 to 1, and
+smtpd_junk_command_limit is reduced from 100 to 1. This will reduce
+the negative impact of server overload for most legitimate mail.
+
+[Feature 20090109] Specify "tcp_windowsize = 65535" (or less) to
+work around routers with broken TCP window scaling implementations.
+This is perhaps more convenient than collecting tcpdump output and
+tuning kernel parameters by hand. With Postfix TCP servers (smtpd(8),
+qmqpd(8)), this feature is implemented by the Postfix master(8)
+daemon.
+
+To change this parameter without stopping Postfix, you need to first
+terminate all Postfix TCP servers:
+
+ # postconf -e master_service_disable=inet
+ # postfix reload
+
+This immediately terminates all processes that accept network
+connections. Then you enable Postfix TCP servers with the updated
+tcp_windowsize setting:
+
+ # postconf -e tcp_windowsize=65535 master_service_disable=
+ # postfix reload
+
+If you skip these steps with a running Postfix system, then the
+tcp_windowsize change will work only for Postfix TCP clients (smtp(8),
+lmtp(8)).
+
+Of course you can also do "postfix stop" and "postfix start",
+but that is more disruptive.
+
+Major changes - tls
+-------------------
+
+[Incompat 20090428] The Postfix SMTP client(!) no longer tries to
+use the obsolete SSLv2 protocol by default, as this may prevent the
+use of modern SSL features. Lack of SSLv2 support should never be
+a problem, since SSLv3 was defined in 1996, and TLSv1 in 1999. You
+can undo the change by specifying empty main.cf values for
+smtp_tls_protocols and lmtp_tls_protocols. The Postfix SMTP server
+maintains SSLv2 support for backwards compatibility with ancient
+clients.
+
+[Feature 20081010] Controls for the protocols and ciphers that
+Postfix will use with opportunistic TLS. The smtp_tls_protocols,
+smtp_tls_ciphers, and equivalent parameters for lmtp and smtpd
+provide global settings; the SMTP client TLS policy table provides
+ciphers and protocols settings for specific peers. Code by Victor
+Duchovni. Details are given in the TLS_README and postconf(5)
+documents.
+
+[Feature 20081108] Elliptic curve support. This requires OpenSSL
+version 0.9.9 or later.
+
+Major changes - address verification
+------------------------------------
+
+[Incompat 20080428] Postfix SMTP server replies for address
+verification have changed. unverified_recipient_reject_code and
+unverified_sender_reject_code now handle "5XX" rejects only. The
+"4XX" rejects are now controlled with unverified_sender_defer_code
+and unverified_recipient_defer_code.
+
+[Feature 20080428] Finer control over the way Postfix reports address
+verification failures to remote SMTP clients.
+
+- unverified_sender/recipient_defer_code: the numerical Postfix
+ SMTP server reply code when address verification failed due
+ to some temporary error.
+
+- unverified_sender/recipient_reject_reason: fixed text that Postfix
+ will send to the remote SMTP client, instead of sending actual
+ address verification details.
+
+Major changes - dsn
+-------------------
+
+[Feature 20090307] New "lmtp_assume_final = yes" flag to send correct
+DSN "success" notifications when LMTP delivery is "final" as opposed
+to delivery into a content filter.
+
+Major changes - file organization
+---------------------------------
+
+[Incompat 20080207] According to discussions on the mailing list,
+too many people are breaking newly installed Postfix by overwriting
+the new /etc/postfix files with versions from an older release, and
+end up with a broken configuration that cannot repair itself. For
+this reason, postfix-script, postfix-files and post-install are
+moved away from /etc/postfix to $daemon_directory.
+
+Major changes - header rewriting
+--------------------------------
+
+[Incompat 20090330] Postfix now adds (Resent-) From:, Date:,
+Message-ID: or To: headers only when clients match
+$local_header_rewrite_clients. Specify "always_add_missing_headers
+= yes" for backwards compatibility. Adding such headers can break
+DKIM signatures that cover headers that are not present. For
+compatibility with existing logfile processing software, Postfix
+will log ``message-id=<>'' for messages without Message-Id header.
+
+Major changes - lmtp client
+---------------------------
+
+[Feature 20090307] New "lmtp_assume_final = yes" flag to send correct
+DSN "success" notifications when LMTP delivery is "final" as opposed
+to delivery into a content filter.
+
+Major changes - logging
+-----------------------
+
+[Incompat 20090330] Postfix now adds (Resent-) From:, Date:,
+Message-ID: or To: headers only when clients match
+$local_header_rewrite_clients. Specify "always_add_missing_headers
+= yes" for backwards compatibility. Adding such headers can break
+DKIM signatures that cover headers that are not present.
+
+This changes the appearance of Postfix logging: to preserve
+compatibility with existing logfile processing software, Postfix
+will log ``message-id=<>'' for messages without Message-Id header.
+
+Major changes - mime
+--------------------
+
+[Feature 20080324] When the "postmap -q -" command reads lookup
+keys from standard input, it now understands RFC822 and MIME message
+format. Specify -h or -b to use headers or body lines as lookup
+keys, and specify -hm or -bm to simulate header_checks or body_checks.
+
+Major changes - miscellaneous
+-----------------------------
+
+[Feature 20090109] Support to selectively disable master(8) listener
+ports by service type or by service name + type. Specify a list of
+service types ("inet", "unix", "fifo", or "pass") or "name.type"
+tuples, where "name" is the first field of a master.cf entry and
+"type" is a service type. Examples: to turn off the main SMTP
+listener port, use "master_service_disable = smtp.inet"; to turn
+off all TCP/IP listeners, use "master_service_disable = inet".
+Changing this parameter requires "postfix reload".
+
+Major changes - sasl
+--------------------
+
+[Feature 20090418] The Postfix SMTP server passes more information
+to the Dovecot authentication server: the "TLS is active" flag, the
+server IP address, and the client IP address.
+
+[Feature 20080629] The Postfix SMTP server's SASL authentication
+was re-structured. With "smtpd_tls_auth_only = yes", SASL support
+is now activated only after a successful TLS handshake. Earlier
+Postfix SMTP server versions could complain about unavailable SASL
+mechanisms during the plaintext phase of the SMTP protocol.
+
diff --git a/static/netbsd/man6/RELEASE_NOTES-3.6 b/static/netbsd/man6/RELEASE_NOTES-3.6
new file mode 100644
index 00000000..d8ac90cc
--- /dev/null
+++ b/static/netbsd/man6/RELEASE_NOTES-3.6
@@ -0,0 +1,277 @@
+This is the Postfix 3.6 (stable) release.
+
+The stable Postfix release is called postfix-3.6.x where 3=major
+release number, 6=minor release number, x=patchlevel. The stable
+release never changes except for patches that address bugs or
+emergencies. Patches change the patchlevel and the release date.
+
+New features are developed in snapshot releases. These are called
+postfix-3.7-yyyymmdd where yyyymmdd is the release date (yyyy=year,
+mm=month, dd=day). Patches are never issued for snapshot releases;
+instead, a new snapshot is released.
+
+The mail_release_date configuration parameter (format: yyyymmdd)
+specifies the release date of a stable release or snapshot release.
+
+If you upgrade from Postfix 3.4 or earlier, read RELEASE_NOTES-3.5
+before proceeding.
+
+License change
+---------------
+
+This software is distributed with a dual license: in addition to the
+historical IBM Public License 1.0, it is now also distributed with the
+more recent Eclipse Public License 2.0. Recipients can choose to take
+the software under the license of their choice. Those who are more
+comfortable with the IPL can continue with that license.
+
+Major changes - internal protocol identification
+------------------------------------------------
+
+[Incompat 20200920] Internal protocols have changed. You need to
+"postfix stop" before updating, or before backing out to an earlier
+release, otherwise long-running daemons (pickup, qmgr, verify, tlsproxy,
+postscreen) may fail to communicate with the rest of Postfix, causing
+mail delivery delays until Postfix is restarted.
+
+This change does not affect message files in Postfix queue directories,
+only the communication between running Postfix programs.
+
+With this change, every Postfix internal service, including the postdrop
+command, announces the name of its protocol before doing any other I/O.
+Every Postfix client program, including the Postfix sendmail command,
+will verify that the protocol name matches what it is supposed to be.
+
+The purpose of this change is to produce better error messages, for
+example, when someone configures the discard daemon as a bounce
+service in master.cf, or vice versa.
+
+This change may break third-party programs that implement a
+Postfix-internal protocol such as qpsmtpd. Such programs have never
+been supported. Fortunately, this will be an easy fix: look at the
+first data from the cleanup daemon: if it is a protocol announcement,
+you're talking to Postfix 3.6 or later. That's the only real change.
+
+Major changes - tls
+-------------------
+
+[Incompat 20200705] The minimum supported OpenSSL version is 1.1.1,
+which will reach the end of life by 2023-09-11. Postfix 3.6 is
+expected to reach the end of support in 2025. Until then, Postfix
+will be updated as needed for compatibility with OpenSSL.
+
+The default fingerprint digest has changed from md5 to sha256 (Postfix
+3.6 with compatibility_level >= 3.6). With a lower compatibility_level
+setting, Postfix defaults to using md5, and logs a warning when a Postfix
+configuration specifies no explicit digest type.
+
+Export-grade Diffie-Hellman key exchange is no longer supported,
+and the tlsproxy_tls_dh512_param_file parameter is ignored,
+
+[Feature 20200906] The tlstype.pl helper script by Viktor Dukhovni
+reports TLS information per message delivery. This processes output
+from the collate.pl script. See auxiliary/collate/README.tlstype and
+auxiliary/collate/tlstype.pl.
+
+Major changes - compatibility level
+-----------------------------------
+
+[Feature 20210109] Starting with Postfix version 3.6, the compatibility
+level is "3.6". In future Postfix releases, the compatibility level will
+be the Postfix version that introduced the last incompatible change. The
+level is formatted as 'major.minor.patch', where 'patch' is usually
+omitted and defaults to zero. Earlier compatibility levels are 0, 1 and 2.
+
+This also introduces main.cf and master.cf support for the <=level,
+<level, and other operators to compare compatibility levels. With the
+standard <=, <, etc. operators, compatibility level 3.10 would be less
+than 3.9, which is undesirable.
+
+Major changes - services(5) override
+------------------------------------
+
+[Feature 20210418] Postfix no longer uses the services(5) database
+to look up the TCP ports for SMTP and LMTP services. Instead, this
+information is configured with the new known_tcp_ports configuration
+parameter (default: lmtp=24, smtp=25, smtps=submissions=465,
+submission=587). When a service is not specified in known_tcp_ports,
+Postfix will still query the services(5) database.
+
+Major changes - local_login_sender_maps
+---------------------------------------
+
+[Feature 20201025] Fine-grained control over the envelope sender address
+for submission with the Postfix sendmail (or postdrop) commands.
+
+The local_login_sender_maps parameter (default: static:*) specifies
+a list of lookup tables that are searched by the UNIX login name, and
+that return a list of allowed envelope sender patterns separated by
+space or comma. The default is backwards-compatible: every user may
+specify any sender envelope address.
+
+This feature is enforced by the postdrop command. When no UNIX login
+name is available, the postdrop command will prepend "uid:" to the
+numerical UID and use that instead.
+
+This feature ignores address extensions in the user-specified
+envelope sender address.
+
+Besides the special pattern "*" which allows any sender address,
+there are "<>" which matches an empty sender address, and the
+"@domain" wildcard pattern. More information about those can be found
+in the postconf(5) manpage.
+
+Example:
+
+/etc/postfix/main.cf:
+ # Allow root and postfix full control, anyone else can only
+ # send mail as themselves. Use "uid:" followed by the numerical
+ # UID when the UID has no entry in the UNIX password file.
+ local_login_sender_maps =
+ inline:{ { root = *}, { postfix = * } },
+ pcre:/etc/postfix/login_senders
+
+/etc/postfix/login_senders:
+ # Allow both the bare username and the user@domain forms.
+ /(.+)/ $1 $1@example.com
+
+Major changes - order of relay and recipient restrictions
+---------------------------------------------------------
+
+[Incompat 20210131] With smtpd_relay_before_recipient_restrictions=yes,
+the Postfix SMTP server will evaluate smtpd_relay_restrictions before
+smtpd_recipient_restrictions. This is the default behavior with
+compatibility_level >= 3.6.
+
+This change makes the implemented behavior consistent with existing
+documentation. There is a backwards-compatibility warning that allows
+users to freeze historical behavior. See COMPATIBILITY_README for
+details.
+
+Major changes - respectful logging
+----------------------------------
+
+[Feature 20210220] Postfix version 3.6 deprecates terminology
+that implies white is better than black. Instead, Postfix prefers
+'allowlist', 'denylist', and variations on those words. This change
+affects Postfix documentation, and postscreen parameters and logging.
+
+To keep the old postscreen logging set "respectful_logging = no"
+in main.cf.
+
+Noel Jones assisted with the initial transition.
+
+Changes in documentation
+------------------------
+
+Postfix documentation was updated to use 'allowlist', 'denylist', etc.
+These documentation changes do not affect Postfix behavior.
+
+Changes in parameter names
+--------------------------
+
+The following postscreen parameters replace names that contain 'blacklist'
+or 'whitelist':
+
+ postscreen_allowlist_interfaces
+ postscreen_denylist_action
+ postscreen_dnsbl_allowlist_threshold
+
+These new parameters have backwards-compatible default settings
+that support the old parameter names, so that the name change should
+not affect Postfix behavior. This means that existing management tools
+that use the old parameter names should keep working as before.
+
+This compatibility safety net may break when some management tools
+use the new parameter names, and some use the old names, such that
+different tools will disagree on how Postfix works.
+
+Changes in logging
+------------------
+
+The following logging replaces forms that contain 'blacklist' or
+'whitelist':
+
+ postfix/postscreen[pid]: ALLOWLIST VETO [address]:port
+ postfix/postscreen[pid]: ALLOWLISTED [address]:port
+ postfix/postscreen[pid]: DENYLISTED [address]:port
+
+To avoid breaking logfile analysis tools, Postfix keeps logging the old
+forms by default, as long as the compatibility_level parameter setting
+is less than 3.6, and the respectful_logging parameter is not explicitly
+configured. As a reminder, Postfix will log the following:
+
+ postfix/postscreen[pid]: Using backwards-compatible default setting
+ respectful_logging=no for client [address]:port
+
+To keep logging the old form, make the setting "respectful_logging =
+no" permanent in main.cf, for example:
+
+ # postconf "respectful_logging = no"
+ # postfix reload
+
+To stop the reminder, configure the respectful_logging parameter to
+"yes" or "no", or configure "compatibility_level = 3.6".
+
+Major changes - threaded bounces
+--------------------------------
+
+[Feature 20201205] Support for threaded bounces. This allows mail
+readers to present a non-delivery, delayed delivery, or successful
+delivery notification in the same email thread as the original
+message.
+
+Unfortunately, this also makes it easy for users to mistakenly delete
+the whole email thread (all related messages), instead of deleting
+only the delivery status notification.
+
+To enable, specify "enable_threaded_bounces = yes".
+
+Other changes - smtpd_sasl_mechanism_list
+-----------------------------------------
+
+[Feature 20200906] The smtpd_sasl_mechanism_list parameter (default:
+!external, static:rest) prevents confusing errors when a SASL backend
+announces EXTERNAL support which Postfix does not support.
+
+Other changes - delivery logging
+--------------------------------
+
+[Incompat 20200531] Postfix delivery agents now log an explicit record
+when delegating delivery to a different Postfix delivery agent.
+
+For example, with "best_mx_transport = local", an SMTP delivery
+agent will now log when a recipient will be delivered locally. This
+makes the delegating delivery agent visible, where it would otherwise
+have remained invisible, which would complicate troubleshooting.
+
+ postfix/smtp[pid]: queueid: passing <recipient> to transport=local
+
+This will usually be followed by logging for an actual delivery:
+
+ postfix/local[pid]: queueid: to=<recipient>, relay=local, ...
+
+Other examples: the local delivery agent will log a record that it
+defers mailbox delivery through mailbox_transport or through
+fallback_transport.
+
+Other changes - error logging
+-----------------------------
+
+[Incompat 20200531] Postfix programs will now log "Application error"
+instead of "Success" or "Unknown error: 0" when an operation fails with
+errno == 0, i.e., the error originates from non-kernel code.
+
+Other changes - dns lookups
+---------------------------
+
+[Feature 20200509] The threadsafe resolver API (res_nxxx() calls)
+is now the default, not because the API is threadsafe, but because
+this is the API where new features are being added.
+
+To build old style, build with:
+
+ make makefiles CCARGS="-DNO_RES_NCALLS..."
+
+This is the default for systems that are known not to support the
+threadsafe resolver API.
diff --git a/static/netbsd/man6/adventure.6 b/static/netbsd/man6/adventure.6
new file mode 100644
index 00000000..cc8c7a85
--- /dev/null
+++ b/static/netbsd/man6/adventure.6
@@ -0,0 +1,55 @@
+.\" $NetBSD: adventure.6,v 1.4 2003/08/07 09:36:50 agc Exp $
+.\"
+.\" Copyright (c) 1991, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" The game adventure was originally written in Fortran by Will Crowther
+.\" and Don Woods. It was later translated to C and enhanced by Jim
+.\" Gillogly. This code is derived from software contributed to Berkeley
+.\" by Jim Gillogly at The Rand Corporation.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)adventure.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt ADVENTURE 6
+.Os
+.Sh NAME
+.Nm adventure
+.Nd an exploration game
+.Sh SYNOPSIS
+.Nm
+.Op saved-file
+.Sh DESCRIPTION
+The object of the game is to locate and explore Colossal Cave, find the
+treasures hidden there, and bring them back to the building with you.
+The program is self-descriptive to a point, but part of the game is to
+discover its rules.
+.Pp
+To terminate a game, enter
+.Dq quit ;
+to save a game for later resumption, enter
+.Dq suspend .
diff --git a/static/netbsd/man6/arithmetic.6 b/static/netbsd/man6/arithmetic.6
new file mode 100644
index 00000000..07f9c837
--- /dev/null
+++ b/static/netbsd/man6/arithmetic.6
@@ -0,0 +1,106 @@
+.\" $NetBSD: arithmetic.6,v 1.12 2009/03/11 13:00:37 joerg Exp $
+.\"
+.\" Copyright (c) 1989, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Eamonn McManus of Trinity College Dublin.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)arithmetic.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt ARITHMETIC 6
+.Os
+.Sh NAME
+.Nm arithmetic
+.Nd quiz on simple arithmetic
+.Sh SYNOPSIS
+.Nm
+.Op Fl o Ar +\-x/
+.Op Fl r Ar range
+.Sh DESCRIPTION
+.Nm
+asks you to solve problems in simple arithmetic.
+Each question must be answered correctly before going on to the next.
+After every 20 problems, it prints the score so far and the time taken.
+You can quit at any time by typing the interrupt or end-of-file character.
+.Pp
+The options are as follows:
+.Bl -tag -width indent
+.It Fl o
+By default,
+.Nm
+asks questions on addition of numbers from 0 to 10, and corresponding
+subtraction.
+By supplying one or more of the characters
+.Ar +\-x/ ,
+you can ask for problems in addition, subtraction, multiplication, and
+division, respectively.
+If you give one of these characters more than once, that kind of problem
+will be asked correspondingly more often.
+.It Fl r
+If a
+.Ar range
+is supplied,
+.Nm
+selects the numbers in its problems in the following way.
+For addition and multiplication, the numbers to be added or multiplied
+are between 0 and
+.Ar range ,
+inclusive.
+For subtraction and division, both the required result and the number to
+divide by or subtract will be between 0 and
+.Ar range .
+(Of course,
+.Nm
+will not ask you to divide by 0.)
+The default
+.Ar range
+is 10.
+.El
+.Pp
+When you get a problem wrong,
+.Nm
+will remember the numbers involved, and will tend to select those numbers
+more often than others, in problems of the same sort.
+Eventually it will forgive and forget.
+.Pp
+.Nm
+cannot be persuaded to tell you the right answer.
+You must work it out for yourself.
+.Sh DIAGNOSTICS
+.Dq What?
+if you get a question wrong.
+.Dq Right!
+if you get it right.
+.Dq Please type a number.
+if
+.Nm
+doesn't understand what you typed.
+.Sh SEE ALSO
+.Xr bc 1 ,
+.Xr dc 1
diff --git a/static/netbsd/man6/atc.6 b/static/netbsd/man6/atc.6
new file mode 100644
index 00000000..dff91db7
--- /dev/null
+++ b/static/netbsd/man6/atc.6
@@ -0,0 +1,504 @@
+.\" $NetBSD: atc.6,v 1.24 2015/07/26 22:22:24 wiz Exp $
+.\"
+.\" Copyright (c) 1990, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Ed James.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)atc.6 8.1 (Berkeley) 5/31/93
+.\"
+.\" Copyright (c) 1986 Ed James. All rights reserved.
+.\"
+.Dd January 1, 2004
+.Dt ATC 6
+.Os
+.Sh NAME
+.Nm atc
+.Nd air traffic controller game
+.Sh SYNOPSIS
+.Nm atc
+.Op Fl u?lstp
+.Op Fl gf Ar "game name"
+.Op Fl r Ar "random seed"
+.Sh DESCRIPTION
+.Nm
+lets you try your hand at the nerve wracking duties of the air traffic
+controller without endangering the lives of millions of travelers each year.
+Your responsibilities require you to direct the flight of jets
+and prop planes into and out of the flight arena and airports.
+The speed (update time) and frequency of the planes depend on the
+difficulty of the chosen arena.
+.Sh OPTIONS
+.Bl -tag -width flag
+.It Fl u
+Print the usage line and exit.
+.It Fl \&?
+Same as
+.Fl u .
+.It Fl l
+Print a list of available games and exit.
+The first game name printed is the default game.
+.It Fl s
+Print the score list (formerly the Top Ten list).
+.It Fl t
+Same as
+.Fl s .
+.It Fl p
+Print the path to the special directory where
+.Nm
+expects to find its private files.
+This is used during the installation of the program.
+.It Fl g Ar game
+Play the named game.
+If the game listed is not one of the ones printed from the
+.Fl l
+option, the default game is played.
+.It Fl f Ar game
+Same as
+.Fl g .
+.It Fl r Ar seed
+Set the random seed.
+The purpose of this flag is questionable.
+.El
+.Sh GOALS
+Your goal in
+.Nm
+is to keep the game going as long as possible.
+There is no winning state, except to beat the times of other players.
+You will need to: launch planes at airports (by instructing them to
+increase their altitude); land planes at airports (by instructing them to
+go to altitude zero when exactly over the airport); and maneuver planes
+out of exit points.
+.Pp
+Several things will cause the end of the game.
+Each plane has a destination (see information area), and
+sending a plane to the wrong destination is an error.
+Planes can run out of fuel, or can collide.
+Collision is defined as adjacency in all three dimensions.
+A plane leaving the arena
+in any other way than through its destination exit is an error as well.
+.Pp
+Scores are sorted in order of the number of planes safe.
+The other statistics are provided merely for fun.
+There is no penalty for
+taking longer than another player (except in the case of ties).
+.Pp
+Suspending a game is not permitted.
+If you get a talk message, tough.
+When was the last time an Air Traffic Controller got called away to the phone?
+.Sh THE DISPLAY
+Depending on the terminal you run
+.Nm
+on, the screen will be divided into 4 areas.
+It should be stressed that the terminal driver portion of the
+game was designed to be reconfigurable, so the display format can vary
+depending on the version you are playing.
+The descriptions here are based on the ascii version of the game.
+The game rules and input format, however, should remain consistent.
+Control-L redraws the screen, should it become muddled.
+.Ss RADAR
+The first screen area is the radar display, showing the relative locations
+of the planes, airports, standard entry/exit points, radar
+beacons, and ``lines'' which simply serve to aid you in guiding
+the planes.
+.Pp
+Planes are shown as a single letter with an altitude.
+If the numerical altitude is a single digit, then it represents
+thousands of feet.
+Some distinction is made between the prop planes and the jets.
+On ascii terminals, prop planes are
+represented by a upper case letter, jets by a lower case letter.
+.Pp
+Airports are shown as a number and some indication of the direction
+planes must be going to land at the airport.
+On ascii terminals, this is one of `^', `\*[Gt]', `\*[Lt]', and `v', to indicate
+north (0 degrees), east (90), west (270) and south (180), respectively.
+The planes will also take off in this direction.
+.Pp
+Beacons are represented as circles or asterisks and a number.
+Their purpose is to offer a place of easy reference to the plane pilots.
+See
+.Sx THE DELAY COMMAND
+section below.
+.Pp
+Entry/exit points are displayed as numbers along the border of the
+radar screen.
+Planes will enter the arena from these points without warning.
+These points have a direction associated with them, and
+planes will always enter the arena from this direction.
+On the ascii version of
+.Nm ,
+this direction is not displayed.
+It will become apparent what this direction is as the game progresses.
+.Pp
+Incoming planes will always enter at the same altitude: 7000 feet.
+For a plane to successfully depart through an entry/exit point,
+it must be flying at 9000 feet.
+It is not necessary for the planes to be flying in any particular
+direction when they leave the arena (yet).
+.Ss INFORMATION AREA
+The second area of the display is the information area, which lists
+the time (number of updates since start), and the number of planes you
+have directed safely out of the arena.
+Below this is a list of planes currently in the air, followed by a
+blank line, and then a list of planes on the ground (at airports).
+Each line lists the plane name and its current altitude,
+an optional asterisk indicating low fuel, the plane's destination,
+and the plane's current command.
+Changing altitude is not considered
+to be a command and is therefore not displayed.
+The following are some possible information lines:
+.Pp
+.Bd -literal -offset indent
+B4*A0: Circle @ b1
+g7 E4: 225
+.Ed
+.Pp
+The first example shows a prop plane named `B' that is flying at 4000 feet.
+It is low on fuel (note the `*').
+Its destination is Airport #0.
+The next command it expects to do is circle when it reaches Beacon #1.
+The second example shows a jet named `g' at 7000 feet, destined for
+Exit #4.
+It is just now executing a turn to 225 degrees (South-West).
+.Ss INPUT AREA
+The third area of the display is the input area.
+It is here that your input is reflected.
+See the
+.Sx INPUT
+heading of this manual for more details.
+.Ss AUTHOR AREA
+This area is used simply to give credit where credit is due. :-)
+.Sh INPUT
+A command completion interface is built into the game.
+At any time, typing `?' will list possible input characters.
+Typing a backspace (your erase character) backs up, erasing the last part
+of the command.
+When a command is complete, a return enters it, and
+any semantic checking is done at that time.
+If no errors are detected, the command is sent to the appropriate plane.
+If an error is discovered
+during the check, the offending statement will be underscored and a
+(hopefully) descriptive message will be printed under it.
+.Pp
+The command syntax is broken into two parts:
+.Em Immediate Only
+and
+.Em Delayable
+commands.
+.Em Immediate Only
+commands happen on the next update.
+.Em Delayable
+commands also happen on the next update unless they
+are followed by an optional predicate called the
+.Em Delay
+command.
+.Pp
+In the following tables, the syntax
+.Em [0\-9]
+means any single digit, and
+.Aq Em dir
+refers to a direction, given by the keys around the `s' key: ``wedcxzaq''.
+In absolute references, `q' refers to North-West or 315 degrees, and `w'
+refers to North, or 0 degrees.
+In relative references, `q' refers to \-45 degrees or 45 degrees left, and `w'
+refers to 0 degrees, or no change in direction.
+.Pp
+All commands start with a plane letter.
+This indicates the recipient of the command.
+Case is ignored.
+.Ss IMMEDIATE ONLY COMMANDS
+.Bl -tag -width "aaaa"
+.It "a [ cd+- ]" Em number
+Altitude: Change a plane's altitude, possibly requesting takeoff.
+`+' and `-' are the same as `c' and `d'.
+.Bl -tag -width "aaaaaaaaaa" -compact
+.It a Em number
+Climb or descend to the given altitude (in thousands of feet).
+.It ac Em number
+Climb: relative altitude change.
+.It ad Em number
+Descend: relative altitude change.
+.El
+.It m
+Mark: Display in highlighted mode.
+Plane and command information is displayed normally.
+.It i
+Ignore: Do not display highlighted.
+Command is displayed as a line of dashes if there is no command.
+.It u
+Unmark: Same as ignore, but if a delayed command is processed,
+the plane will become marked.
+This is useful if you want to forget about a plane during part,
+but not all, of its journey.
+.El
+.Ss DELAYABLE COMMANDS
+.Bl -tag -width "aaaa"
+.It "c [ lr ]"
+Circle: Have the plane circle.
+.Bl -tag -width "aaaaaaaaaa" -compact
+.It cl
+Left: Circle counterclockwise.
+.It cr
+Right: Circle clockwise (default).
+.El
+.It "t [ l-r+LR ] [ dir ] or tt [ abe* ]" Em number
+Turn: Change direction.
+.Bl -tag -width "aaaaaaaaaa" -compact
+.It "t\*[Lt]dir\*[Gt]"
+Turn to direction: Turn to the absolute compass heading given.
+The shortest turn will be taken.
+.It "tl [ dir ]"
+Left: Turn counterclockwise: 45 degrees by default, or the amount
+specified in
+.Aq dir
+(not
+.Em to
+.Aq dir . )
+`w' (0 degrees) is no turn.
+`e' is 45 degrees; `q' gives \-45 degrees counterclockwise, that is,
+45 degrees clockwise.
+.It "t- [ dir ]"
+Same as left.
+.It "tr [ dir ]"
+Right: Turn clockwise, 45 degrees by default, or the amount specified in
+.Aq dir .
+.It "t+ [ dir ]"
+Same as right.
+.It tL
+Hard left: Turn counterclockwise 90 degrees.
+.It tR
+Hard right: Turn clockwise 90 degrees.
+.It "tt [abe*]"
+Towards: Turn towards a beacon, airport or exit.
+The turn is just an estimate.
+.It "tta" Em number
+Turn towards the given airport.
+.It "ttb" Em number
+Turn towards the specified beacon.
+.It "tte" Em number
+Turn towards an exit.
+.It "tt*" Em number
+Same as ttb.
+.El
+.El
+.Ss THE DELAY COMMAND
+The
+.Em Delay
+(a/@) command may be appended to any
+.Em Delayable
+command.
+It allows the controller to instruct a plane to do an action when the
+plane reaches a particular beacon (or other objects in future versions).
+.Bl -tag -width "aaaa"
+.It ab Em number
+Do the delayable command when the plane reaches the specified beacon.
+The `b' for ``beacon'' is redundant to allow for expansion.
+`@' can be used instead of `a'.
+.El
+.Ss MARKING, UNMARKING AND IGNORING
+Planes are
+.Em marked
+by default when they enter the arena.
+This means they are displayed in highlighted mode on the radar display.
+A plane may also be either
+.Em unmarked
+or
+.Em ignored .
+An
+.Em ignored
+plane is drawn in unhighlighted mode, and a line of dashes is displayed in
+the command field of the information area.
+The plane will remain this way until a mark command has been issued.
+Any other command will be issued, but the command line will return to a
+line of dashes when the command is completed.
+.Pp
+An
+.Em unmarked
+plane is treated the same as an
+.Em ignored
+plane, except that it will automatically switch to
+.Em marked
+status when a delayed command has been processed.
+This is useful if you want to forget about a plane for a while, but its
+flight path has not yet been completely set.
+.Pp
+As with all of the commands, marking, unmarking and ignoring will take effect
+at the beginning of the next update.
+Do not be surprised if the plane does
+not immediately switch to unhighlighted mode.
+.Ss EXAMPLES
+.Bl -tag -width gtte4ab2 -offset indent
+.It atlab1
+Plane A: turn left at beacon #1
+.It cc
+Plane C: circle
+.It gtte4ab2
+Plane G: turn towards exit #4 at beacon #2
+.It ma+2
+Plane M: altitude: climb 2000 feet
+.It stq
+Plane S: turn to 315
+.It xi
+Plane X: ignore
+.El
+.Sh OTHER INFORMATION
+.Bl -bullet
+.It
+Jets move every update; prop planes move every other update.
+.It
+All planes turn at most 90 degrees per movement.
