aboutsummaryrefslogtreecommitdiff
path: root/unprotbas.1
diff options
context:
space:
mode:
authorB. Watson <urchlay@slackware.uk>2024-05-24 04:22:02 -0400
committerB. Watson <urchlay@slackware.uk>2024-05-24 04:25:34 -0400
commit79ba7b783def208893d13fe785e7d8bde76740a2 (patch)
treee24a0748b8d045465f700b6f2953e6e8d3761ddf /unprotbas.1
parent0044a85e0ab54ebec7e1ba47f4a4a6ac2ad29360 (diff)
downloadbw-atari8-tools-79ba7b783def208893d13fe785e7d8bde76740a2.tar.gz
unprotbas: add -p/-pc/-pv to docs, plus verbose operation for them.
Diffstat (limited to 'unprotbas.1')
-rw-r--r--unprotbas.116
1 files changed, 12 insertions, 4 deletions
diff --git a/unprotbas.1 b/unprotbas.1
index de1f947..4d381b2 100644
--- a/unprotbas.1
+++ b/unprotbas.1
@@ -27,17 +27,18 @@ level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]]
.in \\n[rst2man-indent\\n[rst2man-indent-level]]u
..
-.TH "UNPROTBAS" 1 "2024-05-23" "0.2.1" "Urchlay's Atari 8-bit Tools"
+.TH "UNPROTBAS" 1 "2024-05-24" "0.2.1" "Urchlay's Atari 8-bit Tools"
.SH NAME
-unprotbas \- Unprotect LIST-protected Atari 8-bit BASIC programs
+unprotbas \- Unprotect or create LIST-protected Atari 8-bit BASIC programs
.SH SYNOPSIS
.sp
-unprotbas [\fB\-v\fP] [\fB\-f\fP] [\fB\-n\fP] [\fB\-g\fP] [\fB\-c\fP] [\fB\-r\fP | \fB\-w\fP] \fBinput\-file\fP \fBoutput\-file\fP
+unprotbas [\fB\-v\fP] [ [\fB\-f\fP] [\fB\-n\fP] [\fB\-g\fP] [\fB\-c\fP] [\fB\-r\fP | \fB\-w\fP] ] | [ [\fB\-p\fP | \fB\-pc\fP | \fB\-pv\fP] ] \fBinput\-file\fP \fBoutput\-file\fP
.SH DESCRIPTION
.sp
\fBunprotbas\fP modifies a LIST\-protected Atari 8\-bit BASIC program,
creating a new non\-protected copy. See \fBDETAILS\fP, below, to
-understand how the protection and unprotection works.
+understand how the protection and unprotection works. It\(aqs also capable
+of LIST\-protecting an unprotected program.
.sp
\fBinput\-file\fP must be a tokenized (SAVEd) Atari BASIC program. Use
\fI\-\fP to read from standard input.
@@ -84,6 +85,13 @@ generating new ones. See \fBVARIABLE NAMES\fP, below.
.B \fB\-r\fP
Read variable names from \fBvarnames.txt\fP, and use them instead of
generating the names. See \fBVARIABLE NAMES\fP, below.
+.TP
+.B \fB\-p\fP, \fB\-pc\fP, \fB\-pv\fP
+LIST\-protect the program, rather than unprotecting it. \fB\-pc\fP sets
+an invalid (0) next\-line pointer on the last line of code. \fB\-pv\fP
+replaces the variable names with the Atari EOL character (\fB$9B\fP).
+\fB\-p\fP does both. None of the other options except \fB\-v\fP (verbose)
+can be used with these.
.UNINDENT
.SH EXIT STATUS
.INDENT 0.0