+.It
+Planes enter at 7000 feet and leave at 9000 feet.
+.It
+Planes flying at an altitude of 0 crash if they are not over an airport.
+.It
+Planes waiting at airports can only be told to take off (climb in altitude).
+.It
+Pressing return (that is, entering an empty command) will perform the
+next update immediately.
+This allows you to ``fast forward''
+the game clock if nothing interesting is happening.
+.El
+.Sh NEW GAMES
+The
+.Pa Game_List
+file lists the currently available play fields.
+New field description file names must be placed in this file to be playable.
+If a player specifies a game not in this file, his score will not be logged.
+.Pp
+The game field description files are broken into two parts.
+The first part is the definition section.
+Here, the four tunable game parameters must be set.
+These variables are set with the syntax:
+.Pp
+.Dl "variable = number;"
+.Pp
+Variable may be one of:
+.Li update ,
+indicating the number of seconds between forced updates;
+.Li newplane ,
+indicating (about) the number of updates between new plane entries;
+.Li width ,
+indicating the width of the play field; or
+.Li height ,
+indicating the height of the play field.
+.Pp
+The second part of the field description files describes the locations
+of the exits, the beacons, the airports and the lines.
+The syntax is as follows:
+.Pp
+.Bd -literal -offset indent
+.Bl -tag -width airport: -compact
+.It beacon :
+(x y) ... ;
+.It airport :
+(x y direction) ... ;
+.It exit :
+(x y direction) ... ;
+.It line :
+[ (x1 y1) (x2 y2) ] ... ;
+.El
+.Ed
+.Pp
+For beacons, a simple x, y coordinate pair is used (enclosed in parenthesis).
+Airports and exits require a third value, which is one of the directions
+.Em wedcxzaq .
+For airports, this is the direction that planes must be going to take
+off and land, and for exits, this is the direction that planes will be
+going when they
+.Em enter
+the arena.
+This may not seem intuitive, but as there is no restriction on
+direction of exit, this is appropriate.
+Lines are slightly different, since they need two coordinate pairs to
+specify the line endpoints.
+These endpoints must be enclosed in square brackets.
+.Pp
+All statements are semi-colon (;) terminated.
+Multiple item statements accumulate.
+Each definition must occur exactly once, before any item statements.
+Comments begin with a hash (#) symbol and terminate with a newline.
+The coordinates are between zero and width-1 and height-1 inclusive.
+All of the exit coordinates must lie on the borders, and
+all of the beacons and airports must lie inside of the borders.
+Line endpoints may be anywhere within the field, so long as
+the lines are horizontal, vertical or
+.Em exactly
+diagonal.
+.Ss FIELD FILE EXAMPLE
+.Bd -literal
+# This is the default game.
+
+update = 5;
+newplane = 10;
+width = 30;
+height = 21;
+
+exit: ( 12 0 x ) ( 29 0 z ) ( 29 7 a ) ( 29 17 a )
+ ( 9 20 e ) ( 0 13 d ) ( 0 7 d ) ( 0 0 c ) ;
+
+beacon: ( 12 7 ) ( 12 17 ) ;
+
+airport: ( 20 15 w ) ( 20 18 d ) ;
+
+line: [ ( 1 1 ) ( 6 6 ) ]
+ [ ( 12 1 ) ( 12 6 ) ]
+ [ ( 13 7 ) ( 28 7 ) ]
+ [ ( 28 1 ) ( 13 16 ) ]
+ [ ( 1 13 ) ( 11 13 ) ]
+ [ ( 12 8 ) ( 12 16 ) ]
+ [ ( 11 18 ) ( 10 19 ) ]
+ [ ( 13 17 ) ( 28 17 ) ]
+ [ ( 1 7 ) ( 11 7 ) ] ;
+
+.Ed
+.Sh FILES
+Files are kept in a special directory.
+See the
+.Sx OPTIONS
+section for a way to print this path out.
+It is normally
+.Pa /usr/share/games/atc .
+.Pp
+This directory contains the file
+.Pa Game_List ,
+which holds the list of playable games, as well as the games themselves.
+.Pp
+The scores are kept in
+.Pa /var/games/atc_score .
+.Sh AUTHORS
+.An Ed James ,
+UC Berkeley:
+.Aq Mt edjames@ucbvax.berkeley.edu ,
+ucbvax!edjames
+.Pp
+This game is based on someone's description of the overall flavor
+of a game written for some unknown PC many years ago, maybe.
+.Sh BUGS
+The screen sometimes refreshes after you have quit.
diff --git a/static/netbsd/man6/backgammon.6 b/static/netbsd/man6/backgammon.6
new file mode 100644
index 00000000..5b466c32
--- /dev/null
+++ b/static/netbsd/man6/backgammon.6
@@ -0,0 +1,176 @@
+.\" $NetBSD: backgammon.6,v 1.13 2012/04/21 12:27:27 roy Exp $
+.\"
+.\" Copyright (c) 1980, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)backgammon.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd April 5, 2012
+.Dt BACKGAMMON 6
+.Os
+.Sh NAME
+.Nm backgammon
+.Nd the game of backgammon
+.Sh SYNOPSIS
+.Nm
+.Op Fl
+.Op Fl nrwb
+.Op Fl pr
+.Op Fl pw
+.Op Fl pb
+.Op Fl t Ar term
+.Op Fl s Ar file
+.Sh DESCRIPTION
+This program lets you play backgammon against the computer
+or against a "friend".
+All commands are only one letter, so you don't need to type a carriage return,
+except at the end of a move.
+The program is mostly self-explanatory,
+so that a question mark (?) will usually get some help.
+If you answer `y' when the program asks if you want the rules,
+you will get text explaining the rules of the game, some hints on strategy,
+instructions on how to use the program,
+and a tutorial consisting of a practice game against the computer.
+A description of how to use the program can be
+obtained by answering `y' when it asks if you want instructions.
+.Pp
+The possible arguments for backgammon
+(most are unnecessary but some are very convenient)
+consist of:
+.Bl -tag -width indent
+.It Fl n
+don't ask for rules or instructions
+.It Fl r
+player is red (implies n)
+.It Fl w
+player is white (implies n)
+.It Fl b
+two players, red and white (implies n)
+.It Fl pr
+print the board before red's turn
+.It Fl pw
+print the board before white's turn
+.It Fl pb
+print the board before both player's turn
+.It Fl t Ar term
+terminal is type
+.Ar term ,
+uses
+.Pa /usr/share/misc/terminfo
+.It Fl s Ar file
+recover previously saved game from
+.Ar file
+.El
+.Pp
+.\"
+.\" Arguments may be optionally preceded by a `-'.
+.\" Several arguments may be concatenated together,
+.\" but not after `s' or `t' arguments,
+.\" since they can be followed by an arbitrary string.
+Any unrecognized arguments are ignored.
+An argument of a lone `-' gets a description of possible arguments.
+.Pp
+If
+.Ar term
+has capabilities for direct cursor movement (see
+.Xr terminfo 5 )
+.Nm
+``fixes'' the board after each move,
+so the board does not need to be reprinted,
+unless the screen suffers some horrendous malady.
+Also, any `p' option will be ignored.
+(The `t' option is not necessary unless the terminal type does not match
+the entry in the
+.Pa /usr/share/misc/terminfo
+data base.)
+.Sh QUICK REFERENCE
+When the program prompts by typing only your color,
+type a space or carriage return to roll, or
+.Bl -tag -width indent
+.It Ic d
+to double
+.It Ic p
+to print the board
+.It Ic q
+to quit
+.It Ic s
+to save the game for later
+.El
+.Pp
+When the program prompts with 'Move:', type
+.Bl -tag -width indent
+.It Ic p
+to print the board
+.It Ic q
+to quit
+.It Ic s
+to save the game
+.El
+.Pp
+or a
+.Em move ,
+which is a sequence of
+.Bl -tag -width indent
+.It Ic s-f
+move from
+.Ic s
+to
+.Ic f
+.It Ic s/r
+move one man on
+.Ic s
+the roll
+.Ic r
+separated by commas or spaces and ending with a newline.
+Available abbreviations are
+.Bl -tag -width indent
+.It Ic s-f1-f2
+means
+.Ic s-f1,f1-f2
+.It Ic s/r1r2
+means
+.Ic s/r1,s/r2
+.El
+.El
+.Pp
+Use
+.Ic b
+for bar and
+.Ic h
+for home,
+or 0 or 25 as appropriate.
+.Sh FILES
+.Bl -tag -width /usr/share/misc/terminfo -compact
+.It Pa /usr/games/teachgammon
+rules and tutorial
+.It Pa /usr/share/misc/terminfo
+terminal capabilities
+.El
+.Sh AUTHORS
+.An Alan Char
+.Sh BUGS
+The program's strategy needs much work.
diff --git a/static/netbsd/man6/bad.include-toplevel.6 b/static/netbsd/man6/bad.include-toplevel.6
new file mode 100644
index 00000000..4f578f5c
--- /dev/null
+++ b/static/netbsd/man6/bad.include-toplevel.6
@@ -0,0 +1,10 @@
+include-toplevel: include.withclauses.*
+include-toplevel: include.withclauses.*
+server:
+ identity: "top 1"
+ include: include.withoutclauses.*
+ include-toplevel: include.withclauses.*
+include: include.withclauses.*
+include-toplevel: include.withclauses.*
+server: identity: "top 2"
+include-toplevel: include.includetop.withoutclauses.*
diff --git a/static/netbsd/man6/banner.6 b/static/netbsd/man6/banner.6
new file mode 100644
index 00000000..a6e171ee
--- /dev/null
+++ b/static/netbsd/man6/banner.6
@@ -0,0 +1,80 @@
+.\" $NetBSD: banner.6,v 1.18 2012/02/26 21:06:59 wiz Exp $
+.\"
+.\" Copyright (c) 1980, 1993, 1995
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)banner.6 8.2 (Berkeley) 4/29/95
+.\"
+.Dd February 26, 2012
+.Dt BANNER 6
+.Os
+.Sh NAME
+.Nm banner
+.Nd print large banners
+.Sh SYNOPSIS
+.Nm
+.Op Fl w Ar width
+.Op Ar message
+.Sh DESCRIPTION
+.Nm
+prints a large, high quality banner on standard output.
+If
+.Ar message
+is omitted, one line of standard input is read for it.
+A prompt is written to standard error in case standard input is
+connected to a terminal.
+.Pp
+If
+.Fl w
+is given, the output is scrunched down from a width of 132 (the default) to
+.Ar width ,
+suitable for a narrow terminal.
+.Pp
+The output should be printed on paper of the appropriate width,
+with no breaks between the pages.
+.Sh EXIT STATUS
+.Ex -std
+.Sh EXAMPLES
+The following command will print the current date as a banner on
+standard output, using a width of 80:
+.Pp
+.Dl "/usr/games/banner -w 80 `date`"
+.Sh SEE ALSO
+.Xr banner 1 ,
+.Xr lpr 1
+.Sh AUTHORS
+.An Mark Horton
+.Sh BUGS
+Several ASCII characters are not defined, notably \*[Lt], \*[Gt], [, ], \e,
+^, _, {, }, |, and ~. Also, the characters ", ', and \*[Am] are funny
+looking (but in a useful way.)
+.Pp
+The
+.Fl w
+option is implemented by skipping some rows and columns.
+The smaller it gets, the grainier the output.
+Sometimes it runs letters together.
diff --git a/static/netbsd/man6/battlestar.6 b/static/netbsd/man6/battlestar.6
new file mode 100644
index 00000000..42f86b48
--- /dev/null
+++ b/static/netbsd/man6/battlestar.6
@@ -0,0 +1,174 @@
+.\" $NetBSD: battlestar.6,v 1.15 2005/09/15 02:09:41 wiz Exp $
+.\"
+.\" Copyright (c) 1983, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)battlestar.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd September 7, 2000
+.Dt BATTLESTAR 6
+.Os
+.Sh NAME
+.Nm battlestar
+.Nd a tropical adventure game
+.Sh SYNOPSIS
+.Nm
+.Op Fl r
+.Op Ar saved-file
+.Sh DESCRIPTION
+.Nm
+is an adventure game in the classic style.
+However, it's slightly less of a puzzle and more a game of exploration.
+There are a few magical words in the game, but on the whole, simple English
+should suffice to make one's desires understandable to the parser.
+.Sh THE SETTING
+In the days before the darkness came, when battlestars ruled the heavens...
+.Bd -literal -offset indent
+Three He made and gave them to His daughters,
+Beautiful nymphs, the goddesses of the waters.
+One to bring good luck and simple feats of wonder,
+Two to wash the lands and churn the waves asunder,
+Three to rule the world and purge the skies with thunder.
+.Ed
+.Pp
+In those times great wizards were known and their powers were beyond belief.
+They could take any object from thin air, and, uttering the word
+.Sq su
+could disappear.
+.Pp
+In those times men were known for their lust for gold and desire to
+wear fine weapons.
+Swords and coats of mail were fashioned that could withstand a laser blast.
+.Pp
+But when the darkness fell, the rightful reigns were toppled.
+Swords and helms and heads of state went rolling across the grass.
+The entire fleet of battlestars was reduced to a single ship.
+.Sh SAMPLE COMMANDS
+.Bd -literal -offset indent
+take --- take an object
+drop --- drop an object
+
+wear --- wear an object you are holding
+draw --- carry an object you are wearing
+
+put on --- take an object and wear it
+take off -- draw an object and drop it
+
+throw \*[Lt]object\*[Gt] \*[Lt]direction\*[Gt]
+
+! \*[Lt]shell esc\*[Gt]
+.Ed
+.Sh IMPLIED OBJECTS
+.Bd -literal -offset indent
+\*[Gt]-: take watermelon
+watermelon:
+Taken.
+\*[Gt]-: eat
+watermelon:
+Eaten.
+\*[Gt]-: take knife and sword and apple, drop all
+knife:
+Taken.
+broadsword:
+Taken.
+apple:
+Taken.
+knife:
+Dropped.
+broadsword:
+Dropped.
+apple:
+Dropped.
+\*[Gt]-: get
+knife:
+Taken.
+.Ed
+.Pp
+Notice that the "shadow" of the next word stays around if you
+want to take advantage of it.
+That is, saying "take knife" and then "drop"
+will drop the knife you just took.
+.Sh SCORE \*[Am] INVEN
+The two commands
+.Dq score
+and
+.Dq inven
+will print out your current status in the game.
+.Sh SAVING A GAME
+The command
+.Dq save
+will save your game in a file called
+.Pa .Bstar
+in your home directory by default.
+You can recover a saved game by using the
+.Fl r
+option when you start up the
+game, or by giving the name of the saved file as an argument.
+Save files will be saved to and restored from your home directory unless a
+path is specified - i.e.,
+.Dq Li battlestar -r savedgame
+will look for
+.Pa savedgame
+in your home directory, but
+.Dq Li battlestar -r ./savedgame
+will look in the current directory.
+.Dq Li battlestar -r
+will look for the default file,
+.Pa .Bstar
+in your home directory.
+.Sh DIRECTIONS
+The compass directions N, S, E, and W can be used if you have a compass.
+If you don't have a compass, you'll have to say R, L, A, or B, which
+stand for Right, Left, Ahead, and Back.
+Directions printed in room descriptions are
+always printed in R, L, A, and B relative directions.
+.Sh HISTORY
+I wrote Battlestar in 1979 in order to experiment with the niceties of
+the C Language.
+Most interesting things that happen in the game are hardwired into the
+code, so don't send me any hate mail about it!
+Instead, enjoy art for art's sake!
+.Sh AUTHORS
+.An David Riggle
+.Sh INSPIRATION \*[Am] ASSISTANCE
+.Bl -item -compact
+.It
+Chris Guthrie
+.It
+Peter Da Silva
+.It
+Kevin Brown
+.It
+Edward Wang
+.It
+Ken Arnold \*[Am] Company
+.El
+.Sh BUGS
+Countless.
+.Sh FAN MAIL
+Send to edward%ucbarpa@berkeley.arpa, chris%ucbcory@berkeley.arpa,
+riggle.pa@xerox.arpa.
diff --git a/static/netbsd/man6/bcd.6 b/static/netbsd/man6/bcd.6
new file mode 100644
index 00000000..d81b60a8
--- /dev/null
+++ b/static/netbsd/man6/bcd.6
@@ -0,0 +1,92 @@
+.\" $NetBSD: bcd.6,v 1.19 2019/09/02 08:26:00 wiz Exp $
+.\"
+.\" Copyright (c) 1988, 1991, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)bcd.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd September 1, 2019
+.Dt BCD 6
+.Os
+.Sh NAME
+.Nm bcd ,
+.Nm ppt ,
+.Nm morse
+.Nd "reformat input as punch cards, paper tape or morse code"
+.Sh SYNOPSIS
+.Nm
+.Op Ar string ...
+.Nm ppt
+.Op Fl d Ns \&| Ns Ar string ...
+.Nm morse
+.Op Fl ds Ar string ...
+.Sh DESCRIPTION
+The
+.Nm ,
+.Nm ppt
+and
+.Nm morse
+commands read the given input and reformat it in the form of
+punched cards, paper tape or morse code respectively.
+Acceptable input are command line arguments or the standard input.
+.Pp
+Available option:
+.Bl -tag -width flag
+.It Fl s
+The
+.Fl s
+option for morse produces dots and dashes rather than words.
+.It Fl d
+Decode
+.Nm ppt
+output, or
+.Nm morse
+output consisting of dots and dashes (as generated by using the
+.Fl s
+option).
+.El
+.Sh SEE ALSO
+.Rs
+.%B "ISO 1681:1973: Information processing--Unpunched paper cards--Specification"
+.Re
+.Rs
+.%B "ISO 1682:1973: Information processing--80 columns punched paper cards--Dimensions and location of rectangular punched holes"
+.Re
+.Rs
+.%B "ECMA-10: ECMA Standard for Data Interchange on Punched Tape"
+.Re
+.Rs
+.%B "ITU-T Recommendation F.1: Operational provisions for the international public telegram service"
+.%O "Division B, I. Morse code"
+.Re
+.Sh HISTORY
+A
+.Nm bcd
+utility appeared in
+.At v1 .
+The current implementation originates from a rewrite included in
+.Bx 4.3 reno .
diff --git a/static/netbsd/man6/boggle.6 b/static/netbsd/man6/boggle.6
new file mode 100644
index 00000000..f5812ffc
--- /dev/null
+++ b/static/netbsd/man6/boggle.6
@@ -0,0 +1,127 @@
+.\" $NetBSD: boggle.6,v 1.9 2006/09/24 01:38:57 jmcneill Exp $
+.\"
+.\" Copyright (c) 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Barry Brachman.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)boggle.6 8.1 (Berkeley) 6/11/93
+.\"
+.Dd September 23, 2006
+.Dt BOGGLE 6
+.Os
+.Sh NAME
+.Nm boggle
+.Nd word search game
+.Sh SYNOPSIS
+.Nm
+.Op Fl bd
+.Op Fl s Ar seed
+.Op Fl t Ar time
+.Op Fl w Ar length
+.Op + Op +
+.Op boardspec
+.Sh DESCRIPTION
+The object of
+.Nm
+is to find as many words as possible on the Boggle board within the three
+minute time limit.
+A Boggle board is a four by four arrangement of Boggle cubes, each side of
+each cube displaying a letter of the alphabet or `qu'.
+Words are formed by finding a sequence of cubes (letters) that are in the
+game's dictionary.
+The (N+1)th cube in the word must be horizontally,
+vertically, or diagonally adjacent to the Nth cube.
+Cubes cannot be reused.
+Words consist solely of lower case letters and must be at least 3 letters long.
+.Pp
+Command line flags can be given to change the rules of the game.
+.Bl -tag -width boardspec
+.It Fl b
+Run
+.Nm
+in batch mode.
+A
+.Ar boardspec
+must also be given.
+The dictionary is read from stdin and a list of words appearing in
+.Ar boardspec
+is printed to stdout.
+.It Fl d
+Enable debugging output.
+.It Fl s Ar seed
+Specify a seed
+.Ar seed
+other than the time of day.
+.It Fl t Ar time
+Set the time limit for each game from the default 3 minutes to
+.Ar time
+seconds.
+.It Fl w Ar length
+Change the minimum word length from 3 letters to
+.Ar length .
+.It Ar +
+This flag allows a cube to be used multiple times, but not in succession.
+.It Ar ++
+This flag allows the same cubes to be considered adjacent to itself.
+.It Ar boardspec
+A starting board position can be specified on the command line by
+listing the board left to right and top to bottom.
+.El
+.Pp
+Help is available during play by typing
+.Sq Ic \&? .
+More detailed information on the game is given there.
+.Sh AUTHORS
+Boggle is a trademark of Parker Brothers.
+.Pp
+Barry Brachman
+.Pp
+Dept. of Computer Science
+.Pp
+University of British Columbia
+.Sh BUGS
+If there are a great many words in the cube the final display of the words
+may scroll off of the screen.
+(On a 25 line screen about 130 words can be displayed.)
+.Pp
+No word can contain a
+.Sq q
+that is not immediately followed by a
+.Sq u .
+.Pp
+When using the
+.Ar +
+or
+.Ar ++
+options the display of words found in the board doesn't indicate reused cubes.
+.Pp
+The dictionary that
+.Nx
+installs omits many words that belong in the English language, most
+notably inflected forms.
diff --git a/static/netbsd/man6/caesar.6 b/static/netbsd/man6/caesar.6
new file mode 100644
index 00000000..b959e3b9
--- /dev/null
+++ b/static/netbsd/man6/caesar.6
@@ -0,0 +1,72 @@
+.\" $NetBSD: caesar.6,v 1.9 2003/08/07 09:37:07 agc Exp $
+.\"
+.\" Copyright (c) 1989, 1991, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)caesar.6 8.2 (Berkeley) 11/16/93
+.\"
+.Dd November 16, 1993
+.Dt CAESAR 6
+.Os
+.Sh NAME
+.Nm caesar ,
+.Nm rot13
+.Nd decrypt caesar ciphers
+.Sh SYNOPSIS
+.Nm
+.Op Ar rotation
+.Sh DESCRIPTION
+The
+.Nm
+utility attempts to decrypt caesar ciphers using English letter frequency
+statistics.
+.Nm
+reads from the standard input and writes to the standard output.
+.Pp
+The optional numerical argument
+.Ar rotation
+may be used to specify a specific rotation value.
+.Pp
+The frequency (from most common to least) of English letters is as follows:
+.Pp
+.Bd -filled -offset indent
+ETAONRISHDLFCMUGPYWBVKXJQZ
+.Ed
+.Pp
+Their frequencies as a percentage are as follows:
+.Pp
+.Bd -filled -offset indent
+E(13), T(10.5), A(8.1), O(7.9), N(7.1), R(6.8), I(6.3), S(6.1), H(5.2),
+D(3.8), L(3.4), F(2.9), C(2.7), M(2.5), U(2.4), G(2),
+P(1.9), Y(1.9), W(1.5), B(1.4), V(.9), K(.4), X(.15), J(.13), Q(.11), Z(.07).
+.Ed
+.Pp
+Rotated postings to
+.Tn USENET
+and some of the databases used by the
+.Xr fortune 6
+program are rotated by 13 characters.
diff --git a/static/netbsd/man6/canfield.6 b/static/netbsd/man6/canfield.6
new file mode 100644
index 00000000..4045be83
--- /dev/null
+++ b/static/netbsd/man6/canfield.6
@@ -0,0 +1,127 @@
+.\" $NetBSD: canfield.6,v 1.12 2010/01/01 11:45:34 wiz Exp $
+.\"
+.\" Copyright (c) 1983, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)canfield.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd January 1, 2010
+.Dt CANFIELD 6
+.Os
+.Sh NAME
+.Nm canfield ,
+.Nm cfscores
+.Nd the solitaire card game canfield
+.Sh SYNOPSIS
+.Nm
+.Nm cfscores
+.Op Ar user
+.Nm cfscores
+.Fl a
+.Sh DESCRIPTION
+If you have never played solitaire before, it is recommended
+that you consult a solitaire instruction book.
+In Canfield, tableau cards may be built on each other downward in
+alternate colors.
+An entire pile must be moved as a unit in building.
+Top cards of the piles are available to be played on foundations,
+but never into empty spaces.
+.Pp
+Spaces must be filled from the stock.
+The top card of the stock also is available to be played on
+foundations or built on tableau piles.
+After the stock is exhausted, tableau spaces may be filled from
+the talon and the player may keep them open until he wishes to use
+them.
+.Pp
+Cards are dealt from the hand to the talon by threes
+and this repeats until there are no more cards in the hand
+or the player quits.
+To have cards dealt onto the talon the player types
+.Sq Ic ht
+for his move.
+Foundation base cards are also automatically moved to the foundation
+when they become available.
+.Pp
+The command
+.Sq Ic c
+causes
+.Nm
+to maintain card counting statistics on the bottom of the screen.
+When properly used this can greatly increase one's chances of winning.
+.Pp
+The rules for betting are somewhat less strict than
+those used in the official version of the game.
+The initial deal costs $13.
+You may quit at this point or inspect the game.
+Inspection costs $13 and allows you to make as many
+moves as possible without moving any cards from your hand to the talon.
+(The initial deal places three cards on the talon;
+if all these cards are used, three more are made available.)
+Finally, if the game seems interesting,
+you must pay the final installment of $26.
+At this point you are
+credited at the rate of $5 for each card on the foundation;
+as the game progresses you are credited with $5 for each
+card that is moved to the foundation.
+Each run through the hand after the first costs $5.
+The card counting feature
+costs $1 for each unknown card that is identified.
+If the information is toggled on, you are only charged for cards
+that became visible since it was last turned on.
+Thus the maximum cost of information is $34.
+Playing time is charged at a rate of $1 per minute.
+.Pp
+With no arguments, the program
+.Nm cfscores
+prints out the current status of your canfield account.
+If a
+.Ar user
+name is specified, it prints out the status of their canfield account.
+If the
+.Fl a
+flag is specified,
+it prints out the canfield accounts for all users that have
+played the game since the database was set up.
+.Sh FILES
+.Bl -tag -width /usr/games/canfield -compact
+.It Pa /usr/games/canfield
+the game itself
+.It Pa /usr/games/cfscores
+the database printer
+.It Pa /var/games/cfscores
+the database of scores
+.El
+.Sh AUTHORS
+Originally written: Steve Levine.
+.Pp
+Further random hacking by: Steve Feldman, Kirk McKusick,
+Mikey Olson, and Eric Allman.
+.Sh BUGS
+It is impossible to cheat.
+.Pp
+The score file database is not portable.
diff --git a/static/netbsd/man6/cgram.6 b/static/netbsd/man6/cgram.6
new file mode 100644
index 00000000..ffcdd068
--- /dev/null
+++ b/static/netbsd/man6/cgram.6
@@ -0,0 +1,68 @@
+.\" $NetBSD: cgram.6,v 1.4 2021/04/29 20:17:20 rillig Exp $
+.\"
+.\" Copyright (c) 2004, 2013 The NetBSD Foundation, Inc.
+.\" All rights reserved.
+.\"
+.\" This code is derived from software contributed to The NetBSD Foundation
+.\" by David A. Holland.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
+.\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+.\" PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
+.\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+.\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+.\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+.\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+.\" POSSIBILITY OF SUCH DAMAGE.
+.\"
+.Dd April 29, 2021
+.Dt CGRAM 6
+.Os
+.Sh NAME
+.Nm cgram
+.Nd solve Sunday-paper cryptograms
+.Sh SYNOPSIS
+.Nm Op Ar file
+.Sh DESCRIPTION
+.Nm
+is a curses-based widget for solving Sunday-paper-type cryptograms
+based on substitution ciphers.
+If
+.Ar file
+is given, it is used as cleartext, otherwise a random cleartext is
+chosen using
+.Xr fortune 6 ;
+either way, a random substitution key is generated.
+.Pp
+The ciphertext is displayed.
+Typing a letter changes the key so that the letter under the cursor
+maps to the newly typed letter, and updates the display accordingly.
+Use Emacs-type cursor commands to move around.
+Enter a tilde
+.Pq ~
+to quit.
+Press asterisk
+.Pq *
+to enter an easier mode where correct characters are displayed in
+boldface.
+.Sh SEE ALSO
+.Xr caesar 6
+.Sh HISTORY
+.Nm
+was written circa 2004.
+It was imported into
+.Nx
+in 2013 and first appeared in
+.Nx 7.0 .
diff --git a/static/netbsd/man6/ching.6 b/static/netbsd/man6/ching.6
new file mode 100644
index 00000000..850de8fc
--- /dev/null
+++ b/static/netbsd/man6/ching.6
@@ -0,0 +1,152 @@
+.\" $NetBSD: ching.6,v 1.6 2022/08/19 00:40:20 uwe Exp $
+.\"
+.\" Copyright (c) Caldera International Inc. 2001-2002. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\"
+.\" 1. Redistributions of source code and documentation must retain the
+.\" above copyright notice, this list of conditions and the following
+.\" disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. All advertising materials mentioning features or use of this software
+.\" must display the following acknowledgement:
+.\" This product includes software developed or owned by Caldera
+.\" International, Inc.
+.\" 4. Neither the name of Caldera International, Inc. nor the names of
+.\" other contributors may be used to endorse or promote products
+.\" derived from this software without specific prior written permission.
+.\"
+.\" USE OF THE SOFTWARE PROVIDED FOR UNDER THIS LICENSE BY CALDERA
+.\" INTERNATIONAL, INC. AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR
+.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
+.\" WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+.\" DISCLAIMED. IN NO EVENT SHALL CALDERA INTERNATIONAL, INC. BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT INCIDENTAL, SPECIAL, EXEMPLARY, OR
+.\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+.\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+.\" BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
+.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
+.\" OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
+.\" IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+.\"
+.\"
+.\" Copyright (c) 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\"
+.\" @(#)ching.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt CHING 6
+.Os
+.Sh NAME
+.Nm ching
+.Nd the book of changes and other cookies
+.Sh SYNOPSIS
+.Nm
+.Op hexagram
+.Sh DESCRIPTION
+The
+.Em I Ching
+or
+.Em Book of Changes
+is an ancient Chinese oracle that has been in use for centuries
+as a source of wisdom and advice.
+.Pp
+The text of the
+.Em oracle
+(as it is sometimes known) consists of sixty-four
+.Em hexagrams ,
+each symbolized by a particular arrangement of six straight (\-\-\-)
+and broken (\-\ \-) lines. These lines have values ranging
+from six through nine, with the even values indicating the broken lines.
+.Pp
+Each hexagram consists of two major sections. The
+.Sy Judgement
+relates specifically to the matter at hand
+.Po e.g. ,
+.Dq \&It furthers one to have somewhere to go.
+.Pc
+while the
+.Sy Image
+describes the general attributes of the hexagram and how they apply
+to one's own life
+.Pq Dq Thus the superior man makes himself strong and untiring.
+.Pp
+When any of the lines have the values six or nine, they are moving
+lines; for each there is an appended judgement which becomes
+significant.
+Furthermore, the moving lines are inherently unstable
+and change into their opposites; a second hexagram (and thus an
+additional judgement) is formed.
+.Pp
+Normally, one consults the oracle by fixing the desired question
+firmly in mind and then casting a set of changes (lines)
+using yarrow\-stalks or tossed coins. The resulting hexagram
+will be the answer to the question.
+.Pp
+Using an algorithm suggested by S. C. Johnson, the
+.Ux
+.Em oracle
+simply reads a question from the standard input (up to an EOF) and
+hashes the individual characters in combination with the time of
+day, process id and any other magic numbers which happen to be
+lying around the system.
+The resulting value is used as the seed of a random
+number generator which drives a simulated coin\-toss divination.
+The answer is then piped through
+.Xr nroff 1
+for formatting and will appear on the standard output.
+.Pp
+For those who wish to remain steadfast in the old traditions, the
+oracle will also accept the results of a personal divination using,
+for example, coins.
+To do this, cast the change and then type the
+resulting line values as an argument.
+.Pp
+The impatient modern may prefer to settle for Chinese cookies; try
+.Xr fortune 6 .
+.Sh DIAGNOSTICS
+.nf
+The great prince issues commands,
+Founds states, vests families with fiefs.
+Inferior people should not be employed.
+.fi
+.Sh SEE ALSO
+It furthers one to see the great man.
+.Sh BUGS
+.nf
+Waiting in the mud
+Brings about the arrival of the enemy.
+If one is not extremely careful,
+Somebody may come up from behind and strike him.
+Misfortune.
+.fi
diff --git a/static/netbsd/man6/colorbars.6 b/static/netbsd/man6/colorbars.6
new file mode 100644
index 00000000..af1fa92d
--- /dev/null
+++ b/static/netbsd/man6/colorbars.6
@@ -0,0 +1,47 @@
+.\" $NetBSD: colorbars.6,v 1.3 2012/06/09 23:15:13 njoly Exp $
+.\"
+.\" Copyright (c) 2012 Nathanial Sloss <nathanialsloss@yahoo.com.au>
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
+.\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+.\" PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
+.\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+.\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+.\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+.\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+.\" POSSIBILITY OF SUCH DAMAGE.
+.\"
+.Dd June 5, 2012
+.Dt COLORBARS 6
+.Os
+.Sh NAME
+.Nm colorbars
+.Nd display ANSI color bars
+.Sh SYNOPSIS
+.Nm
+.Sh DESCRIPTION
+The
+.Nm
+command displays ANSI color bars on a color capable terminal using
+.Xr curses 3 .
+.Sh SEE ALSO
+.Xr curses 3
+.Sh HISTORY
+.Nm
+appeared in
+.Nx 7.0 .
+.Sh AUTHORS
+Nathanial Sloss
diff --git a/static/netbsd/man6/countmail.6 b/static/netbsd/man6/countmail.6
new file mode 100644
index 00000000..7275c65e
--- /dev/null
+++ b/static/netbsd/man6/countmail.6
@@ -0,0 +1,62 @@
+.\" $NetBSD: countmail.6,v 1.14 2014/03/18 18:20:36 riastradh Exp $
+.\"
+.\" Copyright (c) 1997 Matthew R. Green
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
+.\" BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
+.\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
+.\" AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
+.\" OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.Dd October 3, 1997
+.Dt COUNTMAIL 6
+.Os
+.Sh NAME
+.Nm countmail
+.Nd be obnoxious about how much mail you have
+.Sh SYNOPSIS
+.Nm
+.Sh DESCRIPTION
+The
+.Nm
+program counts your mail and tells you about it rather obnoxiously.
+.Sh SEE ALSO
+.Xr from 1
+.Sh HISTORY
+The
+.Nm
+program first appeared in
+.Nx 1.3 .
+.Sh AUTHORS
+.An -nosplit
+.Nm
+was first written by
+.An Noah Friedman Aq Mt friedman@splode.com
+in 1993.
+This version was written by
+.An Charles M. Hannum
+.Aq mycroft@NetBSD.org .
+.Sh CAVEATS
+The read loop is horrendously slow on every shell implementation tried.
+.Nm
+uses
+.Xr from 1
+and
+.Xr wc 1
+instead, though these are not shell builtins.
diff --git a/static/netbsd/man6/cribbage.6 b/static/netbsd/man6/cribbage.6
new file mode 100644
index 00000000..8b749b13
--- /dev/null
+++ b/static/netbsd/man6/cribbage.6
@@ -0,0 +1,188 @@
+.\" $NetBSD: cribbage.6,v 1.12 2023/01/06 17:13:46 christos Exp $
+.\"
+.\" Copyright (c) 1980, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)cribbage.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt CRIBBAGE 6
+.Os
+.Sh NAME
+.Nm cribbage
+.Nd the card game cribbage
+.Sh SYNOPSIS
+.Nm
+.Op Fl eqr
+.Sh DESCRIPTION
+.Nm
+plays the card game cribbage, with the program playing one hand
+and the user the other.
+The program will initially ask the user if the rules of the game are
+needed \(en if so, it will print out the appropriate section from
+.Em According to Hoyle
+with
+.Xr more 1 .
+.Pp
+.Nm
+options include:
+.Bl -tag -width indent
+.It Fl e
+When the player makes a mistake scoring his hand or crib, provide an
+explanation of the correct score.
+(This is especially useful for beginning players.)
+.It Fl q
+Print a shorter form of all messages \(en this is only recommended for
+users who have played the game without specifying this option.
+.It Fl r
+Instead of asking the player to cut the deck, the program will randomly
+cut the deck.
+.It Fl y
+Assume 'Y' to the query for another game if 'Y' is not explicitly typed
+(default is to exit unless 'Y' is typed).
+.El
+.Pp
+.Nm
+first asks the player whether he wishes to play a short game (
+.Dq once around ,
+to 61) or a long game (
+.Dq twice around ,
+to 121).
+A response of
+.Sq Ic s
+will result in a short game, any other response will play a long game.
+.Pp
+At the start of the first game, the program
+asks the player to cut the deck to determine who gets the first crib.
+The user should respond with a number between 0 and
+51, indicating how many cards down the deck is to be cut.
+The player who cuts the lower ranked card gets the first crib.
+If more than one game is played, the
+loser of the previous game gets the first crib in the current game.
+.Pp
+For each hand, the program first prints the player's hand,
+whose crib it is, and then asks the player
+to discard two cards into the crib.
+The cards are prompted for one per line, and are typed as explained below.
+.Pp
+After discarding, the program cuts the deck (if it is the player's
+crib) or asks the player to cut the deck (if it's its crib); in the latter
+case, the appropriate response is a number from 0 to 39 indicating
+how far down the remaining 40 cards are to be cut.
+.Pp
+After cutting the deck, play starts with the non-dealer (the person
+who doesn't have the crib) leading the first card.
+Play continues, as per cribbage, until all cards are exhausted.
+The program keeps track of the scoring of all points and the total of
+the cards on the table.
+.Pp
+After play, the hands are scored.
+The program requests the player to
+score his hand (and the crib, if it is his) by printing out the
+appropriate cards (and the cut card enclosed in brackets).
+Play continues until one player reaches the game limit (61 or 121).
+.Pp
+A carriage return when a numeric input is expected is equivalent
+to typing the lowest legal value; when cutting the deck this
+is equivalent to choosing the top card.
+.Pp
+Cards are specified as rank followed by suit.
+The ranks may be specified
+as one of:
+.Sq a ,
+.Sq 2 ,
+.Sq 3 ,
+.Sq 4 ,
+.Sq 5 ,
+.Sq 6 ,
+.Sq 7 ,
+.Sq 8 ,
+.Sq 9 ,
+.Sq t ,
+.Sq j ,
+.Sq q ,
+and
+.Sq k ,
+or alternatively, one of:
+.Sq ace ,
+.Sq two ,
+.Sq three ,
+.Sq four ,
+.Sq five ,
+.Sq six ,
+.Sq seven ,
+.Sq eight ,
+.Sq nine ,
+.Sq ten ,
+.Sq jack ,
+.Sq queen ,
+and
+.Sq king .
+Suits may be specified as:
+.Sq s ,
+.Sq h ,
+.Sq d ,
+and
+.Sq c ,
+or alternatively as:
+.Sq spades ,
+.Sq hearts ,
+.Sq diamonds ,
+and
+.Sq clubs .
+A card may be specified as:
+.Dq Ao rank Ac \ Aq suit ,
+or:
+.Dq Ao rank Ac of Aq suit .
+If the single letter rank and suit designations are used, the space
+separating the suit and rank may be left out.
+Also, if only one card
+of the desired rank is playable, typing the rank is sufficient.
+For example, if your hand was
+.Dq 2H, 4D, 5C, 6H, JC, and KD
+and it was desired to discard the king of diamonds, any of
+the following could be typed:
+.Sq k ,
+.Sq king ,
+.Sq kd ,
+.Sq k d ,
+.Sq k of d ,
+.Sq king d ,
+.Sq king of d ,
+.Sq k diamonds ,
+.Sq k of diamonds ,
+.Sq king diamonds ,
+.Sq king of diamonds .
+.Sh FILES
+.Bl -tag -width /usr/share/games/cribbage.instr -compact
+.It Pa /usr/games/cribbage
+.It Pa /var/games/criblog
+.It Pa /usr/share/games/cribbage.instr
+.El
+.Sh AUTHORS
+Earl T. Cohen wrote the logic.
+Ken Arnold added the screen oriented interface.
diff --git a/static/netbsd/man6/dab.6 b/static/netbsd/man6/dab.6
new file mode 100644
index 00000000..bfdf337c
--- /dev/null
+++ b/static/netbsd/man6/dab.6
@@ -0,0 +1,112 @@
+.\" $NetBSD: dab.6,v 1.8 2021/12/05 09:46:05 rillig Exp $
+.\"
+.\" Copyright (c) 2003 Thomas Klausner.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
+.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+.\"
+.Dd December 5, 2021
+.Dt DAB 6
+.Os
+.Sh NAME
+.Nm dab
+.Nd Dots and Boxes game
+.Sh SYNOPSIS
+.Nm
+.Op Fl aw
+.Op Fl n Ar ngames
+.Op Fl p Ao Ar c|h Ac Ns Ao Ar c|h Ac
+.Op Ar xdim Oo Ar ydim Oc
+.Sh DESCRIPTION
+.Nm
+is a game where each player tries to complete the most
+boxes.
+A turn consists of putting one border of a box; the player
+setting the fourth and final border of a box gets the
+point for the box and has another turn.
+.Pp
+The keys used are the vi keys:
+.Ic k
+for up,
+.Ic j
+for down,
+.Ic h
+for left, and
+.Ic l
+for right.
+To switch between even and odd rows, use one of the following
+keys:
+.Ic u
+.Pq diagonal right up ,
+.Ic y
+.Pq diagonal left up ,
+.Ic b
+.Pq diagonal left down ,
+.Ic n
+.Pq diagonal right down ;
+.Aq Ic space
+sets a new border,
+.Ic CTRL-L
+and
+.Ic CTRL-R
+redraw the screen, and
+.Ic q
+quits the game.
+.Pp
+Supported options are:
+.Bl -tag -width XXnXngamesXXXXX
+.It Fl a
+Don't use the alternate character set.
+.It Fl n Ar ngames
+.Ar ngames
+games will be played.
+.Pq Especially useful in Fl p Ar cc No mode.
+.It Fl p Ao Ar c|h Ac Ns Ao Ar c|h Ac
+Select which of the two players is a human
+or a computer.
+The first argument is the first player;
+.Ic c
+stands for computer and
+.Ic h
+for human.
+.It Fl w
+Wait for a character press between games.
+.El
+.Pp
+.Ar xdim
+and
+.Ar ydim
+define the size of the board in the x and y
+dimensions.
+If the dimensions specified are
+.Dv 0
+then the maximum dimensions for the size of the screen are
+used.
+.Sh SEE ALSO
+.Rs
+.%A Elwyn R. Berlekamp
+.%T The Dots and Boxes Game: Sophisticated Child's Play
+.%D 2000
+.%I A K Peters
+.%U urn:ISBN:9781568811291
+.Re
+.Sh AUTHORS
+.An Christos Zoulas
+.Aq christos@NetBSD.org
diff --git a/static/netbsd/man6/example.6 b/static/netbsd/man6/example.6
new file mode 100644
index 00000000..5fd4f1ae
--- /dev/null
+++ b/static/netbsd/man6/example.6
@@ -0,0 +1,6 @@
+# $NetBSD: example.6,v 1.1.1.1 2012/03/23 21:20:15 christos Exp $
+#
+# block all TCP packets with only the SYN flag set (this is the first
+# packet sent to establish a connection) out of the SYN-ACK pair.
+#
+block in proto tcp from any to any flags S/SA
diff --git a/static/netbsd/man6/factor.6 b/static/netbsd/man6/factor.6
new file mode 100644
index 00000000..a5ee2d6f
--- /dev/null
+++ b/static/netbsd/man6/factor.6
@@ -0,0 +1,118 @@
+.\" $NetBSD: factor.6,v 1.18 2020/10/12 13:53:43 christos Exp $
+.\"
+.\" Copyright (c) 1989, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Landon Curt Noll.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)factor.6 8.1 (Berkeley) 5/31/93
+.\"
+.\"
+.\" By Landon Curt Noll, http://www.isthe.com/chongo/index.html /\oo/\
+.\"
+.Dd October 12, 2020
+.Dt FACTOR 6
+.Os
+.Sh NAME
+.Nm factor
+.Nd factor a number
+.Sh SYNOPSIS
+.Nm
+.Op Fl hx
+.Op Ar number ...
+.Sh DESCRIPTION
+The
+.Nm
+utility factors integers larger than
+.Dv 0 .
+When a number is factored, it is printed, followed by a
+.Dq \&: ,
+and the list of
+.Pq prime
+factors on a single line.
+Factors are listed in ascending order, and are preceded by a space.
+By default, if a factor divides a value more than once, it will be
+printed more than once.
+.Pp
+When
+.Nm
+is invoked with one or more
+.Ar number
+arguments, each argument will be factored.
+.Pp
+When
+.Nm
+is invoked with no
+.Ar number
+arguments,
+.Nm
+reads numbers, one per line, from standard input, until end of file or error.
+Leading white-space and empty lines are ignored.
+Numbers may be preceded by a single +.
+Numbers that start with
+.Dv 0x
+are interpreted as hexadecimal.
+A
+.Dv 0
+input exits the program.
+Negative numbers are not allowed.
+Numbers are terminated by a non-digit character (such as a newline).
+After a number is read, it is factored.
+Input lines must not be longer than
+.Dv LINE_MAX \- 1
+(currently 2047) characters.
+.Pp
+By default,
+.Nm
+is compiled against the OpenSSL bignum implementation
+.Xr openssl_bn 3 ,
+which lets it handle arbitrarily large values.
+.Pq Note however that very large values can take a very long time to factor.
+If
+.Nm
+is compiled without OpenSSL it is limited to the maximum value of
+.Vt unsigned long .
+.Pp
+The following option is available:
+.Bl -tag -width flag
+.It Fl h
+If the
+.Fl h
+flag is specified, factors will be printed in "human-readable" format.
+If a factor x divides a value n (>1) times, it will appear as x^n.
+.It Fl x
+If the
+.Fl x
+flag is specified, factors will be printed in hexadecimal format.
+.El
+.Sh DIAGNOSTICS
+Out of range or invalid input results in
+an appropriate error message to standard error.
+.Sh AUTHORS
+Originally by
+.An Landon Curt Noll .
diff --git a/static/netbsd/man6/fish.6 b/static/netbsd/man6/fish.6
new file mode 100644
index 00000000..398c55f7
--- /dev/null
+++ b/static/netbsd/man6/fish.6
@@ -0,0 +1,87 @@
+.\" $NetBSD: fish.6,v 1.8 2003/08/07 09:37:13 agc Exp $
+.\"
+.\" Copyright (c) 1990, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)fish.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt FISH 6
+.Os
+.Sh NAME
+.Nm fish
+.Nd play
+.Dq Go Fish
+.Sh SYNOPSIS
+.Nm
+.Op Fl p
+.Sh DESCRIPTION
+.Nm
+is the game
+.Dq Go Fish ,
+a traditional children's card game.
+.Pp
+The computer deals the player and itself seven cards, and places
+the rest of the deck face-down (figuratively).
+The object of the game is to collect
+.Dq books ,
+or all of the members of a single rank.
+For example, collecting four 2's would give the player a
+.Dq book of 2's .
+.Pp
+The options are as follows:
+.Bl -tag -width indent
+.It Fl p
+Professional mode.
+.El
+.Pp
+The computer makes a random decision as to who gets to start the
+game, and then the computer and player take turns asking each other
+for cards of a specified rank.
+If the asked player has any cards of the requested rank, they give
+them up to the asking player.
+A player must have at least one of the cards of the rank they request
+in their hand.
+When a player asks for a rank of which the other player has no
+cards, the asker is told to
+.Dq Go Fish! .
+Then, the asker draws a card from the non-dealt cards.
+If they draw the card they asked for, they continue their turn, asking
+for more ranks from the other player.
+Otherwise, the other player gets a turn.
+.Pp
+When a player completes a book, either by getting cards from the
+other player or drawing from the deck, they set those cards aside and
+the rank is no longer in play.
+.Pp
+The game ends when either player no longer has any cards in their hand.
+The player with the most books wins.
+.Pp
+.Nm
+provides instructions as to what input it accepts.
+.Sh BUGS
+The computer cheats only rarely.
diff --git a/static/netbsd/man6/fortune.6 b/static/netbsd/man6/fortune.6
new file mode 100644
index 00000000..de371d4d
--- /dev/null
+++ b/static/netbsd/man6/fortune.6
@@ -0,0 +1,175 @@
+.\" $NetBSD: fortune.6,v 1.17 2019/07/23 11:02:29 uwe Exp $
+.\"
+.\" Copyright (c) 1985, 1991, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Ken Arnold.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)fortune.6 8.3 (Berkeley) 4/19/94
+.\"
+.Dd July 22, 2019
+.Dt FORTUNE 6
+.Os
+.Sh NAME
+.Nm fortune
+.Nd print a random, hopefully interesting, adage
+.Sh SYNOPSIS
+.Nm
+.Op Fl aefilosw
+.Op Fl m Ar pattern
+.Oo
+.Op Ar N\^ Ns Cm \&%
+.Ar file\| Ns / Ns Ar dir\| Ns / Ns Cm \^all
+.Oc
+.Sh DESCRIPTION
+When
+.Nm
+is run with no arguments it prints out a random epigram.
+Epigrams are divided into several categories, where each category
+is subdivided into those which are potentially offensive and those
+which are not.
+The options are as follows:
+.Bl -tag -width ".Fl XXX"
+.It Fl a
+Choose from all lists of maxims, both offensive and not.
+(See the
+.Fl o
+option for more information on offensive fortunes.)
+.It Fl e
+Consider all fortune files to be of equal size (see discussion below
+on multiple files).
+.It Fl f
+Print out the list of files which would be searched, but don't
+print a fortune.
+.It Fl i
+Ignore case for
+.Fl m
+patterns.
+.It Fl l
+Long dictums only.
+.It Fl m Ar pattern
+Print out all fortunes which match the regular expression
+.Ar pattern .
+See
+.Xr regex 3
+for a description of patterns.
+.It Fl o
+Choose only from potentially offensive aphorisms.
+.Bf -symbolic
+Please, please, please request a potentially offensive fortune if and
+only if you believe, deep down in your heart, that you are willing
+to be offended.
+(And that if you are, you'll just quit using
+.Fl o
+rather than give us grief about it, okay?)
+.Ef
+.Bd -filled -offset indent
+\&... let us keep in mind the basic governing philosophy
+of The Brotherhood, as handsomely summarized in these words:
+we believe in healthy, hearty laughter \(em at the expense of
+the whole human race, if needs be.
+Needs be.
+.Ed
+.Bd -filled -offset indent-two -compact
+\(em H. Allen Smith, "Rude Jokes"
+.Ed
+.It Fl s
+Short apothegms only.
+.It Fl w
+Wait before termination for an amount of time calculated from the
+number of characters in the message.
+This is useful if it is executed as part of the logout procedure
+to guarantee that the message can be read before the screen is cleared.
+.El
+.Pp
+The user may specify alternative sayings.
+You can specify a specific file, a directory which contains one or
+more files, or the special word
+.Cm all ,
+which says to use all the standard databases.
+Any of these may be preceded by a percentage, which is a number
+.Ar N
+between 0 and 100 inclusive, followed by a
+.Ql %
+character.
+If it is, there will be an
+.Ar N
+percent probability that an adage will be picked from that file
+or directory.
+If the percentages do not sum to 100, and there are specifications
+without percentages, the remaining percent will apply to those files
+and/or directories, in which case the probability of selecting from
+one of them will be based on their relative sizes.
+.Pp
+As an example, given two databases
+.Ar funny
+and
+.Ar not-funny ,
+with
+.Ar funny
+twice as big, saying
+.Pp
+.Dl $ fortune funny not-funny
+.Pp
+will get you fortunes out of
+.Ar funny
+two-thirds of the time.
+The command
+.Pp
+.Dl $ fortune 90% funny 10% not-funny
+.Pp
+will pick out 90% of its fortunes from
+.Ar funny
+(the
+.Ql 10%
+is unnecessary, since 10% is all that's left).
+The
+.Fl e
+option says to consider all files equal; thus
+.Pp
+.Dl $ fortune -e
+.Pp
+is equivalent to
+.Pp
+.Dl $ fortune 50% funny 50% not-funny
+.Pp
+Datafiles for
+.Nm
+are created by the
+.Xr strfile 8
+utility.
+.Sh FILES
+.Bl -tag -width ".Pa /usr/share/games/fortune/XXXX" -compact
+.It Pa /usr/share/games/fortune/*
+Fortune files.
+.El
+.Sh SEE ALSO
+.Xr regex 3 ,
+.Xr random 6 ,
+.Xr rot13 6 ,
+.Xr strfile 8
diff --git a/static/netbsd/man6/gomoku.6 b/static/netbsd/man6/gomoku.6
new file mode 100644
index 00000000..1551493a
--- /dev/null
+++ b/static/netbsd/man6/gomoku.6
@@ -0,0 +1,122 @@
+.\" $NetBSD: gomoku.6,v 1.15 2010/03/29 04:00:03 dholland Exp $
+.\"
+.\" Copyright (c) 1994
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Ralph Campbell.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)gomoku.6 8.2 (Berkeley) 8/4/94
+.\"
+.Dd March 28, 2010
+.Dt GOMOKU 6
+.Os
+.Sh NAME
+.Nm gomoku
+.Nd game of 5 in a row
+.Sh SYNOPSIS
+.Nm
+.Op Fl bcdu
+.Op Fl D Ar debugfile
+.Op Ar savefile
+.Sh DESCRIPTION
+.Nm
+is a two player game where the object is to get 5 in a row horizontally,
+vertically or diagonally on a 19 by 19 grid.
+By convention, black always moves first.
+.Pp
+The options are:
+.Bl -tag -width Ds
+.It Fl b
+Run in batch mode.
+.Pq See below.
+.It Fl c
+Computer versus computer.
+.Nm
+will play a game against itself.
+This is mostly used for testing.
+.It Fl d
+Print debugging information.
+Repeating this option more than once yields more detailed information.
+.It Fl D Ar debugfile
+Print the debug information to
+.Ar debugfile
+instead of to the standard output.
+.It Fl u
+User versus user.
+.Pq Play against yourself.
+This is mostly used for testing.
+.It Ar savefile
+Load a previously saved game from
+.Pa savefile .
+.El
+.Pp
+With no arguments,
+.Nm
+starts a fresh user vs. computer game.
+.Pp
+Moves may be entered by selecting the desired board location and
+pressing the space or enter key.
+The cursor may be moved using the arrow keys or
+.Xr vi 1
+motion keys
+.Em hjklyubn .
+These also may be familiar from
+.Xr rogue 6
+and
+.Xr hack 6 .
+.\" Valid moves are a letter for the column and a number for the row
+.\" of an empty board location.
+To quit, type
+.Sq Q ,
+and to save the game, type
+.Sq S
+and supply a file name when prompted.
+.Ss Batch mode
+Batch mode was intended for game tournaments where a referee program
+handles the board display and pits one program against another.
+In this mode,
+.Nm
+reads moves from standard input and writes its responses to standard
+output.
+The first line of input should be either
+.Dq black
+or
+.Dq white
+to specify whether
+.Nm
+has the first move or not respectively.
+.Sh AUTHORS
+.An Ralph Campbell
+.Sh ACKNOWLEDGEMENTS
+The board display routines were based on the
+.Nm goref
+program written by Peter Langston.
+The user interface was based on Eric S. Raymond's interface for
+.\" change this when/if we import openbsd's bs(6)
+.\" .Xr bs 6 .
+.Nm bs .
diff --git a/static/netbsd/man6/hack.6 b/static/netbsd/man6/hack.6
new file mode 100644
index 00000000..e7b67b36
--- /dev/null
+++ b/static/netbsd/man6/hack.6
@@ -0,0 +1,209 @@
+.\" $NetBSD: hack.6,v 1.15 2005/09/15 02:09:41 wiz Exp $ -*- nroff -*-
+.\"
+.\" Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
+.\" Amsterdam
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions are
+.\" met:
+.\"
+.\" - Redistributions of source code must retain the above copyright notice,
+.\" this list of conditions and the following disclaimer.
+.\"
+.\" - Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\"
+.\" - Neither the name of the Stichting Centrum voor Wiskunde en
+.\" Informatica, nor the names of its contributors may be used to endorse or
+.\" promote products derived from this software without specific prior
+.\" written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
+.\" IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
+.\" PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
+.\" OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
+.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
+.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
+.\" PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+.\" LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+.\"
+.\"
+.\" Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. The name of the author may not be used to endorse or promote products
+.\" derived from this software without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
+.\" INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
+.\" AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
+.\" THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
+.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
+.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
+.\" OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
+.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
+.\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
+.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+.\"
+.Dd March 31, 1985
+.Dt HACK 6
+.Os
+.Sh NAME
+.Nm hack
+.Nd exploring The Dungeons of Doom
+.Sh SYNOPSIS
+.Nm
+.Op Fl d Ar directory
+.Op Fl n
+.Op Fl u Ar playername
+.Nm
+.Op Fl d Ar directory
+.Op Fl s
+.Op Fl X
+.Op Ar playername ...
+.Sh DESCRIPTION
+.Nm
+is a display oriented dungeons \*[Am] dragons-like game.
+Both display and command structure resemble rogue.
+(For a game with the same structure but entirely different display -
+a real cave instead of dull rectangles - try Quest.)
+.Pp
+To get started you really only need to know two commands.
+The command
+.Ic \&?
+will give you a list of the available commands and the command
+.Ic /
+will identify the things you see on the screen.
+.Pp
+To win the game (as opposed to merely playing to beat other people's high
+scores) you must locate the Amulet of Yendor which is somewhere below
+the 20th level of the dungeon and get it out.
+Nobody has achieved this yet and if somebody does, he will probably go
+down in history as a hero among heroes.
+.Pp
+When the game ends, either by your death, when you quit, or if you escape
+from the caves,
+.Nm
+will give you (a fragment of) the list of top scorers.
+The scoring is based on many aspects of your behavior but a rough estimate
+is obtained by taking the amount of gold you've found in the cave plus four
+times your (real) experience.
+Precious stones may be worth a lot of gold when brought to the exit.
+There is a 10% penalty for getting yourself killed.
+.Pp
+The administration of the game is kept in the directory specified with the
+.Fl d
+option, or, if no such option is given, in the directory specified by
+the environment variable
+.Ev HACKDIR ,
+or, if no such variable exists, in the current directory.
+This same directory contains several auxiliary files such as lockfiles and
+the list of topscorers and a subdirectory
+.Pa save
+where games are saved.
+The game administrator may however choose to install hack with a fixed
+playing ground, usually
+.Pa /var/games/hackdir .
+.Pp
+The
+.Fl n
+option suppresses printing of the news.
+.Pp
+The
+.Fl u
+.Ar playername
+option supplies the answer to the question "Who are you?".
+When
+.Ar playername
+has as suffix one of
+.Em -T ,
+.Em -S ,
+.Em -K ,
+.Em -F ,
+.Em -C ,
+or
+.Em -W ,
+then this supplies the answer to the question "What kind of character ... ?".
+.Pp
+The
+.Fl s
+option will print out the list of your scores.
+It may be followed by arguments
+.Fl X
+where X is one of the letters C, F, K, S, T, W to print the scores of
+Cavemen, Fighters, Knights, Speleologists, Tourists or Wizards.
+It may also be followed by one or more player names to print the scores of the
+players mentioned.
+.Sh ENVIRONMENT
+.Bl -tag -width 24n -compact
+.It Ev USER No or Ev LOGNAME
+Your login name.
+.It Ev HOME
+Your home directory.
+.It Ev SHELL
+Your shell.
+.It Ev TERM
+The type of your terminal.
+.It Ev HACKPAGER, PAGER
+Pager used instead of default pager.
+.It Ev MAIL
+Mailbox file.
+.It Ev MAILREADER
+Reader used instead of default (probably
+.Pa /usr/bin/mail ) .
+.It Ev HACKDIR
+Playground.
+.It Ev HACKOPTIONS
+String predefining several hack options (see help file).
+.El
+.Pp
+Several other environment variables are used in debugging (wizard) mode,
+like
+.Ev GENOCIDED ,
+.Ev INVENT ,
+.Ev MAGIC
+and
+.Ev SHOPTYPE .
+.Sh FILES
+.Bl -tag -width 24n -compact
+.It Pa hack
+The hack program.
+.It Pa data, rumors
+Data files used by hack.
+.It Pa help, hh
+Help data files.
+.It Pa record
+The list of topscorers.
+.It Pa save
+A subdirectory containing the saved games.
+.It Pa bones_dd
+Descriptions of the ghost and belongings of a deceased adventurer.
+.It Pa xlock.dd
+Description of a dungeon level.
+.It Pa safelock
+Lock file for xlock.
+.It Pa record_lock
+Lock file for record.
+.El
+.Sh AUTHORS
+Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) wrote the
+original hack, very much like rogue (but full of bugs).
+.Pp
+Andries Brouwer continuously deformed their sources into the current
+version - in fact an entirely different game.
+.Sh BUGS
+Probably infinite.
+Mail complaints to mcvax!aeb .
diff --git a/static/netbsd/man6/hals_end.6 b/static/netbsd/man6/hals_end.6
new file mode 100644
index 00000000..c2813af7
--- /dev/null
+++ b/static/netbsd/man6/hals_end.6
@@ -0,0 +1,66 @@
+.\" $NetBSD: hals_end.6,v 1.3 2014/10/18 06:42:31 snj Exp $
+.\"
+.\" Copyright (c) 2003 - 2013 Marc Balmer <marc@msys.ch>.
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. The name of the author may not be used to endorse or promote products
+.\" derived from this software without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
+.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+.\"
+.Dd November 12, 2013
+.Dt HALS_END 6
+.Os
+.Sh NAME
+.Nm hals_end
+.Nd Display HAL's last words on the console
+.Sh SYNOPSIS
+.Nm hals_end
+.Op Fl f
+.Sh DESCRIPTION
+.Nm
+displays the famous last words of the supercomputer HAL 9000 aboard the
+space-ship in Stanley Kubrick's movie "2001 - A Space Odissey".
+.Pp
+Options:
+.Bl -tag -width Ds
+.It Fl f
+Fast forward.
+Every movie can be played back with fast forward.
+This option will double the speed of the output.
+.El
+.Sh HISTORY
+.Nm
+first appeared in the book "Total Interaction" (ISBN 978-3-7643-7076-3) where
+its source code and output illustrates the article
+"Remembering the Future: Memory and Interaction" by Dr. Regine Halter.
+The source code was set in contrast to the graphical artwork "HAL's lifespace"
+by Catherine Walthard.
+"HAL's Lifespace" and "hals_end" were respectively designed and written for
+this article.
+.Sh AUTHORS
+.Nm
+was written by
+.An Marc Balmer Aq Mt marc@msys.ch .
+.Sh BUGS
+Unlike the real HAL, this program can be repeatedly run.
+There should be functionality in the program to destroy itself after one run.
+The rationale for not doing this right now is that the movie itself can be
+watched several times as well.
diff --git a/static/netbsd/man6/hangman.6 b/static/netbsd/man6/hangman.6
new file mode 100644
index 00000000..28b836f2
--- /dev/null
+++ b/static/netbsd/man6/hangman.6
@@ -0,0 +1,65 @@
+.\" $NetBSD: hangman.6,v 1.12 2003/08/07 09:37:21 agc Exp $
+.\"
+.\" Copyright (c) 1983, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)hangman.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt HANGMAN 6
+.Os
+.Sh NAME
+.Nm hangman
+.Nd computer version of the game hangman
+.Sh SYNOPSIS
+.Nm
+.Op Fl d Ar wordlist
+.Op Fl m Ar minlen
+.Sh DESCRIPTION
+In
+.Nm ,
+the computer picks a word from the on-line word list
+and you must try to guess it.
+The computer keeps track of which letters have been guessed
+and how many wrong guesses you have made on the screen in a graphic fashion.
+.Sh OPTIONS
+.Bl -tag -width flag
+.It Fl d
+Use the specified
+.Ar wordlist
+instead of the default one named below.
+.It Fl m
+Set the minimum word length to use.
+The default is 6 letters.
+.El
+.Sh FILES
+.Bl -tag -width /usr/share/dict/words -compact
+.It Pa /usr/share/dict/words
+On-line word list
+.El
+.Sh AUTHORS
+.An Ken Arnold
diff --git a/static/netbsd/man6/hunt.6 b/static/netbsd/man6/hunt.6
new file mode 100644
index 00000000..0157402e
--- /dev/null
+++ b/static/netbsd/man6/hunt.6
@@ -0,0 +1,446 @@
+.\" $NetBSD: hunt.6,v 1.14 2009/07/04 06:15:27 dholland Exp $
+.\"
+.\" hunt
+.\"
+.\" Copyright (c) 1983-2003, Regents of the University of California.
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions are
+.\" met:
+.\"
+.\" + Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" + Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" + Neither the name of the University of California, San Francisco nor
+.\" the names of its contributors may be used to endorse or promote
+.\" products derived from this software without specific prior written
+.\" permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
+.\" IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
+.\" PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+.\" OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+.\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+.\" LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+.\" OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+.\"
+.Dd July 3, 2009
+.Dt HUNT 6
+.Os
+.Sh NAME
+.Nm hunt
+.Nd a multi-player multi-terminal game
+.Sh SYNOPSIS
+.Nm
+.Op Fl bcfmqSs
+.Op Fl n Ar name
+.Op Fl t Ar team
+.Op Fl p Ar port
+.Op Fl w Ar message
+.Op Ar host
+.Sh DESCRIPTION
+The object of the game
+.Nm
+is to kill off the other players.
+There are no rooms, no treasures, and no monsters.
+Instead, you wander around a maze, find grenades, trip mines, and shoot down
+walls and players.
+The more players you kill before you die, the better your score is.
+If the
+.Fl m
+flag is given, you enter the game as a monitor.
+.Pq Monitors can see the action but not play.
+.Pp
+.Nm
+normally looks for an active game on the local network;
+if none is found, it starts one up on the local host.
+The location of the game may be specified by giving the
+.Ar host
+argument.
+This presupposes that a hunt game is already running on that host; see
+.Xr huntd 6
+for details on how to set up a game on a specific host.
+If more than one game is found, you may pick which game to play in.
+.Pp
+If the
+.Fl q
+flag is given,
+.Nm
+queries the local network
+.Pq or a specific host
+and reports on all active games found.
+This is useful for shell startup scripts, e.g.,
+.Xr csh 1 Ns 's
+.Pa .login .
+.Pp
+The player name may be specified on the command line by using the
+.Fl n
+option.
+.Pp
+The
+.Fl c ,
+.Fl s ,
+and
+.Fl f
+options are for entering the game cloaked, scanning, or flying, respectively.
+.Pp
+The
+.Fl b
+option turns off beeping when you reach the typeahead limit.
+.Pp
+The
+.Fl t
+option aids team play by making everyone else on your team
+appear as the team name.
+A team name is a single digit to avoid conflicting with other characters
+used in the game.
+.Pp
+The
+.Fl p Ar port
+option allows the rendezvous port number to be set.
+This is a useful way for people playing on dialup lines to avoid playing
+with people on 9600 baud terminals.
+.Pp
+The
+.Fl w Ar message
+option is the only way to send a message to everyone else's screen when
+you start up.
+It is most often used to say
+.Dq eat slime death - NickD's coming in .
+.Pp
+When you die and are asked if you wish to re-enter the game,
+there are other answers than just yes or no.
+You can also reply with a
+.Ic w
+to write a message before continuing or
+.Ic o
+to change how you enter the game
+.Pq cloaked, scanning, or flying .
+.Pp
+To be notified automatically when a
+.Nm
+starts up, add your login to the
+.Em hunt-players
+mailing list; see
+.Xr huntd 6 .
+.Sh PLAYING HINTS
+.Nm
+only works on terminals with at least 24 lines, 80 columns, and
+cursor addressing.
+The screen is divided in to 3 areas.
+On the right hand side is the status area.
+It shows damage sustained, charges remaining, who's in the game,
+who's scanning (the
+.Dq *
+in front of the name), who's cloaked (the
+.Dq +
+in front of the name), and other players' scores.
+The rest of the screen is taken up by your map of the maze.
+The 24th line is used for longer messages that don't fit in the status area.
+.Pp
+.Nm
+uses the same keys to move as
+.Xr vi 1
+does, i.e.,
+.Ic h ,
+.Ic j ,
+.Ic k ,
+and
+.Ic l
+for left, down, up, right, respectively.
+To change which direction you're facing in the maze,
+use the upper case version of the movement key (i.e.,
+.Ic HJKL ) .
+You can only fire or throw things in the direction you're facing.
+Other commands are:
+.Bl -tag -width xxxxxxx
+.It Ic f No or Ic 1
+Fire a bullet
+.Pq Takes 1 charge
+.It Ic g No or Ic 2
+Throw grenade
+.Pq Takes 9 charges
+.It Ic F No or Ic 3
+Throw satchel charge
+.Pq Takes 25 charges
+.It Ic G No or Ic 4
+Throw bomb
+.Pq Takes 49 charges
+.It Ic 5
+Throw big bomb
+.Pq Takes 81 charges
+.It Ic 6
+Throw even bigger bomb
+.Pq Takes 121 charges
+.It Ic 7
+Throw even more big bomb
+.Pq Takes 169 charges
+.It Ic 8
+Throw even more bigger bomb
+.Pq Takes 225 charges
+.It Ic 9
+Throw very big bomb
+.Pq Takes 289 charges
+.It Ic 0
+Throw very, very big bomb
+.Pq Takes 361 charges
+.It Ic @
+Throw biggest bomb
+.Pq Takes 441 charges
+.It Ic o
+Throw small slime
+.Pq Takes 15 charges
+.It Ic O
+Throw big slime
+.Pq Takes 30 charges
+.It Ic p
+Throw bigger slime
+.Pq Takes 45 charges
+.It Ic P
+Throw biggest slime
+.Pq Takes 60 charges
+.It Ic s
+Scan
+.Pq show where other players are
+.Pq Takes 1 charge
+.It Ic c
+Cloak
+.Pq hide from scanners
+.Pq Takes 1 charge
+.It Ic ^L
+Redraw screen
+.It Ic q
+Quit
+.El
+.Pp
+The symbols on the screen are:
+.Bl -tag -width xxxxx -compact -offset indent
+.It -|+
+walls
+.It /\e
+diagonal
+.Pq deflecting
+walls
+.It #
+doors
+.Pq dispersion walls
+.It ;
+small mine
+.It g
+large mine
+.It :
+bullet
+.It o
+grenade
+.It O
+satchel charge
+.It @
+bomb
+.It s
+small slime
+.It $
+big slime
+.It \*[Gt]\*[Lt]^v
+you, facing right, left, up, or down
+.It }{i!
+other players, facing right, left, up, or down
+.It *
+explosion
+.It \e|/
+.It -*-
+grenade and large mine explosion
+.It /|\e
+.El
+.Pp
+Other helpful hints:
+.Bl -bullet
+.It
+You can only fire in the direction you are facing.
+.It
+You can only fire three shots in a row; then the gun must cool off.
+.It
+Shots move 5 times faster than you do.
+.It
+To stab someone, you face that player and move at them.
+.It
+Stabbing does 2 points worth of damage and shooting does 5 points.
+.It
+Slime does 5 points of damage each time it hits.
+.It
+You start with 15 charges and get 5 more every time a player enters
+or re-enters.
+.It
+Grenade explosions cover a 3 by 3 area, each larger bomb cover a
+correspondingly larger area
+.Pq ranging from 5 by 5 to 21 by 21 .
+All explosions are centered around the square the shot hits and
+do the most damage in the center.
+.It
+Slime affects all squares it oozes over.
+The number of squares is equal to the number of charges used.
+.It
+One small mine and one large mine are placed in the maze for every new player.
+A mine has a 2% probability of tripping when you walk forward on to it;
+50% when going sideways; 95% when backing up.
+Tripping a mine costs you 5 points or 10 points respectively.
+Defusing a mine is worth 1 charge or 9 charges respectively.
+.It
+You cannot see behind you.
+.It
+Cloaking consumes 1 ammo charge per 20 of your moves.
+.It
+Scanning consumes 1 ammo charge per
+.Pq 20 \(mu the number of players
+of other player moves.
+.It
+Turning on cloaking turns off scanning \(em turning on scanning turns off
+cloaking.
+.It
+When you kill someone,
+you get 2 more damage capacity points and 2 damage points get taken away.
+.It
+Maximum typeahead is 5 characters.
+.It
+A shot destroys normal
+.Pq i.e., non-diagonal, non-door
+walls.
+.It
+Diagonal walls deflect shots and change orientation.
+.It
+Doors disperse shots in random directions
+.Pq up, down, left, right .
+.It
+Diagonal walls and doors cannot be destroyed by direct shots but may
+be destroyed by an adjacent grenade explosion.
+.It
+Slime goes around walls, not through them.
+.It
+Walls regenerate, reappearing in the order they were destroyed.
+One percent of the regenerated walls will be diagonal walls or doors.
+When a wall is generated directly beneath a player, he is thrown in
+a random direction for a random period of time.
+When he lands, he sustains damage
+.Pq up to 20 percent of the amount of damage already sustained ;
+i.e., the less damage he had, the more nimble
+he is and therefore less likely to hurt himself on landing.
+.\"MP
+.\"There is a volcano close to the center of the maze which goes off
+.\"close to every 30 deaths.
+.It
+Every 30 deaths or so, a
+.Dq \&?
+will appear.
+It is a wandering bomb which will explode when it hits someone, or
+when it is slimed.
+.It
+If no one moves, everything stands still.
+.It
+The environment variable
+.Ev HUNT
+is checked to get the player name.
+If you don't have this variable set,
+.Nm
+will ask you what name you want to play under.
+If you wish to set other options than just your name,
+you can enumerate the options as follows:
+.Dl setenv HUNT "name=Sneaky,team=1,cloak,mapkey=zoFfGg1f2g3F4G"
+sets the player name to Sneaky, sets the team to one,
+sets the enter game attribute to cloaked, and the maps
+.Ic z
+to
+.Ic o , F
+to
+.Ic f , G
+to
+.Ic g , 1
+to
+.Ic f , 2
+to
+.Ic g , 3
+to
+.Ic F ,
+and
+.Ic 4
+to
+.Ic G .
+The
+.Ar mapkey
+option must be last.
+Other options are:
+.Ar scan , fly , nobeep , port=string , host=string ,
+and
+.Ar message=string ,
+which correspond to the command line options.
+String options cannot contain commas since commas
+are used to separate options.
+.It
+It's a boring game if you're the only one playing.
+.El
+.Pp
+Your score is the decayed average of the ratio of number of kills to number
+of times you entered the game and is only kept for the duration
+of a single session of
+.Nm .
+.\".Pp
+.\".Nm
+.\"normally drives up the load average to be approximately
+.\".Pq number_of_players + 0.5
+.\"greater than it would be without a
+.\".Nm
+.\"game executing.
+.Sh STATISTICS
+The
+.Fl S
+option fetches the current game statistics.
+The meaning of the column headings are as follows:
+.Bl -tag -width ducked
+.It score
+the player's last score
+.It ducked
+how many shots a player ducked
+.It absorb
+how many shots a player absorbed
+.It faced
+how many shots were fired at player's face
+.It shot
+how many shots were fired at player
+.It robbed
+how many of player's shots were absorbed
+.It missed
+how many of player's shots were ducked
+.It slimeK
+how many slime kills player had
+.It enemy
+how many enemies were killed
+.It friend
+how many friends were killed
+.Pq self and same team
+.It deaths
+how many times player died
+.It still
+how many times player died without typing in any commands
+.It saved
+how many times a shot/bomb would have killed player if he hadn't
+ducked or absorbed it.
+.El
+.Sh SEE ALSO
+.Xr huntd 6
+.Sh AUTHORS
+Conrad Huang, Ken Arnold, and Greg Couch;
+.br
+University of California, San Francisco, Computer Graphics Lab
+.Sh ACKNOWLEDGEMENTS
+We thank Don Kneller,
+John Thomason, Eric Pettersen, Mark Day,
+and Scott Weiner for providing
+endless hours of play-testing to improve the character of the game.
+We hope their significant others will forgive them; we certainly don't.
+.Sh BUGS
+To keep up the pace, not everything is as realistic as possible.
diff --git a/static/netbsd/man6/huntd.6 b/static/netbsd/man6/huntd.6
new file mode 100644
index 00000000..32206e4d
--- /dev/null
+++ b/static/netbsd/man6/huntd.6
@@ -0,0 +1,115 @@
+.\" $NetBSD: huntd.6,v 1.12 2014/03/30 01:44:37 dholland Exp $
+.\"
+.\" huntd
+.\"
+.\" Copyright (c) 1983-2003, Regents of the University of California.
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions are
+.\" met:
+.\"
+.\" + Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" + Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" + Neither the name of the University of California, San Francisco nor
+.\" the names of its contributors may be used to endorse or promote
+.\" products derived from this software without specific prior written
+.\" permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
+.\" IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
+.\" PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+.\" OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+.\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+.\" LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+.\" OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+.\"
+.Dd March 29, 2014
+.Dt HUNTD 6
+.Os
+.Sh NAME
+.Nm huntd
+.Nd hunt daemon, back-end for hunt game
+.Sh SYNOPSIS
+.Nm
+.Op Fl s
+.Op Fl p Ar address
+.Sh DESCRIPTION
+.Nm
+controls the multi-player
+.Xr hunt 6
+game.
+.Pp
+The
+.Fl s
+option is for running
+.Nm
+forever (server mode).
+This is similar to running it under the control of
+.Xr inetd 8
+(see below), but it consumes a process table entry when no one is playing.
+.Pp
+The
+.Fl p
+option can be either a pathname, in which case a local socket by that
+name is used for the game, or a number, in which case it selects an
+alternate port number for the internet socket used for the game.
+This allows for private games of hunt.
+.Ss INETD
+To run
+.Nm
+from
+.Xr inetd 8 ,
+you'll need to
+.\"put the
+.\".Nm hunt
+.\"service in
+.\".Pa /etc/services :
+.\".Bd -literal
+.\"hunt 26740/udp # multi-player/multi-host mazewars
+.\".Ed
+.\"and
+uncomment the following line in
+.Pa /etc/inetd.conf :
+.Bd -literal -offset indent -compact
+hunt dgram udp wait nobody /usr/games/huntd huntd
+.Ed
+Do not use any of the command line options; if you want
+.Xr inetd 8
+to start up
+.Nm
+on a private port, change the port listed for
+.Nm hunt
+in
+.Pa /etc/services .
+.Sh NETWORK RENDEZVOUS
+When
+.Xr hunt 6
+starts up, it broadcasts on the local area net
+(using the broadcast address for each interface) to find a
+.Nm hunt
+game in progress.
+If a
+.Nm
+hears the request, it sends back the port number for the
+.Nm hunt
+process to connect to.
+Otherwise, the
+.Nm hunt
+process starts up a
+.Nm
+on the local machine and tries to rendezvous with it.
+.Sh SEE ALSO
+.Xr sendmail 1 ,
+.Xr hunt 6
+.Sh AUTHORS
+Conrad Huang, Ken Arnold, and Greg Couch;
+.br
+University of California, San Francisco, Computer Graphics Lab
diff --git a/static/netbsd/man6/ipv6.6 b/static/netbsd/man6/ipv6.6
new file mode 100644
index 00000000..fffbad28
--- /dev/null
+++ b/static/netbsd/man6/ipv6.6
@@ -0,0 +1,31 @@
+[out,gif0]
+6000 0000 0020 2c01
+ef00 1001 2002 0001 0000 0000 0000 0070
+2001 1002 3333 0001 0000 0000 0000 0001
+1100 0001 0000 0001
+8083 829a
+0020
+f4c1
+0000 0000 0000 0000 0000 0000 0000 0000
+
+[out,gif0]
+6000 0000 0020 2c01
+ef00 1001 2002 0001 0000 0000 0000 0070
+2001 1002 3333 0001 0000 0000 0000 0001
+1100 0008 0000 0001
+0000 0000 0000 0000 0000 0000 0000 0000
+
+[out,gif0]
+6000 0000 001e 2c01
+ef00 1001 2002 0001 0000 0000 0000 0070
+2001 1002 3333 0001 0000 0000 0000 0001
+1100 0001 0000 0001
+0000 0000 0000 0000 0000 0000 0000
+
+[out,gif0]
+6000 0000 0020 2c01
+ef00 1001 2002 0001 0000 0000 0000 0070
+2001 1002 3333 0001 0000 0000 0000 0001
+1100 001c 0000 0001
+0000 0000 0000 0000 0000 0000 0000 0000
+
diff --git a/static/netbsd/man6/larn.6 b/static/netbsd/man6/larn.6
new file mode 100644
index 00000000..7fadc6bd
--- /dev/null
+++ b/static/netbsd/man6/larn.6
@@ -0,0 +1,157 @@
+.\" $NetBSD: larn.6,v 1.14 2010/04/24 01:13:37 dholland Exp $
+.\"
+.\" Copyright (c) 1990 The Regents of the University of California.
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)larn.6 5.5 (Berkeley) 12/30/93
+.\"
+.Dd April 23, 2010
+.Dt LARN 6
+.Os
+.Sh NAME
+.Nm larn
+.Nd exploring the caverns of Larn
+.Sh SYNOPSIS
+.Nm larn
+.Op Fl chilns
+.\".Op Fl H Ar number
+.Op Fl o Ar optsfile
+.Op Fl ##
+.Op ++
+.Sh DESCRIPTION
+.Nm
+is a fantasy games in which your child has contracted
+a strange disease, and none of your home remedies seem to have any effect.
+You set out to find a remedy in a limited
+amount of time, and to collect gold along the way of course!
+.Pp
+The options are:
+.Pp
+.Bl -tag -width flag
+.It Fl c
+Clear the high scores file.
+.\" .It Fl H
+.\" Set the difficulty (hardness) level.
+.It Fl h
+Show the command line options.
+.It Fl i
+Show the high scores, including inventory data.
+.It Fl l
+Show the log of all games.
+.It Fl n
+Suppress the welcome message and start the game immediately.
+.It Fl o
+.\" Ar optsfile
+Read the specified options file instead of
+.Pa ~/.larnopts .
+.It Fl s
+Show the high scores.
+.It Fl ##
+Set the difficulty (hardness) level.
+.It ++
+Restore game from the checkpoint (auto-save) file.
+.El
+.Sh COMMANDS
+These are the movement commands:
+.Bl -column " print program version" " give present pack weight"
+.It h move to the left H run left . stay here
+.It j move down J run down Z teleport yourself
+.It k move up K run up c cast a spell
+.It l move to the right L run right r read a scroll
+.It y move northwest Y run northwest q quaff a potion
+.It u move northeast U run northeast W wear armor
+.It b move southwest B run southwest T take off armor
+.It n move southeast N run southeast w wield a weapon
+.It ^ identify a trap g give present pack weight P give tax status
+.It d drop an item i inventory your pockets Q quit the game
+.It v print program version S save the game D list all items found
+.It ? this help screen A create diagnostic file e eat something
+.It (wizards only)
+.El
+.Sh OPTIONS FILE
+The file
+.Pa ~/.larnopts
+may be used to set a few options for
+.Nm .
+A sequence of words terminated by whitespace is used to specify options.
+.Pp
+.Bl -tag -width "savefile: xxsave-file-namexx" -compact
+.It Sy Word
+.Sy Meaning
+.Pp
+.It bold-objects
+Select bold display of objects.
+.It inverse-objects
+Select inverse video display of objects.
+.It no-introduction
+Do not display intro message.
+.It enable-checkpointing
+Turn on periodic checkpointing.
+.It no-beep
+Disable beeping of the terminal.
+.It male
+Choose your sex to be a man.
+.It female
+Choose your sex to be a woman.
+.It name: Dq your name
+Choose your playing name.
+.It monster: Dq monst name
+Choose a name for a monster.
+.It savefile: Dq save-file-name
+Define what the savegame filename will be.
+.El
+.Pp
+Your name and monster names must be enclosed in double quotation marks and may
+be up to 34 characters long.
+Longer names are truncated.
+Anything enclosed in quotation marks is considered one word, and must be
+separated from other words by whitespace.
+.Sh SPECIAL NOTES
+When
+.Sy dropping gold ,
+if you type '*' as your amount, all your gold gets dropped.
+In general, typing in '*' means all of what you are interested in.
+This is true when visiting the bank, or when contributing at altars.
+.Pp
+You can get out of the store, trading post, school, or home by hitting
+.Aq Sy esc .
+.Pp
+When casting a spell, if you need a list of spells you can cast, type
+.Ic D
+as the first letter of your spell.
+The available list of spells will be shown,
+after which you may enter the spell code.
+This only works on the 1st letter of the spell you are casting.
+.Sh FILES
+.Bl -tag -width "/var/games/larn.scores" -compact
+.It Pa /var/games/larn.scores
+Score file.
+.It Pa ~/.larnopts
+Options file.
+.El
+.Sh AUTHORS
+.An Noah Morgan
diff --git a/static/netbsd/man6/mille.6 b/static/netbsd/man6/mille.6
new file mode 100644
index 00000000..3089756b
--- /dev/null
+++ b/static/netbsd/man6/mille.6
@@ -0,0 +1,387 @@
+.\" $NetBSD: mille.6,v 1.13 2021/12/31 12:42:24 andvar Exp $
+.\"
+.\" Copyright (c) 1983, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)mille.6 8.3 (Berkeley) 6/1/94
+.\"
+.Dd June 1, 1994
+.Dt MILLE 6
+.Os
+.Sh NAME
+.Nm mille
+.Nd play Mille Bornes
+.Sh SYNOPSIS
+.Nm mille
+.Op Ar file
+.Sh DESCRIPTION
+.Nm Mille
+plays a two-handed game reminiscent of
+the Parker Brother's game of Mille Bornes with you.
+The rules are described below.
+If a file name is given on the command line,
+the game saved in that file is started.
+.Pp
+When a game is started up,
+the bottom of the score window will contain a list of commands.
+They are:
+.Bl -tag -width ".Ic P"
+.It Ic P
+Pick a card from the deck.
+This card is placed in the
+.Sq P
+slot in your hand.
+.It Ic D
+Discard a card from your hand.
+To indicate which card, type the number of the card in the hand
+(or
+.Sq P
+for the just-picked card) followed
+by a
+.Aq RETURN
+or
+.Aq SPACE .
+The
+.Aq RETURN
+or
+.Aq SPACE
+is required to allow recovery from typos
+which can be very expensive, like discarding safeties.
+.It Ic U
+Use a card.
+The card is again indicated by its number,
+followed by a
+.Aq RETURN
+or
+.Aq SPACE .
+.It Ic O
+Toggle ordering the hand.
+By default off, if turned on it will sort the cards in your hand appropriately.
+This is not recommended for the impatient on slow terminals.
+.It Ic Q
+Quit the game.
+This will ask for confirmation, just to be sure.
+Hitting
+.Aq DELETE
+(or
+.Aq RUBOUT )
+is equivalent.
+.It Ic S
+Save the game in a file.
+If the game was started from a file,
+you will be given an opportunity to save it on the same file.
+If you don't wish to, or you did not start from a file,
+you will be asked for the file name.
+If you type a
+.Aq RETURN
+without a name, the save will be terminated and the game resumed.
+.It Ic R
+Redraw the screen from scratch.
+The command ^L (control
+.Sq L )
+will also work.
+.It Ic W
+Toggle window type.
+This switches the score window between the startup window
+(with all the command names) and the end-of-game window.
+Using the end-of-game window
+saves time by eliminating the switch at the end of the game
+to show the final score.
+Recommended for hackers and other miscreants.
+.El
+.Pp
+If you make a mistake, an error message will be printed
+on the last line of the score window, and a bell will beep.
+.Pp
+At the end of each hand or game,
+you will be asked if you wish to play another.
+If not, it will ask you if you want to save the game.
+If you do, and the save is unsuccessful,
+play will be resumed as if you had said you wanted to play another hand/game.
+This allows you to use the
+.Dq Ic S
+command to reattempt the save.
+.Sh SEE ALSO
+.Xr curses 3 ,
+.Rs
+.%T Screen Updating and Cursor Movement Optimization: A Library Package
+.%A Ken Arnold
+.Re
+.Sh AUTHORS
+.An Ken Arnold
+.Pp
+(The game itself is a product of Parker Brothers, Inc.)
+.Sh CARDS
+Here is some useful information.
+The number in parentheses after the card name
+is the number of that card in the deck:
+.Bl -column "Speed Limit (3)" "End of Limit (6)" "Puncture Proof (1)"
+.It Sy Hazard Repair Safety
+.It Out of Gas (2) Gasoline (6) Extra Tank (1)
+.It Flat Tire (2) Spare Tire (6) Puncture Proof (1)
+.It Accident (2) Repairs (6) Driving Ace (1)
+.It Stop (4) Go (14) Right of Way (1)
+.It Speed Limit (3) End of Limit (6)
+.El
+.Bd -centered
+25 \- (10), 50 \- (10), 75 \- (10), 100 \- (12), 200 \- (4)
+.Ed
+.Sh RULES
+.Ss Object :
+The point of this game is to get a total of 5000 points in several hands.
+Each hand is a race to put down exactly 700 miles before your opponent does.
+Beyond the points gained by putting down milestones,
+there are several other ways of making points.
+.Ss Overview :
+The game is played with a deck of 101 cards.
+.Em Distance
+cards represent a number of miles traveled.
+They come in denominations of 25, 50, 75, 100, and 200.
+When one is played,
+it adds that many miles to the player's trip so far this hand.
+.Em Hazard
+cards are used to prevent your opponent from putting down Distance cards.
+They can only be played if your opponent has a
+.Em Go
+card on top of the Battle pile.
+The cards are
+.Sy "Out of Gas" ,
+.Sy "Accident" ,
+.Sy "Flat Tire" ,
+.Sy "Speed Limit" ,
+and
+.Sy "Stop" .
+.Em Remedy
+cards fix problems caused by Hazard cards played on you by your opponent.
+The cards are
+.Sy "Gasoline" ,
+.Sy "Repairs" ,
+.Sy "Spare Tire" ,
+.Sy "End of Limit" ,
+and
+.Sy "Go" .
+.Em Safety
+cards prevent your opponent from putting specific Hazard cards on you
+in the first place.
+They are
+.Sy "Extra Tank" ,
+.Sy "Driving Ace" ,
+.Sy "Puncture Proof" ,
+and
+.Sy "Right of Way" ,
+and there are only one of each in the deck.
+.Ss Board Layout :
+The board is split into several areas.
+From top to bottom, they are:
+.Bl -ohang
+.It Li SAFETY AREA
+(unlabeled): This is where the safeties will be placed as they are played.
+.It Li HAND :
+These are the cards in your hand.
+.It Li BATTLE :
+This is the Battle pile.
+All the Hazard and Remedy Cards are played here, except the
+.Sy "Speed Limit"
+and
+.Sy "End of Limit"
+cards.
+Only the top card is displayed, as it is the only effective one.
+.It Li SPEED :
+The Speed pile.
+The
+.Sy "Speed Limit"
+and
+.Sy "End of Limit"
+cards are played here
+to control the speed at which the player is allowed to put down miles.
+.It Li MILEAGE :
+Miles are placed here.
+The total of the numbers shown here is the distance traveled so far.
+.El
+.Ss Play :
+The first pick alternates between the two players.
+Each turn usually starts with a pick from the deck.
+The player then plays a card, or if this is not possible or desirable,
+discards one.
+Normally, a play or discard of a single card constitutes a turn.
+If the card played is a safety, however,
+the same player takes another turn immediately.
+.Pp
+This repeats until one of the players reaches 700 points or the deck runs out.
+If someone reaches 700, they have the option of going for an
+.Em Extension ,
+which means that the play continues until someone reaches 1000 miles.
+.Ss Hazard and Remedy Cards :
+Hazard Cards are played on your opponent's Battle and Speed piles.
+Remedy Cards are used for undoing the effects of your opponent's nastiness.
+.Bl -ohang
+.It Sy Go No ( Green Light )
+must be the top card on your Battle pile for you to play any mileage,
+unless you have played the
+.Sy "Right of Way"
+card (see below).
+.It Sy Stop
+is played on your opponent's
+.Sy Go
+card to prevent them from playing mileage until they play a
+.Sy Go
+card.
+.It Sy "Speed Limit"
+is played on your opponent's Speed pile.
+Until they play an
+.Sy "End of Limit"
+they can only play 25 or 50 mile cards, presuming their
+.Sy Go
+card allows them to do even that.
+.It Sy "End of Limit"
+is played on your Speed pile to nullify a
+.Sy "Speed Limit"
+played by your opponent.
+.It Sy "Out of Gas"
+is played on your opponent's
+.Sy Go
+card.
+They must then play a
+.Sy Gasoline
+card, and then a
+.Sy Go
+card before they can play any more mileage.
+.It Sy "Flat Tire"
+is played on your opponent's
+.Sy Go
+card.
+They must then play a
+.Sy "Spare Tire"
+card, and then a
+.Sy Go
+card before they can play any more mileage.
+.It Sy "Accident"
+is played on your opponent's
+.Sy Go
+card.
+They must then play a
+.Sy Repairs
+card, and then a
+.Sy Go
+card before they can play any more mileage.
+.El
+.Ss Safety Cards :
+Safety cards prevent your opponent
+from playing the corresponding Hazard cards on you for the rest of the hand.
+It cancels an attack in progress, and
+.Em always entitles the player to an extra turn .
+.Bl -ohang
+.It Sy "Right of Way"
+prevents your opponent from playing both
+.Sy Stop
+and
+.Sy "Speed Limit"
+cards on you.
+It also acts as a permanent
+.Sy Go
+card for the rest of the hand, so you can play mileage
+as long as there is not a Hazard card on top of your Battle pile.
+In this case only, your opponent can play Hazard cards directly on a Remedy card
+other than a Go card.
+.It Sy "Extra Tank"
+When played, your opponent cannot play an
+.Sy "Out of Gas"
+on your Battle Pile.
+.It Puncture Proof
+When played, your opponent cannot play a
+.Sy "Flat Tire"
+on your Battle Pile.
+.It Sy "Driving Ace"
+When played, your opponent cannot play an
+.Sy Accident
+on your Battle Pile.
+.El
+.Ss Distance Cards :
+Distance cards are played when you have a
+.Sy Go
+card on your Battle pile,
+or a Right of Way in your Safety area and are not stopped by a Hazard Card.
+They can be played in any combination that totals exactly 700 miles,
+except that
+.Em you cannot play more than two 200 mile cards in one hand .
+A hand ends whenever one player gets exactly 700 miles or the deck runs out.
+In that case, play continues until neither someone reaches 700,
+or neither player can use any cards in their hand.
+If the trip is completed after the deck runs out, this is called
+.Em "Delayed Action" .
+.Ss Coup Fourr\('e :
+This is a French fencing term for a counter-thrust move as part of a parry
+to an opponent's attack.
+In current French colloquial language it means a sneaky, underhanded blow.
+In Mille Bornes, it is used as follows:
+If an opponent plays a Hazard card,
+and you have the corresponding Safety in your hand,
+you play it immediately, even
+.Em before
+you draw.
+This immediately removes the Hazard card from your Battle pile,
+and protects you from that card for the rest of the game.
+This gives you more points (see
+.Sx Scoring
+below).
+.Ss Scoring :
+Scores are totalled at the end of each hand,
+whether or not anyone completed the trip.
+The terms used in the Score window have the following meanings:
+.Bl -ohang
+.It Em Milestones Played :
+Each player scores as many miles as they played before the trip ended.
+.It Em Each Safety :
+100 points for each safety in the Safety area.
+.It Em All 4 Safeties :
+300 points if all four safeties are played.
+.It Em Each Coup Fourr\('e :
+300 points for each Coup Fourr\('e accomplished.
+.El
+.Pp
+The following bonus scores can apply only to the winning player.
+.Bl -ohang
+.It Em Trip Completed :
+400 points bonus for completing the trip to 700 or 1000.
+.It Em Safe Trip :
+300 points bonus for completing the trip without using any 200 mile cards.
+.It Em Delayed Action :
+300 points bonus for finishing after the deck was exhausted.
+.It Em Extension :
+200 points bonus for completing a 1000 mile trip.
+.It Em Shut-Out :
+500 points bonus for completing the trip
+before your opponent played any mileage cards.
+.El
+.Pp
+Running totals are also kept for the current score for each player
+for the hand
+.Em ( "Hand Total" ) ,
+the game
+.Em ( "Overall Total" ) ,
+and number of games won
+.Em ( Games ) .
diff --git a/static/netbsd/man6/monop.6 b/static/netbsd/man6/monop.6
new file mode 100644
index 00000000..ee8bf2ae
--- /dev/null
+++ b/static/netbsd/man6/monop.6
@@ -0,0 +1,178 @@
+.\" $NetBSD: monop.6,v 1.19 2008/02/24 03:50:07 dholland Exp $
+.\"
+.\" Copyright (c) 1980 The Regents of the University of California.
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)monop.6 6.5 (Berkeley) 3/25/93
+.\"
+.Dd February 23, 2008
+.Dt MONOP 6
+.Os
+.Sh NAME
+.Nm monop
+.Nd Monopoly game
+.Sh SYNOPSIS
+.Nm
+.Op Ar file
+.Sh DESCRIPTION
+.Nm
+is reminiscent of the Parker Brother's game Monopoly, and
+monitors a game between 2 to 9 users.
+It is assumed that the rules of Monopoly are known.
+The game follows the standard rules, with the exception that,
+if a property goes up for auction and there are only two solvent players,
+no auction is held and the property remains unowned.
+.Pp
+The game, in effect, lends the player money,
+so it is possible to buy something which you cannot afford.
+However, as soon as a person goes into debt, he must
+.Dq fix the problem ,
+i.e., make himself solvent, before play can continue.
+If this is not possible, the player's property reverts to his debtee,
+either a player or the bank.
+A player can resign at any time to any person or the bank,
+which puts the property back on the board, unowned.
+.Pp
+Any time that the response to a question is a
+.Em string ,
+e.g., a name, place or person, you can type
+.Sq Ic \&?
+to get a list of valid answers.
+It is not possible to input a negative number, nor is it ever necessary.
+.Pp
+.Em A Summary of Commands :
+.Bl -tag -width item
+.It Ic quit
+quit game: This allows you to quit the game.
+It asks you if you're sure.
+.It Ic print
+print board: This prints out the current board.
+The columns have the following meanings (column headings are the same for the
+.Ic where ,
+.Ic own holdings ,
+and
+.Ic holdings
+commands):
+.Pp
+.Bl -tag -width indent -compact
+.It Name
+The first ten characters of the name of the square.
+.It Own
+The
+.Em number
+of the owner of the property.
+.It Price
+The cost of the property (if any).
+.It Mg
+This field has a
+.Sq *
+in it if the property is mortgaged.
+.It \&#
+If the property is a Utility or Railroad, this is the number
+of such owned by the owner.
+If the property is land, this is the number of houses on it.
+.It Rent
+Current rent on the property.
+If it is not owned, there is no rent.
+.El
+.It Ic where
+where players are: Tells you where all the players are.
+A
+.Sq *
+indicates the current player.
+.It Ic own holdings
+List your own holdings,
+i.e., money, get-out-of-jail-free cards, and property.
+.It Ic holdings
+holdings list: Look at anyone's holdings.
+It will ask you whose holdings you wish to look at.
+When you are finished, type
+.Sq Ic done .
+.It Ic mortgage
+mortgage property:
+Sets up a list of mortgageable property, and asks which you wish to mortgage.
+.It Ic unmortgage
+unmortgage property:
+Unmortgage mortgaged property.
+.It Ic buy
+buy houses:
+Sets up a list of monopolies on which you can buy houses.
+If there is more than one, it asks you which you want to buy for.
+It then asks you how many for each piece of property,
+giving the current amount in parentheses after the property name.
+If you build in an unbalanced manner
+(a disparity of more than one house within the same monopoly),
+it asks you to re-input things.
+.It Ic sell
+sell houses:
+Sets up a list of monopolies from which you can sell houses.
+It operates in an analogous manner to
+.Ic buy .
+.It Ic card
+card for jail:
+Use a get-out-of-jail-free card to get out of jail.
+If you're not in jail, or you don't have one, it tells you so.
+.It Ic pay
+pay for jail:
+Pay $50 to get out of jail, from whence you are put on Just Visiting.
+Difficult to do if you're not there.
+.It Ic trade
+This allows you to trade with another player.
+It asks you whom you wish to trade with,
+and then asks you what each wishes to give up.
+You can get a summary at the end, and, in all cases,
+it asks for confirmation of the trade before doing it.
+.It Ic resign
+Resign to another player or the bank.
+If you resign to the bank, all property reverts to its virgin state,
+and get-out-of-jail-free cards revert to the deck.
+.It Ic save
+save game:
+Save the current game in a file for later play.
+You can continue play after saving,
+either by adding the file in which you saved the game after the
+.Nm
+command, or by using the
+.Ic restore
+command (see below).
+It will ask you which file you wish to save it in,
+and, if the file exists, confirm that you wish to overwrite it.
+.It Ic restore
+restore game:
+Read in a previously saved game from a file.
+It leaves the file intact.
+.It Ic roll
+Roll the dice and move forward to your new location.
+If you simply hit the
+.Aq RETURN
+key instead of a command, it is the same as typing
+.Ic roll .
+.El
+.Sh AUTHORS
+.An Ken Arnold
+.Sh BUGS
+No command can be given an argument instead of a response to a query.
diff --git a/static/netbsd/man6/number.6 b/static/netbsd/man6/number.6
new file mode 100644
index 00000000..72266379
--- /dev/null
+++ b/static/netbsd/man6/number.6
@@ -0,0 +1,59 @@
+.\" $NetBSD: number.6,v 1.7 2003/08/07 09:37:30 agc Exp $
+.\"
+.\" Copyright (c) 1989, 1993, 1994
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)number.6 8.2 (Berkeley) 3/31/94
+.\"
+.Dd March 31, 1994
+.Dt NUMBER 6
+.Os
+.Sh NAME
+.Nm number
+.Nd convert Arabic numerals to English
+.Sh SYNOPSIS
+.Nm
+.Op Fl l
+.Op Ar number ...
+.Sh DESCRIPTION
+The
+.Nm
+utility prints the English equivalent of the number to the standard
+output, with each 10^3 magnitude displayed on a separate line.
+If no argument is specified,
+.Nm
+reads lines from the standard input.
+.Pp
+The options are as follows:
+.Bl -tag -width Ds
+.It Fl l
+Display the number on a single line.
+.El
+.Sh BUGS
+Although
+.Nm
+understand fractions, it doesn't understand exponents.
diff --git a/static/netbsd/man6/p.6 b/static/netbsd/man6/p.6
new file mode 100644
index 00000000..c83e82c4
--- /dev/null
+++ b/static/netbsd/man6/p.6
@@ -0,0 +1 @@
+END { print NR }
diff --git a/static/netbsd/man6/phantasia.6 b/static/netbsd/man6/phantasia.6
new file mode 100644
index 00000000..766fd8c6
--- /dev/null
+++ b/static/netbsd/man6/phantasia.6
@@ -0,0 +1,1213 @@
+.\" $NetBSD: phantasia.6,v 1.13 2009/05/26 01:34:32 dholland Exp $
+.\"
+.Dd April 1, 2001
+.Dt PHANTASIA 6
+.Os
+.Sh NAME
+.Nm phantasia
+.Nd an interterminal fantasy game
+.Sh SYNOPSIS
+.Nm
+.Op Fl abHmpSsx
+.Sh DESCRIPTION
+.Nm
+is a role-playing game that allows players to create characters of
+various types to fight monsters and other players.
+Progression of characters is based upon gaining experience from fighting
+monsters and other players.
+.Pp
+Most of the game is menu-driven and more or less self-explanatory.
+The screen is cursor updated, so be sure to set up the
+.Ev TERM
+variable in your environment.
+.Sh OPTIONS
+.Bl -tag -width aaa -offset indent
+.It Fl a
+List all character names on file.
+.It Fl b
+Show scoreboard of top characters per login.
+.It Fl H
+Print header only.
+.It Fl m
+List monsters.
+.It Fl p
+Purge old characters.
+.It Fl S
+Turn on wizard mode, if allowed.
+(Wizard mode is restricted to the super-user.)
+.It Fl s
+Skip printing the header.
+.It Fl x
+Examine/change a particular character on file.
+.El
+.Sh PARTICULARS
+.Pp
+The game is multiplayer and game data is saved in a shared common
+location.
+Characters are password-protected to prevent abuse.
+Only characters above
+.Em level
+zero are saved.
+Characters that are left unused for sufficiently long will be purged.
+Characters are only placed on the scoreboard when they die.
+.Pp
+The world is based on a Cartesian coordinate system.
+New characters are placed randomly near the origin (center).
+.Ss Normal Play
+A number of the player's more important statistics are almost always
+displayed on the screen, with maximums (where applicable) in
+parentheses.
+.Pp
+Most commands are selected with a single letter or digit.
+For example, one may move by hitting
+.Sq W ,
+.Sq S ,
+.Sq N ,
+or
+.Sq E .
+Lower case may also be used; the game is not case-sensitive.
+One may also use
+.Sq H ,
+.Sq J ,
+.Sq K ,
+and
+.Sq L
+for movement, as with
+.Xr vi 1 .
+To move to a specific (x, y) coordinate, use the
+.Ic move
+.Pq Sq 1
+command.
+A character can move a maximum distance of
+1 plus 1.5 per
+.Em level
+at once.
+Entering a compass direction will move the player the maximum
+allowed distance in that direction.
+.Pp
+The
+.Ic players
+.Pq Sq 2
+command shows who else is playing.
+The exact position is shown for those who are a similar distance or
+not as far from the origin.
+.Em Kings
+and
+.Em council of the wise
+can see and be seen by everyone.
+A
+.Em palantir
+removes these restrictions.
+.Pp
+One can talk to other players with the
+.Ic talk
+.Pq Sq 3
+option.
+This sends a line of text to everyone.
+To remove the current message, just type
+.Aq return
+when prompted for a message.
+.Pp
+The
+.Ic stats
+.Pq Sq 4
+option shows additional characteristics of a player.
+.Pp
+The
+.Ic quit
+.Pq Sq 5
+command exits the game.
+.Pp
+One may rest by default.
+Resting lets one regain maximum
+.Em energy level ,
+and also lets one find
+.Em mana .
+More mana is found at larger levels and further distances from the origin.
+.Pp
+One may call a monster by hitting
+.Sq 9
+or
+.Sq C .
+.Pp
+Use
+.Sq X
+to examine other players.
+.Pp
+One may quit or execute a sub-shell by hitting interrupt.
+Quitting during battle results in death, for obvious reasons.
+.Pp
+Several further commands become available as the player progresses in
+.Em level
+and
+.Em magic ,
+or to other stations in the game
+.Em ( valar ,
+.Em council of the wise ,
+.Em king ) .
+These are described elsewhere.
+In general, a control-L will force the redrawing of the screen.
+.Pp
+Other things which may happen are more or less self-explanatory.
+.Ss Fighting Monsters
+A player has several options while fighting monsters.
+They are as follows:
+.Bl -tag -width skirmish -offset indent
+.It Ic melee
+Inflicts damage on the monster, based upon
+.Em strength .
+Also decreases the monster's
+.Em strength
+some.
+.It Ic skirmish
+Inflicts a little less damage than
+.Ic melee ,
+but decreases the monster's
+.Em quickness
+instead.
+.It Ic evade
+Attempt to run away.
+Success is based upon both the player's and the monster's
+.Em brains
+and
+.Em quickness .
+.It Ic spell
+Several options for throwing spells (described elsewhere).
+.It Ic nick
+Hits the monster one plus the player's
+.Em sword ,
+and gives the player 10% of the monster's
+.Em experience .
+Decreases the monster's
+.Em experience
+an amount proportional to the amount granted.
+This also increases the monster's quickness.
+Paralyzed monsters wake up very fast when nicked.
+.It Ic luckout
+This is essentially a battle of wits with the monster.
+Success is based upon the player's and the monster's
+.Em brains .
+The player gets credit for slaying the monster if he/she succeeds.
+Otherwise, nothing happens, and the chance to
+.Ic luckout
+is lost.
+.El
+.Ss Character Statistics
+.Bl -tag -width energyXlevel -offset indent
+.It Em strength
+determines how much damage a character can inflict.
+.It Em quickness
+determines how many chances a character gets to make decisions while fighting.
+.It Em energy level
+specifies how much damage a character may endure before dying.
+.It Em magic level
+determines which spells a character may throw, and how effective those
+spells will be.
+.It Em brains
+basically, the character's intelligence; used for various fighting options
+and spells.
+.It Em mana
+used as a power source for throwing spells.
+.It Em experience
+gained by fighting monsters and other characters.
+.It Em level
+indicative of how much experience a character has accumulated; progresses
+geometrically as
+.Em experience
+increases.
+.It Em poison
+sickness which degrades a character's performance (affects
+.Em energy level
+and
+.Em strength ) .
+.It Em sin
+accumulated as a character does certain nasty things; used only rarely
+in normal play of the game.
+.It Em age
+of player; roughly equivalent to number of turns.
+As
+.Em age
+increases, many personal statistics degenerate.
+.El
+.Ss Character Types
+Character statistics are rolled randomly from the above list, according
+to character type.
+The types are as follows:
+.Bl -tag -width "experimento" -offset indent
+.It Em magic user
+strong in
+.Em magic level
+and
+.Em brains ,
+weak in other areas.
+Must rely on wits and magic to survive.
+.It Em fighter
+good in
+.Em strength
+and
+.Em energy level ,
+fairly good in other areas.
+This adds up to a well-equipped fighter.
+.It Em elf
+very high
+.Em quickness
+and above average
+.Em magic level .
+.It Em dwarf
+very high
+.Em strength
+and
+.Em energy level ,
+but with a tendency to be rather slow and not too bright.
+.It Em halfling
+rather quick and smart, with high
+.Em energy level ,
+but poor in
+.Em magic
+and
+.Em strength .
+Born with some
+.Em experience .
+.It Em experimento
+very mediocre in all areas.
+However, the
+.Em experimento
+may be placed almost anywhere within the playing grid.
+.El
+.Pp
+The possible ranges for starting statistics are summarized in
+the following table.
+.TS
+l c c c c c c
+l c c c c c c.
+Type Strength Quick Mana Energy Brains Magic
+_
+Mag. User 10-15 30-35 50-100 30-45 60-85 5-9
+Fighter 40-55 30-35 30-50 45-70 25-45 3-6
+Elf 35-45 32-38 45-90 30-50 40-65 4-7
+Dwarf 50-70 25-30 25-45 60-100 20-40 2-5
+Halfling 20-25 34 25-45 55-90 40-75 1-4
+Experimento 25 27 100 35 25 2
+.TE
+.\" .Bl -column "Experimento" "Strength" "Quick" "xxxxxx" "Energy" "Brains" "Magic"
+.\" .It Sy Charactertype Strength Quick Mana Energy Brains Magic
+.\" .It "Magic User" 10-15 30-35 50-100 30-45 60-85 5-9
+.\" .It Fighter 40-55 30-35 30-50 45-70 25-45 3-6
+.\" .It Elf 35-45 32-38 45-90 30-50 40-65 4-7
+.\" .It Dwarf 50-70 25-30 25-45 60-100 20-40 2-5
+.\" .It Halfling 20-25 34 25-45 55-90 40-75 1-4
+.\" .It Experimento 25 27 100 35 25 2
+.\" .El
+.Pp
+Not only are the starting characteristics different for the different
+character types, but the characteristics progress at different rates for the
+different types as the character goes up in
+.Em level .
+.Em Experimentoes Ns '
+characteristics progress randomly as one of the other types.
+The progression as characters increase in
+.Em level
+is summarized in the following table.
+.Pp
+.TS
+nokeep ;
+l c c c c c
+l n n n n n.
+Type Strength Mana Energy Brains Magic
+_
+Mag. User 2.0 75 20 6 2.75
+Fighter 3.0 40 30 3.0 1.5
+Elf 2.5 65 25 4.0 2.0
+Dwarf 5 30 35 2.5 1
+Halfling 2.0 30 30 4.5 1
+.TE
+.Pp
+The character type also determines how much gold a player may
+carry, how long until
+.Em rings
+can overcome the player, and how much
+.Em poison
+the player can withstand.
+.Ss Spells
+During the course of the game, the player may exercise his/her
+magic powers.
+These cases are described below.
+.Bl -tag -width "all or nothing" -offset indent
+.It Ic cloak
+.Em magic level necessary :
+20 (plus level 7)
+.br
+.Em mana used :
+35 plus 3 per rest period
+.br
+Used during normal play.
+Prevents monsters from finding the character,
+as well as hiding the player from other players.
+His/her coordinates show up as '?' in the
+.Ic players
+option.
+Players cannot collect
+.Em mana ,
+find trading posts, or discover the
+.Em grail
+while cloaked.
+Calling a monster uncloaks, as does choosing this option while cloaked.
+.It Ic teleport
+.Em magic level necessary :
+40 (plus level 12)
+.br
+.Em mana used :
+30 per 75 moved
+.br
+Used during normal play.
+Allows the player to move with much more freedom than with the
+.Ic move
+option, at the price of expending mana.
+The maximum distance possible to move is based upon
+.Em level
+and
+.Em magic level .
+.It Ic power blast
+.Em magic level necessary :
+none
+.br
+.Em mana used :
+5 times
+.Em level
+.br
+Used during inter-terminal battle.
+Damage is based upon
+.Em magic level
+and
+.Em strength .
+Hits much harder than a normal hit.
+.It Ic all or nothing
+.Em magic level necessary :
+none
+.br
+.Em mana used :
+1
+.br
+Used while combating monsters.
+Has a 25% chance of working.
+If it works it hits the monster just enough to kill it.
+If it fails, it doesn't hit the monster, and doubles the monster's
+.Em quickness
+and
+.Em strength .
+Paralyzed monsters wake up much quicker as a result of this spell.
+.It Ic magic bolt
+.Em magic level necessary :
+5
+.br
+.Em mana used :
+variable
+.br
+Used while combating monsters.
+Hits the monster based upon the amount
+of
+.Em mana
+expended and
+.Em magic level .
+Guaranteed to hit at least 10 per
+.Em mana .
+.It Ic force field
+.Em magic level necessary :
+15
+.br
+.Em mana used :
+30
+.br
+Used during monster combat.
+Throws up a shield to protect from damage.
+The shield is added to actual energy level, and is a fixed number, based
+upon maximum energy.
+Normally, damage occurs first to the shield and then to the players actual
+.Em energy level .
+.It Ic transform
+.Em magic level necessary :
+25
+.br
+.Em mana used :
+50
+.br
+Used during monster combat.
+Transforms the monster randomly into one of the 100 monsters from
+the monster file.
+.It Ic increase might
+.Em magic level necessary :
+35
+.br
+.Em mana used :
+75
+.br
+Used during combat with monsters.
+Increases strength up to a maximum.
+.It Ic invisibility
+.Em magic level necessary :
+45
+.br
+.Em mana used :
+90
+.br
+Used while fighting monsters.
+Makes it harder for the monster to hit, by temporarily increasing the player's
+.Em quickness .
+This spell may be thrown several times, but a maximum level will be reached.
+.It Ic transport
+.Em magic level necessary :
+60
+.br
+.Em mana used :
+125
+.br
+Used during monster combat.
+Transports the monster away from the player.
+Success is based upon player's
+.Em magic
+and
+.Em brains ,
+and the monster's
+.Em experience .
+If it fails the player is transported instead.
+60% of the time, the monster will drop any treasure it was carrying.
+.It Ic paralyze
+.Em magic level necessary :
+75
+.br
+.Em mana used :
+150
+.br
+Used during monster combat.
+.Dq Freezes
+the monster by putting its
+.Em quickness
+slightly negative.
+The monster will slowly wake up.
+Success is based upon player's
+.Em magic
+and the monster's
+.Em experience .
+If it fails, nothing happens.
+.It Ic specify
+.Em magic level necessary :
+none
+.br
+.Em mana used :
+1000
+.br
+Used during monster combat only by
+.Em valar
+or
+.Em council of the wise .
+Allows the player to pick which monster to fight.
+.El
+.Ss Monsters
+Monsters get bigger farther from the origin (0,0).
+Rings of distance 125 from the origin determine the size.
+A monster's
+.Em experience ,
+.Em energy level ,
+and
+.Em brains
+are multiplied by the size.
+.Em Strength
+is increased 50% per size over one, and
+.Em quickness
+remains the same, regardless of size.
+.Pp
+Also, nastier monsters are found as one progresses farther out from the origin.
+Monsters also may flock.
+The percent chance of that happening is designated as
+.Em flock%
+in the monster listing.
+Monsters outside the first ring
+may carry treasure, as determined by their treasure type.
+Flocking monsters, and bigger monsters, increase the chances of treasure.
+.Pp
+Certain monsters have special abilities, as follows:
+.Bl -tag -width "Assorted Faeries"
+.It Em Unicorn
+can only be subdued if the player is in possession of a
+.Em virgin .
+.It Em Modnar
+has random characteristics, including treasure type.
+.It Em Mimic
+will pick another name from the list of monsters in order to confuse.
+.It Em Dark Lord
+very nasty person.
+Does not like to be hit (especially nicked),
+and many spells do not work well (or at all) against him.
+One can always
+.Em evade
+from the
+.Em Dark Lord .
+.It Em Leanan-Sidhe
+also a very nasty person.
+She will permanently sap
+.Em strength
+from someone.
+.It Em Saruman
+wanders around with
+.Em Wormtongue ,
+who can steal a
+.Em palantir .
+Also,
+.Em Saruman
+may turn a player's gems into gold pieces, or scramble her/his stats.
+.It Em Thaumaturgist
+can transport a player.
+.It Em Balrog
+inflicts damage by taking away
+.Em experience ,
+not
+.Em energy .
+.It Em Vortex
+may take some
+.Em mana .
+.It Em Nazgul
+may try to steal a
+.Em ring
+or neutralize part of one's
+.Em brains .
+.It Em Tiamat
+may take half a player's
+.Em gold
+and
+.Em gems
+and escape.
+.It Em Kobold
+may get nasty and steal one gold piece and run away.
+.It Em Shelob
+may bite, inflicting the equivalent of one
+.Em poison .
+.It Em Assorted Faeries
+These are killed if attacking someone carrying
+.Em holy water .
+These are
+.Em Cluricaun , Fir Darrig , Fachan ,
+.Em Ghille Dhu , Bogle , Killmoulis ,
+and
+.Em Bwca .
+.It Em Lamprey
+may bite, inflicting 1/2 of a
+.Em poison .
+.It Em Shrieker
+will call one of its (much bigger) buddies if picked upon.
+.It Em Bonnacon
+will become bored with battle, fart, and run off.
+.It Em Smeagol
+will try to steal a
+.Em ring
+from a player, if given the chance.
+.It Em Succubus
+may inflict damage through a
+.Ic force field .
+This subtracts from
+.Em energy level
+instead of any shield the player may have thrown up.
+This is a very easy way to die.
+.It Em Cerberus
+loves metal and will steal all the metal treasures from a player if able.
+.It Em Ungoliant
+can bite and poison.
+This inflicts five
+.Em poisons ,
+and also takes one from the player's
+.Em quickness .
+.It Em Jabberwock
+may tire of battle, and leave after calling one of his friends
+.Em ( Jubjub Bird
+or
+.Em Bandersnatch ) .
+.It Em Morgoth
+actually
+.Em Modnar ,
+but reserved for
+.Em council of the wise , valar ,
+and
+.Em ex-valar .
+Fights with
+.Em Morgoth
+end when either he or the player dies.
+His characteristics are calculated based upon the player's.
+The player is given the chance to ally with him.
+No magic, except
+.Ic force field ,
+works when battling
+.Em Morgoth .
+.It Em Troll
+may regenerate its
+.Em energy
+and
+.Em strength
+while in battle.
+.It Em Wraith
+may make a player blind.
+.El
+.Ss Treasures
+The various treasure types are as follows:
+.Bl -tag -width "type twelve/thirteen"
+.It Type zero
+none
+.It Type one
+.Em power booster
+\- adds mana.
+.br
+.Em druid
+\- adds experience.
+.br
+.Em holy orb
+\- subtracts 0.25 sin.
+.TP 1.5i
+.It Type two
+.Em amulet
+\- protects from cursed treasure.
+.br
+.Em holy water
+\- kills
+.Em assorted faeries .
+.br
+.Em hermit
+\- reduces sin by 25% and adds some mana.
+.It Type three
+.Em shield
+\- adds to maximum
+.Em energy level .
+.br
+.Em virgin
+\- used to subdue a
+.Em unicorn ,
+or to give much
+.Em experience
+(and some
+.Em sin ) .
+.br
+.Em athelas
+\- subtracts one
+.Em poison .
+.It Type four (scrolls)
+.Em shield
+\- throws a bigger than normal
+.Ic force field .
+.br
+.Em invisible
+\- temporarily puts the finder's
+.Em quickness
+to one million.
+.br
+.Em ten fold strength
+\- multiplies finder's strength by ten.
+.br
+.Em pick monster
+\- allows finder to pick next monster to battle.
+.br
+.Em general knowledge
+\- adds to finder's
+.Em brains
+and
+.Em magic level .
+.Pp
+All the scrolls except
+.Em general knowledge
+automatically call a monster.
+These preserve any spells that were already in effect, but are only in
+effect while in battle.
+.It Type five
+.Em dagger
+\- adds to
+.Em strength .
+.br
+.Em armour
+\- same as a
+.Em shield ,
+but bigger.
+.br
+.Em tablet
+\- adds
+.Em brains .
+.It Type six
+.Em priest
+\- rests to maximum; adds
+.Em mana , brains ;
+and halves
+.Em sin .
+.br
+.Em Robin Hood
+\- increases
+.Em shield
+and adds permanently to
+.Em strength .
+.br
+.Em axe
+\- like
+.Em dagger ,
+but bigger.
+.It Type seven
+.Em charm
+\- protects from cursed treasure (used before
+.Em amulet ) ;
+used in conjunction with
+.Em blessing
+to battle
+.Em Dark Lord .
+.br
+.Em Merlyn
+\- adds
+.Em brains , magic ,
+and
+.Em mana .
+.br
+.Em war hammer
+\- like an
+.Em axe ,
+but bigger.
+.It Type eight
+.Em healing potion
+\- sets
+.Em poison
+to -2, or subtracts two from
+.Em poison ,
+whichever is better.
+.br
+.Em transporter
+\- allows finder to move anywhere.
+.br
+.Em sword
+\- like a
+.Em war hammer ,
+but bigger.
+.It Type nine
+.Em golden crown
+\- allows the player to become
+.Em king
+by going to (0,0).
+.br
+.Em blessing
+\- cuts
+.Em sin
+to 1/3, adds
+.Em mana ,
+rests to maximum, kills
+.Em Dark Lord
+with a
+.Em charm ,
+and gives bearer first hit on all monsters.
+.br
+.Em quicksilver
+\- adds to
+.Em quickness .
+.It Type ten
+.Em elven boots
+\- adds permanently to
+.Em quickness .
+.It Type eleven
+.Em palantir
+\- allows one to see all the other players; used by
+.Em council of the wise
+to seek the
+.Em grail .
+.It Type twelve/thirteen
+.Em ring
+\- allows one to hit much harder in battle, etc.
+.El
+.Pp
+Any treasure type 10-13 monsters may instead carry a type nine treasure.
+.Pp
+A monster may also be carrying
+.Em gold
+or
+.Em gems .
+These are used at
+.Em trading posts
+to buy things.
+A
+.Em gem
+is worth 1000 gold pieces.
+Too much
+.Em gold
+will slow a player down.
+One may carry 1000 plus 200 per
+.Em level
+of
+.Em gold .
+A
+.Em gem
+weighs one half a gold piece.
+Monsters of treasure type 7 or higher may carry
+.Em gems .
+.Pp
+The chance of a cursed treasure is based upon treasure type.
+The more valuable treasures have a greater chance of being cursed.
+A cursed treasure knocks
+.Em energy level
+very low and adds 0.25
+.Em poison .
+.Ss Rings
+.Em Rings
+are only carried by
+.Em nazguls
+and
+.Em Dark Lords .
+They come in four different flavors.
+All
+.Em rings
+rest the player to maximum and cause him/her to hit much harder
+in battle with monsters (assuming the
+.Em ring
+is being used for battle.)
+.Pp
+Two types of
+.Em rings
+are cursed and come either from
+.Em nazguls
+or
+.Em Dark Lords .
+After a few times of using these types, the player falls
+under the control of the
+.Em ring ,
+and strange, random things will occur.
+Eventually, the player dies, and gives his/her name to a monster
+on the file.
+Dying before the
+.Em ring
+is used up also renames the monster.
+.Pp
+The two remaining types of
+.Em rings
+are much more benign.
+The one from a
+.Em nazgul
+is good for a limited number of battle rounds, and will save
+the player from death if it was being used when he/she died.
+The one from
+.Em Dark Lord
+is the same, except that it never is used up.
+.Em rings
+disappear after saving someone from death.
+In general, cursed
+.Em rings
+occur much more often than normal ones.
+It is usually not a good idea to pick one up.
+The only way to get rid of a
+.Em ring
+is to have a monster steal it.
+.Ss King
+A player may become
+.Em king
+by finding a
+.Em crown
+and going to (0,0).
+Players must have a
+.Em level
+in the range of 10 to 1000 to be able to find a
+.Em crown .
+When a player with one or more
+.Em crowns
+reaches
+.Em level
+1000, the
+.Em crowns
+are converted to
+.Em gold .
+.Pp
+Once a player is king, he/she may do certain things while in
+the Lord's Chamber (0,0).
+These are exercised with the
+.Ic decree
+('0') option.
+.Bl -tag -width "collect taxes"
+.It Ic transport
+This is done to another player.
+It randomly moves the affected player about.
+A
+.Em charm
+protects from transports.
+.It Ic curse
+This is done to another player.
+It is analogous to cursed treasure, but worse.
+It inflicts two
+.Em poison ,
+knocks
+.Em energy level
+very low, and degrades the maximum energy.
+It also removes a
+.Em cloak .
+A
+.Em blessing
+protects from king's curses.
+.It Ic energy void
+The king may put a number of these scattered about
+his/her kingdom as he/she pleases.
+If a player hits one, he/she loses
+.Em mana , energy ,
+and
+.Em gold .
+The energy void disappears after being hit.
+.It Ic bestow
+This is also done to another player.
+The king may wish to reward one or more loyal subjects by sharing his/her
+riches
+.Em ( gold ) .
+Or it is a convenient way to dispose of some unwanted deadweight.
+.It Ic collect taxes
+Everyone pays 7% tax on all
+.Em gold
+and
+.Em gems
+acquired, regardless of the existence of a
+.Em king .
+The king collects the accrued taxes with this option.
+.El
+.Pp
+The
+.Em king
+may also
+.Ic teleport
+anywhere for free by using the origin as a starting place.
+.Ss Council of the Wise, Valar
+A player automatically becomes a member of the
+.Em council of the wise
+upon reaching level 3000.
+Members of the council cannot have
+.Em rings .
+Members of the council have a few extra options which they can exercise.
+These are exercised with the
+.Ic intervene
+.Pq Sq 8
+option.
+All
+.Ic intervene
+options cost 1000 mana.
+One
+.Ic intervene
+option is to
+.Ic heal
+another player.
+This is just a quick way for that player to be rested
+to maximum and lose a little
+.Em poison .
+The main purpose in life for members of the council is to seek the
+.Em Holy Grail .
+This is done with a
+.Em palantir
+under the
+.Ic seek grail
+option.
+The distance cited by the seek is accurate within 10%, in order
+not to make it too easy to find the grail.
+A player must have infinitesimally small
+.Em sin ,
+or else it's all over upon finding the grail.
+In order to help members of the council on their quest, they
+may
+.Ic teleport
+with greater ease.
+.Pp
+Upon finding the grail, the player advances to position of
+.Em valar .
+He/she may then exercise more and niftier options under
+.Ic intervention .
+These include all of the council members' options plus the
+ability to move other players about, bless them, and throw monsters at
+them.
+A
+.Em valar Ns 's
+blessing has the same effect as the treasure
+.Em blessing ,
+except that the affected player does not get his/her
+.Em blessing
+flag set.
+All
+.Ic intervention
+options which affect other players age the player who uses them.
+.Em Valars
+are essentially immortal, but are actually given five lives.
+If these are used up, the player is left to die, and becomes an
+.Em ex-valar .
+A
+.Em valar
+cannot
+.Ic move , teleport ,
+or call monsters.
+(An exception to this is if the
+.Em valar
+finds a
+.Em transporter . )
+This is to allow him/her to dispose of excess
+.Em gold .
+Any monsters which a
+.Em valar
+encounters are based upon his/her size.
+Only one valar may exist at a time.
+The current valar is replaced when another player finds the grail.
+The valar is then bumped back to the council of the wise.
+.Ss Wizard
+The
+.Em wizard
+is usually the owner of the game and the one who maintains
+the associated files.
+The
+.Em wizard
+is granted special powers within the game, if it is invoked
+with the
+.Fl S
+option.
+Otherwise, the
+.Em wizard
+plays no different from other players.
+The
+.Em wizard
+abilities are outlined below.
+.Bl -tag -width "super character type"
+.It Ic change players
+When examining a player, (game invoked with
+.Fl x ,
+or
+.Sq X
+is used from within game), the
+.Em wizard
+may also change the player.
+.It Ic intervention
+The
+.Em wizard
+may do all the
+.Ic intervention
+options.
+One extra option,
+.Ic vaporize ,
+is added to kill any offensive players.
+.It Ic super character type
+An extra character type is added.
+This character starts with the
+maximum possible in all statistics, selected from the other character types.
+A
+.Em super
+character's statistics also progress at the maximum possible rate, selected
+from the other character types.
+.El
+.Ss Special Places
+Certain regions of the playing grid have different names.
+In general, this is only to give the player some idea of
+his/her present location.
+Some special places do exist.
+.Bl -tag -width "Trading Posts"
+.It Em Trading Posts
+These are located at |x| == |y| == n*n*100 for n = 1, 2, ..., 1000.
+Trading posts farther out have more things for sale.
+Be careful about cheating the merchants there, as they have short tempers.
+Merchants are dishonest about 5% of the time.
+.It Em Lord's Chamber
+This is located at (0,0).
+Only players with
+.Em crowns
+may enter.
+.It Em Point of \&No Return
+This is located beyond 1.2e+6 in any direction.
+The only way to return from here is a
+.Em transporter
+or to have a
+.Em valar
+relocate the player.
+.It Em Dead Marshes
+This is a band located fairly distant from the origin.
+The first fourteen monsters (water monsters) can normally only be found here.
+.It Em Valhala
+This place is where the
+.Em valar
+resides.
+It is associated with no particular coordinate on the playing grid.
+.El
+.Ss Miscellaneous
+Once a player reaches
+.Em level
+5, the game will start to time out waiting for input.
+This is to try to keep the game a bit faster paced.
+.Pp
+A
+.Em guru
+will never be disgusted with your
+.Em sins
+if they are less than one.
+.Pp
+A
+.Em medic
+wants half of a player's
+.Em gold
+to be happy.
+Offering more than one has, or a negative amount will anger the
+.Em medic ,
+who will make the player worse (add one
+.Em poison ) .
+.Pp
+The
+.Em Holy Grail
+does little for those who are not ready to behold it.
+Whenever anyone finds it, it moves.
+It is always located within 1e+6 in any compass direction of the origin.
+.Pp
+There is a maximum amount of
+.Em mana
+and
+.Em charms
+a player may possess, based upon
+.Em level .
+.Em Quicksilver
+is always limited to a maximum of 99.
+.Pp
+.Em Books
+bought at a
+.Em trading post
+increase
+.Em brains ,
+based upon the number bought.
+It is unwise, however to buy more than 1/10 of one's
+.Em level
+in books at a time.
+.Pp
+Players over level 10000 are automatically retired.
+.Pp
+A
+.Em blindness
+goes away in random time.
+.Pp
+Players with
+.Em crowns
+are identified with a '*' before their character type.
+.Ss Inter-terminal Battle
+When two player's coordinates correspond, they may engage in battle.
+In general, the player with the highest
+.Em quickness
+gets the first hit.
+If the two players are severely mismatched, the stronger player
+is drastically handicapped for the battle.
+In order to protect from being stuck in an infinite loop,
+the player waiting for response may time out.
+Options for battle are:
+.Bl -tag -width "power blast"
+.It Ic fight
+Inflicts damage upon other person.
+.It Ic run away
+Escape from battle.
+Has a 75% chance of working.
+.It Ic power blast
+Battle spell.
+.It Ic luckout
+One-time chance to try to win against the foe.
+Has a 10% chance of working.
+.El
+.Pp
+Sometimes waits for the other player may be excessive, because
+he/she may be battling a monster.
+Upon slaying a player in battle the winner gets the other's
+.Em experience
+and treasures.
+.Em Rings
+do not work for inter-terminal battle.
+.Sh AUTHORS
+.An Edward Estes ,
+AT\*[Am]T Information Systems, Skokie, IL
+.Sh BUGS
+All screen formats assume at least 24 lines by at least 80 columns.
+No provisions are made for when any of the data items get too big
+for the allotted space on the screen.
diff --git a/static/netbsd/man6/pig.6 b/static/netbsd/man6/pig.6
new file mode 100644
index 00000000..aba42687
--- /dev/null
+++ b/static/netbsd/man6/pig.6
@@ -0,0 +1,46 @@
+.\" $NetBSD: pig.6,v 1.5 2003/08/07 09:37:31 agc Exp $
+.\"
+.\" Copyright (c) 1992 The Regents of the University of California.
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)pig.6 8.1 (Berkeley) 6/10/93
+.\"
+.Dd June 10, 1993
+.Dt PIG 6
+.Os
+.Sh NAME
+.Nm pig
+.Nd eformatray inputway asway Igpay Atinlay
+.Sh SYNOPSIS
+.Nm
+.Sh DESCRIPTION
+Ethay
+.Nm
+utilityway eadsray ethay andardstay inputway andway iteswray itway
+outway otay andardstay outputway inway Igpay Atinlay.
+.Pp
+Usefulway orfay eneratinggay onthlymay eportsray.
diff --git a/static/netbsd/man6/pom.6 b/static/netbsd/man6/pom.6
new file mode 100644
index 00000000..3d2e0d86
--- /dev/null
+++ b/static/netbsd/man6/pom.6
@@ -0,0 +1,71 @@
+.\" $NetBSD: pom.6,v 1.13 2005/09/15 02:09:41 wiz Exp $
+.\"
+.\" Copyright (c) 1989, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)pom.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd January 9, 1999
+.Dt POM 6
+.Os
+.Sh NAME
+.Nm pom
+.Nd display the phase of the moon
+.Sh SYNOPSIS
+.Nm
+.Op [[[[[cc]yy]mm]dd]HH]
+.Sh DESCRIPTION
+The
+.Nm
+utility displays the current phase of the moon.
+Useful for selecting software completion target dates and predicting
+managerial behavior.
+.Pp
+.Bl -tag -width [[[[[cc]yy]mm]dd]HH]
+.It Ar [[[[[cc]yy]mm]dd]HH]
+Display the phase of the moon for a given time.
+The format is similar to the canonical representation used by
+.Xr date 1 .
+.El
+.Sh SEE ALSO
+.Xr date 1
+.Sh AUTHORS
+.Nm
+was written by
+.An Keith E. Brandt .
+.Sh BUGS
+Times must be within range of the
+.Ux
+epoch.
+.Pp
+This program does not allow for the difference between the TDT and
+UTC timescales (about one minute at the time of writing).
+.Sh ACKNOWLEDGEMENTS
+This program is based on algorithms from
+.%B Practical Astronomy with Your Calculator, Third Edition
+by Peter Duffett-Smith
+.Aq pjds@mrao.cam.ac.uk .
diff --git a/static/netbsd/man6/primes.6 b/static/netbsd/man6/primes.6
new file mode 100644
index 00000000..aa000ef4
--- /dev/null
+++ b/static/netbsd/man6/primes.6
@@ -0,0 +1,106 @@
+.\" $NetBSD: primes.6,v 1.6 2018/02/03 15:40:29 christos Exp $
+.\"
+.\" Copyright (c) 1989, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Landon Curt Noll.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)factor.6 8.1 (Berkeley) 5/31/93
+.\"
+.\"
+.\" By Landon Curt Noll, http://www.isthe.com/chongo/index.html /\oo/\
+.\"
+.Dd February 2, 2018
+.Dt PRIMES 6
+.Os
+.Sh NAME
+.Nm primes
+.Nd generate primes
+.Sh SYNOPSIS
+.Nm primes
+.Op Fl dh
+.Op Ar start Op Ar stop
+.Sh DESCRIPTION
+The
+.Nm
+utility prints primes in ascending order, one per line, starting
+at or above
+.Ar start
+and continuing until, but not including
+.Ar stop .
+The
+.Ar start
+value must be at least 0 and not greater than
+.Ar stop .
+The
+.Ar stop
+value must not be greater than 3825123056546413050.
+The default value of
+.Ar stop
+is 3825123056546413050.
+.Pp
+When the
+.Nm
+utility is invoked with no arguments,
+.Ar start
+is read from standard input and
+.Ar stop
+is taken to be 3825123056546413050.
+The
+.Ar start
+value may be preceded by a single
+.Sq \&+ .
+The
+.Ar start
+value is terminated by a non-digit character (such as a newline).
+The input line must not be longer than 255 characters.
+.Pp
+When given the
+.Fl d
+argument,
+.Nm
+prints the difference between the current and the previous prime.
+.Pp
+When given the
+.Fl h
+argument,
+.Nm
+prints the prime numbers in hexadecimal.
+.Sh DIAGNOSTICS
+Out of range or invalid input results in
+an appropriate error message to standard error.
+.Sh AUTHORS
+.An -nosplit
+Originally by
+.An Landon Curt Noll ,
+extended to some 64-bit primes by
+.An Colin Percival .
+.Sh BUGS
+This
+.Nm
+program won't get you a world record.
diff --git a/static/netbsd/man6/quiz.6 b/static/netbsd/man6/quiz.6
new file mode 100644
index 00000000..7d8797c9
--- /dev/null
+++ b/static/netbsd/man6/quiz.6
@@ -0,0 +1,119 @@
+.\" $NetBSD: quiz.6,v 1.11 2009/03/11 13:05:46 joerg Exp $
+.\"
+.\" Copyright (c) 1991, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Jim R. Oldroyd at The Instruction Set.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)quiz.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt QUIZ 6
+.Os
+.Sh NAME
+.Nm quiz
+.Nd random knowledge tests
+.Sh SYNOPSIS
+.Nm
+.Op Fl t
+.Op Fl i Ar file
+.Op Ar question answer
+.Sh DESCRIPTION
+The
+.Nm
+utility tests your knowledge of random facts.
+It has a database of subjects from which you can choose.
+With no arguments,
+.Nm
+displays the list of available subjects.
+.Pp
+The options are as follows:
+.Bl -tag -width indent
+.It Fl t
+Use tutorial mode, in which questions are repeated later if you didn't get
+them right the first time, and new questions are presented less frequently
+to help you learn the older ones.
+.It Fl i
+Specify an alternative index file.
+.El
+.Pp
+Subjects are divided into categories.
+You can pick any two categories from the same subject.
+.Nm
+will ask questions from the first category and it expects answers from
+the second category.
+For example, the command
+.Dq quiz victim killer
+asks questions which are the names of victims, and expects you to answer
+with the cause of their untimely demise, whereas the command
+.Dq quiz killer victim
+works the other way around.
+.Pp
+If you get the answer wrong,
+.Nm
+lets you try again.
+To see the right answer, enter a blank line.
+.Ss Index and Data File Syntax
+The index and data files have a similar syntax.
+Lines in them consist of several categories separated by colons.
+The categories are regular expressions formed using the following
+meta-characters:
+.Pp
+.Bl -tag -width "pat|pat" -compact -offset indent
+.It pat|pat
+alternative patterns
+.It {pat}
+optional pattern
+.It [pat]
+delimiters, as in pat[pat|pat]pat
+.El
+.Pp
+In an index file, each line represents a subject.
+The first category in each subject is the pathname of the data file for
+the subject.
+The remaining categories are regular expressions for the titles of each
+category in the subject.
+.Pp
+In data files, each line represents a question/answer set.
+Each category is the information for the question/answer for that category.
+.Pp
+The backslash character (``\e'') is used to quote syntactically significant
+characters, or at the end of a line to signify that a continuation line
+follows.
+.Pp
+If either a question or its answer is empty,
+.Nm
+will refrain from asking it.
+.Sh FILES
+.Bl -tag -width /usr/share/games/quiz.db -compact
+.It Pa /usr/share/games/quiz.db
+The default index and data files.
+.El
+.Sh BUGS
+.Nm
+is pretty cynical about certain subjects.
diff --git a/static/netbsd/man6/rain.6 b/static/netbsd/man6/rain.6
new file mode 100644
index 00000000..441a29be
--- /dev/null
+++ b/static/netbsd/man6/rain.6
@@ -0,0 +1,55 @@
+.\" $NetBSD: rain.6,v 1.13 2020/10/14 18:32:04 nia Exp $
+.\"
+.\" Copyright (c) 1989, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)rain.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd October 14, 2020
+.Dt RAIN 6
+.Os
+.Sh NAME
+.Nm rain
+.Nd animated raindrops display
+.Sh SYNOPSIS
+.Nm
+.Op Fl d Ar delay
+.Sh DESCRIPTION
+The output of
+.Nm
+is modeled after the
+.Tn VAX/VMS
+program of the same name.
+.Bl -tag -width Ds
+.It Fl d
+Delay between updates (in milliseconds).
+If the terminal is faster than 9600 baud, must be set to non-zero to
+obtain a proper rain effect.
+The default is 120.
+.El
+.Sh AUTHORS
+.An Eric P. Scott
diff --git a/static/netbsd/man6/random.6 b/static/netbsd/man6/random.6
new file mode 100644
index 00000000..c4b42c82
--- /dev/null
+++ b/static/netbsd/man6/random.6
@@ -0,0 +1,68 @@
+.\" $NetBSD: random.6,v 1.7 2007/03/20 16:12:40 hubertf Exp $
+.\"
+.\" Copyright (c) 1994
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)random.6 8.2 (Berkeley) 3/31/94
+.\"
+.Dd March 20, 2007
+.Dt RANDOM 6
+.Os
+.Sh NAME
+.Nm random
+.Nd random lines from a file or random numbers
+.Sh SYNOPSIS
+.Nm
+.Op Fl er
+.Op Ar denominator
+.Sh DESCRIPTION
+.Nm
+reads lines from the standard input and copies them to the standard
+output with a probability of 1/denominator.
+The default value for
+.Ar denominator
+is 2.
+.Pp
+The options are as follows:
+.Bl -tag -width Ds
+.It Fl e
+If the
+.Fl e
+option is specified,
+.Nm
+does not read or write anything, and simply exits with a random
+exit value of 0 to
+.Ar denominator Ns -1 ,
+inclusive.
+.It Fl r
+The
+.Fl r
+option guarantees that the output is unbuffered.
+.El
+.Sh SEE ALSO
+.Xr shuffle 1 ,
+.Xr fortune 6
diff --git a/static/netbsd/man6/robots.6 b/static/netbsd/man6/robots.6
new file mode 100644
index 00000000..e07bc3f9
--- /dev/null
+++ b/static/netbsd/man6/robots.6
@@ -0,0 +1,169 @@
+.\" $NetBSD: robots.6,v 1.15 2009/08/05 04:03:47 dholland Exp $
+.\"
+.\" Copyright (c) 1991, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)robots.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd August 4, 2009
+.Dt ROBOTS 6
+.Os
+.Sh NAME
+.Nm robots
+.Nd fight off villainous robots
+.Sh SYNOPSIS
+.Nm
+.Op Fl Aajnrst
+.Op Ar maximum
+.Op Ar scorefile
+.Sh DESCRIPTION
+.Nm
+pits you against evil robots, who are trying to kill you (which is why
+they are evil).
+Fortunately for you, even though they are evil, they are not very bright
+and have a habit of bumping into each other, thus destroying themselves.
+In order to survive, you must get them to kill each other off, since you
+have no offensive weaponry.
+.Pp
+Since you are stuck without offensive weaponry, you are endowed with one
+piece of defensive weaponry: a teleportation device.
+When two robots run into each other or a junk pile, they die.
+If a robot runs into you, you die.
+When a robot dies, you get 10 points, and when all the robots die,
+you start on the next field.
+This keeps up until they finally get you.
+.Pp
+Robots are represented on the screen by a
+.Sq \&+ ,
+the junk heaps from their collisions by a
+.Sq \(** ,
+and you
+(the good guy)
+by a
+.Sq @ .
+.Pp
+The commands are:
+.Bl -tag -width indent -compact
+.It Ic h
+move one square left
+.It Ic l
+move one square right
+.It Ic k
+move one square up
+.It Ic j
+move one square down
+.It Ic y
+move one square up and left
+.It Ic u
+move one square up and right
+.It Ic b
+move one square down and left
+.It Ic n
+move one square down and right
+.It Ic \&.
+(also space) do nothing for one turn
+.It Ic HJKLBNYU
+run as far as possible in the given direction
+.It Ic \*[Gt]
+do nothing for as long as possible
+.It Ic t
+teleport to a random location
+.It Ic w
+wait until you die or they all do
+.It Ic q
+quit
+.It Ic ^L
+redraw the screen
+.El
+.Pp
+All commands can be preceded by a count.
+.Pp
+If you use the
+.Sq Ic w
+command and survive to the next level, you will get a bonus of 10%
+for each robot which died after you decided to wait.
+If you die, however, you get nothing.
+For all other commands, the program will save you from typos
+by stopping short of being eaten.
+However, with
+.Sq Ic w
+you take the risk of dying by miscalculation.
+.Pp
+Only five scores are allowed per user on the score file.
+If you make it into the score file, you will be shown the list at the end
+of the game.
+If an alternative score file is named on the command line, that file
+will be used instead of the standard file for scores.
+The score file must be created empty beforehand, e.g. with
+.Xr touch 1 .
+If the argument
+.Ar maximum ,
+which must be a number, is provided when a score file is first used,
+the value given will be used as the maximum number of scores to keep
+per user instead of the default five.
+This value is a property of the score file and cannot be changed later.
+.Pp
+The options are
+.Bl -tag -width indent
+.It Fl A
+Auto-bot mode.
+Lets the game play itself.
+.It Fl a
+Advance into the higher levels directly, skipping the lower, easier levels.
+.It Fl j
+Jump,
+.Em i.e. ,
+when you run, don't show any intermediate positions; only show things at
+the end.
+This is useful on slow terminals.
+.It Fl n
+Increase the number of games played by one; that is, automatically
+choose to play again one time per usage of this option.
+.It Fl r
+Play in real time; that is, if you do nothing for a few seconds the
+game will assume you meant to do nothing and move the robots.
+.It Fl s
+Don't play, just show the score file.
+.It Fl t
+Teleport automatically when you have no other option.
+This is a little disconcerting until you get used to it, and then it is
+very nice.
+.El
+.Sh FILES
+.Bl -tag -width /var/games/robots_roll -compact
+.It Pa /var/games/robots_roll
+The score file.
+.El
+.Sh AUTHORS
+.An Ken Arnold
+.An Christos Zoulas
+(autobot mode)
+.Sh BUGS
+Bugs?
+You
+.Em crazy ,
+man?!?
diff --git a/static/netbsd/man6/rogue.6 b/static/netbsd/man6/rogue.6
new file mode 100644
index 00000000..4598c7b4
--- /dev/null
+++ b/static/netbsd/man6/rogue.6
@@ -0,0 +1,107 @@
+.\" $NetBSD: rogue.6,v 1.11 2005/09/15 02:09:41 wiz Exp $
+.\"
+.\" Copyright (c) 1988, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)rogue.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt ROGUE 6
+.Os
+.Sh NAME
+.Nm rogue
+.Nd exploring The Dungeons of Doom
+.Sh SYNOPSIS
+.Nm
+.Op Fl s
+.Op Ar save_file
+.\" .Op Fl r
+.\" .Op Fl d
+.Sh DESCRIPTION
+.Nm
+is a computer fantasy game with a new twist.
+It is CRT oriented and the object of the game is to survive the attacks of
+various monsters and get a lot of gold, rather than the puzzle solving
+orientation of most computer fantasy games.
+.Pp
+To get started you really only need to know two commands.
+The command
+.Ic \&?
+will give you a list of the available commands and the command
+.Ic \&/
+will identify the things you see on the screen.
+.Pp
+To win the game (as opposed to merely playing to beat other people's high
+scores) you must locate the Amulet of Yendor which is somewhere below
+the 20th level of the dungeon and get it out.
+Nobody has achieved this yet and if somebody does, they will probably go
+down in history as a hero among heroes.
+.Pp
+When the game ends, either by your death, when you quit, or if you (by
+some miracle) manage to win,
+.Nm
+will give you a list of the top-ten scorers.
+The scoring is based entirely upon how much gold you get.
+There is a 10% penalty for getting yourself killed.
+.Pp
+If
+.Ar save_file
+is specified,
+rogue will be restored from the specified saved game file.
+.Pp
+The
+.Fl s
+option will print out the list of scores.
+.Pp
+For more detailed directions, read the document
+.Rs
+.%T A Guide to the Dungeons of Doom
+.Re
+.Sh FILES
+.Bl -tag -width /var/games/rogue.scores -compact
+.It Pa /var/games/rogue.scores
+Score file
+.It Pa ~/rogue.save
+Default save file
+.El
+.Sh SEE ALSO
+.Rs
+.%A Michael C. Toy
+.%A Kenneth C. R. C. Arnold
+.%T A guide to the Dungeons of Doom
+.Re
+.Sh AUTHORS
+.An Timothy Stoehr
+.An Michael C. Toy
+.An Kenneth C. R. C. Arnold
+.An Glenn Wichman
+.Sh BUGS
+Probably infinite, although none are known.
+However, that Ice Monsters sometimes transfix you permanently is
+.Em not
+a bug.
+It's a feature.
diff --git a/static/netbsd/man6/sail.6 b/static/netbsd/man6/sail.6
new file mode 100644
index 00000000..e7d92f90
--- /dev/null
+++ b/static/netbsd/man6/sail.6
@@ -0,0 +1,1136 @@
+.\" $NetBSD: sail.6,v 1.18 2009/03/02 10:16:54 dholland Exp $
+.\"
+.\" Copyright (c) 1988, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)sail.6 8.3 (Berkeley) 6/1/94
+.\"
+.Dd March 2, 2009
+.Dt SAIL 6
+.Os
+.Sh NAME
+.Nm sail
+.Nd multi-user wooden ships and iron men
+.Sh SYNOPSIS
+.Nm
+.Op Fl bx
+.Op Fl s Op Fl l
+.Op Ar num
+.Sh DESCRIPTION
+.Nm
+is a computer version of Avalon Hill's game of fighting sail
+originally developed by S. Craig Taylor.
+.Pp
+Players of
+.Nm
+take command of an old-fashioned Man of War and fight other
+players or the computer.
+They may re-enact one of the many
+historical sea battles recorded in the game, or they can choose
+a fictional battle.
+.Pp
+As a sea captain in the
+.Nm Sail
+Navy, the player has complete control over the workings of his ship.
+He must order every maneuver, change the set of his sails, and judge the
+right moment to let loose the terrible destruction of his broadsides.
+In addition to fighting the enemy, he must harness the powers of the wind
+and sea to make them work for him.
+The outcome of many battles during the
+age of sail was decided by the ability of one captain to hold the
+.Sq weather gage .
+.Pp
+The flags are:
+.Bl -tag -width flag -compact
+.It Fl b
+No bells.
+.It Fl l
+Show the login name.
+Only effective with
+.Fl s .
+.It Fl s
+Print the names and ships of the top ten sailors.
+.It Fl x
+Play the first available ship instead of prompting for a choice.
+.El
+.Sh IMPLEMENTATION
+.Nm
+is a multiplayer game.
+Each player runs
+.Nm
+to either connect to an existing game or start a new one.
+The game server (or
+.Dq driver )
+is an extra fork of the
+.Nm
+program created when a game is started.
+The driver coordinates the game and runs the computer ships.
+.\" .Pp
+.\" Because the
+.\" driver
+.\" must calculate moves for each ship it controls, the
+.\" more ships the computer is playing, the slower the game will appear.
+.Pp
+If a player joins a game in progress, a synchronization process occurs
+.Pq a rather slow process for everyone ,
+and then the game continues.
+.Pp
+Note that while each scenario can be running independently with
+different players, each scenario can also only be running once at any
+given time.
+.Ss COMMUNICATION
+To implement a multi-user game in Version 7 UNIX, which was the operating
+system
+.Nm
+was first written under, the communicating processes must use a common
+temporary file as a place to read and write messages.
+For e.g. scenario 21, this file is
+.Pa /var/games/sail/#sailsink.21 .
+Corresponding file names are used for the other scenarios.
+.Pp
+In addition, a locking mechanism must be provided to ensure exclusive
+access to the shared file.
+.Nm
+uses a technique stolen from an old game called
+.Dq pubcaves
+by Jeff Cohen.
+Processes do a busy wait in the loop
+.Bd -literal -offset indent
+for (n = 0; link(sync_file, sync_lock) \*[Lt] 0 \*[Am]\*[Am] n \*[Lt] 30; n++)
+ sleep(2);
+
+.Ed
+until they are able to create a hard link named e.g.
+.Pa /var/games/sail/#saillock.21 .
+where 21 is again the scenario number.
+Since creating a hard link is atomic, a process where this succeeds
+will have exclusive access to the temporary file.
+.Ss CONSEQUENCES OF SEPARATE PLAYER AND DRIVER PROCESSES
+When players do something of global interest, such as moving or firing,
+the driver must coordinate the action with the other ships in the game.
+For example, if a player wants to move in a certain direction, he writes a
+message into the temporary file requesting the driver to move his ship.
+Each
+.Dq turn ,
+the driver reads all the messages sent from the players and
+decides what happened.
+It then writes back into the temporary file new values of variables, etc.
+.Pp
+The most noticeable effect this communication has on the game is the
+delay in moving.
+Suppose a player types a move for his ship and hits return.
+What happens then?
+The player process saves up messages to
+be written to the temporary file in a buffer.
+Every 7 seconds or so, the player process gets exclusive access to
+the temporary file and writes out its buffer to the file.
+The driver, running asynchronously, must
+read in the movement command, process it, and write out the results.
+This takes two exclusive accesses to the temporary file.
+Finally, when the player process gets around to doing another 7-second
+update, the results of the move are displayed on the screen.
+Hence, every movement requires four
+exclusive accesses to the temporary file (anywhere from 7 to 21 seconds
+depending upon asynchrony) before the player sees the results of his moves.
+.Pp
+In practice, the delays are not as annoying as they would appear.
+There is room for
+.Dq pipelining
+in the movement.
+After the player writes out
+a first movement message, a second movement command can then be issued.
+The first message will be in the temporary file waiting for the driver, and
+the second will be in the file buffer waiting to be written to the file.
+Thus, by always typing moves a turn ahead of the time, the player can
+sail around quite quickly.
+.Pp
+If the player types several movement commands between two 7-second updates,
+only the last movement command typed will be seen by the driver.
+Movement commands within the same update
+.Dq overwrite
+each other, in a sense.
+.Ss DEFECTS OF THIS SYSTEM IN THE MODERN WORLD
+Quite a few.
+.Pp
+It should be thrown out and replaced with something socket-based.
+.Sh HISTORICAL INFO
+Old square-riggers were very maneuverable ships capable of intricate
+sailing.
+Their only disadvantage was an inability to sail very close to the wind.
+The design of a wooden ship allowed for the guns to bear only to the
+left and right sides.
+A few guns of small
+aspect (usually 6 or 9 pounders) could point forward, but their
+effect was small compared to a 68 gun broadside of 24- or 32-pounders.
+The guns bear approximately like so:
+.Bd -literal -offset indent
+
+ \\
+ b----------------
+ ---0
+ \\
+ \\
+ \\ up to a range of ten (for round shot)
+ \\
+ \\
+ \\
+
+.Ed
+Firing a broadside into a ship lengthwise, from bow to stern or stern
+to bow, is called
+.Em raking .
+This did a great deal more damage, because the shot tended to bounce
+along the deck.
+Because the bows of a ship are very strong and present a smaller
+target than the stern, a stern rake (firing from the stern to the bow) causes
+more damage than a bow rake.
+.Bd -literal -offset indent
+
+ b
+ 00 ---- Stern rake!
+ a
+
+.Ed
+Most ships were equipped with
+.Em carronades ,
+which were very large, close range cannons.
+American ships from the revolution until the War of 1812
+were almost entirely armed with carronades.
+.Pp
+The period of history covered in
+.Nm
+is approximately from the 1770's until the end of Napoleonic France in 1815.
+There are many excellent books about the age of sail.
+.Pq See Sx REFERENCES .
+.Pp
+Fighting ships came in several sizes classed by armament.
+The mainstays of
+any fleet were its
+.Em ships of the line ,
+or
+.Em line of battle ships .
+These were so named because in fleet actions they would sail in lines
+so as to present all broadsides to the enemy at once.
+.\" ... to sail close enough for mutual support.
+The modern terms
+.Dq ocean liner ,
+and
+.Dq battleship
+are derived from
+.Dq ship of the line .
+.Pp
+The pride of the fleet were the
+.Dq first-rates .
+These were huge three decked ships of the line mounting 80 to 136 guns.
+The guns in the three tiers
+were usually 18, 24, and 32 pounders in that order from top to bottom.
+.Pp
+Lesser ships were known as
+.Dq second-rates ,
+.Dq third-rates ,
+and even
+.Dq fourth-rates .
+The most common size was the 74 gun two-decked ship of the line.
+The two gun decks usually mounted 18 and 24 pounder guns.
+.Pp
+.Em Razees
+were ships of the line with one deck sawed off.
+These mounted 40-64 guns and were
+a poor cross between a frigate and a line of battle ship.
+They neither had the speed of the former nor the firepower of the latter.
+.Pp
+The next class was the
+.Em frigate .
+Often called the
+.Dq eyes of the fleet ,
+frigates came in many sizes mounting anywhere from 32 to 44 guns.
+These were very handy vessels.
+They could outsail anything bigger and outshoot anything smaller.
+Frigates did not generally fight in lines of battle as the much bigger
+74s did.
+Instead, they were sent on individual missions or in small groups to
+harass the enemy's rear or capture crippled ships.
+.\" cutting out expeditions or boat actions.
+They were much more useful this way, in missions away from the fleet.
+They could hit hard and get away fast.
+.Pp
+Lastly, there were the corvettes, sloops, and brigs.
+These were smaller ships mounting typically fewer than 20 guns.
+A corvette was only slightly
+smaller than a frigate, so one might have up to 30 guns.
+Sloops were used for carrying despatches or passengers.
+Brigs were small vessels typically built for land-locked lakes.
+.Sh SAIL PARTICULARS
+Ships in
+.Nm
+are represented on the screen by two characters.
+One character represents the bow of
+the ship, and the other represents the stern.
+Ships have nationalities and numbers.
+The first ship of a nationality is number 0, the second
+number 1, etc.
+Therefore, the first British ship in a game would be printed as
+.Dq b0 .
+The second Brit would be
+.Dq b1 ,
+and the fifth Don would be
+.Dq s4 .
+.Pp
+Ships can set normal sails, called
+.Em Battle Sails ,
+or bend on extra canvas called
+.Em Full Sails .
+A ship under full sail is a beautiful sight indeed,
+and it can move much faster than a ship under battle sails.
+The only trouble is, with full sails set, there is so much tension on sail and
+rigging that a well aimed round shot can burst a sail into ribbons where
+it would only cause a little hole in a loose sail.
+For this reason, rigging damage is doubled on a ship with full sails set.
+This does not mean that full sails should never be used; the author
+recommends keeping them up right into the heat of battle.
+When a ship has full sails set, the letter for its nationality is
+capitalized.
+E.g., a Frog,
+.Dq f0 ,
+with full sails set would be printed as
+.Dq F0 .
+.Pp
+When a ship is battered into a listing hulk, the last man aboard
+.Em strikes the colors .
+This ceremony is the ship's formal surrender.
+The nationality character of a surrendered ship is printed as
+.So
+!
+.Sc .
+E.g., the Frog of our last example would soon be
+.Dq !0 .
+.Pp
+A ship that reaches this point has a chance of catching fire or sinking.
+A sinking ship has a
+.Sq ~
+printed for its nationality,
+and a ship on fire and about to explode has a
+.Sq #
+printed.
+.Pp
+Ships that have struck can be captured;
+captured ships become the nationality of the prize crew.
+Therefore, if
+an American ship captures a British ship, the British ship will
+thenceforth have an
+.Sq a
+printed for its nationality.
+In addition, the ship number is changed
+to one of the characters
+.So
+\*[Am]'()*+
+.Sc
+corresponding to its original number
+.So
+012345
+.Sc .
+E.g., the
+.Dq b0
+captured by an American becomes the
+.Dq a\*[Am] .
+The
+.Dq s4
+captured by a Frog becomes the
+.Dq f* .
+.Pp
+The ultimate example is, of course, an exploding Brit captured by an
+American:
+.Dq #\*[Am] .
+.Sh MOVEMENT
+Movement is the most confusing part of
+.Nm
+to many.
+Ships can head in 8 directions:
+.Bd -literal -offset indent
+ 0 0 0
+b b b0 b b b 0b b
+0 0 0
+
+.Ed
+The stern of a ship moves when it turns.
+The bow remains stationary.
+Ships can always turn, regardless of the wind (unless they are becalmed).
+All ships drift when they lose headway.
+If a ship doesn't move forward at all for two turns, it will begin to drift.
+If a ship has begun to
+drift, then it must move forward before it turns, if it plans to do
+more than make a right or left turn, which is always possible.
+.Pp
+Movement commands to
+.Nm
+are a string of forward moves and turns.
+An example is
+.Dq l3 .
+It will turn a ship left and then move it ahead 3 spaces.
+In the drawing above, the
+.Dq b0
+made 7 successive left turns.
+When
+.Nm
+prompts you for a move, it prints three characters of import.
+E.g.,
+.Dl move (7, 4):
+The first number is the maximum number of moves you can make, including turns.
+The second number is the maximum number of turns you can make.
+Between the numbers is sometimes printed a quote
+.Pq ' .
+If the quote is present, it means that your ship has been drifting, and
+you must move ahead to regain headway before you turn (see note above).
+Some of the possible moves for the example above are as follows:
+.Bd -literal -offset indent
+move (7, 4): 7
+move (7, 4): 1
+move (7, 4): d /* drift, or do nothing */
+move (7, 4): 6r
+move (7, 4): 5r1
+move (7, 4): 4r1r
+move (7, 4): l1r1r2
+move (7, 4): 1r1r1r1
+.Ed
+.Pp
+Because square riggers performed so poorly sailing into the wind, if at
+any point in a movement command you turn into the wind, the movement stops
+there.
+E.g.,
+.Bd -literal -offset indent
+move (7, 4): l1l4
+Movement Error;
+Helm: l1l
+
+.Ed
+Moreover, upon making a turn, the movement allowance drops to the
+lesser of what remains this turn and what would be available when
+going in the new direction.
+Thus, any turn closer to the wind will generally preclude sailing the
+full distance printed in the
+.Dq move
+prompt.
+.Pp
+Old sailing captains had to keep an eye constantly on the wind.
+Captains in
+.Nm
+are no different.
+A ship's ability to move depends on its attitude to the wind.
+The best angle possible is to have the wind off your quarter, that is,
+just off the stern.
+The direction rose on the side of the screen gives the
+possible movements for your ship at all positions to the wind.
+Battle
+sail speeds are given first, and full sail speeds are given in parenthesis.
+.Bd -literal
+
+ 0 1(2)
+ \\|/
+ -^-3(6)
+ /|\\
+ | 4(7)
+ 3(6)
+
+.Ed
+Pretend the bow of your ship
+.Pq the Dq ^
+is pointing upward and the wind is
+blowing from the bottom to the top of the page.
+The numbers at the bottom
+.Dq 3(6)
+will be your speed under battle or full
+sails in such a situation.
+If the wind is off your quarter, then you can move
+.Dq 4(7) .
+If the wind is off your beam,
+.Dq 3(6) .
+If the wind is off your bow, then you can only move
+.Dq 1(2) .
+Facing into the wind, you cannot move at all.
+Ships facing into the wind are said to be
+.Em in irons .
+.Sh WINDSPEED AND DIRECTION
+The windspeed and direction is displayed as a weather vane on the
+side of the screen.
+The number in the middle of the vane indicates the wind
+speed, and the + to - indicates the wind direction.
+The wind blows from the + sign (high pressure) to the - sign (low pressure).
+E.g.,
+.Bd -literal
+ |
+ 3
+ +
+.Ed
+.Pp
+The wind speeds are:
+.Bl -tag -width 012 -compact -offset indent
+.It 0
+becalmed
+.It 1
+light breeze
+.It 2
+moderate breeze
+.It 3
+fresh breeze
+.It 4
+strong breeze
+.It 5
+gale
+.It 6
+full gale
+.It 7
+hurricane
+.El
+If a hurricane shows up, all ships are destroyed.
+.Sh GRAPPLING AND FOULING
+If two ships collide, they run the risk of becoming tangled together.
+This is called
+.Em fouling .
+Fouled ships are stuck together, and neither can move.
+They can unfoul each other if they want to.
+Boarding parties can only be
+sent across to ships when the antagonists are either fouled or grappled.
+.Pp
+Ships can grapple each other by throwing grapnels into the rigging of
+the other.
+.Pp
+The number of fouls and grapples you have are displayed on the upper
+right of the screen.
+.Sh BOARDING
+Boarding was a very costly venture in terms of human life.
+Boarding parties may be formed in
+.Nm
+to either board an enemy ship or to defend your own ship against attack.
+Men organized as Defensive Boarding Parties fight twice as hard to save
+their ship as men left unorganized.
+.Pp
+The boarding strength of a crew depends upon its quality and upon the
+number of men sent.
+.Sh CREW QUALITY
+The British seaman was world renowned for his sailing abilities.
+American sailors, however, were actually the best seamen in the world.
+Because the
+American Navy offered twice the wages of the Royal Navy, British seamen
+who liked the sea defected to America by the thousands.
+.Pp
+In
+.Nm ,
+crew quality is quantized into 5 energy levels.
+.Em Elite
+crews can outshoot and outfight all other sailors.
+.Em Crack
+crews are next.
+.Em Mundane
+crews are average, and
+.Em Green
+and
+.Em Mutinous
+crews are below average.
+A good rule of thumb is that
+.Em Crack
+or
+.Em Elite
+crews get one extra hit
+per broadside compared to
+.Em Mundane
+crews.
+Don't expect too much from
+.Em Green
+crews.
+.Sh BROADSIDES
+Your two broadsides may be loaded with four kinds of shot: grape, chain,
+round, and double.
+You have guns and carronades in both the port and starboard batteries.
+Carronades only have a range of two, so you have to get in
+close to be able to fire them.
+You have the choice of firing at the hull or rigging of another ship.
+If the range of the ship is greater than 6,
+then you may only shoot at the rigging.
+.Pp
+The types of shot and their advantages are:
+.Bl -tag -width DOUBLEx
+.It ROUND
+Range of 10.
+Good for hull or rigging hits.
+.It DOUBLE
+Range of 1.
+Extra good for hull or rigging hits.
+Double takes two turns to load.
+.It CHAIN
+Range of 3.
+Excellent for tearing down rigging.
+Cannot damage hull or guns, though.
+.It GRAPE
+Range of 1.
+Sometimes devastating against enemy crews.
+.El
+.Pp
+On the side of the screen is displayed some vital information about your
+ship:
+.Bd -literal -offset indent
+Load D! R!
+Hull 9
+Crew 4 4 2
+Guns 4 4
+Carr 2 2
+Rigg 5 5 5 5
+
+.Ed
+.Dq Load
+shows what your port
+.Pq left
+and starboard
+.Pq right
+broadsides are
+loaded with.
+A
+.So
+!
+.Sc
+after the type of shot indicates that it is an initial broadside.
+Initial broadside were loaded with care before battle and before
+the decks ran red with blood.
+As a consequence, initial broadsides are a
+little more effective than broadsides loaded later.
+A
+.Sq *
+after the type of shot indicates that the gun
+crews are still loading it, and you cannot fire yet.
+.Dq Hull
+shows how much hull you have left.
+.Dq Crew
+shows your three sections of crew.
+As your crew dies off, your ability to fire decreases.
+.Dq Guns
+and
+.Dq Carr
+show your port and starboard guns.
+As you lose guns, your ability to fire decreases.
+.Dq Rigg
+shows how much rigging you have on your 3 or 4 masts.
+As rigging is shot away, you lose mobility.
+.Sh EFFECTIVENESS OF FIRE
+It is very dramatic when a ship fires its thunderous broadsides, but the
+mere opportunity to fire them does not guarantee any hits.
+Many factors influence the destructive force of a broadside.
+First of all, and the chief factor, is distance.
+It is harder to hit a ship at range ten than it is
+to hit one sloshing alongside.
+Next is raking.
+Raking fire, as mentioned before, can sometimes dismast a ship at range ten.
+Next, crew size and quality affects the damage done by a broadside.
+The number of guns firing also bears on the point, so to speak.
+Lastly, weather affects the accuracy of a broadside.
+If the seas are high (5 or 6), then the lower gunports
+of ships of the line can't even be opened to run out the guns.
+This gives frigates and other flush decked vessels an advantage in a storm.
+The scenario
+.Em Pellew vs. The Droits de L'Homme
+takes advantage of this peculiar circumstance.
+.Sh REPAIRS
+Repairs may be made to your Hull, Guns, and Rigging at the slow rate of
+two points per three turns.
+The message "Repairs Completed" will be printed if no more repairs can be made.
+.Sh PECULIARITIES OF COMPUTER SHIPS
+Computer ships in
+.Nm
+follow all the rules above with a few exceptions.
+Computer ships never repair damage.
+If they did, the players could never beat them.
+They play well enough as it is.
+As a consolation, the computer ships can fire double shot every turn.
+That fluke is a good reason to keep your distance.
+The driver figures out the moves of the computer ships.
+It computes them with a typical A.I. distance
+function and a depth first search to find the maximum
+.Dq score .
+It seems to work fairly well, although I'll be the first to admit it isn't
+perfect.
+.Sh HOW TO PLAY
+Commands are given to
+.Nm
+by typing a single character.
+You will then be prompted for further input.
+A brief summary of the commands follows.
+.Ss COMMAND SUMMARY
+.Bl -tag -width xD,xNxx -compact
+.It Sq f
+Fire broadsides if they bear
+.It Sq l
+Reload
+.It Sq L
+Unload broadsides (to change ammo)
+.It Sq m
+Move
+.It Sq i
+Print the closest ship
+.It Sq I
+Print all ships
+.It Sq F
+Find a particular ship or ships (e.g. "a?" for all Americans)
+.It Sq s
+Send a message around the fleet
+.It Sq b
+Attempt to board an enemy ship
+.It Sq B
+Recall boarding parties
+.It Sq c
+Change set of sail
+.It Sq r
+Repair
+.It Sq u
+Attempt to unfoul
+.It Sq g
+Grapple/ungrapple
+.It Sq v
+Print version number of game
+.It Sq ^L
+Redraw screen
+.It Sq Q
+Quit
+.Pp
+.It Sq C
+Center your ship in the window
+.It Sq U
+Move window up
+.It Sq D, N
+Move window down
+.It Sq H
+Move window left
+.It Sq J
+Move window right
+.It Sq S
+Toggle window to follow your ship or stay where it is
+.El
+.Sh SCENARIOS
+Here is a summary of the scenarios in
+.Nm :
+.Ss Ranger vs. Drake :
+Wind from the N, blowing a fresh breeze.
+.Bd -literal
+(a) Ranger 19 gun Sloop (crack crew) (7 pts)
+(b) Drake 17 gun Sloop (crack crew) (6 pts)
+.Ed
+.Ss The Battle of Flamborough Head :
+Wind from the S, blowing a fresh breeze.
+.Pp
+This is John Paul Jones' first famous battle.
+Aboard the
+.Em Bonhomme Richard ,
+he was able to overcome the
+.Em Serapis's
+greater firepower
+by quickly boarding her.
+.Bd -literal
+(a) Bonhomme Rich 42 gun Corvette (crack crew) (11 pts)
+(b) Serapis 44 gun Frigate (crack crew) (12 pts)
+.Ed
+.Ss Arbuthnot and Des Touches :
+Wind from the N, blowing a gale.
+.Bd -literal
+(b) America 64 gun Ship of the Line (crack crew) (20 pts)
+(b) Befford 74 gun Ship of the Line (crack crew) (26 pts)
+(b) Adamant 50 gun Ship of the Line (crack crew) (17 pts)
+(b) London 98 gun 3 Decker SOL (crack crew) (28 pts)
+(b) Royal Oak 74 gun Ship of the Line (crack crew) (26 pts)
+(f) Neptune 74 gun Ship of the Line (average crew) (24 pts)
+(f) Duc de Bourgogne 80 gun 3 Decker SOL (average crew) (27 pts)
+(f) Conquerant 74 gun Ship of the Line (average crew) (24 pts)
+(f) Provence 64 gun Ship of the Line (average crew) (18 pts)
+(f) Romulus 44 gun Ship of the Line (average crew) (10 pts)
+.Ed
+.Ss Suffren and Hughes :
+Wind from the S, blowing a fresh breeze.
+.Bd -literal
+(b) Monmouth 74 gun Ship of the Line (average crew) (24 pts)
+(b) Hero 74 gun Ship of the Line (crack crew) (26 pts)
+(b) Isis 50 gun Ship of the Line (crack crew) (17 pts)
+(b) Superb 74 gun Ship of the Line (crack crew) (27 pts)
+(b) Burford 74 gun Ship of the Line (average crew) (24 pts)
+(f) Flamband 50 gun Ship of the Line (average crew) (14 pts)
+(f) Annibal 74 gun Ship of the Line (average crew) (24 pts)
+(f) Severe 64 gun Ship of the Line (average crew) (18 pts)
+(f) Brilliant 80 gun Ship of the Line (crack crew) (31 pts)
+(f) Sphinx 80 gun Ship of the Line (average crew) (27 pts)
+.Ed
+.Ss Nymphe vs. Cleopatre :
+Wind from the S, blowing a fresh breeze.
+.Bd -literal
+(b) Nymphe 36 gun Frigate (crack crew) (11 pts)
+(f) Cleopatre 36 gun Frigate (average crew) (10 pts)
+.Ed
+.Ss Mars vs. Hercule :
+Wind from the S, blowing a fresh breeze.
+.Bd -literal
+(b) Mars 74 gun Ship of the Line (crack crew) (26 pts)
+(f) Hercule 74 gun Ship of the Line (average crew) (23 pts)
+.Ed
+.Ss Ambuscade vs. Baionnaise :
+Wind from the N, blowing a fresh breeze.
+.Bd -literal
+(b) Ambuscade 32 gun Frigate (average crew) (9 pts)
+(f) Baionnaise 24 gun Corvette (average crew) (9 pts)
+.Ed
+.Ss Constellation vs. Insurgent :
+Wind from the S, blowing a gale.
+.Bd -literal
+(a) Constellation 38 gun Corvette (elite crew) (17 pts)
+(f) Insurgent 36 gun Corvette (average crew) (11 pts)
+.Ed
+.Ss Constellation vs. Vengeance :
+Wind from the S, blowing a fresh breeze.
+.Bd -literal
+(a) Constellation 38 gun Corvette (elite crew) (17 pts)
+(f) Vengeance 40 gun Frigate (average crew) (15 pts)
+.Ed
+.Ss The Battle of Lissa :
+Wind from the S, blowing a fresh breeze.
+.Bd -literal
+(b) Amphion 32 gun Frigate (elite crew) (13 pts)
+(b) Active 38 gun Frigate (elite crew) (18 pts)
+(b) Volage 22 gun Frigate (elite crew) (11 pts)
+(b) Cerberus 32 gun Frigate (elite crew) (13 pts)
+(f) Favorite 40 gun Frigate (average crew) (15 pts)
+(f) Flore 40 gun Frigate (average crew) (15 pts)
+(f) Danae 40 gun Frigate (crack crew) (17 pts)
+(f) Bellona 32 gun Frigate (green crew) (9 pts)
+(f) Corona 40 gun Frigate (green crew) (12 pts)
+(f) Carolina 32 gun Frigate (green crew) (7 pts)
+.Ed
+.Ss Constitution vs. Guerriere :
+Wind from the SW, blowing a gale.
+.Bd -literal
+(a) Constitution 44 gun Corvette (elite crew) (24 pts)
+(b) Guerriere 38 gun Frigate (crack crew) (15 pts)
+.Ed
+.Ss United States vs. Macedonian :
+Wind from the S, blowing a fresh breeze.
+.Bd -literal
+(a) United States 44 gun Frigate (elite crew) (24 pts)
+(b) Macedonian 38 gun Frigate (crack crew) (16 pts)
+.Ed
+.Ss Constitution vs. Java :
+Wind from the S, blowing a fresh breeze.
+.Bd -literal
+(a) Constitution 44 gun Corvette (elite crew) (24 pts)
+(b) Java 38 gun Corvette (crack crew) (19 pts)
+.Ed
+.Ss Chesapeake vs. Shannon :
+Wind from the S, blowing a fresh breeze.
+.Bd -literal
+(a) Chesapeake 38 gun Frigate (average crew) (14 pts)
+(b) Shannon 38 gun Frigate (elite crew) (17 pts)
+.Ed
+.Ss The Battle of Lake Erie :
+Wind from the S, blowing a light breeze.
+.Bd -literal
+(a) Lawrence 20 gun Sloop (crack crew) (9 pts)
+(a) Niagara 20 gun Sloop (elite crew) (12 pts)
+(b) Lady Prevost 13 gun Brig (crack crew) (5 pts)
+(b) Detroit 19 gun Sloop (crack crew) (7 pts)
+(b) Q. Charlotte 17 gun Sloop (crack crew) (6 pts)
+.Ed
+.Ss Wasp vs. Reindeer :
+Wind from the S, blowing a light breeze.
+.Bd -literal
+(a) Wasp 20 gun Sloop (elite crew) (12 pts)
+(b) Reindeer 18 gun Sloop (elite crew) (9 pts)
+.Ed
+.Ss Constitution vs. Cyane and Levant :
+Wind from the S, blowing a moderate breeze.
+.Bd -literal
+(a) Constitution 44 gun Corvette (elite crew) (24 pts)
+(b) Cyane 24 gun Sloop (crack crew) (11 pts)
+(b) Levant 20 gun Sloop (crack crew) (10 pts)
+.Ed
+.Ss Pellew vs. Droits de L'Homme :
+Wind from the N, blowing a gale.
+.Bd -literal
+(b) Indefatigable 44 gun Frigate (elite crew) (14 pts)
+(b) Amazon 36 gun Frigate (crack crew) (14 pts)
+(f) Droits L'Hom 74 gun Ship of the Line (average crew) (24 pts)
+.Ed
+.Ss Algeciras :
+Wind from the SW, blowing a moderate breeze.
+.Bd -literal
+(b) Caesar 80 gun Ship of the Line (crack crew) (31 pts)
+(b) Pompee 74 gun Ship of the Line (crack crew) (27 pts)
+(b) Spencer 74 gun Ship of the Line (crack crew) (26 pts)
+(b) Hannibal 98 gun 3 Decker SOL (crack crew) (28 pts)
+(s) Real-Carlos 112 gun 3 Decker SOL (green crew) (27 pts)
+(s) San Fernando 96 gun 3 Decker SOL (green crew) (24 pts)
+(s) Argonauta 80 gun Ship of the Line (green crew) (23 pts)
+(s) San Augustine 74 gun Ship of the Line (green crew) (20 pts)
+(f) Indomptable 80 gun Ship of the Line (average crew) (27 pts)
+(f) Desaix 74 gun Ship of the Line (average crew) (24 pts)
+.Ed
+.Ss Lake Champlain :
+Wind from the N, blowing a fresh breeze.
+.Bd -literal
+(a) Saratoga 26 gun Sloop (crack crew) (12 pts)
+(a) Eagle 20 gun Sloop (crack crew) (11 pts)
+(a) Ticonderoga 17 gun Sloop (crack crew) (9 pts)
+(a) Preble 7 gun Brig (crack crew) (4 pts)
+(b) Confiance 37 gun Frigate (crack crew) (14 pts)
+(b) Linnet 16 gun Sloop (elite crew) (10 pts)
+(b) Chubb 11 gun Brig (crack crew) (5 pts)
+.Ed
+.Ss Last Voyage of the USS President :
+Wind from the N, blowing a fresh breeze.
+.Bd -literal
+(a) President 44 gun Frigate (elite crew) (24 pts)
+(b) Endymion 40 gun Frigate (crack crew) (17 pts)
+(b) Pomone 44 gun Frigate (crack crew) (20 pts)
+(b) Tenedos 38 gun Frigate (crack crew) (15 pts)
+.Ed
+.Ss Hornblower and the Natividad :
+Wind from the E, blowing a gale.
+.Pp
+A scenario for you Horny fans.
+Remember, he sank the Natividad against heavy odds and winds.
+Hint: don't try to board the Natividad;
+her crew is much bigger, albeit green.
+.Bd -literal
+(b) Lydia 36 gun Frigate (elite crew) (13 pts)
+(s) Natividad 50 gun Ship of the Line (green crew) (14 pts)
+.Ed
+.Ss Curse of the Flying Dutchman :
+Wind from the S, blowing a fresh breeze.
+.Pp
+Just for fun, take the Piece of cake.
+.Bd -literal
+(s) Piece of Cake 24 gun Corvette (average crew) (9 pts)
+(f) Flying Dutchy 120 gun 3 Decker SOL (elite crew) (43 pts)
+.Ed
+.Ss The South Pacific :
+Wind from the S, blowing a strong breeze.
+.Bd -literal
+(a) USS Scurvy 136 gun 3 Decker SOL (mutinous crew) (27 pts)
+(b) HMS Tahiti 120 gun 3 Decker SOL (elite crew) (43 pts)
+(s) Australian 32 gun Frigate (average crew) (9 pts)
+(f) Bikini Atoll 7 gun Brig (crack crew) (4 pts)
+.Ed
+.Ss Hornblower and the battle of Rosas bay :
+Wind from the E, blowing a fresh breeze.
+.Pp
+The only battle Hornblower ever lost.
+He was able to dismast one ship and stern rake the others though.
+See if you can do as well.
+.Bd -literal
+(b) Sutherland 74 gun Ship of the Line (crack crew) (26 pts)
+(f) Turenne 80 gun 3 Decker SOL (average crew) (27 pts)
+(f) Nightmare 74 gun Ship of the Line (average crew) (24 pts)
+(f) Paris 112 gun 3 Decker SOL (green crew) (27 pts)
+(f) Napoleon 74 gun Ship of the Line (green crew) (20 pts)
+.Ed
+.Ss Cape Horn :
+Wind from the NE, blowing a strong breeze.
+.Bd -literal
+(a) Concord 80 gun Ship of the Line (average crew) (27 pts)
+(a) Berkeley 98 gun 3 Decker SOL (crack crew) (28 pts)
+(b) Thames 120 gun 3 Decker SOL (elite crew) (43 pts)
+(s) Madrid 112 gun 3 Decker SOL (green crew) (27 pts)
+(f) Musket 80 gun 3 Decker SOL (average crew) (27 pts)
+.Ed
+.Ss New Orleans :
+Wind from the SE, blowing a fresh breeze.
+.Pp
+Watch that little Cypress go!
+.Bd -literal
+(a) Alligator 120 gun 3 Decker SOL (elite crew) (43 pts)
+(b) Firefly 74 gun Ship of the Line (crack crew) (27 pts)
+(b) Cypress 44 gun Frigate (elite crew) (14 pts)
+.Ed
+.Ss Botany Bay :
+Wind from the N, blowing a fresh breeze.
+.Bd -literal
+(b) Shark 64 gun Ship of the Line (average crew) (18 pts)
+(f) Coral Snake 44 gun Corvette (elite crew) (24 pts)
+(f) Sea Lion 44 gun Frigate (elite crew) (24 pts)
+.Ed
+.Ss Voyage to the Bottom of the Sea :
+Wind from the NW, blowing a fresh breeze.
+.Pp
+This one is dedicated to Richard Basehart and David Hedison.
+.Bd -literal
+(a) Seaview 120 gun 3 Decker SOL (elite crew) (43 pts)
+(a) Flying Sub 40 gun Frigate (crack crew) (17 pts)
+(b) Mermaid 136 gun 3 Decker SOL (mutinous crew) (27 pts)
+(s) Giant Squid 112 gun 3 Decker SOL (green crew) (27 pts)
+.Ed
+.Ss Frigate Action :
+Wind from the E, blowing a fresh breeze.
+.Bd -literal
+(a) Killdeer 40 gun Frigate (average crew) (15 pts)
+(b) Sandpiper 40 gun Frigate (average crew) (15 pts)
+(s) Curlew 38 gun Frigate (crack crew) (16 pts)
+.Ed
+.Ss The Battle of Midway :
+Wind from the E, blowing a moderate breeze.
+.Bd -literal
+(a) Enterprise 80 gun Ship of the Line (crack crew) (31 pts)
+(a) Yorktown 80 gun Ship of the Line (average crew) (27 pts)
+(a) Hornet 74 gun Ship of the Line (average crew) (24 pts)
+(j) Akagi 112 gun 3 Decker SOL (green crew) (27 pts)
+(j) Kaga 96 gun 3 Decker SOL (green crew) (24 pts)
+(j) Soryu 80 gun Ship of the Line (green crew) (23 pts)
+.Ed
+.Ss Star Trek :
+Wind from the S, blowing a fresh breeze.
+.Bd -literal
+(a) Enterprise 450 gun Ship of the Line (elite crew) (75 pts)
+(a) Yorktown 450 gun Ship of the Line (elite crew) (75 pts)
+(a) Reliant 450 gun Ship of the Line (elite crew) (75 pts)
+(a) Galileo 450 gun Ship of the Line (elite crew) (75 pts)
+(k) Kobayashi Maru 450 gun Ship of the Line (elite crew) (75 pts)
+(k) Klingon II 450 gun Ship of the Line (elite crew) (75 pts)
+(o) Red Orion 450 gun Ship of the Line (elite crew) (75 pts)
+(o) Blue Orion 450 gun Ship of the Line (elite crew) (75 pts)
+.Ed
+.Sh HISTORY
+Dave Riggle wrote the first version of
+.Nm
+on a PDP\-11/70 in the fall of 1980.
+Needless to say, the code was horrendous,
+not portable in any sense of the word, and didn't work.
+The program was not
+very modular and had
+.Xr fseek 3
+and
+.Xr fwrite 3
+calls every few lines.
+After a tremendous rewrite from the top down,
+the first working version was up and running by 1981.
+There were several annoying bugs concerning firing broadsides and
+finding angles.
+.\" No longer true...
+.\" .Nm
+.\" uses no floating point, by the way, so the direction routines are rather
+.\" tricky.
+.Pp
+Ed Wang rewrote the
+.Fn angle
+routine in 1981 to be more correct.
+He also added code to let a player select
+which ship he wanted at the start of the game, instead of always
+taking the first one available.
+.Pp
+Captain Happy (Craig Leres) is responsible for making
+.Nm
+portable for the first time.
+This was no easy task.
+Constants like 2 and 10 were very frequent in the code.
+The
+.Nm
+code was also notorious for the use of
+.Dq Riggle Memorial Structures .
+Many structure references were so long that they ran off the line
+printer page.
+Here is an example, if you promise not to laugh:
+.Bd -literal -offset indent
+specs[scene[flog.fgamenum].ship[flog.fshipnum].shipnum].pts
+.Ed
+.Pp
+.Nm
+received its fourth and most thorough rewrite in the summer and fall
+of 1983.
+Ed Wang rewrote and modularized the code (a monumental feat)
+almost from scratch.
+Although he introduced many new bugs, the final result was very much
+cleaner and (?) faster.
+He added window movement commands and find ship commands.
+.Pp
+At some currently unknown time,
+.Nm
+was imported into
+.Bx .
+.Sh AUTHORS
+.Nm
+has been a group effort.
+.Ss AUTHOR
+Dave Riggle
+.Ss CO-AUTHOR
+Ed Wang
+.Ss REFITTING
+Craig Leres
+.Ss CONSULTANTS
+.Bl -item -compact
+.It
+Chris Guthrie
+.It
+Captain Happy
+.It
+Horatio Nelson
+.El
+and many valiant others...
+.Sh REFERENCES
+.Rs
+.%B Wooden Ships \*[Am] Iron Men
+.%A "Avalon Hill"
+.Re
+.Pp
+.Rs
+.%B Master and Commander
+.%O and 20 more volumes
+.%A Patrick O'Brian
+.Re
+.Pp
+.Rs
+.%B Captain Horatio Hornblower Novels
+.%O "(13 of them)"
+.%A "C.S. Forester"
+.Re
+.Pp
+.Rs
+.%B Captain Richard Bolitho Novels
+.%O "(12 of them)"
+.%A "Alexander Kent"
+.Re
+.Pp
+.Rs
+.%B The Complete Works of Captain Frederick Marryat
+.%O "(about 20)"
+.Re
+.Pp
+Of these, consider especially
+.Bl -item -offset indent -compact
+.It
+.%B Mr. Midshipman Easy
+.It
+.%B Peter Simple
+.It
+.%B Jacob Faithful
+.It
+.%B Japhet in Search of a Father
+.It
+.%B Snarleyyow, or The Dog Fiend
+.It
+.%B Frank Mildmay, or The Naval Officer
+.El
+.\" .Sh BUGS
+.\" Probably a few, and please report them to "riggle@ernie.berkeley.edu" and
+.\" "edward@ucbarpa.berkeley.edu".
diff --git a/static/netbsd/man6/smp.6 b/static/netbsd/man6/smp.6
new file mode 100644
index 00000000..268c051c
--- /dev/null
+++ b/static/netbsd/man6/smp.6
@@ -0,0 +1,23 @@
+ * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+ * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
+* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
diff --git a/static/netbsd/man6/snake.6 b/static/netbsd/man6/snake.6
new file mode 100644
index 00000000..e5ab173d
--- /dev/null
+++ b/static/netbsd/man6/snake.6
@@ -0,0 +1,126 @@
+.\" $NetBSD: snake.6,v 1.13 2016/03/12 03:13:52 dholland Exp $
+.\"
+.\" Copyright (c) 1980, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)snake.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt SNAKE 6
+.Os
+.Sh NAME
+.Nm snake ,
+.Nm snscore
+.Nd display chase game
+.Sh SYNOPSIS
+.Nm
+.Op Fl w Ar width
+.Op Fl l Ar length
+.Op Fl t
+.Nm snscore
+.Sh DESCRIPTION
+.Nm
+is a display-based game.
+The object of the game is to make as much money as possible without
+getting eaten by the snake.
+The
+.Fl l
+and
+.Fl w
+options allow you to specify the length and width of the field.
+By default the entire screen is used.
+The
+.Fl t
+option makes the game assume you are on a slow terminal.
+.Pp
+You are represented on the screen by an I.
+The snake is 6 squares long and is represented by s's with an S at its head.
+The money is $, and an exit is #.
+Your score is posted in the upper left hand corner.
+.Pp
+You can move around using the same conventions as
+.Xr vi 1 ,
+the
+.Ic h ,
+.Ic j ,
+.Ic k ,
+and
+.Ic l
+keys work, as do the arrow keys.
+Other possibilities include:
+.Bl -tag -width indent
+.It Ic sefc
+These keys are like hjkl but form a directed pad around the d key.
+.It Ic HJKL
+These keys move you all the way in the indicated direction to the
+same row or column as the money.
+This does
+.Em not
+let you jump away from the snake, but rather saves you from having
+to type a key repeatedly.
+The snake still gets all his turns.
+.It Ic SEFC
+Likewise for the upper case versions on the left.
+.It Ic ATPB
+These keys move you to the four edges of the screen.
+Their position on the keyboard is the mnemonic, e.g.
+P is at the far right of the keyboard.
+.It Ic x
+This lets you quit the game at any time.
+.It Ic p
+Points in a direction you might want to go.
+.It Ic w
+Space warp to get out of tight squeezes, at a price.
+.El
+.Pp
+To earn money, move to the same square the money is on.
+A new $ will appear when you earn the current one.
+As you get richer, the snake gets hungrier.
+To leave the game, move to the exit (#).
+.Pp
+A record is kept of the personal best score of each player.
+Scores are only counted if you leave at the exit,
+getting eaten by the snake is worth nothing.
+.Pp
+As in pinball, matching the last digit of your score to the number
+which appears after the game is worth a bonus.
+.Pp
+To see who wastes time playing snake, run
+.Nm snscore .
+.Sh FILES
+.Bl -tag -width /var/games/snakerawscores -compact
+.It Pa /var/games/snakerawscores
+database of personal bests
+.It Pa /var/games/snake.log
+log of games played
+.El
+.Sh BUGS
+When playing on a small screen,
+it's hard to tell when you hit the edge of the screen.
+.Pp
+The scoring function takes into account the size of the screen.
+A perfect function to do this equitably has not been devised.
diff --git a/static/netbsd/man6/t.6 b/static/netbsd/man6/t.6
new file mode 100644
index 00000000..177d01e5
--- /dev/null
+++ b/static/netbsd/man6/t.6
@@ -0,0 +1,8 @@
+/a|b|c/ {
+ i = $1
+ print
+ while (i >= 1) {
+ print " ", i
+ i = i / 10
+ }
+}
diff --git a/static/netbsd/man6/test_packets.6 b/static/netbsd/man6/test_packets.6
new file mode 100644
index 00000000..70f111e1
--- /dev/null
+++ b/static/netbsd/man6/test_packets.6
@@ -0,0 +1,22 @@
+; test packets for unit test
+;-- next packet --
+; test packet from nlnetlabs.nl ANY +dnssec last SRV has RRSIG first.
+
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
+AA3CB31FD2E8D756F425A80CDA9EDB48A9547582F998D363D8D64E45E65EFECA8BD11B3036D2B8B1DFF0FFD0F703CE7BB6C7A3000F00010001518000040032C02AC7A3000F00010001518000110064056F6D76616C067465646E6574C7ADC7A3002E00010001518000A0000605020001518046E6941D46C1AA1D4706096E6C6E65746C616273026E6C0087059806E37D4CFEC617C733F1841B9EB5DBA3F02E7E105E9D23A9998C34F276FE032A83758FA6B4D30A540BCCB0D82AAA1903C8CDF34377712556B08A227613F40FB3A129B6205B16A377227EE682ED9D6F22069BFA24E50FD485C525DE6D1813B056F9AEF2C0CE408BBA7A3E8D9347AA648849B7896275BE6D7EC443B6E1A0C87C002E00010001518000A0000205020001518046E6941D46C1AA1D4706096E6C6E65746C616273026E6C007588829ABDACCB921070102946174422ECB1057BF9B1DF3A6A179FB03E7CA698C967FDD34EF0973142B6471B161981B0BF9EE066608744D8A60EDC873EFC8461E055915D924BC2FEBCF5DC22D1468EAD2C27D167112FEC0F3C079A91F279EC0925CE54F2AD1EA280D973584633DE119D32F16EAAD012A052D6C66690799AD1D4C92800020001000151800002C02AC92800020001000151800016036E73370F646F6D61696E2D7265676973747279C932C92800020001000151800002C84FC928002E00010001518000A0
+000105020001518046E6941D46C1AA1D4706096E6C6E65746C616273026E6C004A8FDD14D1F4655452A6C5A9321434B9A4FC73C1D63E7D30030D716AC1ABBB37E208319F2A80111D211EE6D8A47FF4084401353FD65B2F50CB6D3EC0C9593CFA53630E75AAEB483C70E9B5B754B5EAD88DDCC2B0EE8D9BA4BAC3F8643BE12A3BD9CE6051BDDE14C46CE9608B935F004C0828ECF0C7958E272F71F67DE8DDDE72CA1200010001000151800004D59AE001CA12002E00010000465000A0002F05020000465046E6941D46C1AA1D4706096E6C6E65746C616273026E6C000E85A6563F289CC81E360B46EC09C30D0B16B3E7C75DB01C6F7544594425237D38D02FCC3C304F904DE3617D195BBA1F0642C2906E1F91C8D4CC7E34903837607AC1FEE5A9F1AA22596EDEC40AAD323EC8F9845F2A17C94F266C0F30E604E1C6A38124EA2A5F87E3522A7E100E4A2B85059FDF9C2716DAC5D735CE111237F395CACE002F0001000046500021045F736970045F756470096E6C6E65746C616273026E6C00000762018008100380066A6F686E6E79CB7200010001000002580004D59AE02CC02A00010001000002580004D59AE001C02A001C0001000002580010200107B8020600010000000000000001C02A001C0001000002580010200107B8020600010000000000000053C84F00010001000070800004D59AE011C84F001C00010000
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
+
+;-- next packet --
+; this packet contains a SOA record, the
+; comrite.com. 86400 IN SOA ns15.domaincontrol.com. dns.jomax.net. 2006092800 28800 7200 604800 86400
+; with dns.jomax.net. having its root label compressed 0xc040.
+00588400000100000001000007
+636F6D7269746503636F6D00001C0001C00C0006000100015180003C046E7331350D646F6D61696E
+636F6E74726F6C03636F6D0003646E73056A6F6D6178036E6574C04077928C000000708000001C20
+00093A8000015180
+
diff --git a/static/netbsd/man6/test_signatures.6 b/static/netbsd/man6/test_signatures.6
new file mode 100644
index 00000000..be6f0909
--- /dev/null
+++ b/static/netbsd/man6/test_signatures.6
@@ -0,0 +1,48 @@
+; Signature test file
+
+; first entry is a DNSKEY answer, with the DNSKEY rrset used for verification.
+; later entries are verified with it.
+
+; ldns-keygen (svn trunk 1.3.0, 15 april 2008)
+; ./ldns-keygen -a DSAMD5 -b 768 nlnetlabs.nl
+; Knlnetlabs.nl.+003+51124
+
+; nlnetlabs.nl. 3600 IN DS 51124 3 1 6f7e3ea1d525f3428ce342596f7375b1c3a71c51
+; Private-key-format: v1.2
+; Algorithm: 3 (DSA)
+; Prime(p): 1kpY0hU98SJrpDCTKHv9TQyN6EGcY9FJ8bw0QiQdcm3nx3fkS298V9Y7ZRzjCQmkxVwNrwdhtNpz4MvrByHKy+YE/hSJamNhwKHAtiIAHNggqfutGQwUkfqHmybFO8Kx
+; Subprime(q): 3GwgwvHRyOeXNgZqR/5XpaNs6Pc=
+; Base(g): Rw1YckcZ/Es07FYrNV6soRTbcQ5NEDj7ITSUdGSLKRPQT0k4ofR3L8aslTeOJESR2s2sIay/ZHoYmdQuwLZ93HLEq5MooPO19c/GnVkOWZm1Ab9H7zttNcoKgzQ64dhT
+; Private_value(x): OoN8CQisHVjCIET7B3WdAwERRro=
+; Public_value(y): 08zY8i9l5qn1xC829beHq2Hhb8MUIvGHyW+eBchQa4S5XIRwf1rVpnw1iengslp/Y1Kx28/a9GEQbIESQORfxllPV23Uv2OJ3aNV0jP7kI2a7VLVSDSJrCh2wBCFj8tY
+
+; DSA key from ldns tool
+ENTRY_BEGIN
+SECTION QUESTION
+nlnetlabs.nl. IN DNSKEY
+SECTION ANSWER
+nlnetlabs.nl. 3600 IN DNSKEY 256 3 3 BNxsIMLx0cjnlzYGakf+V6WjbOj31kpY0hU98SJrpDCTKHv9TQyN6EGcY9FJ8bw0QiQdcm3nx3fkS298V9Y7ZRzjCQmkxVwNrwdhtNpz4MvrByHKy+YE/hSJamNhwKHAtiIAHNggqfutGQwUkfqHmybFO8KxRw1YckcZ/Es07FYrNV6soRTbcQ5NEDj7ITSUdGSLKRPQT0k4ofR3L8aslTeOJESR2s2sIay/ZHoYmdQuwLZ93HLEq5MooPO19c/GnVkOWZm1Ab9H7zttNcoKgzQ64dhT08zY8i9l5qn1xC829beHq2Hhb8MUIvGHyW+eBchQa4S5XIRwf1rVpnw1iengslp/Y1Kx28/a9GEQbIESQORfxllPV23Uv2OJ3aNV0jP7kI2a7VLVSDSJrCh2wBCFj8tY ;{id = 51124 (zsk), size = 768b}
+ENTRY_END
+
+; entry to test
+; from
+; ldns-signzone nlnetlabs.nl Knlnetlabs.nl.+003+51124
+ENTRY_BEGIN
+SECTION QUESTION
+nlnetlabs.nl. IN SOA
+SECTION ANSWER
+nlnetlabs.nl. 10200 IN SOA open.nlnetlabs.nl. hostmaster.nlnetlabs.nl. ( 2008040100 28800 7200 604800 3600 )
+nlnetlabs.nl. 10200 IN RRSIG SOA 3 2 10200 20080513174626 20080415174626 51124 nlnetlabs.nl. MC0CFB3cRDHQROzkGp4NtLNc4jDA1lhWAhUAgsbb8VMxGqifShEzuCNgczxDHHg= ;{id = 51124}
+ENTRY_END
+
+ENTRY_BEGIN
+SECTION QUESTION
+nlnetlabs.nl. IN NS
+SECTION ANSWER
+nlnetlabs.nl. 10200 NS omval.tednet.nl.
+nlnetlabs.nl. 10200 NS ns7.domain-registry.nl.
+nlnetlabs.nl. 10200 NS open.nlnetlabs.nl.
+nlnetlabs.nl. 10200 IN RRSIG NS 3 2 10200 20080513174626 20080415174626 51124 nlnetlabs.nl. MCwCFEzgEjT0n/ooV/xZkRMzKNqeF4pkAhQxEPFtMt5LbIlsi9mSi0HS4+RZuA== ;{id = 51124}
+
+ENTRY_END
+
diff --git a/static/netbsd/man6/testpat.6 b/static/netbsd/man6/testpat.6
new file mode 100644
index 00000000..558cb361
--- /dev/null
+++ b/static/netbsd/man6/testpat.6
@@ -0,0 +1,49 @@
+.\" $NetBSD: testpat.6,v 1.2 2021/01/02 08:55:51 wiz Exp $
+.\"
+.\" Copyright (c) 2021 Nathanial Sloss <nathanialsloss@yahoo.com.au>
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
+.\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+.\" PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
+.\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+.\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+.\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+.\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+.\" POSSIBILITY OF SUCH DAMAGE.
+.\"
+.Dd January 2, 2021
+.Dt TESTPAT 6
+.Os
+.Sh NAME
+.Nm testpat
+.Nd display test pattern
+.Sh SYNOPSIS
+.Nm
+.Op title
+.Sh DESCRIPTION
+The
+.Nm
+command displays a test pattern on a color capable terminal using
+.Xr curses 3 .
+Title is a string to display as the title of the test pattern.
+.Sh SEE ALSO
+.Xr curses 3
+.Sh HISTORY
+.Nm
+appeared in
+.Nx 10.0 .
+.Sh AUTHORS
+.An Nathanial Sloss
diff --git a/static/netbsd/man6/tetris.6 b/static/netbsd/man6/tetris.6
new file mode 100644
index 00000000..32915f8c
--- /dev/null
+++ b/static/netbsd/man6/tetris.6
@@ -0,0 +1,175 @@
+.\" $NetBSD: tetris.6,v 1.18 2023/07/01 10:51:35 nia Exp $
+.\"
+.\" Copyright (c) 1992, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Nancy L. Tinkham and Darren F. Provine.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)tetris.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd July 1, 2023
+.Dt TETRIS 6
+.Os
+.Sh NAME
+.Nm tetris
+.Nd the game of tetris
+.Sh SYNOPSIS
+.Nm
+.Op Fl bps
+.Op Fl k Ar keys
+.Op Fl l Ar level
+.Sh DESCRIPTION
+The
+.Nm
+command is a display-based game.
+The object is to fit the shapes together forming complete rows,
+which then vanish.
+When the shapes fill up to the top, the game ends.
+You can optionally select a level of play, or custom-select control keys.
+.Pp
+The default level of play is 2.
+.Pp
+The default control keys are as follows:
+.Pp
+.Bl -tag -width "xxspacexx" -compact -offset indent
+.It j
+move left
+.It k
+rotate 1/4 turn counterclockwise
+.It l
+move right
+.It Aq space
+drop
+.It p
+pause
+.It q
+quit
+.It n
+down
+.El
+.Pp
+The options are as follows:
+.Bl -tag -width indent
+.It Fl b
+By default, shapes are displayed colorfully if the user's CRT supports color.
+The
+.Fl b
+option can be used to restore the traditional black-and-white behavior.
+.It Fl k
+The default control keys can be changed using the
+.Fl k
+option.
+The
+.Ar keys
+argument must have the seven keys in order, and, remember to quote any
+space or tab characters from the shell.
+For example:
+.Pp
+.Dl "tetris -l 2 -k 'jkl pqn'"
+.Pp
+will play the default games, i.e. level 2 and with the default
+control keys.
+The current key settings are displayed at the bottom of the screen
+during play.
+.It Fl l
+Select a level of play.
+.It Fl s
+Display the top scores.
+.It Fl p
+Switch on previewing of the shape that will appear next.
+.El
+.Sh PLAY
+At the start of the game, a shape will appear at the top of the screen,
+falling one square at a time.
+The speed at which it falls is determined directly by the level:
+if you select level 2, the blocks will fall twice per second;
+at level 9, they fall 9 times per second.
+(As the game goes on, things speed up,
+no matter what your initial selection.)
+When this shape
+.Dq touches down
+on the bottom of the field, another will appear at the top.
+.Pp
+You can move shapes to the left or right, rotate them counterclockwise,
+or drop them to the bottom by pressing the appropriate keys.
+As you fit them together, completed horizontal rows vanish,
+and any blocks above fall down to fill in.
+When the blocks stack up to the top of the screen, the game is over.
+.Sh SCORING
+You get one point for every block you fit into the stack,
+and one point for every space a block falls when you hit the drop key.
+(Dropping the blocks is therefore a good way to increase your score.)
+Your total score is the product of the level of play
+and your accumulated
+.ie t points\(em200
+.el points -- 200
+points on level 3 gives you a score of 600.
+Each player gets at most one entry on any level,
+for a total of nine scores in the high scores file.
+Players who no longer have accounts are limited to one score.
+Also, scores over 5 years old are expired.
+The exception to these conditions is that the highest score on a given
+level is
+.Em always
+kept,
+so that following generations can pay homage to those who have
+wasted serious amounts of time.
+.Pp
+The score list is produced at the end of the game.
+The printout includes each player's overall ranking,
+name, score, and how many points were scored on what level.
+Scores which are the highest on a given level
+are marked with asterisks
+.Dq * .
+.Sh ENVIRONMENT
+.Nm
+honors the informal standard
+.Dv NO_COLOR .
+When it is set in the environment, no color will be used.
+.Sh FILES
+.Bl -tag -width /var/games/tetris.scoresxx
+.It /var/games/tetris.scores
+high score file
+.El
+.Sh AUTHORS
+.An -nosplit
+Adapted from a 1989 International Obfuscated C Code Contest winner by
+.An Chris Torek
+and
+.An Darren F. Provine .
+.Pp
+Manual adapted from the original entry written by
+.An Nancy L. Tinkham
+and
+.An Darren F. Provine .
+.Pp
+Code for previewing next shape added by
+.An Hubert Feyrer
+in 1999.
+.Sh BUGS
+The higher levels are unplayable without a fast terminal connection.
diff --git a/static/netbsd/man6/traffic.expect.6 b/static/netbsd/man6/traffic.expect.6
new file mode 100644
index 00000000..d5affe6b
--- /dev/null
+++ b/static/netbsd/man6/traffic.expect.6
@@ -0,0 +1,10 @@
+.\" $NetBSD: traffic.expect.6,v 1.3 2025/01/26 16:25:04 christos Exp $
+.\"
+tcp request-size 16-31: 1
+tcp request-size 48-63: 2
+tcp response-size 112-127: 1
+tcp response-size 64-79: 1
+tcp response-size 848-863: 1
+udp request-size 48-63: 2
+udp response-size 112-127: 1
+udp response-size 848-863: 1
diff --git a/static/netbsd/man6/trek.6 b/static/netbsd/man6/trek.6
new file mode 100644
index 00000000..2da7cafd
--- /dev/null
+++ b/static/netbsd/man6/trek.6
@@ -0,0 +1,141 @@
+.\" $NetBSD: trek.6,v 1.14 2022/06/28 20:12:52 rillig Exp $
+.\"
+.\" Copyright (c) 1980, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)trek.6 8.2 (Berkeley) 12/30/93
+.\"
+.Dd June 28, 2022
+.Dt TREK 6
+.Os
+.Sh NAME
+.Nm trek
+.Nd trekkie game
+.Sh SYNOPSIS
+.Nm
+.Oo
+.Fl sf
+.Oc
+.Sh DESCRIPTION
+.Nm
+is a game of space glory and war.
+Below is a summary of commands.
+For complete documentation, see
+.Em Trek
+by Eric Allman.
+.Pp
+The
+.Fl s
+flag makes the game somewhat more efficient if you have a (very) slow
+terminal.
+The
+.Fl f
+flag (the default) is for faster terminals.
+.Pp
+The game will ask you what length game you would like.
+Valid responses are
+.Dq short ,
+.Dq medium ,
+and
+.Dq long .
+You may also type
+.Dq restart ,
+which restarts a previously saved game.
+You will then be prompted for the skill, to which you must respond
+.Dq novice ,
+.Dq fair ,
+.Dq good ,
+.Dq expert ,
+.Dq commodore ,
+or
+.Dq impossible .
+You should normally start out with a novice and work up.
+.Pp
+In general, throughout the game, if you forget what is appropriate
+the game will tell you what it expects if you just type in a question mark.
+.Sh SEE ALSO
+.Pa /usr/share/doc/reference/ref6/trek
+.Sh AUTHORS
+.An Eric Allman
+.Sh COMMAND SUMMARY
+.Bl -item -compact
+.It
+.Ic abandon
+.It
+.Ic ca Ns pture
+.It
+.Ic cl Ns oak
+.Ic u Ns p/ Ns Ic d Ns own
+.It
+.Ic c Ns omputer request; ...
+.It
+.Ic da Ns mages
+.It
+.Ic destruct
+.It
+.Ic do Ns ck
+.It
+.Ic help
+.It
+.Ic i Ns mpulse course distance
+.It
+.Ic l Ns rscan
+.It
+.Ic m Ns ove course distance
+.It
+.Ic p Ns hasers Ic a Ns utomatic
+amount
+.It
+.Ic p Ns hasers Ic m Ns anual
+amt1 course1 spread1 ...
+.It
+.Ic t Ns orpedo course
+.Op Ic y Ns es
+.No angle/ Ns Ic n Ns o
+.It
+.Ic ram No course distance
+.It
+.Ic r Ns est time
+.It
+.Ic shell
+.It
+.Ic sh Ns ields
+.Ic u Ns p/ Ns Ic d Ns own
+.It
+.Ic s Ns rscan
+.Op Ic y Ns es/ Ic n Ns o
+.It
+.Ic st Ns atus
+.It
+.Ic terminate y Ns es/ Ns Ic n Ns o
+.It
+.Ic u Ns ndock
+.It
+.Ic v Ns isual course
+.It
+.Ic w Ns arp warp_factor
+.El
diff --git a/static/netbsd/man6/wargames.6 b/static/netbsd/man6/wargames.6
new file mode 100644
index 00000000..bf393cbc
--- /dev/null
+++ b/static/netbsd/man6/wargames.6
@@ -0,0 +1,50 @@
+.\" $NetBSD: wargames.6,v 1.6 2005/09/15 02:09:42 wiz Exp $
+.\"
+.\" Copyright (c) 1998 Joey Hess
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. The name of the author may not be used to endorse or promote products
+.\" derived from this software without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
+.\" BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
+.\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
+.\" AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
+.\" OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.Dd February 22, 1998
+.Dt WARGAMES 6
+.Os
+.Sh NAME
+.Nm wargames
+.Nd shall we play a game?
+.Sh SYNOPSIS
+.Nm wargames
+.Sh DESCRIPTION
+.Dq Shall we play a game?
+-- computer,
+.Nm wargames
+.Pp
+Just like in the movie, the computer will happily play a game with you.
+The likelihood of Global Thermonuclear Warfare resulting is much smaller....
+.Sh SEE ALSO
+Wargames,
+the movie (an MGM production, PG 13, directed by John Badham, 1983).
+.Sh AUTHORS
+This manual page was written by
+.An Joey Hess
+.Aq joeyh@kitenet.net .
diff --git a/static/netbsd/man6/worm.6 b/static/netbsd/man6/worm.6
new file mode 100644
index 00000000..5bd501c9
--- /dev/null
+++ b/static/netbsd/man6/worm.6
@@ -0,0 +1,62 @@
+.\" $NetBSD: worm.6,v 1.11 2004/01/01 16:06:57 jsm Exp $
+.\"
+.\" Copyright (c) 1989, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)worm.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd May 31, 1993
+.Dt WORM 6
+.Os
+.Sh NAME
+.Nm worm
+.Nd Play the growing worm game
+.Sh SYNOPSIS
+.Nm
+.Op Ar size
+.Sh DESCRIPTION
+In
+.Nm ,
+you are a little worm, your body is the "o"'s on the screen
+and your head is the "@".
+You move with the hjkl keys and the arrow keys (as in the game snake).
+If you don't press any keys, you continue in the direction you last moved.
+The upper case HJKL keys move you as if you had pressed
+several (9 for HL and 5 for JK) of the corresponding lower case key
+(unless you run into a digit, then it stops).
+.Pp
+On the screen you will see a digit, if your worm eats the digit is will
+grow longer, the actual amount longer depends on which digit it was
+that you ate.
+The object of the game is to see how long you can make the worm grow.
+.Pp
+The game ends when the worm runs into either the sides of the screen,
+or itself.
+The current score (how much the worm has grown) is kept in
+the upper right corner of the screen.
+.Pp
+The optional argument, if present, is the initial length of the worm.
diff --git a/static/netbsd/man6/worms.6 b/static/netbsd/man6/worms.6
new file mode 100644
index 00000000..62f6e52c
--- /dev/null
+++ b/static/netbsd/man6/worms.6
@@ -0,0 +1,126 @@
+.\" $NetBSD: worms.6,v 1.18 2023/04/26 22:58:09 kre Exp $
+.\"
+.\" Copyright (c) 1989, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)worms.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd April 26, 2023
+.Dt WORMS 6
+.Os
+.Sh NAME
+.Nm worms
+.Nd animate worms on a display terminal
+.Sh SYNOPSIS
+.Nm
+.Op Fl CfHrt
+.Op Fl d Ar delay
+.Op Fl l Ar length
+.Op Fl n Ar number
+.Op Fl S Ar seed
+.Sh DESCRIPTION
+.Nm
+is a
+.Ux
+version of the DEC-2136 program
+.Dq worms .
+.Pp
+The options are as follows:
+.Bl -compact -tag -width Fl
+.Pp
+.It Fl C
+Use colours, if available, to make the worms easier to distinguish.
+.Pp
+.It Fl d Ar delay
+Specifies a
+.Ar delay ,
+in milliseconds, between each update.
+This is useful for fast terminals.
+Reasonable values are around 20-200;
+the default is 20.
+.Pp
+.It Fl f
+Makes a
+.Dq field
+for the worm(s) to eat.
+.Pp
+.It Fl H
+Display the head of the worm differently than its body.
+.Pp
+.It Fl l Ar length
+.It Fl l Ar min Ns \(mi Ns Ar max
+Specifies the
+.Ar length
+of each worm; the default is 16, the minimum is 2.
+In the second form, worm lengths are randomly chosen
+between
+.Ar min
+.Pq which must be at least 2
+and
+.Ar max .
+The
+.Ar max
+worm length will be reduced if required by the screen
+size and the
+.Ar number
+of worms selected.
+This option overrides any earlier
+.Fl r .
+.Pp
+.It Fl n Ar number
+Specifies the
+.Ar number
+of worms; the default is 3.
+There must be at least one.
+.Pp
+.It Fl r
+Use random lengths for the worms, within a range of
+sizes chosen to suit the screen size.
+Note this option overrides any earlier
+.Fl l .
+.Pp
+.It Fl S Ar seed
+Provide an integer
+.Ar seed
+for the random number generator.
+Specifying zero (0, the default) causes a random seed to be used.
+.Pp
+.It Fl t
+Makes each worm leave a trail behind it.
+.El
+.Pp
+The maximum
+.Ar length ,
+and
+.Ar number ,
+of worms depends upon the screen size, though the
+.Ar length
+can never exceed 1024.
+If the screen is particularly small, even the defaults
+for those may be too large.
+Screens with less than 3 rows or columns cannot be handled,
+nor can ones with insufficient total space.
diff --git a/static/netbsd/man6/wtf.6 b/static/netbsd/man6/wtf.6
new file mode 100644
index 00000000..c2764e7f
--- /dev/null
+++ b/static/netbsd/man6/wtf.6
@@ -0,0 +1,90 @@
+.\" $NetBSD: wtf.6,v 1.19 2015/04/22 15:04:57 christos Exp $
+.\"
+.\" Public Domain
+.\"
+.Dd April 22, 2015
+.Dt WTF 6
+.Os
+.Sh NAME
+.Nm wtf
+.Nd look up terms
+.Sh SYNOPSIS
+.Nm
+.Op Fl f Ar dbfile
+.Op Fl o
+.Op Ar is
+.Ar term ...
+.Sh DESCRIPTION
+The
+.Nm
+utility looks up the meaning of one or more
+.Ar term
+operands specified on the command line.
+.Pp
+.Ar term
+will first be searched for as an acronym in the acronym databases,
+which are expected to be in the format
+.Dq acronym[tab]meaning .
+If no match has been found,
+.Nm
+will check to see if the term is known by
+.Xr whatis 1 ,
+.Xr pkg_info 1 ,
+or, when called from within a pkgsrc package directory,
+pkgsrc's internal help facility,
+.Dq make help topic=XXX .
+.Pp
+The optional
+.Ar is
+operand will be ignored, allowing the
+fairly natural
+.Dq wtf is WTF
+usage.
+.Pp
+The following option is available:
+.Bl -tag -width flag
+.It Fl f Ar dbfile
+Overrides the default list of acronym databases, bypassing the value of the
+.Ev ACRONYMDB
+variable.
+Unlike this variable the
+.Fl f
+option only accepts one file name as an argument,
+but it may be given multiple times to specify more than one file to use.
+.It Fl o
+Include acronyms that could be considered offensive to some.
+Please consult
+.Xr fortune 6
+for more information about the
+.Fl o
+flag.
+.El
+.Sh ENVIRONMENT
+.Bl -tag -width ACRONYMDB
+.It Ev ACRONYMDB
+The default list of acronym databases may be overridden by setting the
+environment variable
+.Ev ACRONYMDB
+to the name of one or more space-separated file names of
+acronym databases.
+.El
+.Sh FILES
+.Bl -tag -width /usr/share/misc/acronyms.XXXX -compact
+.It Pa /usr/share/misc/acronyms
+default acronym database.
+.It Pa /usr/share/misc/acronyms-o
+default offensive acronym database.
+.It Pa /usr/share/misc/acronyms.comp
+default computer-related acronym database.
+.El
+.Sh SEE ALSO
+.Xr make 1 ,
+.Xr pkg_info 1 ,
+.Xr whatis 1 ,
+.Xr fortune 6
+.Sh HISTORY
+.Nm
+first appeared in
+.Nx 1.5 .
+Initially it only translated acronyms;
+functionality to look up the meaning of terms in other sources was added later.
diff --git a/static/netbsd/man6/wump.6 b/static/netbsd/man6/wump.6
new file mode 100644
index 00000000..15a30778
--- /dev/null
+++ b/static/netbsd/man6/wump.6
@@ -0,0 +1,110 @@
+.\" $NetBSD: wump.6,v 1.8 2006/01/22 21:22:30 wiz Exp $
+.\"
+.\" Copyright (c) 1989, 1993
+.\" The Regents of the University of California. All rights reserved.
+.\"
+.\" This code is derived from software contributed to Berkeley by
+.\" Dave Taylor, of Intuitive Systems.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. Neither the name of the University nor the names of its contributors
+.\" may be used to endorse or promote products derived from this software
+.\" without specific prior written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" @(#)wump.6 8.1 (Berkeley) 5/31/93
+.\"
+.Dd January 19, 2006
+.Dt WUMP 6
+.Os
+.Sh NAME
+.Nm wump
+.Nd hunt the wumpus in an underground cave
+.Sh SYNOPSIS
+.Nm
+.Op Fl h
+.Op Fl a Ar arrows
+.Op Fl b Ar bats
+.Op Fl p Ar pits
+.Op Fl r Ar rooms
+.Op Fl t Ar tunnels
+.Sh DESCRIPTION
+The game
+.Nm
+is based on a fantasy game first presented in the pages of
+.Em People's Computer Company
+in 1973.
+In Hunt the Wumpus you are placed in a cave built of many different rooms,
+all interconnected by tunnels.
+Your quest is to find and shoot the evil Wumpus that resides elsewhere in
+the cave without running into any pits or using up your limited supply of
+arrows.
+.Pp
+The options are as follows:
+.Bl -tag -width indent
+.It Fl a
+Specifies the number of magic arrows the adventurer gets.
+The default is five.
+.It Fl b
+Specifies the number of rooms in the cave which contain bats.
+The default is three.
+.It Fl h
+Play the hard version -- more pits, more bats, and a generally more
+dangerous cave.
+.It Fl p
+Specifies the number of rooms in the cave which contain bottomless pits.
+The default is three.
+.It Fl r
+Specifies the number of rooms in the cave.
+The default cave size is twenty rooms.
+.It Fl t
+Specifies the number of tunnels connecting each room in the cave to
+another room.
+Beware, too many tunnels in a small cave can easily cause it to collapse!
+The default cave room has three tunnels to other rooms.
+.El
+.Pp
+While wandering through the cave you'll notice that, while there are tunnels
+everywhere, there are some mysterious quirks to the cave topology, including
+some tunnels that go from one room to another, but not necessarily back!
+Also, most pesky of all are the rooms that are home to large numbers of bats,
+which, upon being disturbed, will en masse grab you and move you to another
+portion of the cave (including those housing bottomless pits, sure
+death for unwary explorers).
+.Pp
+Fortunately, you're not going into the cave without any weapons or tools,
+and in fact your biggest aids are your senses; you can often smell the
+rather odiferous Wumpus up to
+.Em two
+rooms away, and you can always feel the drafts created by the occasional
+bottomless pit and hear the rustle of the bats in caves they might be
+sleeping within.
+.Pp
+To kill the wumpus, you'll need to shoot it with one of your magic arrows.
+Fortunately, you don't have to be in the same room as the creature, and can
+instead shoot the arrow from as far as three or four rooms away!
+.Pp
+When you shoot an arrow, you do so by typing in a list of rooms that you'd
+like it to travel to.
+If at any point in its travels it cannot find a tunnel to the room you
+specify from the room it's in, it will instead randomly fly down one of the
+tunnels, possibly, if you're real unlucky, even flying back into the room
+you're in and hitting you!